company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO/CTO

DevOps Engineer

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

Discover how hackers exploited vulnerabilities in Cleo's file transfer tools, le...

loading..

Artivion, a US medical device leader, faces a ransomware attack: hackers steal f...

loading..

Discover DroidBot, an advanced Android malware redefining threats with MaaS tact...

Loading...

Vulnerability

Exploitation

How Hackers Are Weaponizing File Transfer Tools to Devastate Businesses

Discover how hackers exploited vulnerabilities in Cleo's file transfer tools, leading to severe consequences for global businesses. Learn about the risks, exploitation methods, and mitigation strategies to protect your organization. ...

  12-Dec-2024
  5 min read
Loading...

Healthcare

Hackers Swipe Files of US Medical Device Giant in Ransomware Attack

Artivion, a US medical device leader, faces a ransomware attack: hackers steal files and disrupt orders and shipping, with no major financial impact...

  10-Dec-2024
  5 min read
Loading...

Spyware

DroidBot

New DroidBot Spyware Targets Banking Apps, Crypto Platforms Worldwide

Discover DroidBot, an advanced Android malware redefining threats with MaaS tactics, targeting 77 entities globally. Learn how to stay protected....

  08-Dec-2024
  5 min read
Loading...

TikTok

Cyberattack

Romania’s Democracy Hacked: TikTok Scandal and Cyber Warfare Exposed!

Romania faces TikTok manipulation, cyberattacks, and annulled elections amid global scrutiny. Discover the hybrid warfare challenges to democracy today....

  07-Dec-2024
  6 min read
Loading...

Supply Chain Attack

Supply Chain Attack on Solana's web3.js Library: What You Need to Know

Learn about the recent supply chain attack on the Solana web3.js npm library, impacting versions 1.95.6 and 1.95.7. Detailed mitigation steps and a comprehensive analysis to secure your projects...

  05-Dec-2024
  8 min read
Loading...

Data Security

Signzy

Indian ID Verification Startup Faces Cyberattack, Impact Under Investigation

Signzy, an online ID verification company, has confirmed a cybersecurity incident that may have exposed customer data. While some clients, including PayU and ICICI Bank, stated they were unaffected...

  03-Dec-2024
  4 min read
Loading...

Salt Typhoon

T-Mobile Thwarts Chinese Hackers: Salt Typhoon Telecom Breach Stopped

T-Mobile halts a Chinese state-sponsored cyberattack by Salt Typhoon, safeguarding customer data through proactive monitoring and advanced defenses. ...

  30-Nov-2024
  3 min read
Loading...

GhostSpider

Espionage

Earth Estries Hackers Backdoor Telecoms with New GhostSpider Malware

Earth Estries hackers exploit GhostSpider malware to backdoor telecoms globally, compromising critical infrastructure and government networks...

  29-Nov-2024
  7 min read
Loading...

Ransomware

Starbucks

Starbucks Struggles with Ransomware Chaos After Blue Yonder Attack

Starbucks grapples with payroll chaos and supply chain disruptions after a devastating ransomware attack on Blue Yonder. Here's how it's affecting operations...

  27-Nov-2024
  5 min read
Loading...

Blue Yonder

Ransomware Attack Cripples Blue Yonder, Disrupting Global Supply Chains

Blue Yonder hit by ransomware, disrupting supply chains for major retailers like Morrisons and Sainsbury’s. Recovery efforts ongoing, impact global....

  26-Nov-2024
  5 min read