company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Threatspy

Solutions

By Industry

Healthcare

Education

IT & Telecom

By Role

Government

CISO/CTO

DevSecOps

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Threat Feeds

Threat Research

White Paper

SB Blogs

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

Our Story

Our Team

Careers

Press & Media

Contact Us
loading..

Unveiling the relentless Gafgyt malware's assault on legacy Zyxel routers. Disco...

loading..

Explore the Knight ransomware's ingenious distribution through TripAdvisor compl...

loading..

Unveil the takedown of LOLEKHosted: a bulletproof haven aiding ransomware. Explo...

Loading...

Vulnerability

Five-Year-Old Flaw in EoL Zyxel Router Exploited by Gafgyt Malware

Unveiling the relentless Gafgyt malware's assault on legacy Zyxel routers. Discover the battle, vulnerabilities, and defense strategies....

  12-Aug-2023
  3 min read
Loading...

Ransomware

Tripadvisor Complaint Email: A Vector for Knight Ransomware

Explore the Knight ransomware's ingenious distribution through TripAdvisor complaints. Unveil the deception, techniques, and defenses in this cybersecurity exposé...

  12-Aug-2023
  4 min read
Loading...

DDoS

Netwaller

Lolek

LOLEKHosted: Unveiling a Ransomware Nexus - Dark Secrets Exposed

Unveil the takedown of LOLEKHosted: a bulletproof haven aiding ransomware. Explore the arrest of administrators and the battle against cybercrime....

  12-Aug-2023
  4 min read
Loading...

Phishing

Ransom

Lapsus$ Hackers Elevate SIM-Swapping Attacks to Unprecedented Heights

Unveiling Lapsus$ Cyber Saga: Ingenious SIM-swapping tactics, audacious breaches, and lessons for cybersecurity. Dive deep into this evolving threat....

  11-Aug-2023
  4 min read
Loading...

Data Breach

40 Million UK Voters' Data Exposed: Electoral Commission Cyberattack

Massive cyberattack on UK Electoral Commission exposes 40 million voters' data. Learn how the breach unfolded and its implications

  09-Aug-2023
  3 min read
Loading...

MOVEit

Torrent

Clop

Cl0p Ransomware's Torrent Data Leak: Disclosing MOVEit's Massive Breach!

Discover Clop ransomware's latest twist! Using torrents to leak stolen data from MOVEit attacks.

  07-Aug-2023
  4 min read
Loading...

Data Breach

3 Years of Data Stolen in Colorado Dept of Higher Edu Ransomware Attack

Read the in-depth report on the Colorado Department of Higher Education's ransomware attack and data breach. Learn about the extent of the breach...

  05-Aug-2023
  4 min read
Loading...

MOVEit

Clop

MoveIT Attacks Resulted in Serco Discloses Data Breach Exposing 10K

Serco Inc discloses data breach due to MoveIT attacks. Learn how 10,000 individuals' data was stolen & steps taken for prevention

  05-Aug-2023
  4 min read
Loading...

Phishing

Zero Day

Salesforce Zero-Day Exploited to Phish Facebook Credentials

Unraveling the sophisticated phishing campaign that leveraged a zero-day flaw in Salesforce's email services to deceive Facebook users

  05-Aug-2023
  3 min read
Loading...

Source Code

Cryptocurrency

Malware

Malicious NPM Packages Exfiltrate Developer Data

Discover the Cryptocurrency Cybersecurity Attack involving Malicious npm Packages. Learn about the exfiltration of sensitive data from developers. ...

  04-Aug-2023
  4 min read