Loading cryptocurrency prices...

Most recent articles by:

Deep Shah

Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.

China-backed UTA0388 launches AI-driven GOVERSHELL cyber espionage attacks

A China-aligned group identified as UTA0388 conducted spear-phishing attacks targeting North America, Asia, and Europe using a Malware implant called GOVERSHELL.These campaigns used fake...

Russian Hackers Accelerate AI-Driven Cyber Attacks on Ukraine 2025

Russian Hackers increased use of Artificial Intelligence (AI) in cyber attacks against Ukraine in early 2025.There were 3,018 cyber incidents reported in the first...

Chinese Hackers Abuse Nezha Tool to Deploy Gh0st RAT Malware

Threat actors linked to China used the legitimate tool Nezha to deliver the Malware Gh0st RAT.Attackers exploited a vulnerable phpMyAdmin panel and employed log...

Critical Figma MCP Vulnerability Allows Remote Code Execution Exploit

A command injection vulnerability was found in the figma-developer-mcp Model Context Protocol (MCP) server.The flaw could allow attackers to run arbitrary system commands and...

Vietnamese Hacker BatShadow Targets Job Seekers with Vampire Bot Malware

A Vietnamese Hacking group named BatShadow has launched a campaign using fake job offers to spread new Malware called Vampire Bot.The attackers send malicious...

Google DeepMind launches CodeMender AI to auto-fix software flaws

Google's DeepMind introduced CodeMender, an AI tool that detects and fixes software vulnerabilities automatically.CodeMender uses Google's Gemini Deep Think models to identify and repair...

Chinese Cybercriminals Exploit IIS Servers for SEO Fraud, Data Theft

A Chinese-speaking cybercriminal group named UAT-8099 targets Microsoft Internet Information Services (IIS) servers to commit SEO fraud and steal sensitive data. The group...

CometJacking Attack Exploits AI Browser to Steal Sensitive Data

A new attack named CometJacking targets Perplexity's agentic AI browser Comet via malicious embedded prompts.The attack uses a deceptive link to extract sensitive data...

Must read