Top Categories

Spotlight

todayAugust 6, 2020

Blog admin

35000 ZoOM ID’s exposed to internet – one can join meeting without authentication

One of the Security researchers of our company has found a security vulnerability in the Zoom platform where users can join many meetings without any authentication and they are google indexed with many big company giants. We are attaching screenshots for people’s reference. This is purely compromising the privacy of company [...]


Vulnerability Management, Robotically Optimized.™

Static Application Testing (SAST)

Behavioral-Based Threat Detection

Malware Bot Security Management

Find your solution..

by role

DevOps

CISOs

CTOs

Testing & Quality Assurance

by industry

Financial Services

Healthcare

Government

Games

eCommerce

Blockchain

Our partners

True partners are an extension of ourselves. Find a local partner and put the security in your DevOp teams.

Find a partner

Become a partner

Become a partner and provide our cutting edge AI Vulnerability Detection and Reasoning engine to your customers.

Become a partner

Blog

3 Results / Page 1 of 1

Background

todayJuly 19, 2020

  • 284
close

Blog admin

XXE+SSRF INJECTION

Google Dorking is most important tool and sometimes it leads to bigger results sometimes it lead to remote code execution or XXE injection. Let’s check it out, how it gathers the information and leads to XXE injection. Suppose we are playing with php application and we want to see how ...

todayJuly 10, 2020

  • 273
close

Blog admin

BUG Bounty TIps : PART ONE

Here are some bug bounty tips for security researchers and bug bounty hunters which can help them to crack bounties in easy manner: BUG BOUNTY TIP A: BUG BOUNTY TIP B: BUG BOUNTY TIP C: BUG BOUNTY TIP D: BUG BOUNTY TIP E: BUG BOUNTY TIP F: BUG BOUNTY TIP ...


ABOUT US



Intelligent & Continuous Security Improvement with advanced ML.



CONTACT US