Most recent articles by:
Deep Shah
Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.
News
Google Pixel 10 Adds C2PA Content Credentials for Media Security
Google has introduced C2PA content authentication on its new Pixel 10 phones.C2PA Content Credentials are now available in Pixel Camera and Google Photos for...
News
Fake Meta-Verified Extensions Use Malvertising to Steal Facebook Accounts
Researchers have found two new malvertising campaigns distributing fake browser extensions to steal sensitive data.
Fake “Meta Verified” extensions and AI-powered ad optimization tools are...
News
CHILLYHELL, ZynorRAT Malware Target Windows, Mac, and Linux Systems
Researchers have found two new Malware threats targeting macOS, Windows, and Linux systems.The modular backdoor named CHILLYHELL is developed for Apple macOS and attributed...
News
AsyncRAT Delivered via ScreenConnect in New Fileless Attack Campaign
Certain threat actors are misusing ConnectWise ScreenConnect, a legitimate remote monitoring tool, to access target systems and deploy Malware.
Cybersecurity researchers observed attackers delivering AsyncRAT,...
News
Malicious npm Packages Steal Ethereum Wallets by Impersonating Flashbots
Researchers have found four harmful npm packages targeting Ethereum wallet credentials.The packages pretend to be official Flashbots tools but steal private keys and mnemonic...
News
SVG Files Used in New Colombian Phishing Campaign Bypass Antivirus
Researchers discovered phishing attacks using SVG files to mimic Colombia's judicial system.
Obfuscated SVG files delivered JavaScript-based payloads, leading to undetected phishing pages and hidden...
News
Cybercriminals Use Grok AI to Bypass X’s Malvertising Protections
Cybercriminals are using a new strategy to get around ad protections on X (formerly Twitter) by leveraging its AI assistant, Grok.
The method,...
News
Ethereum Smart Contracts Used to Hide Malware in npm Packages
Researchers found two harmful npm packages using Ethereum smart contracts to hide malicious activity.
The packages installed downloader Malware and targeted developers on both npm...
