company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO/CTO

DevOps Engineer

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

Over 200 malicious packages have been infiltrating the PyPI & NPM open source re...

loading..

Lazarus gang hackers used a signed malicious software for macOS to spoof Coinbas...

loading..

NATO countries under the target of a Russian hacking group tracked as SEABORGIUM...

Loading...

PyPI

NPM

Cryptominers

241 NPM & PyPI packages involved deploying Linux based cryptominers

Over 200 malicious packages have been infiltrating the PyPI & NPM open source registries, dropping Linux cryptominers…

  20-Aug-2022
  3 min read
Loading...

Lazarus

Coinbase

North Korean hackers target IT jobseekers with macOS malware

Lazarus gang hackers used a signed malicious software for macOS to spoof Coinbase and deceive fintech workers…

  19-Aug-2022
  2 min read
Loading...

Microsoft

Russia

SEABORGIUM

Microsoft foils Russian SEABORGIUM group's hacking attempt at NATO

NATO countries under the target of a Russian hacking group tracked as SEABORGIUM attempting to breach through social engineering attacks…...

  18-Aug-2022
  4 min read
Loading...

MailChimp

DigitalOcean

Data Breach

New MailChimp hack revealed DigitalOcean user's email addresses

DigitalOcean users' emails & other confidential details were surreptitiously compromised in a recent MailChimp data breach…

  17-Aug-2022
  5 min read
Loading...

Argentina

Ransomware

PLAY ransomware attacks Córdoba's Judiciary disrupting its IT systems

Argentina's Judiciary of Córdoba took down its IT systems following a ransomware attack, purportedly by PLAY ransomware...

  16-Aug-2022
  3 min read
Loading...

MediaTek

Xiaomi

Vulnerability

Xiaomi phones with MediaTek chips may facilitate forgery

Xiaomi Redmi Note 9T and Redmi Note 11 flaws could be used to fake transactions and potentially disable the mobile payment system…

  15-Aug-2022
  4 min read
Loading...

FBI

Ransomware

Zeppelin ransomware strain can encrypt vulnerable devices multiple times

In a new flow of attacks deploying Zeppelin ransomware strains encrypting the same devices multiple times, according to the FBI & CISA… ...

  12-Aug-2022
  3 min read
Loading...

Cryptocurrency

Phishing

Google & Microsoft Azure exploited to steal crypto from multiple sites

A widespread phishing campaign exploiting Google Sites & Microsoft Azure Web App to target multiple sites for stealing crypto developing fraudulent sites… ...

  11-Aug-2022
  4 min read
Loading...

Volumetric DDoS

Cloudflare

Botnet

Cloudflare employees also become victims of Twilio SMS phishing attack

Hackers behind the Twilio SMS phishing attack have also targeted employees of Cloudflare; however, they couldn't successfully obtain access… ...

  09-Aug-2022
  3 min read
Loading...

SMS

Phishing

Twilio

Twilio confirmed databreach after a sms phishing targeted its employees

Hackers gained access to the internal system of Twilio resulting in the breach of it's customer data after targeting it's employees credentials......

  09-Aug-2022
  3 min read