company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

SinkClose, a high-severity AMD CPU vulnerability, allows attackers to install un...

loading..

Discover the 0.0.0.0 Day vulnerability: How this threat exploits local services ...

loading..

INTERPOL's Global Stop-Payment Mechanism: A Deep Dive into the Largest-Ever Reco...

Loading...

SinkClose

AMD

SinkClose: A High-Severity AMD CPU Vulnerability Enables Undetectable Malware

SinkClose, a high-severity AMD CPU vulnerability, allows attackers to install undetectable malware. Learn about the affected processors and mitigations...

  10-Aug-2024
  2 min read
Loading...

RCE

Zero Day

0.0.0.0 Day Vulnerability: The Hidden Threat Exploiting Your Local Services

Discover the 0.0.0.0 Day vulnerability: How this threat exploits local services and what browsers are doing to fix it. Stay informed and secure. ...

  09-Aug-2024
  6 min read
Loading...

Cryptonator

BEC

Interpol

How INTERPOL’s I-GRIP Cracked a $42 Million BEC Scam!

INTERPOL's Global Stop-Payment Mechanism: A Deep Dive into the Largest-Ever Recovery of $42 Million Funds aided by I-GRIP Defrauded in a BEC Scam ...

  07-Aug-2024
  4 min read
Loading...

Google Chrome

Hijack

300K+ Users Hit Malicious Browser Extensions Spread via Fake Downloads

300,000+ users infected! Malicious browser extensions are spreading through fake downloads. Learn how to protect yourself from this sneaky malware. ...

  06-Aug-2024
  4 min read
Loading...

Zero-Day

Android

46 Flaws Patched Google Fight Against Android Kernel Zero-Day Exploit!

Uncover the latest 46 Vulnerabilities Patched Google’s swift response, Fight Against Android Kernel Zero-Day Exploit!

  06-Aug-2024
  3 min read
Loading...

Panamorfi

DDoS

Exploiting Jupyter Notebooks with Mineping in Panamorfi DDoS Attack

Discover how the Panamorfi DDoS attack exploits Jupyter Notebooks using Mineping. Learn about the attack details, threat actors, and defense strategies....

  03-Aug-2024
  3 min read
Loading...

ShadowPad

APT41

APT41 Hacks Taiwanese Institute: ShadowPad & Cobalt Strike EXPOSED

Taiwan Research Institute Hit by APT41: Nation-State Hackers Deploy Advanced ShadowPad and Cobalt Strike Malware in Alarming Cyberattack ...

  03-Aug-2024
  5 min read
Loading...

Cyberattack

OneBlood

Ransomware Attack Cripples OneBlood, Triggering Critical Blood Crisis!

Ransomware attack cripples OneBlood's systems, sparking a critical blood supply crisis and jeopardizing lives across the Southeastern U.S...

  02-Aug-2024
  3 min read
Loading...

Google Play

Android

New Mandrake Spyware Undetected for 2 Years Hits 32K Android in Google Play

Mandrake Android spyware returns to Google Play, evading detection for 2 years. 32,000+ downloads, advanced obfuscation techniques, and C2 communication via certificate pinning....

  30-Jul-2024
  3 min read
Loading...

email security

proofpoint

EchoSpoofing Exploit in Proofpoint Exposes Millions to Phishing Attacks

Guardio Labs uncovers critical EchoSpoofing exploit in Proofpoint's email security, impacting millions & exposing major brands to phishing attacks. ...

  29-Jul-2024
  5 min read