company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

SFile ransomware, aka Escal operators, have ported to the Linux environment with...

loading..

WebKit engine of Safari 15 browser detected with a critical issue in the impleme...

loading..

QNAP NAS devices once again became viable victims of a new cyberattack campaign ...

Loading...

China

Linux

Escal

SFile (Escal) ransomware operators resurrected with a new Linux version of their...

SFile ransomware, aka Escal operators, have ported to the Linux environment with its newly developed malware to infect & encrypt files of Linux-based operating systems… ...

  18-Jan-2022
  2 min read
Loading...

Data Leak

WebKit

iOS

Safari 15 leaks browsing history & reveals user identity following the exploitat...

WebKit engine of Safari 15 browser detected with a critical issue in the implementation of IndexedDB API resulting in leaking of browsing activities & exposing user identity......

  17-Jan-2022
  4 min read
Loading...

NAS

Qlocker2

QNAPCrypt

Qlocker resurrected with a new campaign in targeting QNAP NAS devices once again

QNAP NAS devices once again became viable victims of a new cyberattack campaign launched by the operators of Qlocker ransomware group......

  15-Jan-2022
  3 min read
Loading...

E-Commerce

ShopGoodwill

Data Breach

Goodwill revels data breach on its e-com auction platform ShopGoodwill exposing ...

Goodwill identified a site vulnerability following the discovery of data breach on its ShopGoodwill platform exposing...

  15-Jan-2022
  2 min read
Loading...

HTTP

RCE

Worm

Microsoft addresses critical Office RCE & wormable Windows HTTP flaw in its Tues...

Microsoft has recently patched 96 vulnerabilities, including wormable Windows HTTP protocol stack & Office RCE flaw, as a part of its Tuesday security update for......

  12-Jan-2022
  4 min read
Loading...

XSS

SQL Injection

Vulnerability

WordPress releases 5.8.3 security release following the disclosure of high sever...

WordPress 5.8.3 security update addresses SQL injection, XSS flaws and more vulnerabilities within this short-cycle security release…

  11-Jan-2022
  3 min read
Loading...

Data Security

Grass Valley

SSN

Grass Valley's unauthorized access leads to massive data breaches leaking SSN, m...

City of Grass Valley discovers a massive data breach following the detection of unauthorized access risks its secure networks, copying & transferring data...

  10-Jan-2022
  2 min read
Loading...

VMware

VMWare Horizon servers targeted through exploiting Log4Shell vulnerabilities acc...

VMWare Horizon was reportedly found vulnerable against underlying Log4Shell vulnerabilities exploited by unknown threat actors to circulate webshells...

  08-Jan-2022
  4 min read
Loading...

VMWare

Log4Shell

NHS

National Health Service (NHS) has published a cyber alert warning of an unknown ...

VMWare Horizon is a platform used to deploy virtual desktops in enterprise environments...

  07-Jan-2022
  2 min read
Loading...

Chrome

Google

Zero-Day

Google Chrome receives numerous security updates post new year following the dis...

Google Chrome receives security updates to patch 37 new vulnerabilities for 2022...

  06-Jan-2022
  2 min read