Most recent articles by:
Deep Shah
Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.
News
Microsoft AI Role Flaw Allowed Identity Takeover
A privilege escalation flaw in Microsoft Entra ID's Agent ID Administrator role was patched by Microsoft on April 9, 2026.The vulnerability allowed users with...
News
Checkmarx Data Leaked on Dark Web Following Attack
Checkmarx confirms stolen data from its GitHub repository was published on the dark web.The company states no customer data was stored in the compromised...
News
CISA Adds 4 Exploited Flaws to KEV Catalog
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added four actively exploited vulnerabilities to its Known Exploited Vulnerabilities catalog on April 24, 2026.The flaws...
News
China Accused of NASA Tech Theft via Phishing
A Chinese national associated with a state-owned defense firm impersonated U.S. engineers for years to steal sensitive defense software.Victims included employees at NASA, the...
News
Fake Apps on Apple Store Steal Crypto Keys
Researchers discovered 26 malicious apps on the Apple App Store, dubbed FakeWallet, designed to steal cryptocurrency wallet recovery phrases and private keys.The scam, active...
News
LMDeploy Flaw Exploited Within Hours of Disclosure
Threat actors exploited the critical SSRF bug in LMDeploy toolkit just 12 hours after its public disclosure.The vulnerability, CVE-2026-33626, allows attackers to steal cloud...
News
Bitwarden CLI Compromised by Checkmarx Supply Chain Attack
The official Bitwarden CLI package on npm was compromised, distributing a malicious version that steals credentials and secrets.The supply chain attack used a hacked...
News
AI Attack Wave: The Collapsing Exploit Window
The speed of AI-powered attacks is creating a Collapsing Exploit Window, drastically reducing the time to patch vulnerabilities.Legacy, manual patching processes are now too...
