Loading cryptocurrency prices...

Most recent articles by:

Deep Shah

Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.

ShadowRay 2.0 Exploits Ray AI Flaw for Crypto Botnet Attack

A longstanding security flaw in the Ray AI framework is being exploited to create self-replicating cryptocurrency mining botnets.The ShadowRay 2.0 campaign targets exposed Ray...

TamperedChef Malvertising Campaign Targets Users with Fake Software

Threat actors use fake installers disguised as popular software in a global malvertising campaign called TamperedChef.The campaign employs social engineering, SEO, and code-signing certificates...

Active Exploitation of 7-Zip CVE-2025-11001 ZIP Flaw Alert

A critical vulnerability, CVE-2025-11001, affecting 7-Zip has been actively exploited since its public disclosure.The flaw allows remote code execution via crafted ZIP files manipulating...

ServiceNow Now Assist AI Vulnerable to Prompt Injection Attacks

Default configurations in ServiceNow's Now Assist AI platform enable second-order prompt injection attacks.Attackers can exploit agent-to-agent communication to access and modify sensitive data without...

Sneaky 2FA Phishing Kit Now Uses Browser-in-the-Browser Attack

Phishing-as-a-Service (PhaaS) kit Sneaky 2FA now uses Browser-in-the-Browser (BitB) impersonation to steal Microsoft account credentials.BitB creates fake browser pop-ups that simulate legitimate login windows,...

Meta Launches WhatsApp Research Proxy to Boost Bug Bounty Program

Meta has introduced the WhatsApp Research Proxy tool to aid bug bounty researchers in analyzing WhatsApp’s network protocol.The company awarded over $25 million in...

Sophisticated Tuoni C2 Malware Targets US Real-Estate Firm

A U.S.-based real estate company was targeted in October 2025 by an attack using the emerging Tuoni command-and-control (C2) framework.The attack involved social engineering...

Seven Malicious npm Packages Redirect Users to Crypto Scams

Seven malicious npm packages were published by one threat actor between September and November 2025.The threat actor used a cloaking service named Adspect to...

Must read