Most recent articles by:
Deep Shah
Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.
News
Sophisticated Tuoni C2 Malware Targets US Real-Estate Firm
A U.S.-based real estate company was targeted in October 2025 by an attack using the emerging Tuoni command-and-control (C2) framework.The attack involved social engineering...
News
Seven Malicious npm Packages Redirect Users to Crypto Scams
Seven malicious npm packages were published by one threat actor between September and November 2025.The threat actor used a cloaking service named Adspect to...
News
Microsoft Thwarts Record 15.72 Tbps IoT Botnet DDoS Attack
Microsoft detected and stopped a record-breaking 15.72 terabits per second (Tbps) DDoS attack in Australia.The assault was launched by the AISURU IoT botnet, comprised...
News
Google Patches Active Chrome Zero-Day Flaws in V8 Engine
Google has released a security update for Chrome to fix two serious vulnerabilities, one actively exploited in the wild.The main flaw, CVE-2025-13223, is a...
News
ClickFix Malware Campaigns Deploy Amatera Stealer, NetSupport RAT
Malware operations are using the ClickFix social engineering method to spread Amatera Stealer and NetSupport RAT.Amatera is an updated version of ACR Stealer available...
News
RondoDox Botnet Exploits Critical XWiki Flaw, Urges Patch Now
The RondoDox botnet is exploiting a serious vulnerability in unpatched XWiki instances to conduct cyberattacks.CVE-2025-24893 is an eval injection flaw enabling remote code execution,...
News
Five Guilty in US Scheme Aiding North Korean IT Worker Fraud
Five individuals pleaded guilty to aiding North Korea in illicit revenue by enabling fraudulent IT worker schemes in the U.S.The defendants used stolen U.S....
News
North Korean Hackers Use JSON Services for Malware Delivery
A North Korean group behind the Contagious Interview campaign now uses JSON storage services to host Malware payloads.The attackers lure targets on professional networks...
