company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO/CTO

DevOps Engineer

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

security researchers reportedly spotted a fresh wave of malicious mobile surveil...

loading..

GitHub under the alarming target of phishing campaign active in the wild obtaini...

loading..

security researchers published a proof-of-concept (PoC) exploit for CVE-2022-240...

Loading...

Uyghurs

Spyware

MobileOrder: Scarlet Mimic's campaign against Uyghurs lasts almost a decade

security researchers reportedly spotted a fresh wave of malicious mobile surveillance campaigns targeting the Uyghur minority

  23-Sep-2022
  3 min read
Loading...

Phishing

CircleCI

Github

GitHub accounts are stolen through fake CircleCI notification

GitHub under the alarming target of phishing campaign active in the wild obtaining users accounts credentials vis emails disguising as CircleCI continuous integration......

  22-Sep-2022
  3 min read
Loading...

Vulnerability

Magento

Magento flaws allow unauthenticated code execution on vulnerable sites

security researchers published a proof-of-concept (PoC) exploit for CVE-2022-24086, opening the road to mass exploitation...

  22-Sep-2022
  3 min read
Loading...

Support System

2K

Redline

2K Game support system exploited to circulate Redline malware

Hackers compromised the support system of 2K games to deploy Redline password stealing malware via sending fake support tickets to gamers…. ...

  20-Sep-2022
  3 min read
Loading...

Network Security

Uber

Uber was hacked without a single system breach

Uber hack was only possible after a teenager managed to find high privileged admin access led to access of the ride-sharing giant's AWS, Windows, Google Cloud, VMware, and other environments......

  20-Sep-2022
  6 min read
Loading...

Phishing

Revolut

50,000 Revolut users details exposed with a new phishing wave

As a result of a hack, tens of thousands of customers' private data were exposed to a malicious third party...

  19-Sep-2022
  4 min read
Loading...

Source Code

GTA 6

Data Breach

Rockstar Games hack resulted in leaking source code & video of GTA 6

Hackers started leaking source code & video files of unreleased GTA 6 after disrupting the slack server & confluence wiki of Rockstar Game… ...

  19-Sep-2022
  4 min read
Loading...

Data Breach

Starbucks

219,000 user details of Starbucks sold after an undetected data breach

Hackers started selling the stolen details of 219,000 customers of Starbucks Singapore over various hacking forums…

  17-Sep-2022
  3 min read
Loading...

LastPass

Security Breach

Password

LastPass remained compromised for four days right before August hack

LastPass updated following the investigation that their systems remained compromised for four days after hackers obtained...

  17-Sep-2022
  3 min read
Loading...

BIOS

Vulnerability

Lenovo

High severity BIOS security flaw fixed in all affected Lenovo models

Lenovo addressed a new high severity BIOS vulnerabilities prone to exploitation in hundreds of computer models…

  15-Sep-2022
  3 min read