company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO/CTO

DevOps Engineer

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

design

Threat Research

Gain comprehensive reporting on the dynamic threat landscape through tailored analysis by our team of expert researchers on emerging cyber threats.
logo
design
Loading...

QNAP

Qlocker

Ransomware

QLocker Ransomware

Qlocker, an infamous ransomware rise in prominence after victimizing the QNAP NAS storage, uses 7-zip to move files into password-protected archives......

  28-Jul-2021
  3 min read
Loading...

Trojan

Qakbot

Emotet

Qakbot: An infamous Banking Trojan Family

Qakbot creates a specialized phishing e-mail that incorporates an Office document in the mail content...

  22-Jun-2021
  4 min read
Loading...

Zero-Day

Google

Counterterrorism

Google took down the hacking attack as a counterterrorism operation in disguise

Western Government operatives found to be actively conducting a counterterrorism operation for the past nine months discovered by Google as a hacking attack...

  28-Mar-2021
  8 min read
Loading...

Vulnerability

SHAREIt: Unpatched Vulnerability Targeting To Remote Code Execution

SHAREit the infamous peer-to-peer file transfer app, mostly familiar for leaking its user data and maliciously spying on them, was recently identified to be occupied with numerous patched vulnerabilities...

  18-Feb-2021
  11 min read
Loading...

Cyberespionage

Winnti or Higaisa resurrected from APT41 Backdoor

Winnti' a cyberespionage group from the Chinese origins primarily identified for targeting software companies and political organisations worldwide, gained traction over a series of cyberattacks...

  20-Jan-2021
  15 min read
Loading...

Solarwinds

Solarwinds Hack: Why it is not like any other cyberattack

Solarwinds, a SaaS-based firm known for their IT & Network management solutions, was spotted under the radar of a manual supply chain attack....

  11-Jan-2021
  4 min read
Loading...

vulnerability

Zerologon

Zerologon vulnerability

Zerologon is the name that has been given to a vulnerability identified in CVE-2020-1472. It’s called zerologon due to the flaw in the logon process where the initialisation vector (IV) is set to all zeros all the time while an Initialisation Vector (IV) should always be a random number...

  18-Nov-2020
  7 min read
Loading...

Cyberthreat

Malware

IAmTheKing and the SlothfulMedia malware family

DHS CISA agency published a Malware Analysis Report (MAR) on October 1, 2020 released information about a malware family called SlothfulMedia...

  09-Nov-2020
  9 min read
Loading...

Ransomware

Security

EKANS

EKANS Ransomware

Dragos Platform regularly detects and responds to Major ransomware outbreaks within industrial environments and maintains a report related to the attack......

  21-Aug-2020
  3 min read
Loading...

Malware

Taidoor

Security

Taidoor Malware

A malware analysis report published on Monday about the composition of a virus named Taidoor.

  20-Aug-2020
  3 min read