company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO/CTO

DevOps Engineer

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

Learn about the sophisticated supply chain attack involving a trojanized version...

loading..

Shopify denies hack claims; customer data breach blamed on third-party app. Disc...

loading..

Roblox's latest data breach exposes 10,386 accounts from RDC attendees. Dive int...

Loading...

npm

jQuery

New Trojanized jQuery Supply Chain Attack Targeting npm, GitHub & CDN

Learn about the sophisticated supply chain attack involving a trojanized version of jQuery discovered by Phylum, affecting npm, GitHub, and jsDelivr. ...

  09-Jul-2024
  5 min read
Loading...

Shopify

Shopify Hack Denied: Third-Party App Blamed for Customer Data Breach

Shopify denies hack claims; customer data breach blamed on third-party app. Discover the full analysis of this critical cybersecurity incident....

  09-Jul-2024
  5 min read
Loading...

Games

Roblox

Roblox Data Breach Exposes 10,386 Accounts: Critical Security Analysis

Roblox's latest data breach exposes 10,386 accounts from RDC attendees. Dive into our critical security analysis to understand the impact and future precautions....

  08-Jul-2024
  3 min read
Loading...

Packet Rate Attacks

DDoS

840 Million PPS DDoS on OVHcloud Exposes MikroTik Router Flaws

Explore the alarming rise of packet rate DDoS attacks targeting network core devices like MikroTik routers. Learn how a record-breaking 840 million PPS attack on OVHcloud exposed vulnerabilities...

  06-Jul-2024
  5 min read
Loading...

Ethereum

Crypto Drainer

Ethereum Phishing Attack Exposes 35K Users: How No Funds Were Lost

Explore the detailed analysis of the Ethereum mailing list breach and phishing attack, including response strategies and security measures to protect crypto assets...

  04-Jul-2024
  4 min read
Loading...

Blackcat

ALPHV

2.5M Exposed ALPHV Ransomware Involved Prudential Data Breach

Prudential Financial's February breach exposed 2.5M records. ALPHV ransomware gang claimed responsibility. Discover the incident's detailed analysis. ...

  03-Jul-2024
  4 min read
Loading...

Indirector

Intel

Intel CPUs Vulnerable to High-Precision Indirector BTI Attack, Study Finds

Discover how the Indirector BTI attack targets Intel's Raptor and Alder Lake CPUs, exploiting IBP and BTB flaws to steal sensitive data. Mitigation strategies included....

  02-Jul-2024
  5 min read
Loading...

OpenSSH

Linux

New regreSSHion: Critical OpenSSH Vulnerability Allows Root Access on Linux

A severe OpenSSH vulnerability, regreSSHion, allows unauthenticated RCE, risking root access on millions of Linux servers. Immediate patching required...

  02-Jul-2024
  7 min read
Loading...

Supply Chain Attack

CDN

Polyfill.io Supply Chain Attack: 100,000 Sites Compromised

Polyfill.io relaunches on a new domain after being accused of delivering malicious code to 100,000+ sites. Explore the security implications and industry impact....

  29-Jun-2024
  5 min read
Loading...

MoveIt

Authentication Bypass

Critical MOVEit Transfer Authentication Bypass Flaws EXPLOITED

Discover the latest critical vulnerabilities in MOVEit Transfer. Learn about CVE-2024-5806 and CVE-2024-5805, their impact, and essential mitigation steps....

  28-Jun-2024
  7 min read