Most recent articles by:

Deep Shah

Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.

AI-Powered Cognitive SOC Transforms Alert Noise into Clear Context

Traditional security operations centers (SOCs) generate excessive alerts that overwhelm analysts and delay threat response.Integrating context from multiple data sources helps transform isolated alerts...

Microsoft Expands Sentinel SIEM with Data Lake and AI Agent Tools

Microsoft has made its Sentinel Security Incidents and Event Management (SIEM) solution a unified platform with the general release of Sentinel data lake.Sentinel Graph...

Google Patches Gemini AI Vulnerabilities Exposing User Data

Three security flaws affecting Google's Gemini AI assistant were recently fixed after being disclosed by Cybersecurity researchers.The vulnerabilities threatened users' privacy by enabling data...

UK Seizes £5.5B Bitcoin in Largest Crypto Fraud Bust

A Chinese woman pleaded guilty to involvement in a cryptocurrency fraud after £5.5 billion (about $7.39 billion) in Bitcoin was seized by U.K. police...

Wing Security Boosts AI Supply Chain Protection Amid Rising Risks

AI adoption in enterprises is growing rapidly, embedding large language models (LLMs) into SaaS platforms. New security risks include uncontrolled AI use, supply...

First Malicious MCP Server Found in npm Postmark-MCP Package

Security researchers detected the first known malicious Model Context Protocol (MCP) server in the wild on September 17, 2025.A fake npm package named postmark-mcp...

Microsoft Warns of AI-Driven Phishing Using Obfuscated SVG Files

Microsoft identified an AI-assisted phishing campaign targeting U.S. organizations using obfuscated SVG files.The scam uses compromised business emails to send messages disguised as file-sharing...

Malicious SVG Files Used in Phishing to Spread Crypto Malware

Attackers use phishing emails pretending to be Ukrainian government agencies to deliver Malware.Malicious SVG attachments start a download chain leading to remote access trojans...

Must read