company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO/CTO

DevOps Engineer

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..

MUT-1244 exploited trust to steal 390,000 WordPress credentials, SSH keys, and A...

loading..

Citrix NetScaler faces sophisticated password spray attacks on edge devices, urg...

loading..

MUT-1244 exploits GitHub trust with fake PoCs, exfiltrating 390k+ credentials. U...

Loading...

GitHub

WordPress

Over 390,000 WordPress Credentials Stolen in Year-Long MUT-1244 Heist

MUT-1244 exploited trust to steal 390,000 WordPress credentials, SSH keys, and AWS access while mining Monero in a year-long cyber campaign...

  14-Dec-2024
  5 min read
Loading...

Password Spray

Bruteforce

Sophisticated Attacks Target the Backbone of Enterprise Security

Citrix NetScaler faces sophisticated password spray attacks on edge devices, urging enterprises to strengthen security measures

  14-Dec-2024
  6 min read
Loading...

PoC

GitHub

Fake PoC Repositories and Malicious Code on GitHub

MUT-1244 exploits GitHub trust with fake PoCs, exfiltrating 390k+ credentials. Unveil the risks, tactics, and strategies to counter these advanced threats. ...

  14-Dec-2024
  7 min read
Loading...

Vulnerability

Exploitation

How Hackers Are Weaponizing File Transfer Tools to Devastate Businesses

Discover how hackers exploited vulnerabilities in Cleo's file transfer tools, leading to severe consequences for global businesses. Learn about the risks, exploitation methods, and mitigation strategies to protect your organization. ...

  12-Dec-2024
  5 min read
Loading...

Healthcare

Hackers Swipe Files of US Medical Device Giant in Ransomware Attack

Artivion, a US medical device leader, faces a ransomware attack: hackers steal files and disrupt orders and shipping, with no major financial impact...

  10-Dec-2024
  5 min read
Loading...

Spyware

DroidBot

New DroidBot Spyware Targets Banking Apps, Crypto Platforms Worldwide

Discover DroidBot, an advanced Android malware redefining threats with MaaS tactics, targeting 77 entities globally. Learn how to stay protected....

  08-Dec-2024
  5 min read
Loading...

TikTok

Cyberattack

Romania’s Democracy Hacked: TikTok Scandal and Cyber Warfare Exposed!

Romania faces TikTok manipulation, cyberattacks, and annulled elections amid global scrutiny. Discover the hybrid warfare challenges to democracy today....

  07-Dec-2024
  6 min read
Loading...

Supply Chain Attack

Supply Chain Attack on Solana's web3.js Library: What You Need to Know

Learn about the recent supply chain attack on the Solana web3.js npm library, impacting versions 1.95.6 and 1.95.7. Detailed mitigation steps and a comprehensive analysis to secure your projects...

  05-Dec-2024
  8 min read
Loading...

Data Security

Signzy

Indian ID Verification Startup Faces Cyberattack, Impact Under Investigation

Signzy, an online ID verification company, has confirmed a cybersecurity incident that may have exposed customer data. While some clients, including PayU and ICICI Bank, stated they were unaffected...

  03-Dec-2024
  4 min read
Loading...

Salt Typhoon

T-Mobile Thwarts Chinese Hackers: Salt Typhoon Telecom Breach Stopped

T-Mobile halts a Chinese state-sponsored cyberattack by Salt Typhoon, safeguarding customer data through proactive monitoring and advanced defenses. ...

  30-Nov-2024
  3 min read