Most recent articles by:

Deep Shah

Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.

Sophisticated Tuoni C2 Malware Targets US Real-Estate Firm

A U.S.-based real estate company was targeted in October 2025 by an attack using the emerging Tuoni command-and-control (C2) framework.The attack involved social engineering...

Seven Malicious npm Packages Redirect Users to Crypto Scams

Seven malicious npm packages were published by one threat actor between September and November 2025.The threat actor used a cloaking service named Adspect to...

Microsoft Thwarts Record 15.72 Tbps IoT Botnet DDoS Attack

Microsoft detected and stopped a record-breaking 15.72 terabits per second (Tbps) DDoS attack in Australia.The assault was launched by the AISURU IoT botnet, comprised...

Google Patches Active Chrome Zero-Day Flaws in V8 Engine

Google has released a security update for Chrome to fix two serious vulnerabilities, one actively exploited in the wild.The main flaw, CVE-2025-13223, is a...

ClickFix Malware Campaigns Deploy Amatera Stealer, NetSupport RAT

Malware operations are using the ClickFix social engineering method to spread Amatera Stealer and NetSupport RAT.Amatera is an updated version of ACR Stealer available...

RondoDox Botnet Exploits Critical XWiki Flaw, Urges Patch Now

The RondoDox botnet is exploiting a serious vulnerability in unpatched XWiki instances to conduct cyberattacks.CVE-2025-24893 is an eval injection flaw enabling remote code execution,...

Five Guilty in US Scheme Aiding North Korean IT Worker Fraud

Five individuals pleaded guilty to aiding North Korea in illicit revenue by enabling fraudulent IT worker schemes in the U.S.The defendants used stolen U.S....

North Korean Hackers Use JSON Services for Malware Delivery

A North Korean group behind the Contagious Interview campaign now uses JSON storage services to host Malware payloads.The attackers lure targets on professional networks...

Must read