company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

T-Mobile user's data reportedly compromised following a data breach incident to...

loading..

Broward healthcare system is offering a two-year membership of identity theft de...

loading..

Rootkits discovered inside the firmware of HP iLO contains a wiper malware to pe...

Loading...

SIM Swapping Attack

Telecom

T-Mobile yet again becomes a victim of SIM swapping attacks exposing its users d...

T-Mobile user's data reportedly compromised following a data breach incident to SIM swapping attack or had their CPNI data exposed or both......

  05-Jan-2022
  2 min read
Loading...

Healthcare

Broward Health

Hospital

Broward Health remains vulnerable following a databreach exposing 1.3 million us...

Broward healthcare system is offering a two-year membership of identity theft detection and protection services through Experian

  04-Jan-2022
  3 min read
Loading...

Iran

Amnpardaz

Wiper

Rootkits hiding in HP iLO used for routine destruction of servers

Rootkits discovered inside the firmware of HP iLO contains a wiper malware to perform routine destruction of Iranian servers...

  03-Jan-2022
  3 min read
Loading...

Encryption

DataVault

DataVault Encryption application vulnerable to Brute-Force attacks

Vulnerabilities in DataVault encryption software allows attackers to brute force passwords and gain unauthorized access...

  31-Dec-2021
  2 min read
Loading...

Shadow Brokers

DoubleFeature

Python

DoubleFeature plugin in DanderSpritz framework logs Equation Group's every tool ...

Experts publish details about the post-exploitation framework DanderSpritz used by the Equation Group; their DoubleFeature plugin provides a complete diagnostic tool for victim machines......

  31-Dec-2021
  4 min read
Loading...

Amazon S3 Bucket

Logistics

Privacy

D.W Morgan Logistics company exposes 100 GB of data from an open Amazon S3 bucke...

Researchers spotted an Amazon S3 bucket belonging to D.W Morgan without authorization controls that exposed 2.5 million files adding up to 100 GB of data......

  30-Dec-2021
  2 min read
Loading...

Ransomware

Firmware

Auerswald VoIP firmware identified with multiple backdoors allowing privilege e...

One of Auerwalds widely used products exposes two backdoor passwords that will allow threat actors to escalate privileges

  30-Dec-2021
  3 min read
Loading...

EV

Schneider

Schneider patches multiple critical CVEs in its charging station products

Latest version of Schneider products fixes multiple critical vulnerabilities that could lead to unauthorized access and denial of service attacks......

  28-Dec-2021
  3 min read
Loading...

Ransomware

QNAPCrypt

Encryption

QNAP NAS sees a dramatic rise in Echoraix ransomware attacks aka QNAPCrypt

QNAP NAS users reported an increase in echoraix ransomware attacks during Christmas week, where attackers demanded $1200 to $3000 in bitcoin......

  28-Dec-2021
  3 min read
Loading...

Conti

Shutterfly

VMware ESXI

Shutterfly's data at risk following a Conti ransomware attack

Shutterfly experiences a disruption in services after falling victim to Conti ransomware incident; attackers threaten to publish stolen data on their leak site.... ...

  27-Dec-2021
  2 min read