company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO/CTO

DevOps Engineer

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

Twilio hackers have now also targeted Doordash, the food delivery app, following...

loading..

Attackers can launch DDoS attacks on their desired targets without authenticatin...

loading..

Multiple services & workstations at Instituto Agrario Dominicano of the Dominica...

Loading...

Twilio

Phishing

Data Breach

DoorDash becomes yet another victim linked to Twilio SMS phishing

Twilio hackers have now also targeted Doordash, the food delivery app, following the failed attempt at Cloudflare...

  26-Aug-2022
  3 min read
Loading...

Network

Vulnerability

Endpoint

Palo Alto Networks Firewall vulnerability exploited in the wild, CISA

Attackers can launch DDoS attacks on their desired targets without authenticating to the firewall using the flaw identified as CVE-2022-0028… ...

  26-Aug-2022
  5 min read
Loading...

Cyberattack

Ransomware

Quantum

Instituto Agrario Dominicano becomes a victim of Quantum Ransomware

Multiple services & workstations at Instituto Agrario Dominicano of the Dominican Republic have been maliciously encrypted in an attack, thanks to Quantum Ransomware......

  25-Aug-2022
  3 min read
Loading...

Ransomware

New 'BianLian' ransomware variant spotted in the wild

ransomware was created with the Go open source programming language, demonstrating how malware authors

  24-Aug-2022
  3 min read
Loading...

Data Exfiltration

Extortion

Ransomware

New Donut Leaks group is involved in a series of ransomware attacks

Newly emerged threat group Donut Leak was found to be involved in a series of ransomware attacks targeting DESFA, Sheppard Robson & Sando…...

  24-Aug-2022
  4 min read
Loading...

Tracker

Meta

Data Breach

1.3M healthcare records leaked for misconfigured Meta Pixel script

Over a million healthcare records of Novant Health were breached in a data breach due to a misconfigured Meta Pixel ad tracking script…

  23-Aug-2022
  3 min read
Loading...

Command Injection

Vulnerability

80,000 Hikvision cameras vulnerable to command injection flaw exposed

80,000 Hikvision cameras can be compromised due to a critical command injection flaw tracked as CVE-2021-36260, if exploited, could send......

  23-Aug-2022
  3 min read
Loading...

Dark Web

Malware

MS Word Doc leveraged as infection vector to spread Escanor malware

Escanor, a new Remote Administration Tool (RAT) was recently discovered by researchers. It was advertised on the Dark Web and Telegram…

  22-Aug-2022
  3 min read
Loading...

Zero Day

Bitcoin

Cryptocurrency

CAS driven Bitcoin ATMs are still vulnerable to cyber exploitation

Hackers have stolen cryptocurrencies surreptitiously exploiting zero day vulnerabilities in Crypto Application Server driven Bitcoin ATMs......

  21-Aug-2022
  3 min read
Loading...

APT29

Russia

Cyberespionage

Microsoft 365 accounts of NATO countries targeted by CozyBear

Russian linked infamous Cozy Bear aka APT29, involved in a cyberespionage campaign targeting accounts of Microsoft 365 across the users of NATO countries leveraging evasive tactics.....

  21-Aug-2022
  4 min read