company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO/CTO

DevOps Engineer

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

IBM security researchers have detected a cyber spying effort using targeted fake...

loading..

The malware's creators use suspicious payloads hidden as social media buttons th...

loading..

A private spying firm that uses mobile network vulnerabilities to spy on calls, ...

Loading...

WHO

Covid-19

Cyber Spying Being Made For Extracting Information From WHO

IBM security researchers have detected a cyber spying effort using targeted fake emails for collecting vital information on the WHO’s initiative...

  04-Dec-2020
  2 min read
Loading...

Creditcard

SocialMedia

Social Media Platform Icons Contain Credit Card Stealing Malware

The malware's creators use suspicious payloads hidden as social media buttons that mimic high profile platforms such as Facebook, Twitter, and Instagram....

  04-Dec-2020
  2 min read
Loading...

Vulnerability

Private Spying Firm Involved in Human Right Abuse Doing Business With 25 Governm...

A private spying firm that uses mobile network vulnerabilities to spy on calls, texts and location information is doing business with at least 25 governments globally...

  04-Dec-2020
  2 min read
Loading...

Russia

Malware

The Russian Malware ‘Crutch’ Used For Vulnerable Attacks Against Military Organi...

The Cyber Security firm Uncover Crutch Russian Malware Used In APT Attacks

  04-Dec-2020
  2 min read
Loading...

Securitybreach

Spotify

“Spotify Wrapped 2020” Security Breached Affected The Pages of The Biggest Stars

Popular Spotify Wrapped 2020 playlist rollout of the year’s most popular songs, the streaming service is struggling with a security violation....

  03-Dec-2020
  2 min read
Loading...

Google

iOS

iOS Bug Makes Possible For A Remote Hacker To Hack Through A Nearby Wi-fi

Google Project Zero white-hat hacker Ian Beer on Tuesday revealed details of a patched severe iOS bug

  03-Dec-2020
  2 min read
Loading...

Microsoft

Vietnamese Government-Supported Hackers Deploying Crypto Currency-Mining Malware

Microsoft stated that the Vietnamese Government Supported Hackers are positioning crypto currency mining malware along with their regular cyber spying toolkits....

  03-Dec-2020
  2 min read
Loading...

Gosmspro

Avoid Using GO SMS PRO App Till The Issues Are Completely Solved

A week after cyber security researchers disclosed a defect in the well known GO SMS Pro messaging application, it appears the developers of the app are silently taking steps to fix the issue from behind the scenes...

  02-Dec-2020
  2 min read
Loading...

Cybersecurity

Households On An Average Experienced 104 Cyber Security Threats Per Month

The most unsafe devices include laptops, computers, smart phones and tablets, networked cameras and storage devices and streaming video devices...

  02-Dec-2020
  2 min read
Loading...

Kaspersky

Cert-In

Kaspersky To Assist CERT-In After A Strategic Partnership Made Recently

Cyber security firm Kaspersky to assist Indian cyber security agency (CERT-In) in cyber incident management enhancing users’ trust in digital technologies...

  02-Dec-2020
  2 min read