Most recent articles by:

Deep Shah

Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.

Google Pixel 10 Adds C2PA Content Credentials for Media Security

Google has introduced C2PA content authentication on its new Pixel 10 phones.C2PA Content Credentials are now available in Pixel Camera and Google Photos for...

Fake Meta-Verified Extensions Use Malvertising to Steal Facebook Accounts

Researchers have found two new malvertising campaigns distributing fake browser extensions to steal sensitive data. Fake “Meta Verified” extensions and AI-powered ad optimization tools are...

CHILLYHELL, ZynorRAT Malware Target Windows, Mac, and Linux Systems

Researchers have found two new Malware threats targeting macOS, Windows, and Linux systems.The modular backdoor named CHILLYHELL is developed for Apple macOS and attributed...

AsyncRAT Delivered via ScreenConnect in New Fileless Attack Campaign

Certain threat actors are misusing ConnectWise ScreenConnect, a legitimate remote monitoring tool, to access target systems and deploy Malware. Cybersecurity researchers observed attackers delivering AsyncRAT,...

Malicious npm Packages Steal Ethereum Wallets by Impersonating Flashbots

Researchers have found four harmful npm packages targeting Ethereum wallet credentials.The packages pretend to be official Flashbots tools but steal private keys and mnemonic...

SVG Files Used in New Colombian Phishing Campaign Bypass Antivirus

Researchers discovered phishing attacks using SVG files to mimic Colombia's judicial system. Obfuscated SVG files delivered JavaScript-based payloads, leading to undetected phishing pages and hidden...

Cybercriminals Use Grok AI to Bypass X’s Malvertising Protections

Cybercriminals are using a new strategy to get around ad protections on X (formerly Twitter) by leveraging its AI assistant, Grok. The method,...

Ethereum Smart Contracts Used to Hide Malware in npm Packages

Researchers found two harmful npm packages using Ethereum smart contracts to hide malicious activity. The packages installed downloader Malware and targeted developers on both npm...

Must read