company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

Meta busted a massive Russian news spoofing campaign circulating fake news via m...

loading..

researchers just recently discovered its operations while examining a series of ...

loading..

Hackers compromised an employee's Microsoft 365 account to pull off the hack on ...

Loading...

Spoofing

Meta

Russia

Russian news spoofing campaign spreading rumors taken down by Meta

Meta busted a massive Russian news spoofing campaign circulating fake news via multiple Facebook & Instagram accounts replicating Western news media sites…. ...

  28-Sep-2022
  3 min read
Loading...

Malware

Metador is behind the series of intrusions on telcos, ISPs & Unis

researchers just recently discovered its operations while examining a series of intrusions at one organization

  26-Sep-2022
  5 min read
Loading...

Data Breach

Phishing

American Airlines

American Airlines hack was yet another phishing target

Hackers compromised an employee's Microsoft 365 account to pull off the hack on American Airlines successfully...

  24-Sep-2022
  3 min read
Loading...

Uyghurs

Spyware

MobileOrder: Scarlet Mimic's campaign against Uyghurs lasts almost a decade

security researchers reportedly spotted a fresh wave of malicious mobile surveillance campaigns targeting the Uyghur minority

  23-Sep-2022
  3 min read
Loading...

Phishing

CircleCI

Github

GitHub accounts are stolen through fake CircleCI notification

GitHub under the alarming target of phishing campaign active in the wild obtaining users accounts credentials vis emails disguising as CircleCI continuous integration......

  22-Sep-2022
  3 min read
Loading...

Vulnerability

Magento

Magento flaws allow unauthenticated code execution on vulnerable sites

security researchers published a proof-of-concept (PoC) exploit for CVE-2022-24086, opening the road to mass exploitation...

  22-Sep-2022
  3 min read
Loading...

Support System

2K

Redline

2K Game support system exploited to circulate Redline malware

Hackers compromised the support system of 2K games to deploy Redline password stealing malware via sending fake support tickets to gamers…. ...

  20-Sep-2022
  3 min read
Loading...

Network Security

Uber

Uber was hacked without a single system breach

Uber hack was only possible after a teenager managed to find high privileged admin access led to access of the ride-sharing giant's AWS, Windows, Google Cloud, VMware, and other environments......

  20-Sep-2022
  6 min read
Loading...

Phishing

Revolut

50,000 Revolut users details exposed with a new phishing wave

As a result of a hack, tens of thousands of customers' private data were exposed to a malicious third party...

  19-Sep-2022
  4 min read
Loading...

Source Code

GTA 6

Data Breach

Rockstar Games hack resulted in leaking source code & video of GTA 6

Hackers started leaking source code & video files of unreleased GTA 6 after disrupting the slack server & confluence wiki of Rockstar Game… ...

  19-Sep-2022
  4 min read