company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

Phishing email posing as WhatsApp voice message notification circulated info-ste...

loading..

Brokenwire is a new attack technique that intends to potentially disrupt Combine...

loading..

Trezor is a hardware cryptocurrency wallet that allows you to store your crypto ...

Loading...

Email

Phishing

Voicemail

27,655 users fallen prey to a WhatsApp phishing email delivering info-stealing m...

Phishing email posing as WhatsApp voice message notification circulated info-stealing malware to 27,655 email addresses...

  05-Apr-2022
  3 min read
Loading...

Brokenwire

EV

Brokenwire attack: EV charging system vulnerable against a newly discovered atta...

Brokenwire is a new attack technique that intends to potentially disrupt Combined Charging System (CCS) in electric vehicles lately prone......

  04-Apr-2022
  3 min read
Loading...

Trezor

Trezor hardware wallet mailing list was used to send fake data breach notificati...

Trezor is a hardware cryptocurrency wallet that allows you to store your crypto assets offline, rather than using cloud-based wallets or wallets stored on your PC that are more vulnerable to theft....

  03-Apr-2022
  2 min read
Loading...

RAT

BORAT

DoS

BORAT, a newly appeared RAT over DarkNet market conduct DDoS attacks, UAC bypass...

RAT, Borat enables remote threat actors to take complete control of their victim’s mouse and keyboard, access files, network points, and hide any signs of their presence......

  03-Apr-2022
  1 min read
Loading...

Supply Chain Attack

PHP

PEAR could have suffered a supply chain attack due to a 15-year-old vulnerabilit...

Vulnerability researcher disclosed the presence of critical flaws in PEAR PHP repo that could have triggered a supply chain attack that remained dormant for past 15 years... ...

  02-Apr-2022
  2 min read
Loading...

Apex

RCE

Vulnerability

Trend Micro updated its Apex Central after active exploitation of a critical RCE...

Trend Micro addressed a high severity vulnerability in its Apex Central management console that allows attackers to execute arbitrary code remotely... ...

  01-Apr-2022
  1 min read
Loading...

Backdoor

DeFi

Lazarus Group deploys backdoor via trojanized DeFi wallet to steal cryptocurrenc...

Lazarus Group, involved in another financially motivated attack campaign leveraging trojanized DeFi wallet app to deploy a fully-featured backdoor.... ...

  01-Apr-2022
  3 min read
Loading...

Firewall

Networking

VPN

Zyxel pushes critical security update to address its business firewall & VPN dev...

Zyxel pushes a security update to address a critical vulnerability affecting some of its business firewall & VPN devices...

  01-Apr-2022
  2 min read
Loading...

Filesystem

Broadband

AcidRain data wiper malware brute-forces router or modem's entire filesystem

AcidRain, a newly discovered data wiper malware targets routers & modems filesystem indirectly linked to previous attacks...

  31-Mar-2022
  3 min read
Loading...

Rosaviatsiya

Aviation

Rosaviatsiya forced in switching to pen & paper losing 65TB data in a cyberattac...

Rosaviatsiya, Federal Air Transport Agency of Russia crippled due to a cyberattack that forced its entire aviation operation to pen & paper due to internet outage losing 65 TB of data… ...

  31-Mar-2022
  2 min read