company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

Nikkei Group Asia encountered a ransomware attack a week ago, disrupting its int...

loading..

Bank of Zambia made it clear that they would not pay by posting a picture of mal...

loading..

VMware users are alarmed by a critical authentication bypass vulnerability "affe...

Loading...

Media

Ransomware

Asia

Nikkei Group Asia discloses a week-old ransomware attack

Nikkei Group Asia encountered a ransomware attack a week ago, disrupting its internal servers and leading to a complete shutdown...

  19-May-2022
  2 min read
Loading...

Hive

Ransomware

Zambia National Bank refused ransom demand posting a male genitalia pic

Bank of Zambia made it clear that they would not pay by posting a picture of male genitalia and telling the hackers…

  19-May-2022
  3 min read
Loading...

Authentication

Vulnerability

VMWare fixes critical auth bypass flaws in multiple of its products

VMware users are alarmed by a critical authentication bypass vulnerability "affecting local domain" in multiple products exploitable to obtain admin privileges.. ...

  18-May-2022
  3 min read
Loading...

Hacking

Dev

DPRK

North Korean devs disguises as US freelancers to aid DRPK govt hackers

DPRK IT worker's activity comes with legal consequences associated with prohibited or sanctioned behavior...

  18-May-2022
  5 min read
Loading...

GPU

Vulnerability

Driver

NVIDIA addresses 10 critical vulnerabilities in multiple GPU models

NVIDIA addresses 10 high & medium severity vulnerabilities in its GPU drivers that could have resulted in denial of service, information disclosure......

  18-May-2022
  4 min read
Loading...

Relay Attack

BLE

Vulnerability

Tesla Model 3 & Y can be vulnerable to a new Bluetooth relay attack

NCC Group security researchers have developed a tool to execute an evasive relay attack through Bluetooth Low Energy (BLE) technology that bypasses......

  17-May-2022
  5 min read
Loading...

Ransomware

Aerospace

Data Breach

419GB data of Parker-Hannifin got exposed after a ransomware attack

Parker-Hannifin Corporation was hit by a ransomware attack notorious group published 3% of the stolen data allegedly stolen during their ransomware attack ...

  16-May-2022
  4 min read
Loading...

Info Stealer Trojan

NFT

Password

Pixelmon NFT site's fake replica infects fans with infostealing trojan

Hackers lure fans of Pixelmon NFT with free tokens & collectibles through a malicious replica of its site distributing password...

  15-May-2022
  4 min read
Loading...

Attack Vector

NTLM

Vulnerability

Microsoft addresses previously unpatched vector for PetitPotam attack

Microsoft addresses a Windows NTLM Relay attack confirmed to be a previously unfixed vector for the PetitPotam attack…

  15-May-2022
  4 min read
Loading...

PHP

Vulnerability

Path Traversal

Icingia vulnerabilities allows running arbitrary PHP code to hack servers

Iciniga web vulnerable to two path traversal vulnerabilities enabling to unauthentically execute arbitrary PHP code from the administrator interface to compromise its servers......

  14-May-2022
  1 min read