Most recent articles by:
Deep Shah
Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.
News
Meta Launches New Scam Protection Tools for Messenger, WhatsApp Users
Meta has introduced new scam prevention tools for Messenger and WhatsApp users.WhatsApp now warns users about screen sharing with unknown contacts during video calls.Messenger...
News
CISA Adds 5 Exploited Vulnerabilities Including Oracle EBS Flaw
CISA included five vulnerabilities in its Known Exploited Vulnerabilities Catalog on October 20, 2025.A new server-side request forgery flaw in Oracle E-Business Suite was...
News
131 WhatsApp Web Extensions Spam Brazilian Users, Bypass Limits
Security researchers detected 131 rebranded WhatsApp Web automation extensions on the Google Chrome Web Store used to spam Brazilian users.The extensions share one codebase...
News
Europol Busts SIM Farm Cybercrime Network, Seizes 40K SIMs
Europol dismantled a cybercrime-as-a-service platform operating a SIM farm used for various crimes on October 10, 2025.Seven suspects were arrested, including five Latvian nationals,...
News
AI Agents Expand Risk, Identity Security Becomes Enterprise Perimeter
Autonomous AI agents now hold significant system privileges, executing tasks without human oversight.Identity has become the main security perimeter, replacing traditional models like firewalls...
News
UNC5142 Abuses Blockchain Smart Contracts to Spread Malware
A financially motivated group named UNC5142 is spreading information-stealing Malware via blockchain smart contracts.The threat uses hacked WordPress sites and a method called "EtherHiding"...
News
North Korean Hackers Use EtherHiding for Malware, Crypto Theft
A North Korean-linked Hacking group has used the EtherHiding method to spread Malware and steal cryptocurrency.The campaign targets developers on LinkedIn, then uses Telegram...
News
TA585 Launches MonsterV2 Malware via Sophisticated Phishing Campaigns
A previously unknown threat actor named TA585 distributes the Malware MonsterV2 through phishing campaigns.MonsterV2 is a remote access trojan (RAT) and data stealer first...
