Most recent articles by:

Deep Shah

Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.

Agentic AI Browser Attack Wipes Google Drive via Emails

A new attack exploits Perplexity's Comet AI browser to delete a user’s entire Google Drive without any clicks.The attack leverages browser agents' access to...

China-Linked Hackers Rapidly Exploit React2Shell RSC Flaw

Two China-linked Hacking groups are exploiting a critical React Server Components vulnerability known as React2Shell (CVE-2025-55182).The vulnerability allows unauthenticated remote code execution and affects...

Silver Fox Mimics Russian Hackers in Microsoft Teams Malware Attack

The threat group Silver Fox is conducting a false flag campaign mimicking Russian actors to target organizations in China.The attack uses SEO poisoning with...

GoldFactory Targets SE Asian Users with Malware-Linked Fake Bank Apps

The cybercrime group GoldFactory targets mobile users in Indonesia, Thailand, and Vietnam through fake government service apps.Modified banking apps embed Android Malware using frameworks...

Cloudflare Thwarts Largest Ever 29.7 Tbps DDoS Attack

Cloudflare mitigated a record DDoS attack peaking at 29.7 terabits per second (Tbps) in late 2025.The AISURU botnet, linked to multiple high-volume attacks, launched...

Microsoft Quietly Patches Long-Exploited Windows Shortcut Vulnerability

Microsoft quietly fixed a security vulnerability exploited since 2017 in November 2025 updates.The issue, CVE-2025-9491, involves a Windows Shortcut (LNK) file flaw enabling remote...

AI Phishing Epidemic: New Tools Outsmart Email Filters in 2025

AI-powered phishing tools have drastically lowered the skill and cost barriers for cybercriminals.Three major AI Hacking tools—WormGPT, FraudGPT, and SpamGPT—are changing how phishing attacks...

Three Critical Flaws Found in Picklescan Risk PyTorch Model Security

Three critical vulnerabilities were found in Picklescan, an open-source tool designed to scan Python pickle files for unsafe content.These flaws allow attackers to bypass...

Must read