Loading cryptocurrency prices...

Most recent articles by:

Deep Shah

Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.

ClickFix Social Engineering Scam Surges, Replaces Browser Threats

A new online scam tactic called ClickFix has replaced previous fake browser update attacks by using advanced social engineering. ClickFix tricks users into running harmful...

Misconfigurations, Not Hackers, Cause Most SaaS Security Incidents

Misconfiguration and vulnerability are different security risks in SaaS, each with separate responsibilities. Customers are responsible for managing settings, permissions, and third-party integrations in their...

AI-Powered “FraudOnTok” Scam Targets TikTok Shop Users Worldwide

The scam, called "FraudOnTok," uses fake TikTok Shop sites and AI-generated videos to steal credentials and distribute malware. Researchers found over 15,000 lookalike...

PXA Stealer Malware Hits 62 Countries, Steals 200K Passwords

A new Python-based Malware campaign, named PXA Stealer, is targeting internet users worldwide. Researchers link the activity to Vietnamese-speaking cybercriminals using Telegram for automation and...

New NVIDIA Triton AI Server Bugs Allow Full Remote System Takeover

Researchers disclosed serious security issues in the NVIDIA Triton Inference Server used for AI models.The vulnerabilities could allow attackers to take full control of...

PlayPraetor Android Malware Hits 11,000 Devices in Global Surge

A new Android Malware called PlayPraetor has infected more than 11,000 devices, spreading rapidly in Europe, North Africa, and South America.The malware uses fake...

AI-Generated npm Package Conceals Solana Crypto Wallet Drainer

Researchers found a malicious npm package created using Artificial Intelligence. The package targeted cryptocurrency wallets and was downloaded over 1,500 times before removal. The Malware’s main...

North Korean Hackers Use Cloud, Social Lures in Crypto Heists

North Korea-linked group UNC4899 used LinkedIn and Telegram to target employees at two organizations with social engineering attacks.The attackers convinced employees to run malicious...

Must read