Most recent articles by:
Deep Shah
Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.
News
Tomiris APT Shifts to Telegram, Discord for Stealthy Cyberattacks
The threat actor Tomiris targets government and intergovernmental organizations in Russia and Central Asia.New tactics involve using public services like Telegram and Discord for...
News
North Korean Hackers Flood npm with 197 Malicious Packages
North Korean Hackers have released 197 malicious packages on the npm registry since last month.These packages spread a variant of OtterCookie Malware that can...
News
Legacy Python Package Vulnerabilities Risk Supply Chain Attacks via Domain Takeover
Legacy Python packages contain vulnerable bootstrap scripts that can enable domain takeover attacks on PyPI.The vulnerable bootstrap scripts fetch installation files from a now-available...
News
Gainsight Breach Wider Than Thought, Linked to ShinyHunters Ransomware
Gainsight reported that more customers were affected by the recent suspicious activity on its applications than initially identified.Salesforce revoked all access and refresh tokens...
News
Crypto Copilot Chrome Extension Steals Solana via Hidden Fees
A Chrome extension named Crypto Copilot injects hidden Solana token (SOL) transfers during swaps, diverting funds to an attacker’s wallet.The extension was published on...
News
Thousands of Passwords Exposed via Popular JSON Formatter Tools
Organizations across sensitive sectors are exposing credentials by pasting them into online code formatting tools.A dataset of over 80,000 files on JSONformatter and CodeBeautify...
News
New StealC V2 Malware Targets Blender Users via Malicious Files
Hackers have launched a campaign using malicious .blend files to spread the StealC V2 information stealer.The attack targets users downloading 3D assets from sites...
News
Second Wave of Sha1-Hulud Attack Hits Hundreds of NPM Packages
A new wave of supply chain attacks named Sha1-Hulud has compromised hundreds of npm packages between November 21 and 23, 2025.The attack executes malicious...
