company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO/CTO

DevOps Engineer

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

A critical vulnerability in the WP-Automatic WordPress plugin allows hackers to ...

loading..

Discover how a phishing attack on Los Angeles County Department of Health Servic...

loading..

UnitedHealth confirms paying hackers to protect sensitive patient data after a m...

Loading...

Vulnerability

Critical WordPress-Automatic Plugin Flaw Enables Site Takeovers

A critical vulnerability in the WP-Automatic WordPress plugin allows hackers to take over your site. Update immediately to version 3.9.2.0 or later for protection. ...

  26-Apr-2024
  3 min read
Loading...

Phishing

LA County Hit by Phishing Attack Impacting 23 Employees

Discover how a phishing attack on Los Angeles County Department of Health Services compromised sensitive data, impacting 23 employees. ...

  26-Apr-2024
  2 min read
Loading...

Ransom

OPTUM

To Pay or Not to Pay? UnitedHealth's Ransomware Struggle

UnitedHealth confirms paying hackers to protect sensitive patient data after a major cyberattack.

  24-Apr-2024
  2 min read
Loading...

Sandworm

APT44

Russian Sandworm Hackers Hit 20 Ukraine Critical Infrastructure

Russian hackers, Sandworm, target Ukraine's 20 critical infrastructure orgs. Power grid, water supply at risk.

  23-Apr-2024
  3 min read
Loading...

Lua Bytecode

RedLine Stealer Uses Lua Bytecode in Fake Game Cheats

New RedLine Stealer variant uses Lua bytecode to disguise itself within game cheats. Avoid suspicious downloads.

  22-Apr-2024
  5 min read
Loading...

APT44

Russian Hackers Infiltrate Water Systems as Hacktivists

Russian state-backed hackers, Sandworm, are targeting water utilities. Learn how they're disguising their attacks.

  18-Apr-2024
  3 min read
Loading...

steganography

SteganoAmor: TA558 Hackers Turn Images into Malware Weapons

Beware! Hackers are now hiding malware in images using steganography. Learn how to protect yourself

  18-Apr-2024
  3 min read
Loading...

data breach

Daixin Ransomware Group Claims Omni Hotels Breach, Demands Millions

Omni Hotels faces a data breach nightmare. Ransomware gang claims to have stolen guest information and threatens public release

  16-Apr-2024
  3 min read
Loading...

Zero Day

RCE

PanOS

Palo Alto Firewalls Hit by Zero-Day: Who's Behind the Attack?

Zero-Day Attack Hits Palo Alto Firewalls! Palo Alto Networks PAN-OS Vulnerability (CVE-2024-3400)

  15-Apr-2024
  2 min read
Loading...

Heritage Foundation

Cyberattack

Why Even the Heritage Foundation Couldn't Be Immune to a Cyberattack

Heritage Foundation, a conservative think tank, hit by a cyberattack. Details are scarce, nation-state hackers suspected.

  13-Apr-2024
  4 min read