Most recent articles by:

Deep Shah

Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.

Chrome Zero-Day Flaw Exploited in Wild, Patch Out

Google issued an emergency Chrome patch for an actively exploited zero-day vulnerability, tracked as CVE-2026-2441.The high-severity flaw is a use-after-free bug in CSS that...

New Stealthy VoidLink Malware Targets Finance Sector

A new cyber-espionage actor, UAT-9921, is using the advanced VoidLink malware framework to target financial and tech sectors.The modular, AI-assisted VoidLink is designed for...

North Korean Hackers Use Google’s Gemini AI for Cyber Recon

Google's threat intelligence team observed the North Korean hacking group UNC2970 using the generative AI model Gemini to profile high-value cybersecurity and defense targets.Multiple...

Apple Releases Updates for Exploited Zero-Day Flaw

Apple has released emergency security updates for all major platforms including iOS, macOS, and visionOS.The patches address a critical memory corruption flaw (CVE-2026-20700) in...

Patch Tuesday: Microsoft Fixes 59 Flaws, 6 Zero-Days

Major software vendors, including Microsoft, Adobe, and SAP, released critical security patches on February 11, 2026, addressing dozens of vulnerabilities.Microsoft fixed 59 flaws, six...

India Defense Sector Targeted by Pakistan-Linked RAT Campaigns

Indian defense and government organizations have been targeted by sophisticated cyber espionage campaigns since at least February 2026.Pakistan-aligned threat groups SideCopy and APT36 are...

Exposed Cloud Training Apps Exploited by Attackers

Security researchers found nearly 2,000 publicly exposed, intentionally vulnerable training apps in cloud environments, with 60% hosted on customer-managed infrastructure.Approximately 20% of these exposed...

New SSHStalker Linux Botnet Uses Old Exploits

A new botnet, SSHStalker, uses legacy IRC protocol for command-and-control and targets old Linux systems.The operation is distinct for maintaining persistent access without immediate...

Must read