company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

Chinese threat actors manage to obtain access to cloud-based web servers by expl...

loading..

Misconfigured Elasticsearch database suffered 1 million leaked records leading t...

loading..

Cloudflare prevented a record-breaking volumetric DDoS attack that peaked at 26 ...

Loading...

Zero-Day

Firewall

RCE

Zero day vulnerability in Sophos Firewall exploited a week before fix

Chinese threat actors manage to obtain access to cloud-based web servers by exploiting zero-day vulnerabilities in Sophos Firewall…

  17-Jun-2022
  3 min read
Loading...

PII

Database

Data Breach

30,000 PII data of students leaked from misconfigured Elasticsearch Db

Misconfigured Elasticsearch database suffered 1 million leaked records leading to exposing 30,000 students' PII data belonging to the......

  16-Jun-2022
  3 min read
Loading...

HTTP

DDoS

Cyberattack

26 million RPS record breaking volumetric DDoS attacks prevented

Cloudflare prevented a record-breaking volumetric DDoS attack that peaked at 26 million requests per second last week, making it the largest HTTPS DDoS attack detected to date… ...

  16-Jun-2022
  2 min read
Loading...

Cryptominer

Botnet

SSH

Linux servers infect by new peer to peer botnet by cryptominer Panchan

Panchan, newly emerged peer-to-peer botnet, appears to be infecting Linux servers across the education sector to mine cryptocurrency leveraging SSH worm......

  16-Jun-2022
  3 min read
Loading...

Email

Vulnerability

Zimbra email suite is vulnerable to a high severity flaw

An unauthenticated attacker might exploit a high-severity vulnerability in the Zimbra email suite to obtain users' login credentials... ...

  15-Jun-2022
  3 min read
Loading...

PHI

NGO

Healthcare

69,000 patients are hit by a massive data breach at Kaiser Permanente

Washington based Kaiser Permanente, a largest NGO for health plans and health care providers, was hit by a massive data breach affecting 69,000 patient's health care information…...

  14-Jun-2022
  2 min read
Loading...

Mitel

Backdoor

IP

Mitel IP Phones for business vulnerable to a rooting backdoor

Two medium-security flaws tracked as CVE-2022-29854 and CVE-2022-29855 (CVSS score: 6.8) detected in Mitel 6800/6900 desk phones, if exploited, could enable......

  14-Jun-2022
  2 min read
Loading...

Backdoor

Malware

Linux

Highly evasive Linux malware targeting compromised system, Symbiote

Intezer & BlackBerry security researchers managed to detect a highly evasive Linux-based malware, tracked as Symbiote, that could be used to backdoor infected systems…...

  10-Jun-2022
  3 min read
Loading...

China

APT

Aoqin Dragon, Chinese APT targeting Southeast Asia & Australia

Researchers spotted a previously undocumented Chinese-speaking APT, tracked as Aoqin Dragon, targeting entities in Southeast Asia and Australia. ...

  09-Jun-2022
  4 min read
Loading...

Cryptocurrency

Blockchain

$5 Mn stolen exploiting a bug detected in blockchain platform Osmosis

Osmosis blockchain decentralized exchange taken down offline after hackers stole nearly $5 million…

  09-Jun-2022
  3 min read