Most recent articles by:
Deep Shah
Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.
News
Agentic AI Browser Attack Wipes Google Drive via Emails
A new attack exploits Perplexity's Comet AI browser to delete a user’s entire Google Drive without any clicks.The attack leverages browser agents' access to...
News
China-Linked Hackers Rapidly Exploit React2Shell RSC Flaw
Two China-linked Hacking groups are exploiting a critical React Server Components vulnerability known as React2Shell (CVE-2025-55182).The vulnerability allows unauthenticated remote code execution and affects...
News
Silver Fox Mimics Russian Hackers in Microsoft Teams Malware Attack
The threat group Silver Fox is conducting a false flag campaign mimicking Russian actors to target organizations in China.The attack uses SEO poisoning with...
News
GoldFactory Targets SE Asian Users with Malware-Linked Fake Bank Apps
The cybercrime group GoldFactory targets mobile users in Indonesia, Thailand, and Vietnam through fake government service apps.Modified banking apps embed Android Malware using frameworks...
News
Cloudflare Thwarts Largest Ever 29.7 Tbps DDoS Attack
Cloudflare mitigated a record DDoS attack peaking at 29.7 terabits per second (Tbps) in late 2025.The AISURU botnet, linked to multiple high-volume attacks, launched...
News
Microsoft Quietly Patches Long-Exploited Windows Shortcut Vulnerability
Microsoft quietly fixed a security vulnerability exploited since 2017 in November 2025 updates.The issue, CVE-2025-9491, involves a Windows Shortcut (LNK) file flaw enabling remote...
News
AI Phishing Epidemic: New Tools Outsmart Email Filters in 2025
AI-powered phishing tools have drastically lowered the skill and cost barriers for cybercriminals.Three major AI Hacking tools—WormGPT, FraudGPT, and SpamGPT—are changing how phishing attacks...
News
Three Critical Flaws Found in Picklescan Risk PyTorch Model Security
Three critical vulnerabilities were found in Picklescan, an open-source tool designed to scan Python pickle files for unsafe content.These flaws allow attackers to bypass...
