company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO/CTO

DevOps Engineer

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

design

Threat Research

Gain comprehensive reporting on the dynamic threat landscape through tailored analysis by our team of expert researchers on emerging cyber threats.
logo
design
Loading...

APT

ScarCruft: Ever Evolving State-Sponsored Espionage Tactics

Delve into ScarCruft's sophisticated cyber espionage: NPO Mashinostroyeniya breach, Dolphin, OpenCarrot backdoor, state-sponsored tactics exposed...

  17-Aug-2023
  7 min read
Loading...

APT35

Magic Hound (APT35): Iranian State-Sponsored Cyber Espionage

Discover the tactics of Magic Hound (APT35), an Iranian state-sponsored threat group, targeting various industries with sophisticated cyber espionage campaigns...

  07-Aug-2023
  12 min read
Loading...

Trojan

Unveiling TOITOIN: Dissecting a Sophisticated LATAM Cyber Attack

TOITOIN Trojan: Advanced threat analysis, evasion techniques, and data exfiltration methods in Windows systems.

  31-Jul-2023
  8 min read
Loading...

APT

Dark Pink APT: An Evolving Threat Group After Law Enforcement Agencies

Dark Pink: A New APT Group Targeting Governmental and Military Organizations in APAC and Europe

  20-Jun-2023
  7 min read
Loading...

SOHO

LOLBin

LSASS

Volt Typhoon: Chinese State-Sponsored Actor Targeting Critical Infrastructure

A stealthy and targeted campaign by Volt Typhoon, a China-based state-sponsored actor, aiming to disrupt critical communications infrastructure between the US & Asia...

  05-Jun-2023
  10 min read
Loading...

Linux

Golamg

GobRAT Malware: A Golang-Based Threat Targeting Linux Routers

GobRAT is a sophisticated malware that poses a significant threat to Linux routers. With its unique characteristics and mode of operation, GobRAT has gained attention in the cybersecurity community...

  29-May-2023
  5 min read
Loading...

APT

Evolution of Reconnaissance Capabilities: Kimsuky's Global Campaign

Learn about Kimsuky's use of ReconShark, their global campaign implications, and effective countermeasures to protect your digital environment....

  23-May-2023
  3 min read
Loading...

WordPress

Malware

Balada Injector: A Massive Ongoing WordPress Malware Campaign

Balada Injector: A Comprehensive Threat Research on Ongoing WordPress Malware Campaign. Learn about the code scripts, IoCs, and in-depth technical analysis......

  24-Apr-2023
  3 min read
Loading...

Ransomware

Dark Power Ransomware: New Double Extortion Tactics

Discover the new Dark Power ransomware threat and learn how to protect your systems. Our threat research reveals its origin, behavior, and IoCs...

  27-Mar-2023
  7 min read
Loading...

IoT Devices

Botnet

Mirai

Mirai Botnet: How IoT Devices Almost Brought Down The Internet

Learn about the MIRAi botnet and its devastating impact on IoT devices. Understand how to protect your devices and networks from this dangerous malware....

  25-Mar-2023
  3 min read