Most recent articles by:

Deep Shah

Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.

Meta Launches New Scam Protection Tools for Messenger, WhatsApp Users

Meta has introduced new scam prevention tools for Messenger and WhatsApp users.WhatsApp now warns users about screen sharing with unknown contacts during video calls.Messenger...

CISA Adds 5 Exploited Vulnerabilities Including Oracle EBS Flaw

CISA included five vulnerabilities in its Known Exploited Vulnerabilities Catalog on October 20, 2025.A new server-side request forgery flaw in Oracle E-Business Suite was...

131 WhatsApp Web Extensions Spam Brazilian Users, Bypass Limits

Security researchers detected 131 rebranded WhatsApp Web automation extensions on the Google Chrome Web Store used to spam Brazilian users.The extensions share one codebase...

Europol Busts SIM Farm Cybercrime Network, Seizes 40K SIMs

Europol dismantled a cybercrime-as-a-service platform operating a SIM farm used for various crimes on October 10, 2025.Seven suspects were arrested, including five Latvian nationals,...

AI Agents Expand Risk, Identity Security Becomes Enterprise Perimeter

Autonomous AI agents now hold significant system privileges, executing tasks without human oversight.Identity has become the main security perimeter, replacing traditional models like firewalls...

UNC5142 Abuses Blockchain Smart Contracts to Spread Malware

A financially motivated group named UNC5142 is spreading information-stealing Malware via blockchain smart contracts.The threat uses hacked WordPress sites and a method called "EtherHiding"...

North Korean Hackers Use EtherHiding for Malware, Crypto Theft

A North Korean-linked Hacking group has used the EtherHiding method to spread Malware and steal cryptocurrency.The campaign targets developers on LinkedIn, then uses Telegram...

TA585 Launches MonsterV2 Malware via Sophisticated Phishing Campaigns

A previously unknown threat actor named TA585 distributes the Malware MonsterV2 through phishing campaigns.MonsterV2 is a remote access trojan (RAT) and data stealer first...

Must read