Most recent articles by:
Deep Shah
Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.
News
Chrome Zero-Day Flaw Exploited in Wild, Patch Out
Google issued an emergency Chrome patch for an actively exploited zero-day vulnerability, tracked as CVE-2026-2441.The high-severity flaw is a use-after-free bug in CSS that...
News
New Stealthy VoidLink Malware Targets Finance Sector
A new cyber-espionage actor, UAT-9921, is using the advanced VoidLink malware framework to target financial and tech sectors.The modular, AI-assisted VoidLink is designed for...
News
North Korean Hackers Use Google’s Gemini AI for Cyber Recon
Google's threat intelligence team observed the North Korean hacking group UNC2970 using the generative AI model Gemini to profile high-value cybersecurity and defense targets.Multiple...
News
Apple Releases Updates for Exploited Zero-Day Flaw
Apple has released emergency security updates for all major platforms including iOS, macOS, and visionOS.The patches address a critical memory corruption flaw (CVE-2026-20700) in...
News
Patch Tuesday: Microsoft Fixes 59 Flaws, 6 Zero-Days
Major software vendors, including Microsoft, Adobe, and SAP, released critical security patches on February 11, 2026, addressing dozens of vulnerabilities.Microsoft fixed 59 flaws, six...
News
India Defense Sector Targeted by Pakistan-Linked RAT Campaigns
Indian defense and government organizations have been targeted by sophisticated cyber espionage campaigns since at least February 2026.Pakistan-aligned threat groups SideCopy and APT36 are...
News
Exposed Cloud Training Apps Exploited by Attackers
Security researchers found nearly 2,000 publicly exposed, intentionally vulnerable training apps in cloud environments, with 60% hosted on customer-managed infrastructure.Approximately 20% of these exposed...
News
New SSHStalker Linux Botnet Uses Old Exploits
A new botnet, SSHStalker, uses legacy IRC protocol for command-and-control and targets old Linux systems.The operation is distinct for maintaining persistent access without immediate...
