Most recent articles by:

Deep Shah

Deep is the Co-founder at Codezeros Technology. His strong business acumen and industry knowledge in the Blockchain industry make him one of the strongest pillars at Codezeros. He comes with a rich technological and business understanding to lead. His deep understanding of Blockchain technology integration is a key component of our success at Codezeros. He also contributes to the overall vision of the company's growth and development.

Chrome extension steals MEXC API keys, enables theft online.

A malicious Chrome extension named MEXC API Automator (ID: pppdfgkfdemgfknfnhpkibbkabhghhfh) steals newly created API keys with withdrawal rights from MEXC accounts.The extension creates API...

Agentic AI Alert: Securing MCPs, Shadow Keys, RCE Risk Now!!

AI agents such as Copilot, Claude Code, and Codex can now build, test, and deploy software end-to-end.Machine Control Protocols (MCPs) form the control layer...

ServiceNow AI critical bug allows impersonation, actions now

ServiceNow patched a critical impersonation flaw in its AI platform, tracked as CVE-2025-12420 (CVSS 9.3).The bug could allow an unauthenticated attacker to act as...

GoBruteforcer Botnet Targets Crypto Projects with Bruteforce

GoBruteforcer operators are targeting crypto and blockchain project servers to add them to a botnet that brute-forces FTP, MySQL, PostgreSQL, and phpMyAdmin logins.Campaigns exploit...

Anthropic launches Claude for Healthcare with record access.

Anthropic launched a Claude for Healthcare option allowing U.S. subscribers to share health records with the assistant.Users on Claude Pro and Max can opt...

34 arrested in Spain in Black Axe transnational operation EU

Law enforcement arrested 34 people in Spain linked to the transnational group Black Axe.Authorities estimate fraud losses of about $6.9 million and froze roughly...

MuddyWater deploys RustyWater Rust RAT in Middle East attack

MuddyWater has deployed a Rust-based implant called RustyWater against Middle East diplomatic, maritime, financial, and telecom targets.Attackers use spear-phishing with malicious Word documents and...

Evidence-Backed 2026 Cyber Forecast: Bitdefender on AI Risks

Data-driven webinar outlines which 2026 Cybersecurity predictions reflect real risk versus speculation.Ransomware is shifting toward targeted disruptions that maximize operational and business impact.Uncontrolled adoption...

Must read