Loading cryptocurrency prices...

Most recent articles by:

Deep Shah

Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.

AsyncRAT Delivered via ScreenConnect in New Fileless Attack Campaign

Certain threat actors are misusing ConnectWise ScreenConnect, a legitimate remote monitoring tool, to access target systems and deploy Malware. Cybersecurity researchers observed attackers delivering AsyncRAT,...

Malicious npm Packages Steal Ethereum Wallets by Impersonating Flashbots

Researchers have found four harmful npm packages targeting Ethereum wallet credentials.The packages pretend to be official Flashbots tools but steal private keys and mnemonic...

SVG Files Used in New Colombian Phishing Campaign Bypass Antivirus

Researchers discovered phishing attacks using SVG files to mimic Colombia's judicial system. Obfuscated SVG files delivered JavaScript-based payloads, leading to undetected phishing pages and hidden...

Cybercriminals Use Grok AI to Bypass X’s Malvertising Protections

Cybercriminals are using a new strategy to get around ad protections on X (formerly Twitter) by leveraging its AI assistant, Grok. The method,...

Ethereum Smart Contracts Used to Hide Malware in npm Packages

Researchers found two harmful npm packages using Ethereum smart contracts to hide malicious activity. The packages installed downloader Malware and targeted developers on both npm...

Threat Actors Weaponize HexStrike AI to Exploit New Vulnerabilities

Threat actors are using the new HexStrike AI tool to exploit recent security vulnerabilities. HexStrike AI can automate security testing and supports over 150 other...

CISA Warns of Active Exploits Targeting WhatsApp, TP-Link Devices

CISA added a high-risk vulnerability affecting TP-Link TL-WA855RE Wi-Fi Range Extenders to its Known Exploited Vulnerabilities catalog. The security flaw, CVE-2020-24363, can let attackers gain...

Salesloft Drift Supply Chain Attack Hits 700+ Firms, Data Stolen

Salesloft is temporarily taking its Drift chatbot service offline after a supply chain attack affected many companies.The attack resulted in widespread theft of authentication...

Must read