Loading cryptocurrency prices...

Most recent articles by:

Deep Shah

Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.

Google Mandates Licenses for Crypto Apps Amid Scam Concerns

Google now requires crypto exchange and wallet app developers to hold government licenses before publishing in 15 regions. The new policy targets locations including the...

Zoom, Xerox Patch Critical Windows Flaws Enabling Remote Attacks

Zoom and Xerox resolved major software vulnerabilities that could enable attackers to gain higher system privileges or run unauthorized code. The Zoom flaw, labeled CVE-2025-49457...

PS1Bot Malware Targets Crypto Wallets via New 2025 Malvertising Campaign

Researchers identified a new malvertising campaign spreading the modular PS1Bot Malware. PS1Bot can steal data, log keystrokes, perform reconnaissance, and maintain access to infected systems. The...

Brute-Force Attacks Surge Against Fortinet SSL VPN Devices Globally

Researchers report a sharp rise in brute-force attacks targeting Fortinet SSL VPN devices.Over 780 unique IP addresses were involved in the attacks observed on...

60 Malicious Packages Target RubyGems, PyPI in Credential Theft Campaign

Sixty malicious software packages targeted the RubyGems platform by disguising as automation tools for social media and messaging. The compromised packages have been available since...

GreedyBear Malware Uses Fake Firefox Wallet Extensions to Steal $1M

A campaign using over 150 fake Firefox extensions stole more than $1 million in cryptocurrency. The attackers copied popular crypto wallets to trick users and...

SocGholish Malware Leveraging TDS for Sophisticated Web Attacks

Attackers use Traffic Distribution Systems to spread the SocGholish Malware through compromised websites. SocGholish operates as a Malware-as-a-Service model, selling infected system access to other...

11 Malicious Go Packages and npm Libraries Spread Cross-Platform Malware

Researchers found 11 new malicious Go packages delivering remote payloads on Windows and Linux. These packages contain hidden loaders that can download additional Malware from...

Must read