company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

ALPHV, aka BlackCat, was reportedly behind the European Pipeline Creos Luxembour...

loading..

Security researchers at CloudSEK discovered nearly 3,200 applications leaking Tw...

loading..

Adware programs having 7 million downloads across Google Play store disguising a...

Loading...

Pipeline

Cyberattack

Ransomware

Creos Luxembourg S.A attack was claimed by ALPHV aka BlackCat

ALPHV, aka BlackCat, was reportedly behind the European Pipeline Creos Luxembourg S.A attack…

  02-Aug-2022
  3 min read
Loading...

Twitter

API

3,200 Smartphone Apps Found To Be Leaking Twitter API Keys

Security researchers at CloudSEK discovered nearly 3,200 applications leaking Twitter APIs

  01-Aug-2022
  2 min read
Loading...

Android

Adware

Malware

Android adware with 7 million installs actively promoted on FB ads

Adware programs having 7 million downloads across Google Play store disguising as system clearers & optimizers are actively promoted through Facebook ads…...

  01-Aug-2022
  3 min read
Loading...

Cobalt Strike

LockBit

DLL

Windows Defender exploited to deploy Cobalt Strike beacons by LockBit

LockBit operators exploit Windows Defender on compromised systems to evade detection by security software…

  30-Jul-2022
  3 min read
Loading...

Data Breach

Healthcare

30 Healthcare providers impacted after OneTouchPoint data breach

Over 30 healthcare companies compromised following the disclosure of a data breach incident at OneTouchPoint…

  30-Jul-2022
  2 min read
Loading...

Microsoft

SQL

Proxy

Bandwidth of Microsoft SQL servers were compromised for proxy services

Microsoft SQL server hacks to transform machines into proxies rented through internet proxy services; threat actors generate cash.

  29-Jul-2022
  3 min read
Loading...

Microsoft

Spyware

Zero Day

Microsoft windows zero day attack linked to Australian spyware creator

DSIRF states that it was founded in 2016, but claims to have more than two decades of experience delivering "data-driven intelligence to multinational- Microsoft ...

  29-Jul-2022
  3 min read
Loading...

Akamai

DDoS

Massive DDoS attack in the history of Europe mitigated by Akamai

European enterprise becomes a viable victim of massive distributed denial-of-service (DDoS) attack has been mitigated by Akamai...

  28-Jul-2022
  2 min read
Loading...

MSP

Kansas City

Cyberattack

MyAppsAnywhere shut down following a cyberattack at NetStandard

A cyberattack on the US-managed service provider NetStandard caused the company to shut down its MyAppsAnywhere cloud services...

  28-Jul-2022
  3 min read
Loading...

Cyberattack

RAR

Hackers arrested under the suspicious involvement of RAR cyberattack

Spanish law enforcement officials have apprehended two hackers suspected to be under the involvement of radiation alert network (RAR) cyberattack… ...

  28-Jul-2022
  3 min read