Most recent articles by:

Deep Shah

Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.

Tomiris APT Shifts to Telegram, Discord for Stealthy Cyberattacks

The threat actor Tomiris targets government and intergovernmental organizations in Russia and Central Asia.New tactics involve using public services like Telegram and Discord for...

North Korean Hackers Flood npm with 197 Malicious Packages

North Korean Hackers have released 197 malicious packages on the npm registry since last month.These packages spread a variant of OtterCookie Malware that can...

Legacy Python Package Vulnerabilities Risk Supply Chain Attacks via Domain Takeover

Legacy Python packages contain vulnerable bootstrap scripts that can enable domain takeover attacks on PyPI.The vulnerable bootstrap scripts fetch installation files from a now-available...

Gainsight Breach Wider Than Thought, Linked to ShinyHunters Ransomware

Gainsight reported that more customers were affected by the recent suspicious activity on its applications than initially identified.Salesforce revoked all access and refresh tokens...

Crypto Copilot Chrome Extension Steals Solana via Hidden Fees

A Chrome extension named Crypto Copilot injects hidden Solana token (SOL) transfers during swaps, diverting funds to an attacker’s wallet.The extension was published on...

Thousands of Passwords Exposed via Popular JSON Formatter Tools

Organizations across sensitive sectors are exposing credentials by pasting them into online code formatting tools.A dataset of over 80,000 files on JSONformatter and CodeBeautify...

New StealC V2 Malware Targets Blender Users via Malicious Files

Hackers have launched a campaign using malicious .blend files to spread the StealC V2 information stealer.The attack targets users downloading 3D assets from sites...

Second Wave of Sha1-Hulud Attack Hits Hundreds of NPM Packages

A new wave of supply chain attacks named Sha1-Hulud has compromised hundreds of npm packages between November 21 and 23, 2025.The attack executes malicious...

Must read