Loading cryptocurrency prices...

Most recent articles by:

Deep Shah

Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.

Bitdefender Named Representative Vendor in Gartner MDR Guide 2025

Bitdefender is recognized for the fourth consecutive year in Gartner® Market Guide for Managed Detection and Response (MDR).The MDR market is expanding due to...

Critical OS Command Injection Flaw Found in React Native CLI

A critical security flaw in the @react-native-community/cli npm package has been identified and fixed.The flaw allowed remote attackers to execute operating system commands without...

Nine Arrested in €600M Crypto Money Laundering Bust

Law enforcement arrested nine individuals linked to a cryptocurrency money laundering network.The network defrauded victims of approximately $688 million by creating fake crypto investment...

Three Charged in U.S. BlackCat Ransomware Attacks on Firms

Three U.S. nationals are charged with attacking five U.S. companies using BlackCat Ransomware in 2023.The suspects targeted firms including medical, pharmaceutical, engineering, and manufacturing...

Malicious Solidity Extension SleepyDuck Malware Targets Developers

A new malicious extension called SleepyDuck was found in the Open VSX registry.The extension initially appeared harmless but added Malware after 14,000 downloads.SleepyDuck uses...

Australia Warns of BADCANDY Malware Targeting Cisco Devices

The Australian Signals Directorate (ASD) reports ongoing attacks on unpatched Cisco IOS XE devices using the BADCANDY implant.BADCANDY exploits a critical vulnerability (CVE-2023-20198) that...

OpenAI Launches Aardvark AI to Detect and Patch Code Flaws

OpenAI has introduced Aardvark, an AI security researcher using the GPT-5 large language model.Aardvark works by scanning code repositories, identifying vulnerabilities, assessing risks, and...

AdaptixC2 Framework Adopted by Russian-Linked Ransomware Groups

The open-source command-and-control (C2) framework AdaptixC2 is increasingly used by threat actors, including Russian Ransomware groups.AdaptixC2 supports encrypted communications and various post-exploitation features for...

Must read