Most recent articles by:

Deep Shah

Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.

NuGet Typosquat Attack Steals Crypto Wallet Keys via Nethereum

Malicious typosquat packages have been uploaded to the NuGet package manager targeting Nethereum, a .NET library for Ethereum integration. The fake package Netherеum.All steals crypto...

Pentera Resolve Bridges Security Validation with Automated Remediation

Multiple security tools detect vulnerabilities but often lack coordinated action to resolve them. The Continuous Threat Exposure Management (CTEM) framework emphasizes ongoing risk...

Meta Launches New Scam Protection Tools for Messenger, WhatsApp Users

Meta has introduced new scam prevention tools for Messenger and WhatsApp users.WhatsApp now warns users about screen sharing with unknown contacts during video calls.Messenger...

CISA Adds 5 Exploited Vulnerabilities Including Oracle EBS Flaw

CISA included five vulnerabilities in its Known Exploited Vulnerabilities Catalog on October 20, 2025.A new server-side request forgery flaw in Oracle E-Business Suite was...

131 WhatsApp Web Extensions Spam Brazilian Users, Bypass Limits

Security researchers detected 131 rebranded WhatsApp Web automation extensions on the Google Chrome Web Store used to spam Brazilian users.The extensions share one codebase...

Europol Busts SIM Farm Cybercrime Network, Seizes 40K SIMs

Europol dismantled a cybercrime-as-a-service platform operating a SIM farm used for various crimes on October 10, 2025.Seven suspects were arrested, including five Latvian nationals,...

AI Agents Expand Risk, Identity Security Becomes Enterprise Perimeter

Autonomous AI agents now hold significant system privileges, executing tasks without human oversight.Identity has become the main security perimeter, replacing traditional models like firewalls...

UNC5142 Abuses Blockchain Smart Contracts to Spread Malware

A financially motivated group named UNC5142 is spreading information-stealing Malware via blockchain smart contracts.The threat uses hacked WordPress sites and a method called "EtherHiding"...

Must read