Most recent articles by:
Deep Shah
Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.
News
New Matrix Push C2 Kit Exploits Browser Notifications for Phishing
Malicious actors use browser notifications to conduct phishing attacks via the new Matrix Push C2 platform.
The platform is sold as Malware-as-a-service with...
News
Google Quick Share now works with Apple AirDrop on Pixel 10
Google updated Quick Share to enable file transfers between Pixel 10 devices and Apple AirDrop-compatible products.
Security uses memory-safe Rust language and does...
News
ShadowRay 2.0 Exploits Ray AI Flaw for Crypto Botnet Attack
A longstanding security flaw in the Ray AI framework is being exploited to create self-replicating cryptocurrency mining botnets.The ShadowRay 2.0 campaign targets exposed Ray...
News
TamperedChef Malvertising Campaign Targets Users with Fake Software
Threat actors use fake installers disguised as popular software in a global malvertising campaign called TamperedChef.The campaign employs social engineering, SEO, and code-signing certificates...
News
Active Exploitation of 7-Zip CVE-2025-11001 ZIP Flaw Alert
A critical vulnerability, CVE-2025-11001, affecting 7-Zip has been actively exploited since its public disclosure.The flaw allows remote code execution via crafted ZIP files manipulating...
News
ServiceNow Now Assist AI Vulnerable to Prompt Injection Attacks
Default configurations in ServiceNow's Now Assist AI platform enable second-order prompt injection attacks.Attackers can exploit agent-to-agent communication to access and modify sensitive data without...
News
Sneaky 2FA Phishing Kit Now Uses Browser-in-the-Browser Attack
Phishing-as-a-Service (PhaaS) kit Sneaky 2FA now uses Browser-in-the-Browser (BitB) impersonation to steal Microsoft account credentials.BitB creates fake browser pop-ups that simulate legitimate login windows,...
News
Meta Launches WhatsApp Research Proxy to Boost Bug Bounty Program
Meta has introduced the WhatsApp Research Proxy tool to aid bug bounty researchers in analyzing WhatsApp’s network protocol.The company awarded over $25 million in...
