Loading cryptocurrency prices...

Most recent articles by:

Deep Shah

Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.

North Korean APT37 Targets S. Korea With RokRAT in New Attacks

Cybersecurity researchers identified a new phishing campaign by North Korea-linked group ScarCruft (APT37), targeting South Korean individuals. The attack used fake newsletters and malicious links...

WhatsApp Fixes Zero-Day Bug Exploited in Targeted Spyware Attacks

WhatsApp fixed a significant security vulnerability that could affect iOS and macOS users. The flaw, CVE-2025-55177, may have been used in real-world attacks combined with...

FBI, Dutch Police Dismantle $6.4M VerifTools ID Fraud Market

Authorities in the U.S. and Netherlands took down VerifTools, a major online marketplace for fake IDs, targeting cybercriminals internationally.The FBI seized the marketplace's main...

Google Warns of Widespread Data Breach Impacting Salesforce Users

Google disclosed a broad attack affecting Salesforce instances through Salesloft Drift integrations. All authentication tokens connected to Drift are considered potentially compromised, according to Google’s...

VS Code Marketplace Loophole Lets Hackers Reuse Malicious Extension Names

Researchers found that removed extension names on the Visual Studio Code Marketplace can be reused by anyone, opening a new attack vector. Malicious extensions have...

North Korean IT Workers Use AI Tools in Fraud, Face New US Sanctions

The U.S. Treasury sanctioned two people and two companies connected to North Korea’s illegal IT worker program. North Korean IT workers are accused of fraud,...

Five Golden Rules for Safe AI Adoption and Data Protection at Work

Effective AI adoption requires robust controls and visibility in organizations. Real-time monitoring and discovery of all AI activity is essential to reduce risks. Context-based risk assessment...

ESET Discovers PromptLock: First AI-Powered Ransomware Emerges

Researchers at ESET identified a new AI-powered Ransomware called PromptLock. PromptLock uses locally run AI models to create malicious scripts that target files across multiple...

Must read