company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

Cisco has recently addressed three newly discovered critical vulnerabilities tha...

loading..

Hackers can remotely take over as many as 25 different router models of DrayTek ...

loading..

GitHub purged more than 35,000 repos following the report of forking with malwar...

Loading...

Cisco

Vulnerability

SMB

Cisco small business routers found vulnerable to critical flaws

Cisco has recently addressed three newly discovered critical vulnerabilities that could have allowed external threats to trigger arbitrary code......

  04-Aug-2022
  2 min read
Loading...

Routers

RCE

25 DrayTek routers can be compromised after a critical RCE discovered

Hackers can remotely take over as many as 25 different router models of DrayTek Vigor exploiting an unauthenticated critical RCE vulnerability tracked as CVE-2022-32548… ...

  04-Aug-2022
  3 min read
Loading...

Malware

GitHub

35,000 GitHub repos were switched with their clones to push malware

GitHub purged more than 35,000 repos following the report of forking with malware…

  04-Aug-2022
  4 min read
Loading...

Password

Darkweb

Wiseasy

140,000 credit card terminals compromised following unauthorized access

Wiseasy affected by cybersecurity incident following the unauthorized access compromising 140,000 credit card payment terminals…

  03-Aug-2022
  2 min read
Loading...

T-Mobile

Phishing

25 million illegal scheme pulled off compromising T-Mobile employees

Ex-owner of a T-Mobile retail unit compromised many of its employees' cell phones resulting in $25 million….

  02-Aug-2022
  3 min read
Loading...

Pipeline

Cyberattack

Ransomware

Creos Luxembourg S.A attack was claimed by ALPHV aka BlackCat

ALPHV, aka BlackCat, was reportedly behind the European Pipeline Creos Luxembourg S.A attack…

  02-Aug-2022
  3 min read
Loading...

Twitter

API

3,200 Smartphone Apps Found To Be Leaking Twitter API Keys

Security researchers at CloudSEK discovered nearly 3,200 applications leaking Twitter APIs

  01-Aug-2022
  2 min read
Loading...

Android

Adware

Malware

Android adware with 7 million installs actively promoted on FB ads

Adware programs having 7 million downloads across Google Play store disguising as system clearers & optimizers are actively promoted through Facebook ads…...

  01-Aug-2022
  3 min read
Loading...

Cobalt Strike

LockBit

DLL

Windows Defender exploited to deploy Cobalt Strike beacons by LockBit

LockBit operators exploit Windows Defender on compromised systems to evade detection by security software…

  30-Jul-2022
  3 min read
Loading...

Data Breach

Healthcare

30 Healthcare providers impacted after OneTouchPoint data breach

Over 30 healthcare companies compromised following the disclosure of a data breach incident at OneTouchPoint…

  30-Jul-2022
  2 min read