Most recent articles by:

Deep Shah

Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.

Five Golden Rules for Safe AI Adoption and Data Protection at Work

Effective AI adoption requires robust controls and visibility in organizations. Real-time monitoring and discovery of all AI activity is essential to reduce risks. Context-based risk assessment...

ESET Discovers PromptLock: First AI-Powered Ransomware Emerges

Researchers at ESET identified a new AI-powered Ransomware called PromptLock. PromptLock uses locally run AI models to create malicious scripts that target files across multiple...

AI-Powered Claude Used in Sophisticated July 2025 Data Extortion Attack

Anthropic blocked a large cyberattack in July 2025 that used its AI tool Claude for data theft and extortion. The operation targeted at least 17...

Hackers Breach Salesloft via Drift App to Steal Salesforce Data

Hackers breached Salesloft and used compromised OAuth tokens to access Salesforce customer data. The threat group, identified as UNC6395, targeted Salesforce instances linked to the...

Citrix Patches Critical NetScaler RCE Flaw Amid Active Attacks

Citrix addressed three security vulnerabilities in NetScaler ADC and NetScaler Gateway, one of which is under active attack. Critical flaw CVE-2025-7775 could allow attackers to...

MixShell Malware Targets U.S. Manufacturers in ZipLine Attack

Attackers are targeting supply chain-related manufacturing companies using an in-memory Malware called MixShell.The campaign, identified as ZipLine, uses professional conversations through company contact forms...

HOOK Android Trojan Adds Ransomware Overlay, Expands Threats

Researchers have discovered a new version of the HOOK Android banking trojan with Ransomware-like capabilities. HOOK uses full-screen overlays to extort victims and gathers sensitive...

Fake Voicemails Spread UpCrypter Malware in Global Phishing Surge

New phishing campaign uses fake voicemails and purchase orders to distribute UpCrypter Malware loader.The attacks target sectors like manufacturing, technology, healthcare, construction, and retail...

Must read