company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

Cyberattack hits Collins Aerospace check-in system, crippling Heathrow, Brussels...

loading..

PyPI invalidates stolen tokens in the GhostAction supply chain attack, urging ma...

loading..

FileFix phishing embeds PowerShell in clipboard, uses steganographic JPGs to del...

Loading...

Airport

Cyberattack at Heathrow Triggers Widespread Travel Meltdown

Cyberattack hits Collins Aerospace check-in system, crippling Heathrow, Brussels, Berlin. Thousands face delays, manual ops activated.

  21-Sep-2025
  4 min read
Loading...

PyPi

PyPI Shuts Down Stolen Tokens After Massive GhostAction Supply Chain Attack

PyPI invalidates stolen tokens in the GhostAction supply chain attack, urging maintainers to adopt short lived credentials for stronger security. ...

  18-Sep-2025
  2 min read
Loading...

FileFix

New FileFix Campaign Exploits Steganography to Deploy StealC Infostealer

FileFix phishing embeds PowerShell in clipboard, uses steganographic JPGs to deliver StealC infostealer — multi-stage, stealthy credential theft. now!...

  17-Sep-2025
  4 min read
Loading...

AI Penetration Testing

From Red Team to Rogue, Villager Threatens to Become the Next Cobalt Strike

Villager an AI-native penetration-testing framework tied to “Cyberspike.” This dossier sequences discovery, architecture, capabilities, indicators, risk assessment, and defensive controls — presented as a structured, actionable briefing for security teams...

  16-Sep-2025
  12 min read
Loading...

iCloud

iCloud Calendar Abused to Send Phishing Emails from Apple’s Servers

Attackers exploit iCloud Calendar invites via Apple servers to deliver phishing scams.

  13-Sep-2025
  7 min read
Loading...

RCE

CVE-2025-21043 Actively Exploited RCE in Samsung Quram Image Codec

Actively exploited CVE-2025-21043 lets attackers run code via Samsung’s Quram image codec. Patch Galaxy phones with September 2025 update ASAP...

  12-Sep-2025
  9 min read
Loading...

DDoS

1.5 Gpps UDP Flood Shakes Scrubbing Provider With Record DDoS

FastNetMon detects record 1.5 Gpps UDP flood from 11,000+ compromised CPEs, exposing ISP blind spots and testing scrubbing center resilience....

  11-Sep-2025
  4 min read
Loading...

NPM

Supply Chain

Hijacked npm Packages Put Billions of Downloads at Risk

Hijacked npm packages with 2.6B weekly downloads spread crypto-stealing malware, exposing supply-chain risks and urging stronger defenses. ...

  09-Sep-2025
  4 min read
Loading...

Automotive

Major Cyberattack Cripples Jaguar Land Rover Operations Worldwide

Jaguar Land Rover crippled by cyberattack; production halted, staff sent home, and recovery may take weeks amid supply-chain turmoil and NCSC probe....

  09-Sep-2025
  14 min read
Loading...

CWMP

RCE

Unpatched TP-Link Zero-Day Threatens Millions of Routers

A critical zero-day flaw in TP-Link routers allows remote code execution. CISA warns of active exploits. Mitigate by disabling CWMP and patching immediately....

  05-Sep-2025
  6 min read