company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

Discover how a critical CUPS vulnerability exposes Unix systems to remote code e...

loading..

CISA warns critical infrastructure operators of ongoing attacks targeting Intern...

loading..

Necro malware, has reportedly infiltrated 11 million devices via apps distribute...

Loading...

UNIX

CUPS

Linux

Critical CUPS Vulnerability Exposes Unix Systems to Remote Attacks

Discover how a critical CUPS vulnerability exposes Unix systems to remote code execution attacks and learn steps to protect your devices from potential exploits...

  27-Sep-2024
  6 min read
Loading...

ICS

CISA

OT

CISA Warns of Unsophisticated Attacks Targeting Critical Infrastructure OT & ICS...

CISA warns critical infrastructure operators of ongoing attacks targeting Internet-exposed OT and ICS devices using unsophisticated methods like default credentials & brute-force attacks....

  25-Sep-2024
  3 min read
Loading...

Necro

Android

11M Android Devices Infected with Necro Malware via Google Play

Necro malware, has reportedly infiltrated 11 million devices via apps distributed on Google Play

  23-Sep-2024
  5 min read
Loading...

Dell

Data Leak

Dell Investigates Alleged Data Breach After Hacker Leaks Employee Information up

Dell Technologies is currently investigating allegations of a data breach after a hacker, known as "grep," leaked sensitive information purportedly belonging to over 10,000 employees.....

  21-Sep-2024
  4 min read
Loading...

Malware

Espionage

Phishing Espionage Attack Targets US-Taiwan Defense Conference

US and Taiwanese defense sectors was recently targeted by a sophisticated phishing attack carrying fileless malware

  19-Sep-2024
  7 min read
Loading...

Vulnerability

Over 1,000 ServiceNow Instances Found Leaking Corporate Knowledge Base Data

Over 1,000 ServiceNow instances are misconfigured, leading to the unintentional exposure of sensitive corporate Knowledge Base (KB) data...

  17-Sep-2024
  5 min read
Loading...

AT&T

$13Mn FCC Settlement Over 2023 Data Breach

$13Mn FCC Settlement Over 2023 Data Breach

  17-Sep-2024
  5 min read
Loading...

CISA

Exploitation of Windows MSHTML Spoofing Vulnerability (CVE-2024-43461) by Void B...

Cybersecurity and Infrastructure Security Agency (CISA) recently issued a directive to all U.S. federal agencies

  16-Sep-2024
  6 min read
Loading...

Android

TrickMo Evolves: From Banking Trojan to Data-Stealing Malware

Discover how TrickMo has evolved from a banking trojan into a sophisticated data exfiltration threat. Learn about its advanced capabilities, implications, and how to protect your organization...

  14-Sep-2024
  5 min read
Loading...

Kawasaki

RansomHub

RansomHub Threatens 487 GB Data Leak from Kawasaki Europe Cyberattack!

Kawasaki Motors Europe recovers from RansomHub’s ransomware attack, analyzing stolen data threats while remedial actions are still underway…. ...

  14-Sep-2024
  4 min read