Most recent articles by:

Deep Shah

Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.

Crypto Copilot Chrome Extension Steals Solana via Hidden Fees

A Chrome extension named Crypto Copilot injects hidden Solana token (SOL) transfers during swaps, diverting funds to an attacker’s wallet.The extension was published on...

Thousands of Passwords Exposed via Popular JSON Formatter Tools

Organizations across sensitive sectors are exposing credentials by pasting them into online code formatting tools.A dataset of over 80,000 files on JSONformatter and CodeBeautify...

New StealC V2 Malware Targets Blender Users via Malicious Files

Hackers have launched a campaign using malicious .blend files to spread the StealC V2 information stealer.The attack targets users downloading 3D assets from sites...

Second Wave of Sha1-Hulud Attack Hits Hundreds of NPM Packages

A new wave of supply chain attacks named Sha1-Hulud has compromised hundreds of npm packages between November 21 and 23, 2025.The attack executes malicious...

New Matrix Push C2 Kit Exploits Browser Notifications for Phishing

Malicious actors use browser notifications to conduct phishing attacks via the new Matrix Push C2 platform. The platform is sold as Malware-as-a-service with...

Google Quick Share now works with Apple AirDrop on Pixel 10

Google updated Quick Share to enable file transfers between Pixel 10 devices and Apple AirDrop-compatible products. Security uses memory-safe Rust language and does...

ShadowRay 2.0 Exploits Ray AI Flaw for Crypto Botnet Attack

A longstanding security flaw in the Ray AI framework is being exploited to create self-replicating cryptocurrency mining botnets.The ShadowRay 2.0 campaign targets exposed Ray...

TamperedChef Malvertising Campaign Targets Users with Fake Software

Threat actors use fake installers disguised as popular software in a global malvertising campaign called TamperedChef.The campaign employs social engineering, SEO, and code-signing certificates...

Must read