company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO/CTO

DevOps Engineer

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

design

Threat Research

Gain comprehensive reporting on the dynamic threat landscape through tailored analysis by our team of expert researchers on emerging cyber threats.
logo
design
Loading...

Android

Trojan

PixPirate: Invisible Android Trojan Targets Brazilian Users

PixPirate analysis reveals advanced Android banking trojan. Accessibility abuse, credential theft, and Pix fraud tactics analyzed.

  04-Apr-2024
  10 min read
Loading...

1-Day

Worm

Raspberry Robin: Advanced Worm Exploits 1-Day, Discord Distribution

Raspberry Robin malware aggressively targets unpatched systems with new 1-day exploits, deploying ransomware and stealing sensitive data....

  11-Mar-2024
  11 min read
Loading...

Turla

APT

Turla Wields: TinyTurla-NG and Espionage Tactics Exposed

Uncover the latest tactics of Russia's Turla APT. This technical report analyzes web attack techniques, PowerShell usage, and provides actionable defense strategies for 2024. ...

  21-Feb-2024
  4 min read
Loading...

APT

Phishing

ColdRiver: Russia-Backed APT Tactics with Spica Malware

Explore ColdRiver's Spica malware in this detailed threat analysis. Uncover Russia-backed APT tactics, Spica code insights, and proactive defense measures...

  31-Jan-2024
  4 min read
Loading...

Infostealer

AgentTesla's Deceptive Tactics: Analyzing CHM Extension Distribution

Explore the stealthy tactics of AgentTesla, distributed via deceptive CHM files in emails, posing as order-related attachments

  17-Jan-2024
  4 min read
Loading...

APT

Sandman APT: Mysterious Threat Targeting Telcos with LuaJIT Toolkit

Sandman, a mysterious APT group out of unknown origin, strategically targets telecommunication providers in the Middle East, Western Europe, and South Asia...

  10-Jan-2024
  5 min read
Loading...

Ransomware

AvosLocker: Why US Authorities Issued High-Risk Alerts to Critical Infrastructur...

US authorities warn of AvosLocker Ransomware cyberattacks targeting critical infrastructure. CISA & FBI advise safeguards against this evolving RaaS attacks...

  18-Oct-2023
  6 min read
Loading...

APT

Supply Chain Attack

Malware

Carderbee APT: After Hong Kong & Asia with PlugX Malware via Cobra DocGuard

Newly Discovered APT Group 'Carderbee' Strikes Hong Kong and Asia with PlugX Malware via Legitimate Cobra DocGuard Software, Suggesting Chinese State Links...

  04-Oct-2023
  4 min read
Loading...

Ransomware

Phishing

TeamPhisher

Storm-0324 Threat Analysis: Microsoft Teams Phishing Risks

Explore Storm-0324 cyber threat tactics via Microsoft Teams phishing and stay protected against ransomware attacks.

  18-Sep-2023
  8 min read
Loading...

APT

ScarCruft: Ever Evolving State-Sponsored Espionage Tactics

Delve into ScarCruft's sophisticated cyber espionage: NPO Mashinostroyeniya breach, Dolphin, OpenCarrot backdoor, state-sponsored tactics exposed...

  17-Aug-2023
  7 min read