Most recent articles by:

Deep Shah

Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.

MuddyWater’s Operation Olalampo Targets MENA with AI Malware

The Iranian state-sponsored hacking group MuddyWater has launched a new campaign called Operation Olalampo, deploying multiple new malware families.The group utilized AI-assisted development tools...

Anthropic’s AI Scans Code for Security Flaws

Anthropic has launched Claude Code Security, a new AI feature for scanning codebases and suggesting vulnerability patches.The capability is currently available in a limited...

AI Tool Cline CLI Hijacked in Supply Chain Attack

The AI-powered Cline CLI npm package was compromised, leading to an unauthorized update that installed the OpenClaw AI agent on developer machines.The breach, attributed...

Ukrainian Hacker Gets 5 Years for North Korean IT Scheme

A Ukrainian national received a five-year U.S. prison sentence for operating an identity theft scheme that aided North Korean IT workers.The fraudulent operation funneled...

First Android Malware Abuses Google’s Gemini AI

Security researchers have discovered PromptSpy, an advanced Android malware that abuses Google's Gemini AI for persistence and device control.The malware is designed to capture...

Kenya Used Cellebrite Spyware on Dissident: Report

Kenyan authorities used Cellebrite technology to break into a dissident's phone in July 2025, according to new research.An Angolan journalist's iPhone was successfully infected...

Three Intelligent Workflows to Automate Security & IT Tasks

Security and IT teams are shifting focus from standalone tools to intelligent workflows that combine AI, automation, and human decision-making for greater efficiency.Three immediate...

AI Chatbots Hijacked as Stealthy Attack Proxies

Major AI platforms like Microsoft Copilot and xAI Grok can be exploited as stealthy command-and-control proxies.The technique, AI as a C2 proxy, uses web-browsing...

Must read