company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

Trojan Source a newly evolved attack technique allows threat actors to inject ma...

loading..

Enable Security revealed five vulnerabilities found in a WebRTC application serv...

loading..

A targeted ransomware attack has shut down online services of Toronto Public Tra...

Loading...

Compiler

Trojan

Source Code

Trojan Source, a new attack vector leverages Unicode to manipulate compiler

Trojan Source a newly evolved attack technique allows threat actors to inject malware into the source code but remain syntactically valid for compiler......

  03-Nov-2021
  3 min read
Loading...

Telecommunications

WebRTC

SIP

Researches unveil five vulnerabilities identified in FreeStack

Enable Security revealed five vulnerabilities found in a WebRTC application server FreeSwitch that has now been patched in a security update......

  03-Nov-2021
  4 min read
Loading...

TTC

Canada

Ransomware

Toronto Public Transportation System went through a complete shutdown following ...

A targeted ransomware attack has shut down online services of Toronto Public Transportation and brought down TTC's internal email servers......

  02-Nov-2021
  3 min read
Loading...

Botnet

Pink

DDoS

Pink, the largest botnet malware in six years has infected 1.6M devices primaril...

Pink is reportedly the largest botnet in the past six years; it has infected 1.6 million devices, out of which 96 % are in China...

  01-Nov-2021
  4 min read
Loading...

BlackShadow

LGBTQ

Israel

BlackShadow targets many Israeli firms, including LGBTQ apps, after database goe...

Telegram channel of BlackShadow was removed shortly after they threatened to leak data from an LGBTQ dating site while demanding a ransom of $1 Million......

  01-Nov-2021
  3 min read
Loading...

Microsoft

MacOS

Apple

MacOS vulnerability 'Shrootless,' detected by Microsoft, bypasses SIP

Shrootless, a newly evolved macOS vulnerability detected by Microsoft allows attackers to bypass Apple's SIP macOS file system and write arbitrary code on a device. ...

  01-Nov-2021
  3 min read
Loading...

Chaos

Minecraft

Gamer

Chaos Ransomware variant lures victims while masked as Minecraft alt list

Chaos ransomware variant targeting Japanese Minecraft players encrypt files only less than 2MB and destroys the rest despite paying the ransom......

  30-Oct-2021
  3 min read
Loading...

Malware

Android

Rooting

AbstractEmu, a new rooting malware disguises as a utility app, can take over you...

AbstractEmu, a previously undocumented Android rooting malware, contains code abstraction capabilities & anti-emulation checks to avoid detection actively. Its similarities with banking Trojans indicate that the actors are financially motivated......

  30-Oct-2021
  4 min read
Loading...

British

Guntrader

SQL Vulnerability

Guntrader Ltd forced into liquidation following data breach lawsuits

Guntrader Ltd. underwent a data breach attack and was forced into liquidation due to lawsuits against them. Current tradings are carried through their rebranded name Guntrader Media Ltd... ...

  30-Oct-2021
  3 min read
Loading...

VoIP

DDoS

Ransomware

Comms Council warns VoIP providers of coordinated DDoS extortion operation

Comms Council warns about coordinated DDoS campaigns carried by professional cybercriminals against VoIP providers in the past four weeks... ...

  29-Oct-2021
  3 min read