Loading cryptocurrency prices...

Most recent articles by:

Deep Shah

Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.

Rhadamanthys Stealer Updates Enhance Fingerprinting, Offers Tiers

The threat actor behind Rhadamanthys stealer also promotes two other tools: Elysium Proxy Bot and Crypt Service.Rhadamanthys now collects device and web browser fingerprints,...

Cavalry Werewolf Cyberattack Targets Russian Public Sector Agencies

A threat actor called Cavalry Werewolf has targeted Russian public sector entities with Malware.They use phishing emails impersonating Kyrgyz government officials to distribute FoalShell...

New Android Spyware Poses as Signal, ToTok Apps in UAE

Two Android spyware campaigns named ProSpy and ToSpy target users in the United Arab Emirates (U.A.E.) by impersonating popular apps Signal and ToTok.The malicious...

Ukraine Hit by CABINETRAT Backdoor Cyberattacks via Excel XLL Files

The Computer Emergency Response Team of Ukraine (CERT-UA) has identified new targeted cyber attacks using a backdoor named CABINETRAT.The attacks were observed in September...

Bitdefender 2025 Report: Rising Breach Secrecy, AI, and Attack Surfaces

Over half of security professionals are pressured to keep breach information confidential, up 38% since 2023.84% of high-severity cyberattacks use legitimate tools within companies,...

Severe Privilege Escalation Flaw Found in Red Hat OpenShift AI

A high-severity security flaw was found in Red Hat OpenShift AI.The flaw allows authenticated, low-privileged users to gain full administrative control over the system.The...

Balancing AI and Human Workflows in Cybersecurity Automation

AI has significantly impacted automation but is not a complete solution by itself.Human-led and rigid automated workflows often fail under changing conditions.Fully autonomous AI...

AI-Powered Cognitive SOC Transforms Alert Noise into Clear Context

Traditional security operations centers (SOCs) generate excessive alerts that overwhelm analysts and delay threat response.Integrating context from multiple data sources helps transform isolated alerts...

Must read