Most recent articles by:
Deep Shah
Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.
News
MuddyWater’s Operation Olalampo Targets MENA with AI Malware
The Iranian state-sponsored hacking group MuddyWater has launched a new campaign called Operation Olalampo, deploying multiple new malware families.The group utilized AI-assisted development tools...
News
Anthropic’s AI Scans Code for Security Flaws
Anthropic has launched Claude Code Security, a new AI feature for scanning codebases and suggesting vulnerability patches.The capability is currently available in a limited...
News
AI Tool Cline CLI Hijacked in Supply Chain Attack
The AI-powered Cline CLI npm package was compromised, leading to an unauthorized update that installed the OpenClaw AI agent on developer machines.The breach, attributed...
News
Ukrainian Hacker Gets 5 Years for North Korean IT Scheme
A Ukrainian national received a five-year U.S. prison sentence for operating an identity theft scheme that aided North Korean IT workers.The fraudulent operation funneled...
News
First Android Malware Abuses Google’s Gemini AI
Security researchers have discovered PromptSpy, an advanced Android malware that abuses Google's Gemini AI for persistence and device control.The malware is designed to capture...
News
Kenya Used Cellebrite Spyware on Dissident: Report
Kenyan authorities used Cellebrite technology to break into a dissident's phone in July 2025, according to new research.An Angolan journalist's iPhone was successfully infected...
News
Three Intelligent Workflows to Automate Security & IT Tasks
Security and IT teams are shifting focus from standalone tools to intelligent workflows that combine AI, automation, and human decision-making for greater efficiency.Three immediate...
News
AI Chatbots Hijacked as Stealthy Attack Proxies
Major AI platforms like Microsoft Copilot and xAI Grok can be exploited as stealthy command-and-control proxies.The technique, AI as a C2 proxy, uses web-browsing...
