company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO/CTO

DevOps Engineer

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

Explore the detailed analysis of the Ethereum mailing list breach and phishing a...

loading..

Prudential Financial's February breach exposed 2.5M records. ALPHV ransomware ga...

loading..

Discover how the Indirector BTI attack targets Intel's Raptor and Alder Lake CPU...

Loading...

Ethereum

Crypto Drainer

Ethereum Phishing Attack Exposes 35K Users: How No Funds Were Lost

Explore the detailed analysis of the Ethereum mailing list breach and phishing attack, including response strategies and security measures to protect crypto assets...

  04-Jul-2024
  4 min read
Loading...

Blackcat

ALPHV

2.5M Exposed ALPHV Ransomware Involved Prudential Data Breach

Prudential Financial's February breach exposed 2.5M records. ALPHV ransomware gang claimed responsibility. Discover the incident's detailed analysis. ...

  03-Jul-2024
  4 min read
Loading...

Indirector

Intel

Intel CPUs Vulnerable to High-Precision Indirector BTI Attack, Study Finds

Discover how the Indirector BTI attack targets Intel's Raptor and Alder Lake CPUs, exploiting IBP and BTB flaws to steal sensitive data. Mitigation strategies included....

  02-Jul-2024
  5 min read
Loading...

OpenSSH

Linux

New regreSSHion: Critical OpenSSH Vulnerability Allows Root Access on Linux

A severe OpenSSH vulnerability, regreSSHion, allows unauthenticated RCE, risking root access on millions of Linux servers. Immediate patching required...

  02-Jul-2024
  7 min read
Loading...

Supply Chain Attack

CDN

Polyfill.io Supply Chain Attack: 100,000 Sites Compromised

Polyfill.io relaunches on a new domain after being accused of delivering malicious code to 100,000+ sites. Explore the security implications and industry impact....

  29-Jun-2024
  5 min read
Loading...

MoveIt

Authentication Bypass

Critical MOVEit Transfer Authentication Bypass Flaws EXPLOITED

Discover the latest critical vulnerabilities in MOVEit Transfer. Learn about CVE-2024-5806 and CVE-2024-5805, their impact, and essential mitigation steps....

  28-Jun-2024
  7 min read
Loading...

AWS

Coinstats

Cryptotheft

CoinStats Hack: Is Social Engineering Behind $2M Loss & 1,590 Wallets?

CoinStats breach exposes 1,590 crypto wallets via alleged social engineering attack. Learn how it happened and what it means for the crypto industry...

  28-Jun-2024
  5 min read
Loading...

LockBit

Ransomware

LockBit Ransomware's Claim Against the US Federal Reserve HACK

Critical analysis of LockBit's claim against the US Federal Reserve, exploring technical nuances and security implications.

  26-Jun-2024
  4 min read
Loading...

Trojan

Android

Medusa

Medusa Returns: New Malware Variant Threatens Android Users Worldwide

Discover the resurgence of Medusa malware, now targeting Android users globally with new variants.

  25-Jun-2024
  4 min read
Loading...

Conti

Blacksuit

CDK

From Royal to BlackSuit How Rebranded Ransomware Crippled CDK Global

With over 350 attacks and $275M in ransom demands the notorious BlackSuit ransomware a rebrand of the Royal operation has set its sights on CDK Global...

  24-Jun-2024
  4 min read