company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

The latest findings in Zoom’s screen sharing feature which can accidentally leak...

loading..

Up to three MB of data can be hidden inside a Twitter image revealed, how Twitte...

loading..

Flaws have been detected in many WordPress plugins like Elementor, WP Super Cach...

Loading...

Databreach

Zoom

Flaw in Zoom's screen sharing feature may leak data

The latest findings in Zoom’s screen sharing feature which can accidentally leak sensitive detail to other attendees in a call and it discloses the content of applications that are not shared...

  19-Mar-2021
  2 min read
Loading...

Twitter

Twitter images misuse to hide ZIP, MP3 files

Up to three MB of data can be hidden inside a Twitter image revealed, how Twitter hosts both MP3 audio files and ZIP archives present within the PNG images ...

  19-Mar-2021
  2 min read
Loading...

Wordpress

WordPress plugin flaws affect over 7 million websites

Flaws have been detected in many WordPress plugins like Elementor, WP Super Cache which if abused could permit a hacker to execute a random code and take control of a website in some cases...

  19-Mar-2021
  2 min read
Loading...

Chinesehackers

Telecom industry targeted by Chinese hackers Worldwide

A group of threat actors who are originated in China is targeting telecom companies across the world so as to exfiltrate 5G technology secrets...

  18-Mar-2021
  2 min read
Loading...

Bitcoin

Twitter

Teen hacker behind Twitter Bitcoin scam sentenced to three years in prison

Graham Ivan Clark, the Teen hacker behind Twitter Bitcoin scam charged as an adult as he turned 18 in January 2021 and arrested after an operation was coordinated by the FBI...

  18-Mar-2021
  3 min read
Loading...

Mimecast

Solarwinds

Mimecast's source codes stolen by Solarwinds Hackers

The well-known SolarWinds campaign, hackers who compromised Mimecast networks, have also swiped some of Mimecast’s source code repositories ...

  18-Mar-2021
  2 min read
Loading...

ChinaChopper

China Chopper: a web shell exploited by Hafnium cybercriminals

China Chopper, a web shell exploited by the state-sponsored Hafnium cybercriminals that originates from China

  17-Mar-2021
  3 min read
Loading...

Databreach

Alert: SMSes reach hackers render OTPs unsafe

The threat actors make use of text messaging management services that are meant for business, to launch their attack that redirect SMS to reach the victim’s phone number to the systems that are controlled by them...

  17-Mar-2021
  3 min read
Loading...

Botnet

Malware

Mirai

The emergence of New Mirai Variant and ZHtrap Botnet Malware

A new wave of ongoing cyberattacks that are abusing various vulnerabilities to deploy Mirai variants on compromised systems has been uncovered on Monday by cybersecurity researchers....

  17-Mar-2021
  3 min read
Loading...

Dataleak

Credit card data Hide by hackers in JPG file from compromised stores

A data leak from stolen payment cards from compromised online stores is a new trick adopted by threat actors these days

  16-Mar-2021
  2 min read