Most recent articles by:
Deep Shah
Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.
News
North Korean APT37 Targets S. Korea With RokRAT in New Attacks
Cybersecurity researchers identified a new phishing campaign by North Korea-linked group ScarCruft (APT37), targeting South Korean individuals.
The attack used fake newsletters and malicious links...
News
WhatsApp Fixes Zero-Day Bug Exploited in Targeted Spyware Attacks
WhatsApp fixed a significant security vulnerability that could affect iOS and macOS users.
The flaw, CVE-2025-55177, may have been used in real-world attacks combined with...
News
FBI, Dutch Police Dismantle $6.4M VerifTools ID Fraud Market
Authorities in the U.S. and Netherlands took down VerifTools, a major online marketplace for fake IDs, targeting cybercriminals internationally.The FBI seized the marketplace's main...
News
Google Warns of Widespread Data Breach Impacting Salesforce Users
Google disclosed a broad attack affecting Salesforce instances through Salesloft Drift integrations.
All authentication tokens connected to Drift are considered potentially compromised, according to Google’s...
News
VS Code Marketplace Loophole Lets Hackers Reuse Malicious Extension Names
Researchers found that removed extension names on the Visual Studio Code Marketplace can be reused by anyone, opening a new attack vector.
Malicious extensions have...
News
North Korean IT Workers Use AI Tools in Fraud, Face New US Sanctions
The U.S. Treasury sanctioned two people and two companies connected to North Korea’s illegal IT worker program.
North Korean IT workers are accused of fraud,...
News
Five Golden Rules for Safe AI Adoption and Data Protection at Work
Effective AI adoption requires robust controls and visibility in organizations.
Real-time monitoring and discovery of all AI activity is essential to reduce risks.
Context-based risk assessment...
News
ESET Discovers PromptLock: First AI-Powered Ransomware Emerges
Researchers at ESET identified a new AI-powered Ransomware called PromptLock.
PromptLock uses locally run AI models to create malicious scripts that target files across multiple...