Most recent articles by:

Deep Shah

Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.

X urges users to re-enroll security keys for 2FA by Nov 10, 2025

X is requiring users who use passkeys or hardware security keys for two-factor authentication (2FA) to re-enroll their keys by November 10, 2025.Failure to...

New ChatGPT Atlas Browser Vulnerability Enables Persistent Code Injection

A vulnerability has been found in OpenAI's ChatGPT Atlas browser that allows attackers to insert harmful commands into the AI's memory.The flaw exploits a...

China-Linked Smishing Triad Hits 194K+ Domains in Global Scam

More than 194,000 malicious domains linked to a global smishing campaign have been registered since January 2024.The attack infrastructure primarily uses U.S.-hosted cloud services...

YouTube Ghost Network Spreads Malware via Malicious Video Campaigns

A network of YouTube accounts has been spreading Malware by sharing videos that link to harmful downloads.The network, active since 2021 and called the...

GlassWorm Worm Targets VS Code Extensions in Major Supply Chain Attack

A self-propagating worm called GlassWorm spreads through Visual Studio Code extensions on the Open VSX Registry and Microsoft Extension Marketplace.The attack uses the Solana...

Managing AI Risks: Webinar on Securing AI Adoption Oct 2025

Companies use many AI agents, often 100 per employee, creating security challenges.Most AI agents lack management and oversight, leading to potential security risks.A webinar...

NuGet Typosquat Attack Steals Crypto Wallet Keys via Nethereum

Malicious typosquat packages have been uploaded to the NuGet package manager targeting Nethereum, a .NET library for Ethereum integration. The fake package Netherеum.All steals crypto...

Pentera Resolve Bridges Security Validation with Automated Remediation

Multiple security tools detect vulnerabilities but often lack coordinated action to resolve them. The Continuous Threat Exposure Management (CTEM) framework emphasizes ongoing risk...

Must read