company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

exploitation attempts took place in the first four days since the disclosure of ...

loading..

MailChimp & Trezor further questions about the breach details as social engineer...

loading..

Phishing email posing as WhatsApp voice message notification circulated info-ste...

Loading...

Spring Boot

Spring4Shell zero-day vulnerability have already been targeted

exploitation attempts took place in the first four days since the disclosure of the severe remote code execution (RCE) flaw, tracked as CVE-2022-22965, and the associated exploit cod...

  05-Apr-2022
  1 min read
Loading...

Trezor

Email Marketing

Cryptocurrency

MailChimp confirmed a massive hack to obtain crypto assets

MailChimp & Trezor further questions about the breach details as social engineering, malware, and credential theft to gain access to numerous well-known companies, including Nvidia, Samsung, Microsoft, & Okta......

  05-Apr-2022
  3 min read
Loading...

Email

Phishing

Voicemail

27,655 users fallen prey to a WhatsApp phishing email delivering info-stealing m...

Phishing email posing as WhatsApp voice message notification circulated info-stealing malware to 27,655 email addresses...

  05-Apr-2022
  3 min read
Loading...

Brokenwire

EV

Brokenwire attack: EV charging system vulnerable against a newly discovered atta...

Brokenwire is a new attack technique that intends to potentially disrupt Combined Charging System (CCS) in electric vehicles lately prone......

  04-Apr-2022
  3 min read
Loading...

Trezor

Trezor hardware wallet mailing list was used to send fake data breach notificati...

Trezor is a hardware cryptocurrency wallet that allows you to store your crypto assets offline, rather than using cloud-based wallets or wallets stored on your PC that are more vulnerable to theft....

  03-Apr-2022
  2 min read
Loading...

RAT

BORAT

DoS

BORAT, a newly appeared RAT over DarkNet market conduct DDoS attacks, UAC bypass...

RAT, Borat enables remote threat actors to take complete control of their victim’s mouse and keyboard, access files, network points, and hide any signs of their presence......

  03-Apr-2022
  1 min read
Loading...

Supply Chain Attack

PHP

PEAR could have suffered a supply chain attack due to a 15-year-old vulnerabilit...

Vulnerability researcher disclosed the presence of critical flaws in PEAR PHP repo that could have triggered a supply chain attack that remained dormant for past 15 years... ...

  02-Apr-2022
  2 min read
Loading...

Apex

RCE

Vulnerability

Trend Micro updated its Apex Central after active exploitation of a critical RCE...

Trend Micro addressed a high severity vulnerability in its Apex Central management console that allows attackers to execute arbitrary code remotely... ...

  01-Apr-2022
  1 min read
Loading...

Backdoor

DeFi

Lazarus Group deploys backdoor via trojanized DeFi wallet to steal cryptocurrenc...

Lazarus Group, involved in another financially motivated attack campaign leveraging trojanized DeFi wallet app to deploy a fully-featured backdoor.... ...

  01-Apr-2022
  3 min read
Loading...

Firewall

Networking

VPN

Zyxel pushes critical security update to address its business firewall & VPN dev...

Zyxel pushes a security update to address a critical vulnerability affecting some of its business firewall & VPN devices...

  01-Apr-2022
  2 min read