company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO/CTO

DevOps Engineer

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

Cisco Adaptive Security Appliance is found to be actively exploited after the re...

loading..

Nobelium dispatched a mission against the United States Agency for International...

loading..

Crackonosh is targeting to install and run XMRig, a coin miner package that expl...

Loading...

Vulnerability

Cisco

PoC

Cisco ASA bug subjected to active in-the-wild attacks following the release of P...

Cisco Adaptive Security Appliance is found to be actively exploited after the researcher...

  28-Jun-2021
  7 min read
Loading...

Microsoft

Nobelium

Phishing

Nobelium group linked to Russia found behind compromised Microsoft Customer Supp...

Nobelium dispatched a mission against the United States Agency for International Development (USAID) after the SolarWinds digital assault......

  28-Jun-2021
  2 min read
Loading...

Monero

Crackonosh

malware

Crackonosh exploited 222K vulnerable PC's to mine $2 million Monero via XMRig

Crackonosh is targeting to install and run XMRig, a coin miner package that exploits the resources of the vulnerable system to mine Monero......

  28-Jun-2021
  3 min read
Loading...

Data Breach

Mercedes-Benz

Mercedes-Benz hit by a data breach impacting 1.6 million customer base including...

Mercedes-Benz also emphasized that its internal system wasn't compromised in this data breach, which targeted the customer data ranges from......

  28-Jun-2021
  4 min read
Loading...

zero-day exploit

ZYXEL

ZYXEL found under active cyberattack targeting its firewalls & VPN servers

ZYXEL devices, especially the zero-day vulnerabilities, to compromise the system

  26-Jun-2021
  2 min read
Loading...

Supply Chain Attack

Atlassian

One-Click Exploit

Atlassian is found vulnerable to One-Click exploit could result in account take ...

Atlassian investigations are conducted by Checkpoint Research, in which attackers will target concentrated resources used by other...

  26-Jun-2021
  3 min read
Loading...

REvil

Grupo Fleury

Ransomware

Grupo Fleury suffered REvil ransomware attack

Grupo Fleury has not formally confirmed the ransomware attack

  25-Jun-2021
  3 min read
Loading...

RAT

ReverseRat

Indian power organization under cyber threat with a possible link to Pakistan vi...

The threat actor group attempts to conceal their through additional modification of the registry keys in order...

  24-Jun-2021
  3 min read
Loading...

Ragnar Locker

ADATA

Data Leak

ADATA experiences a data leak of 700GB from the last Ragnar Locker attack

Ragnar Locker may have extorted from ADATA, containing monetary data, secrecy arrangements, and different kinds of...

  24-Jun-2021
  2 min read
Loading...

Databreach

NATO

NATO Cloud Computing platform is reportedly compromised

NATO's information technology modernization efforts are also known as the North Star Project...

  23-Jun-2021
  3 min read