Most recent articles by:

Deep Shah

Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.

Microsoft AI Role Flaw Allowed Identity Takeover

A privilege escalation flaw in Microsoft Entra ID's Agent ID Administrator role was patched by Microsoft on April 9, 2026.The vulnerability allowed users with...

Checkmarx Data Leaked on Dark Web Following Attack

Checkmarx confirms stolen data from its GitHub repository was published on the dark web.The company states no customer data was stored in the compromised...

CISA Adds 4 Exploited Flaws to KEV Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added four actively exploited vulnerabilities to its Known Exploited Vulnerabilities catalog on April 24, 2026.The flaws...

China Accused of NASA Tech Theft via Phishing

A Chinese national associated with a state-owned defense firm impersonated U.S. engineers for years to steal sensitive defense software.Victims included employees at NASA, the...

Fake Apps on Apple Store Steal Crypto Keys

Researchers discovered 26 malicious apps on the Apple App Store, dubbed FakeWallet, designed to steal cryptocurrency wallet recovery phrases and private keys.The scam, active...

LMDeploy Flaw Exploited Within Hours of Disclosure

Threat actors exploited the critical SSRF bug in LMDeploy toolkit just 12 hours after its public disclosure.The vulnerability, CVE-2026-33626, allows attackers to steal cloud...

Bitwarden CLI Compromised by Checkmarx Supply Chain Attack

The official Bitwarden CLI package on npm was compromised, distributing a malicious version that steals credentials and secrets.The supply chain attack used a hacked...

AI Attack Wave: The Collapsing Exploit Window

The speed of AI-powered attacks is creating a Collapsing Exploit Window, drastically reducing the time to patch vulnerabilities.Legacy, manual patching processes are now too...

Must read