company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO/CTO

DevOps Engineer

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

Prometheus has disclosed data on 27 victims, primarily from Mexico Government, a...

loading..

JBS Foods endured a vague episode throughout the end of the week that upset vari...

loading..

Google's new privacy settings make it challenging to hide user location, allowin...

Loading...

Prometheus

Mexico

Grief

Mexican Govt. data publicized with new ransomware group Prometheus & Grief

Prometheus has disclosed data on 27 victims, primarily from Mexico Government, and it looks like this is just the beginning...

  01-Jun-2021
  7 min read
Loading...

Cyberattack

JBS

JBS Foods operations abruptly halted in U.S., Australia after hit by Cyberattack

JBS Foods endured a vague episode throughout the end of the week that upset various workers helping IT...

  01-Jun-2021
  4 min read
Loading...

Privacy

Google

Google convolutes some privacy settings to remain stealth from users

Google's new privacy settings make it challenging to hide user location, allowing google to allocate user location even user had turned off their location...

  01-Jun-2021
  3 min read
Loading...

Nuclear

U.S. Soldiers

Databreach

US soldiers circulated nuclear data online mistakenly via flashcard apps

leaked important nuclear data online by mistake via flashcard apps.' flashcard learning apps are popular digital learning tools

  31-May-2021
  3 min read
Loading...

Vulnerability

SonicWall

SonicWall recently addressed a new on-premises NSM vulnerability

SonicWall has validated and patched a post-authentication vulnerability...

  29-May-2021
  2 min read
Loading...

Russia

Hydra

Cryptocurrency

Russian Hydra rose oversurged with $1.3 Billion over DarkNet Market in 2020

Hydra has been actively operating since 2015 as a competitor to the now-defunct Russian Anonymous Marketplace...

  27-May-2021
  4 min read
Loading...

Half-Double

Rowhammer

Google

New Rowhammer attack variant dubbed as Half-Double by Google Security Researcher...

Rowhammer attacks dubbed as “Half-Double,” which enables the bypassing of all current laid out defenses

  26-May-2021
  4 min read
Loading...

Cryptocurrency

Cryptocore

North Korea

Cryptocore attacks on cryptocurrency exchange was identified to have links with ...

CryptoCore, also called CageyChameleon, CryptoMimic, and Leery Turtle is no different from other Lazarus Group operations in that the exploitation of cryptocurrency primarily drives......

  25-May-2021
  3 min read
Loading...

Zero-Day

Apple

Vulnerability

Apple released updated security patch against actively exploited zero-day vulner...

Apple in macOS responsible for maintaining each of the user's database consents...

  25-May-2021
  3 min read
Loading...

Vulnerability

Nagios

Nagios enveloped by 13 critically new vulnerability details publicized recently

Nagios is an open-source IT infrastructure tool equivalent to SolarWinds...

  24-May-2021
  5 min read