company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

VMWare Horizon is a platform used to deploy virtual desktops in enterprise envir...

loading..

Google Chrome receives security updates to patch 37 new vulnerabilities for 2022...

loading..

T-Mobile user's data reportedly compromised following a data breach incident to...

Loading...

VMWare

Log4Shell

NHS

National Health Service (NHS) has published a cyber alert warning of an unknown ...

VMWare Horizon is a platform used to deploy virtual desktops in enterprise environments...

  07-Jan-2022
  2 min read
Loading...

Chrome

Google

Zero-Day

Google Chrome receives numerous security updates post new year following the dis...

Google Chrome receives security updates to patch 37 new vulnerabilities for 2022...

  06-Jan-2022
  2 min read
Loading...

SIM Swapping Attack

Telecom

T-Mobile yet again becomes a victim of SIM swapping attacks exposing its users d...

T-Mobile user's data reportedly compromised following a data breach incident to SIM swapping attack or had their CPNI data exposed or both......

  05-Jan-2022
  2 min read
Loading...

Healthcare

Broward Health

Hospital

Broward Health remains vulnerable following a databreach exposing 1.3 million us...

Broward healthcare system is offering a two-year membership of identity theft detection and protection services through Experian

  04-Jan-2022
  3 min read
Loading...

Iran

Amnpardaz

Wiper

Rootkits hiding in HP iLO used for routine destruction of servers

Rootkits discovered inside the firmware of HP iLO contains a wiper malware to perform routine destruction of Iranian servers...

  03-Jan-2022
  3 min read
Loading...

Encryption

DataVault

DataVault Encryption application vulnerable to Brute-Force attacks

Vulnerabilities in DataVault encryption software allows attackers to brute force passwords and gain unauthorized access...

  31-Dec-2021
  2 min read
Loading...

Shadow Brokers

DoubleFeature

Python

DoubleFeature plugin in DanderSpritz framework logs Equation Group's every tool ...

Experts publish details about the post-exploitation framework DanderSpritz used by the Equation Group; their DoubleFeature plugin provides a complete diagnostic tool for victim machines......

  31-Dec-2021
  4 min read
Loading...

Amazon S3 Bucket

Logistics

Privacy

D.W Morgan Logistics company exposes 100 GB of data from an open Amazon S3 bucke...

Researchers spotted an Amazon S3 bucket belonging to D.W Morgan without authorization controls that exposed 2.5 million files adding up to 100 GB of data......

  30-Dec-2021
  2 min read
Loading...

Ransomware

Firmware

Auerswald VoIP firmware identified with multiple backdoors allowing privilege e...

One of Auerwalds widely used products exposes two backdoor passwords that will allow threat actors to escalate privileges

  30-Dec-2021
  3 min read
Loading...

EV

Schneider

Schneider patches multiple critical CVEs in its charging station products

Latest version of Schneider products fixes multiple critical vulnerabilities that could lead to unauthorized access and denial of service attacks......

  28-Dec-2021
  3 min read