company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO/CTO

DevOps Engineer

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

design

Threat Research

Gain comprehensive reporting on the dynamic threat landscape through tailored analysis by our team of expert researchers on emerging cyber threats.
logo
design
Loading...

Malware

SSH

MCCrash Malware: A Cross-Platform Botnet Targeting SSH-Enabled Devices

Analysis of MCCrash cross-platform botnet that targets Windows & Linux devices, as well as IoT devices, via insecure SSH settings. It launches DDoS attacks against private Minecraft servers... ...

  23-Dec-2022
  6 min read
Loading...

Malware

Infostealer

Ducklogs

Ducklogs: A Malware-as-a-Service Comes With Multifold Functionalities

Ducklogs Malware-as-a-Service offers functionality to steal & exfiltrate user data from compromised systems…

  17-Dec-2022
  3 min read
Loading...

Discord

Ransomware

AxLocker: A new wave of ransomware attacks targeting Discord Servers

Discord servers credentials are being exploited involving newly emerged ransomware families out of which AxLocker…

  21-Nov-2022
  4 min read
Loading...

Dropper

BOMB

Malware

BOMB: A Dropper-Like Malware Actively Spreading In Disguise of Cracks

BOMB, a dropper malware concealed as crack actively circulated following it's dormancy deployed over the targeted system…

  16-Nov-2022
  3 min read
Loading...

Amadey

LockBit

Phishing

Amadey Bot: Ransomware Affiliates Spreading LockBit By Phishing Email

LockBit 3.0 Ransomware affiliates acting as a lure with phishing emails to deploy Amadey Bot across infected devices to take control... ...

  09-Nov-2022
  7 min read
Loading...

Wanniti

APT41

Spyder Loader

Operation CuckooBees: A sophisticated resurrection to Spyder Loader

Operation CuckooBees resurfaced since its inception in May, involved in a series of attacks targeting IPs of Hong Kong companies by Spyder Loader…...

  31-Oct-2022
  9 min read
Loading...

Onion

APT

TOR

OnionPoison: YouTube Channels spreading malicious TOR browsers installers

OnionPoison involved in wild infection chain of TOR Browser installer spread via YouTube channels

  21-Oct-2022
  10 min read
Loading...

Twilio

Phishing

EvilProxy

EvilProxy: Scaling Phishing Attacks Keeping MFA At Bay

EvilProxy operators leverage Reverse Proxy & Cookie Injection methods to evade MFA – proxyfying victim’s session...

  21-Sep-2022
  7 min read
Loading...

Golang

BianLian

Ransomware

BianLian: A new golan based cross functional ransomware in action

Increases in the command and control infrastructure of the new cross-platform ransomware BianLian this month suggest a quickening of the rate at which it is being developed and deployed......

  16-Sep-2022
  7 min read
Loading...

APT

Backdoor

TA428

CotSam, Never Before Seen Malware linked to TA428 involved in EU attack

CotSam: a never seen before malware strain involved in the targeted attacks across several European & Afghanistan institutions linked to infamous APT group TA428......

  09-Aug-2022
  7 min read