company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

Cyber security researchers on Thursday disclosed details of a previously undisco...

loading..

Johnson & Johnson which is one of the six COVID-19 research firms have been targ...

loading..

Randstad NV declared that their network was violated by the Egregor virus who s...

Loading...

Kaspersky

Hackers-For-Hire Group Develops A New In-Memory Malware termed as Power Pepper

Cyber security researchers on Thursday disclosed details of a previously undiscovered in-memory Windows secretive developed by a hacker-for-hire operation...

  07-Dec-2020
  4 min read
Loading...

Covid19

Johnson& Johnson Company Targeted By North Korean Hackers

Johnson & Johnson which is one of the six COVID-19 research firms have been targeted by North Korean State-Sponsored hackers

  06-Dec-2020
  2 min read
Loading...

Databreach

Randstad’s Information Stole Recently During A Cyber Attack

Randstad NV declared that their network was violated by the Egregor virus who stole information

  06-Dec-2020
  2 min read
Loading...

Application

Googleplay

Vulnerability

Google Play Applications Are Facing A High Risk Vulnerability

Mobile browser app Edge have to push out an important update addressing a high-severity vulnerability in the Google Play Core Library.

  05-Dec-2020
  2 min read
Loading...

Hacker

California Hacker Ryan S. Hernandez To be Imprisoned For Three Years

A computer hacker who stole information from Nintendo and was caught with child pornography on his computer.

  05-Dec-2020
  2 min read
Loading...

WHO

Covid-19

Cyber Spying Being Made For Extracting Information From WHO

IBM security researchers have detected a cyber spying effort using targeted fake emails for collecting vital information on the WHO’s initiative...

  04-Dec-2020
  2 min read
Loading...

Creditcard

SocialMedia

Social Media Platform Icons Contain Credit Card Stealing Malware

The malware's creators use suspicious payloads hidden as social media buttons that mimic high profile platforms such as Facebook, Twitter, and Instagram....

  04-Dec-2020
  2 min read
Loading...

Vulnerability

Private Spying Firm Involved in Human Right Abuse Doing Business With 25 Governm...

A private spying firm that uses mobile network vulnerabilities to spy on calls, texts and location information is doing business with at least 25 governments globally...

  04-Dec-2020
  2 min read
Loading...

Russia

Malware

The Russian Malware ‘Crutch’ Used For Vulnerable Attacks Against Military Organi...

The Cyber Security firm Uncover Crutch Russian Malware Used In APT Attacks

  04-Dec-2020
  2 min read
Loading...

Spotify

Spotify Artist Pages Hacked Amid 2020 Wrapped Launch

During Spotify's Wrapped 2020 launch, artist pages were hacked; users urged to update passwords and review security settings

  03-Dec-2020
  2 min read