Loading cryptocurrency prices...

Most recent articles by:

Deep Shah

Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.

VS Code Marketplace Loophole Lets Hackers Reuse Malicious Extension Names

Researchers found that removed extension names on the Visual Studio Code Marketplace can be reused by anyone, opening a new attack vector. Malicious extensions have...

North Korean IT Workers Use AI Tools in Fraud, Face New US Sanctions

The U.S. Treasury sanctioned two people and two companies connected to North Korea’s illegal IT worker program. North Korean IT workers are accused of fraud,...

Five Golden Rules for Safe AI Adoption and Data Protection at Work

Effective AI adoption requires robust controls and visibility in organizations. Real-time monitoring and discovery of all AI activity is essential to reduce risks. Context-based risk assessment...

ESET Discovers PromptLock: First AI-Powered Ransomware Emerges

Researchers at ESET identified a new AI-powered Ransomware called PromptLock. PromptLock uses locally run AI models to create malicious scripts that target files across multiple...

AI-Powered Claude Used in Sophisticated July 2025 Data Extortion Attack

Anthropic blocked a large cyberattack in July 2025 that used its AI tool Claude for data theft and extortion. The operation targeted at least 17...

Hackers Breach Salesloft via Drift App to Steal Salesforce Data

Hackers breached Salesloft and used compromised OAuth tokens to access Salesforce customer data. The threat group, identified as UNC6395, targeted Salesforce instances linked to the...

Citrix Patches Critical NetScaler RCE Flaw Amid Active Attacks

Citrix addressed three security vulnerabilities in NetScaler ADC and NetScaler Gateway, one of which is under active attack. Critical flaw CVE-2025-7775 could allow attackers to...

MixShell Malware Targets U.S. Manufacturers in ZipLine Attack

Attackers are targeting supply chain-related manufacturing companies using an in-memory Malware called MixShell.The campaign, identified as ZipLine, uses professional conversations through company contact forms...

Must read