company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

BlackBerry researchers found a link between Onyx and Yashma ransomware with the ...

loading..

More than 194,000 patients were notified by Regional Eye Associates that their d...

loading..

Killnet is under the radar of the infamous hacktivist group Anonymous for a poss...

Loading...

Ransomware

Researchers linked Chaos ransomware with Onyx & Yashma variants

BlackBerry researchers found a link between Onyx and Yashma ransomware with the Chaos ransomware builder...

  24-May-2022
  4 min read
Loading...

Data Breach

Ophthalmology

194,000 patients of Regional Eye hit by databreach after a cyberattack

More than 194,000 patients were notified by Regional Eye Associates that their data had been accessed and destroyed by Eye Care Leaders, a cloud-based......

  24-May-2022
  2 min read
Loading...

Cyberattack

Anonymous

Anonymous broke out a cyberattack against Pro-Russian group Killnet

Killnet is under the radar of the infamous hacktivist group Anonymous for a possible incoming cyberattack as they are already claiming to have leaked vitalities of the group......

  23-May-2022
  3 min read
Loading...

APT

China

Russian defense targeted by Chinese APT espionage operation baiting war

Twisted Panda, a sophisticatedly emerged Chinese APT espionage operation against Russian state-owned defense institutes baiting the Russo-Ukrainian war…...

  23-May-2022
  3 min read
Loading...

Malware

Keylogger

Macros

Snake Keylogger malware deployed using malicious word doc via PDF

PDF attachments used in circulating Snake Keylogger malware to infect users through malicious word documents laced with malware-loading macro code to evade detection......

  23-May-2022
  3 min read
Loading...

Spyware

Zero-Day

Vulnerability

Multiple zero-day vulnerabilities exploited to deploy Predator Spyware

Google TAG hunts down 9 zero-day vulnerabilities exploited in-the-wild to deploy Predator spyware across Chrome, Android, Apple and Microsoft, leading to patches to protect users from these attacks......

  22-May-2022
  4 min read
Loading...

Data Breach

Ransomware

Chicago

500K students data of Chicago Public Schools exposed in a cyberattack

Chicago Public Schools suffered a data breach exposing details of over 500,000 students that got recently disclosed after its vendor Battelle for Kids became a......

  22-May-2022
  4 min read
Loading...

Backdoor

PyPI

Linux

PyPI packages dropping CS beacons & backdoors by supply chain attacks

Python package has been spotted in the PyPI registry performing supply chain attacks to drop Cobalt Strike beacons and backdoors on Windows, Linux, and macOS systems... ...

  21-May-2022
  4 min read
Loading...

Russia

DDoS

Cyberattack

Sberbank targeted by a staggering wave of DDoS attacks that was earlier mitigate...

Over $570 billion assets of Russia's largest financial institute reportedly remains at critical amid the unprecedented wave of DDoS attacks......

  20-May-2022
  3 min read
Loading...

Finance

Theft

Razorpay lost over 70 million after hackers exploited its auth process

Hackers exploited the authorization & authentication process of Razorpay's payment gateway to exfiltrate over 70 million...

  20-May-2022
  2 min read