company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO/CTO

DevOps Engineer

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

Microsoft Office users face a zero-day vulnerability (CVE-2024-38200) with poten...

loading..

SinkClose, a high-severity AMD CPU vulnerability, allows attackers to install un...

loading..

Discover the 0.0.0.0 Day vulnerability: How this threat exploits local services ...

Loading...

Zero Day

Microsoft

Unpatched Microsoft Office Zero-Day Vulnerability Poses Data Leak Risk

Microsoft Office users face a zero-day vulnerability (CVE-2024-38200) with potential data leaks. While a patch is pending, temporary fixes are available. This article details the vulnerability, affected versions, and mitigation strategies. ...

  10-Aug-2024
  2 min read
Loading...

SinkClose

AMD

SinkClose: A High-Severity AMD CPU Vulnerability Enables Undetectable Malware

SinkClose, a high-severity AMD CPU vulnerability, allows attackers to install undetectable malware. Learn about the affected processors and mitigations...

  10-Aug-2024
  2 min read
Loading...

RCE

Zero Day

0.0.0.0 Day Vulnerability: The Hidden Threat Exploiting Your Local Services

Discover the 0.0.0.0 Day vulnerability: How this threat exploits local services and what browsers are doing to fix it. Stay informed and secure. ...

  09-Aug-2024
  6 min read
Loading...

Cryptonator

BEC

Interpol

How INTERPOL’s I-GRIP Cracked a $42 Million BEC Scam!

INTERPOL's Global Stop-Payment Mechanism: A Deep Dive into the Largest-Ever Recovery of $42 Million Funds aided by I-GRIP Defrauded in a BEC Scam ...

  07-Aug-2024
  4 min read
Loading...

Google Chrome

Hijack

300K+ Users Hit Malicious Browser Extensions Spread via Fake Downloads

300,000+ users infected! Malicious browser extensions are spreading through fake downloads. Learn how to protect yourself from this sneaky malware. ...

  06-Aug-2024
  4 min read
Loading...

Zero-Day

Android

46 Flaws Patched Google Fight Against Android Kernel Zero-Day Exploit!

Uncover the latest 46 Vulnerabilities Patched Google’s swift response, Fight Against Android Kernel Zero-Day Exploit!

  06-Aug-2024
  3 min read
Loading...

Panamorfi

DDoS

Exploiting Jupyter Notebooks with Mineping in Panamorfi DDoS Attack

Discover how the Panamorfi DDoS attack exploits Jupyter Notebooks using Mineping. Learn about the attack details, threat actors, and defense strategies....

  03-Aug-2024
  3 min read
Loading...

ShadowPad

APT41

APT41 Hacks Taiwanese Institute: ShadowPad & Cobalt Strike EXPOSED

Taiwan Research Institute Hit by APT41: Nation-State Hackers Deploy Advanced ShadowPad and Cobalt Strike Malware in Alarming Cyberattack ...

  03-Aug-2024
  5 min read
Loading...

Cyberattack

OneBlood

Ransomware Attack Cripples OneBlood, Triggering Critical Blood Crisis!

Ransomware attack cripples OneBlood's systems, sparking a critical blood supply crisis and jeopardizing lives across the Southeastern U.S...

  02-Aug-2024
  3 min read
Loading...

Google Play

Android

New Mandrake Spyware Undetected for 2 Years Hits 32K Android in Google Play

Mandrake Android spyware returns to Google Play, evading detection for 2 years. 32,000+ downloads, advanced obfuscation techniques, and C2 communication via certificate pinning....

  30-Jul-2024
  3 min read