company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO/CTO

DevOps Engineer

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

City of Grass Valley discovers a massive data breach following the detection of ...

loading..

VMWare Horizon was reportedly found vulnerable against underlying Log4Shell vuln...

loading..

VMWare Horizon is a platform used to deploy virtual desktops in enterprise envir...

Loading...

Data Security

Grass Valley

SSN

Grass Valley's unauthorized access leads to massive data breaches leaking SSN, m...

City of Grass Valley discovers a massive data breach following the detection of unauthorized access risks its secure networks, copying & transferring data...

  10-Jan-2022
  2 min read
Loading...

VMware

VMWare Horizon servers targeted through exploiting Log4Shell vulnerabilities acc...

VMWare Horizon was reportedly found vulnerable against underlying Log4Shell vulnerabilities exploited by unknown threat actors to circulate webshells...

  08-Jan-2022
  4 min read
Loading...

VMWare

Log4Shell

NHS

National Health Service (NHS) has published a cyber alert warning of an unknown ...

VMWare Horizon is a platform used to deploy virtual desktops in enterprise environments...

  07-Jan-2022
  2 min read
Loading...

Chrome

Google

Zero-Day

Google Chrome receives numerous security updates post new year following the dis...

Google Chrome receives security updates to patch 37 new vulnerabilities for 2022...

  06-Jan-2022
  2 min read
Loading...

SIM Swapping Attack

Telecom

T-Mobile yet again becomes a victim of SIM swapping attacks exposing its users d...

T-Mobile user's data reportedly compromised following a data breach incident to SIM swapping attack or had their CPNI data exposed or both......

  05-Jan-2022
  2 min read
Loading...

Healthcare

Broward Health

Hospital

Broward Health remains vulnerable following a databreach exposing 1.3 million us...

Broward healthcare system is offering a two-year membership of identity theft detection and protection services through Experian

  04-Jan-2022
  3 min read
Loading...

Iran

Amnpardaz

Wiper

Rootkits hiding in HP iLO used for routine destruction of servers

Rootkits discovered inside the firmware of HP iLO contains a wiper malware to perform routine destruction of Iranian servers...

  03-Jan-2022
  3 min read
Loading...

Encryption

DataVault

DataVault Encryption application vulnerable to Brute-Force attacks

Vulnerabilities in DataVault encryption software allows attackers to brute force passwords and gain unauthorized access...

  31-Dec-2021
  2 min read
Loading...

Shadow Brokers

DoubleFeature

Python

DoubleFeature plugin in DanderSpritz framework logs Equation Group's every tool ...

Experts publish details about the post-exploitation framework DanderSpritz used by the Equation Group; their DoubleFeature plugin provides a complete diagnostic tool for victim machines......

  31-Dec-2021
  4 min read
Loading...

Amazon S3 Bucket

Logistics

Privacy

D.W Morgan Logistics company exposes 100 GB of data from an open Amazon S3 bucke...

Researchers spotted an Amazon S3 bucket belonging to D.W Morgan without authorization controls that exposed 2.5 million files adding up to 100 GB of data......

  30-Dec-2021
  2 min read