company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO/CTO

DevOps Engineer

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

Discover the aftermath of ALPHV's ransomware attack on VF Corp, leading to the t...

loading..

Learn how attackers exploit TeamViewer, turning it into a threat vector for rans...

loading..

Iranian Hackers Targeting Employees from Research Orgs & Universities in a New S...

Loading...

Lifestyle

DataBreach

35.5 Million VF Corp User Data Stolen in ALPHV Ransomware Attack!

Discover the aftermath of ALPHV's ransomware attack on VF Corp, leading to the theft of 35.5 million user records.

  20-Jan-2024
  4 min read
Loading...

Remote Access

Initial Access

TeamViewer Exploited in Ransomware for Network Breaches

Learn how attackers exploit TeamViewer, turning it into a threat vector for ransomware attacks, compromising network security...

  20-Jan-2024
  2 min read
Loading...

APT35

Backdoor

Iranian Hackers Spear Phishing Unis & Research Orgs with MediaPl Malware

Iranian Hackers Targeting Employees from Research Orgs & Universities in a New Spear Phishing Attacks Pushing Mint Sandstorm's MediaPl Backdoor Malware...

  18-Jan-2024
  4 min read
Loading...

Atlassian

Vulnerability

RCE

Critical Remote Code Execution Vulnerability in Old Atlassian Confluence

Stay secure with Atlassian! Learn about the critical CVE-2023-22527 vulnerability in Confluence. Immediate patching. #AtlassianSecurity ...

  17-Jan-2024
  5 min read
Loading...

Spyware

Android

GrapheneOS: Mitigating Android Firmware Exploits

GrapheneOS proposes auto-reboot to counter Android vulnerabilities. Google responds. Dive into the future of mobile security now

  16-Jan-2024
  3 min read
Loading...

Balada

WordPress

6,200+ WordPress Sites with POPUP BUILDER Plugin Infected by New Balada

A little over 6,700 WordPress websites using a vulnerable version of the Popup Builder plugin have been infected with the Balada Injector malware.....

  12-Jan-2024
  7 min read
Loading...

CISA

KEV

CISA Identifies 6 Exploited Flaws Involved in Triangulation Spyware

CISA identifies 4th critical known exploited vulnerabilities in Apple, Adobe, and more. Operation Triangulation exposes sophisticated attacks...

  11-Jan-2024
  6 min read
Loading...

Vulnerability

Kyocera and QNAP’s Critical Vulnerabilities EXPOSED

Reveal of critical flaws in Kyocera's Device Manager and QNAP systems. Learn how vulnerabilities could expose systems to malicious activities. ...

  09-Jan-2024
  5 min read
Loading...

Vulnerability

OpenSSH

Terrapin Attack Threatens 52% of Global SSH Servers – 11 Million at RISK!

Approximately 52% of all scanned global SSH servers on the public web, representing nearly 11 million instances, are vulnerable to Terrapin attacks...

  09-Jan-2024
  5 min read
Loading...

Cyberwarfare

Beirut Airport’s Info Screens Become Anti-Hezbollah Hacktivist Canvas

Anti-Hezbollah hacktivist group hacked into the arrival and departure information screens of Beirut International Airport, leading to a cyber-warfare...

  09-Jan-2024
  3 min read