company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO/CTO

DevOps Engineer

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

A private spying firm that uses mobile network vulnerabilities to spy on calls, ...

loading..

The Cyber Security firm Uncover Crutch Russian Malware Used In APT Attacks...

loading..

During Spotify's Wrapped 2020 launch, artist pages were hacked; users urged to u...

Loading...

Vulnerability

Private Spying Firm Involved in Human Right Abuse Doing Business With 25 Governm...

A private spying firm that uses mobile network vulnerabilities to spy on calls, texts and location information is doing business with at least 25 governments globally...

  04-Dec-2020
  2 min read
Loading...

Russia

Malware

The Russian Malware ‘Crutch’ Used For Vulnerable Attacks Against Military Organi...

The Cyber Security firm Uncover Crutch Russian Malware Used In APT Attacks

  04-Dec-2020
  2 min read
Loading...

Spotify

Spotify Artist Pages Hacked Amid 2020 Wrapped Launch

During Spotify's Wrapped 2020 launch, artist pages were hacked; users urged to update passwords and review security settings

  03-Dec-2020
  2 min read
Loading...

Google

iOS

iOS Bug Makes Possible For A Remote Hacker To Hack Through A Nearby Wi-fi

Google Project Zero white-hat hacker Ian Beer on Tuesday revealed details of a patched severe iOS bug

  03-Dec-2020
  2 min read
Loading...

Microsoft

Vietnamese Government-Supported Hackers Deploying Crypto Currency-Mining Malware

Microsoft stated that the Vietnamese Government Supported Hackers are positioning crypto currency mining malware along with their regular cyber spying toolkits....

  03-Dec-2020
  2 min read
Loading...

Gosmspro

Avoid Using GO SMS PRO App Till The Issues Are Completely Solved

A week after cyber security researchers disclosed a defect in the well known GO SMS Pro messaging application, it appears the developers of the app are silently taking steps to fix the issue from behind the scenes...

  02-Dec-2020
  2 min read
Loading...

Cybersecurity

Households On An Average Experienced 104 Cyber Security Threats Per Month

The most unsafe devices include laptops, computers, smart phones and tablets, networked cameras and storage devices and streaming video devices...

  02-Dec-2020
  2 min read
Loading...

Kaspersky

Cert-In

Kaspersky To Assist CERT-In After A Strategic Partnership Made Recently

Cyber security firm Kaspersky to assist Indian cyber security agency (CERT-In) in cyber incident management enhancing users’ trust in digital technologies...

  02-Dec-2020
  2 min read
Loading...

PayPal

Credit Card Skimmer Fills PayPal Forms Using Innovative Techniques

Credit card skimmer uses an innovative technique to inject highly convincing PayPal iframes and hijack the checkout process on compromised online stores...

  01-Dec-2020
  2 min read
Loading...

Ransomware

Big Brother, Master Chef and The Voice Hit by a Notorious Ransomware Gang

Notorious Ransomware Gang targets Endemol Shine Group, the Amsterdam-based production and distribution giant behind hits like Big Brother, Master Chef and The Voice...

  01-Dec-2020
  2 min read