Most recent articles by:

Deep Shah

Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.

Malicious Go SSH Tool Steals Credentials Via Telegram Bot Alert

Researchers found a fake Go module that steals SSH credentials instead of providing legitimate brute-force functionality. The malicious module sends stolen logins to a Telegram...

INTERPOL Cracks Down on Cybercrime: 1,209 Arrested in Africa Sweep

Authorities arrested 1,209 cybercriminals across 18 African countries during an INTERPOL operation. The crackdown recovered $97.4 million and took down over 11,400 malicious online infrastructures. 25...

Hackers Use Fake CAPTCHAs, USBs to Spread CORNFLAKE and XMRig

Attackers use fake CAPTCHA pages to lure users into infecting systems with a backdoor named CORNFLAKE.V3. The threat group tracked as UNC5518 sells access which...

New QuirkyLoader Malware Targets Users in Recent Email Attacks

Researchers have identified a new Malware loader called QuirkyLoader being used in global email attacks since November 2024.QuirkyLoader distributes different types of malware, including...

Scattered Spider Hacker Sentenced to 10 Years for Crypto Thefts

A member of the Scattered Spider cybercrime group received a 10-year U.S. prison sentence for involvement in cryptocurrency theft and Hacking.Noah Michael Urban, age...

Apple Patches Actively Exploited ImageIO Zero-Day Vulnerability

Apple has released security updates to fix a major flaw affecting iOS, iPadOS, and macOS. The flaw, tracked as CVE-2025-43300, is currently being exploited in...

Popular Password Manager Extensions Vulnerable to Clickjacking Attacks

Several widely used browser password manager extensions are vulnerable to a new clickjacking attack. The weakness could allow attackers to steal logins, two-factor authentication codes,...

Shadow AI Agents Pose Growing Security Risk for Enterprises

Businesses face challenges in tracking the number and activities of AI agents operating within their organizations.Many AI agents are deployed independently by business units,...

Must read