Most recent articles by:

Deep Shah

Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.

CISA Flags Critical ASUS Live Update Flaw Exploited in the Wild

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a critical vulnerability affecting ASUS Live Update to its Known Exploited Vulnerabilities catalog.The flaw, CVE-2025-59374,...

Cisco Warns of Critical Zero-Day in AsyncOS Exploited by APT

Cisco AsyncOS software contains a zero-day vulnerability actively exploited by a China-linked advanced persistent threat (APT) group called UAT-9686.The flaw allows attackers to run...

Massive Kimwolf Botnet Hijacks 1.8M Android TVs for DDoS Attack

A new Android-based botnet called Kimwolf has compromised 1.8 million devices such as smart TVs, set-top boxes, and tablets worldwide.Between November 19 and 22,...

Operation ForumTroll Phishing Targets Russian Scholars with Spyware

A threat actor linked to Operation ForumTroll initiated new phishing attacks on Russian academics in October 2025.Attackers used a forged domain mimicking a scientific...

GhostPoster Malware Hits 50,000 Firefox Users via Malicious Add-ons

A campaign named GhostPoster used malicious logo files in 17 Mozilla Firefox add-ons to deliver Malware targeting over 50,000 users.The malware hijacks affiliate links,...

Malicious NuGet Package Steals Cryptocurrency via Typosquatting Scam

A malicious NuGet package posing as a popular .NET tracing library has been active since 2020.The package, "Tracer.Fody.NLog," steals cryptocurrency wallet data by scanning...

New Crypto Mining Campaign Targets AWS via Stolen IAM Credentials

A campaign targets Amazon Web Services (AWS) customers using stolen Identity and Access Management (IAM) credentials to run cryptocurrency mining.The attackers employ new persistence...

Amazon Uncovers Russian Cyber Espionage Targeting Western Infrastructure

From 2021 to 2025, a Russian state-sponsored group targeted Western critical infrastructure, focusing on misconfigured network edge devices.The campaign primarily affected energy, cloud services,...

Must read