Most recent articles by:
Deep Shah
Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.
News
Google Mandates Licenses for Crypto Apps Amid Scam Concerns
Google now requires crypto exchange and wallet app developers to hold government licenses before publishing in 15 regions.
The new policy targets locations including the...
News
Zoom, Xerox Patch Critical Windows Flaws Enabling Remote Attacks
Zoom and Xerox resolved major software vulnerabilities that could enable attackers to gain higher system privileges or run unauthorized code.
The Zoom flaw, labeled CVE-2025-49457...
News
PS1Bot Malware Targets Crypto Wallets via New 2025 Malvertising Campaign
Researchers identified a new malvertising campaign spreading the modular PS1Bot Malware.
PS1Bot can steal data, log keystrokes, perform reconnaissance, and maintain access to infected systems.
The...
News
Brute-Force Attacks Surge Against Fortinet SSL VPN Devices Globally
Researchers report a sharp rise in brute-force attacks targeting Fortinet SSL VPN devices.Over 780 unique IP addresses were involved in the attacks observed on...
News
60 Malicious Packages Target RubyGems, PyPI in Credential Theft Campaign
Sixty malicious software packages targeted the RubyGems platform by disguising as automation tools for social media and messaging.
The compromised packages have been available since...
News
GreedyBear Malware Uses Fake Firefox Wallet Extensions to Steal $1M
A campaign using over 150 fake Firefox extensions stole more than $1 million in cryptocurrency.
The attackers copied popular crypto wallets to trick users and...
News
SocGholish Malware Leveraging TDS for Sophisticated Web Attacks
Attackers use Traffic Distribution Systems to spread the SocGholish Malware through compromised websites.
SocGholish operates as a Malware-as-a-Service model, selling infected system access to other...
News
11 Malicious Go Packages and npm Libraries Spread Cross-Platform Malware
Researchers found 11 new malicious Go packages delivering remote payloads on Windows and Linux.
These packages contain hidden loaders that can download additional Malware from...
