company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO/CTO

DevOps Engineer

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

Xfinity data breach—exploiting Citrix Bleed vulnerability. Learn the code insigh...

loading..

Hunters International ransomware targets 800K Fred Hutch Cancer Patients, riskin...

loading..

INL Data Breach: 45,000 Individuals Impacted - Sensitive PII Stolen in Cybersecu...

Loading...

Xinfinity

Vulnerability

35 Million Affected in Xinfinity Data Breach Linked to Citrix Bleed Flaw

Xfinity data breach—exploiting Citrix Bleed vulnerability. Learn the code insights, mitigation strategies, and user impact

  19-Dec-2023
  5 min read
Loading...

Data Breach

Healthcare

800K Fred Hutch Cancer Patients Targeted by Hunters Ransomware

Hunters International ransomware targets 800K Fred Hutch Cancer Patients, risking 533.1GB of data and demanding $50 to prevent the data from being...

  15-Dec-2023
  4 min read
Loading...

Data Leak

45,000 Affected in a CONFIRMED U.S. Nuclear Research Lab's Data Breach

INL Data Breach: 45,000 Individuals Impacted - Sensitive PII Stolen in Cybersecurity Incident. CISA and FBI Investigate. SiegedSec

  15-Dec-2023
  4 min read
Loading...

Ledger

Supply Chain Attack

$680K Cryptocurrency Theft Turned Out to be LEDGER Supply Chain Attack

Explore the impact of Ledger's supply chain attack. Swift response, $680K crypto theft, ongoing investigation.

  15-Dec-2023
  5 min read
Loading...

WP

90,000 at Risk: Critical WordPress Plugin Vulnerability (CVE-2023-6553)

90,000+ WordPress Plugin Installs Face Critical Flaw: CVE-2023-6553, 9.8/10 Severity

  13-Dec-2023
  1 min read
Loading...

Automotive

Data Leak

Toyota Financial Services Suffered Data Breach

Explore the ramifications of the recent Toyota Financial Services data breach as we delve into investigative response, impacted divisions, and ongoing investigations...

  12-Dec-2023
  3 min read
Loading...

Scam Loan

Millions of Android Users Defrauded in the SpyLoan Apps SCANDLE

Discover the SpyLoan scandal as millions fall victim to deceptive Android loan apps. Uncover the tactics, risks, & protective measures

  12-Dec-2023
  5 min read
Loading...

Cyberattack

Hacktivist

India Under Threat as Indonesian Hacktivist Group Plans CYBER WAR PARTY

Indian government on HIGH ALERT ahead of planned CYBER WAR PARTY to target Digital Infrastructure by a group of 4000 hackers from Hacktivist Indonesia...

  10-Dec-2023
  3 min read
Loading...

Data Breach

Encryption

2.6 Bn Records Compromised Last 2 Years Apple Urge End-to-End Encryption

Apple’s recent report underscores the need for end‑to‑end encryption following the disclosure of 2.6 billion users' records COMPROMISED!...

  09-Dec-2023
  4 min read
Loading...

Malware

Guloader

GULOADER's Latest Obfuscation Tactics Escalate Malware Analysis Complexity

GULOADER, an elusive shellcode downloader, revealing recent enhancements to its Vectored Exception Handler (VEH).

  09-Dec-2023
  4 min read