company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO/CTO

DevOps Engineer

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

BitB attack extends this technique by creating an entirely fabricated browser wi...

loading..

Western Digital EdgeRover application for both Windows & Mac found vulnerable to...

loading..

N4ughtysecTU, an infamous Brazilian hacking group, claimed to have extracted 4TB...

Loading...

Browser

BitB attack extends this technique by creating an entirely fabricated browser wi...

BitB attack extends this technique by creating an entirely fabricated browser window, including trust signals like a locked padlock icon and a known (but faked) URL. You think you're seeing a real...

  21-Mar-2022
  1 min read
Loading...

Western Digital

Vulnerability

Western Digital's EdgeRover vulnerable to privilege escalation flaws in both Win...

Western Digital EdgeRover application for both Windows & Mac found vulnerable to local privilege escalation & sandboxing escape flaw

  21-Mar-2022
  2 min read
Loading...

SFTP

Password

South Africa

TransUnion South Africa server breached using password affecting 54M users deman...

N4ughtysecTU, an infamous Brazilian hacking group, claimed to have extracted 4TB of confidential details belonging to the TransUnion South Africa......

  20-Mar-2022
  3 min read
Loading...

ALPHV

LokiLocker

BlackMatter

BlackMatter affiliates actively circulating BlackCat RaaS without getting rebran...

BlackCat RaaS resurrected in getting deployed across many companies globally exhibiting a strong relationship with BlackMatter & DarkMatter......

  18-Mar-2022
  4 min read
Loading...

TAG

Google

Conti

Exotic Lily threat group acts as an initial access broker for Conti ransomware

Google’s Threat Analysis Group has observed a financially-motivated threat actor working as an intermediary for the Russian hackers, including the...

  17-Mar-2022
  2 min read
Loading...

RAT

MSSQL

Malware

Gh0stCringe malware targeting Microsoft SQL & MySQL servers in vulnerable device...

According to the threat report, security researchers outline the lateral movement of threat actors behind GhostCringe through

  17-Mar-2022
  2 min read
Loading...

Antivirus

BitDefender

Windows

Cobalt Strike disguised as BitDefender Windows Antivirus update circulated acros...

Ukraine CERT is alarmed about an advanced phishing email containing a fake BitDefender Windows update that, if installed, deploys Cobalt Strike malware to the infected system…...

  16-Mar-2022
  2 min read
Loading...

Password

UBISOFT

Ubisoft undergoes mass password reset to conceal a confirmed cybersecurity incid...

UBISoft confirmed to have suffered from a cybersecurity incident that reportedly resulted in mass password reset…

  15-Mar-2022
  2 min read
Loading...

Backdoor

BazarLoader

Contact Forms

Contact forms become a new attack vector for BazarLoader malware operators to av...

BazarLoader stealthily targets users through online contact forms to evade getting detected by any security software…

  12-Mar-2022
  3 min read
Loading...

One Piece

Topie

Anime

Toei cyberattack resulted in delays of airing new episodes of One Piece anime se...

ONE PIECE, who eagerly anticipate the release of the series' chapter 1000.

  11-Mar-2022
  1 min read