Most recent articles by:

Deep Shah

Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.

Brazilian Banking Trojan Targets Crypto Platforms

Cybersecurity researchers have uncovered a new Brazilian banking trojan named TCLBANKER, which targets 59 banking, fintech, and cryptocurrency platforms.The malware spreads via malicious MSI...

Quasar Linux RAT Targets Developers’ Credentials

A new Linux malware, Quasar Linux RAT (QLNX), is stealthily targeting developers to steal credentials for software supply chains.The malware can hide itself, harvest...

Linux ‘Dirty Frag’ Vulnerability Unpatched

A new, unpatched Linux kernel vulnerability dubbed Dirty Frag enables local privilege escalation to root.The flaw chains two Page-Cache Write bugs and has a...

Ivanti EPMM Zero-Day Exploited, CISA Issues Order

A new, actively exploited flaw (CVE-2026-6973) in Ivanti Endpoint Manager Mobile allows authenticated admins remote code execution.The U.S. Cybersecurity and Infrastructure Security Agency (CISA)...

AI Phishing: New Threat Detection Webinar Announced

Cybersecurity's greatest challenge is human vulnerability, not technology.AI-generated phishing attacks are making the initial malicious "click" nearly impossible to detect.A rapid containment plan focused...

Critical Flaws Found in vm2 Node.js Sandbox Library

vm2 Node.js library users must urgently update to version 3.11.2 to patch twelve critical sandbox escape vulnerabilities.The flaws allow attackers to break out of...

New botnet targets Android TVs, IoT devices

A new Mirai-derived botnet called xlabs_v1 is targeting internet-exposed Android devices to build a DDoS-for-hire service.The malware specifically hunts for Android Debug Bridge (ADB)...

Android Bolsters Security with Binary Transparency Log

Google has expanded its Binary Transparency initiative to the entire Android ecosystem to combat supply chain attacks.The system creates a public cryptographic log, similar...

Must read