company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO/CTO

DevOps Engineer

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

malicious campaign was discovered exploiting Microsoft Build Engine (MSBuild) to...

loading..

Rapid7 eventually joins the list of over hundreds of clients that potentially be...

loading..

FragAttacks a newly discovered vulnerability found directly impacting the Wi-Fi ...

Loading...

Malware

Microsoft

Microsoft Build Engine exploited to circulate password stealing fileless malware

malicious campaign was discovered exploiting Microsoft Build Engine (MSBuild) to circulate malware filelessly. The Threat Actors targeted Windows systems for stealing credentials, including passwords...

  15-May-2021
  3 min read
Loading...

Codecov

Rapid7

Supply Chain Attack

Rapid7 codebase maliciously compromised linked to Codecov Supply Chain Attack

Rapid7 eventually joins the list of over hundreds of clients that potentially became the victim of this supply chain attack

  14-May-2021
  3 min read
Loading...

Vulnerability

FragAttacks

Wi-Fi

FragAttacks Vulnerability newly discovered over dozens exploiting Wi-Fi enabled ...

FragAttacks a newly discovered vulnerability found directly impacting the Wi-Fi enabled devices with malicious intent to extract personal data at a large scale......

  12-May-2021
  3 min read
Loading...

U.S.

Colonial Pipeline

Ransomware

Emergency declared over 17 States of U.S. over Colonial Pipeline hit by ransomwa...

ransomware attack hitting the Colonial Pipeline has turned into digital devastation exemplifying how the underlying vulnerability

  12-May-2021
  4 min read
Loading...

AirTag

Apple

Jailbreak

Apple yet to accept the jailbroken AirTag during an experiment

AirTag was reportedly jailbreaked in a video demonstration by a German Security Researcher through...

  12-May-2021
  4 min read
Loading...

DarkSide

Colonial Pipeline

Ransomware

Colonial Pipeline hit by a DarkSide ransomware attack encrypting entire system t...

Colonial Pipeline has already paid the ransom is yet to be answered; however, from all the experience of DarkSide, it is pretty sure that if the ransomware operation is once executed......

  11-May-2021
  4 min read
Loading...

DNS

TsuName

DDoS Attack

TsuName affecting DNS Servers can lead to reflection based DDoS Attacks

Most DNS servers found and available online today are recursive servers that take a user’s DNS issues and forward them to an authoritative DNS server......

  10-May-2021
  3 min read
Loading...

Privacy Policy

WhatsApp

Facebook restricts WhatsApp features nonacceptance of privacy policy can prohibi...

WhatsApp will neither restrict the usage of its platform by the users who didn't accept their privacy policy nor will they levied any immediate restrictions to......

  09-May-2021
  5 min read
Loading...

Intel

Spectre

AMD

Spectre identified in new vulnerabilities targeting Intel & AMD across billions ...

Spectre got associated with an all-new series of attacks exploiting the micro-ops built into Intel-based machines manufactured since 2011...

  08-May-2021
  4 min read
Loading...

Checkpoint

Qualcomm

Vulnerability

Qualcomm MSM Chip newly found vulnerable affecting over 40% mobile devices

Dubbed as heap overflow, the vulnerability is tracked as CVE-2020-11292, found in the QMI voice service

  06-May-2021
  3 min read