Skip to content
  • Home
  • VAPT Services
    • Web Application Security Testing
    • Mobile Application Security Testing
    • Network Penetration Testing
    • Cloud Penetration Testing
    • IoT Security Testing
    • Secure Code Review
    • Medical Device Security Testing
  • Compliance
    • Standard Compliance
      • ISO/IEC 27001
      • SOC2 Compliance
      • GDPR Compliance
      • HIPAA Compliance
      • PCI DSS Compliance
      • Cyber Jagrookta Diwas
    • Regulatory Compliance
      • RBI Guidelines
      • IRDAI Compliance Audit
      • SEBI Compliance Audit
      • CERT-In Security Audit
      • Information System Audit
      • SAR Compliance Audit
  • vCISO
  • Product
    • TSAT
    • TDMARC
    • TPIR
  • Industry
    • Industry Overview
    • Financial Services
    • Health Tech
    • Payment Services
    • Education
    • eCommerce
  • About Us
    • About Kratikal
    • Our Team
    • Our Clients
    • Media Coverage
    • Our Partner
  • Contact Us
Kratikal Blogs

Kratikal Blogs

Information Hub For Cyber Security Experts

Kratikal Blogs

Profile

One stop platform of the latest cyber security news, reports, trends, stats and much more!

Menu
  • All Blogs
  • Cyber Security
  • Phishing
  • Cyber Security Buffs
  • Ransomware
  • News Shots
  • CEO’s Desk
Opensource attacks
Categories
Attacks cyber attacks Hacking Ransoware attack

Cyber Attack Due to Malicious Open-source Package

June 6, 2023June 7, 2023
6 mins read
Introduction Open-source tools and packages are an essential part of the modern software development ecosystem. They are widely used by developers to speed up the development process and reduce the…
Read more
Categories
cyber attacks Cyber Security VAPT

Protect future threats with Threat modeling

May 30, 2023June 7, 2023
3 mins read
Introduction Threat modeling is a process that aims to identify potential threats and their corresponding impact on an application or computer system. It involves adopting the perspective impact on an…
Read more
Cert-In Empanelment
Categories
Cyber Awareness

Understanding Cert-In Empanelment and How it can be obtained?

May 26, 2023
5 mins read
Introduction For India to have secure internet, CERT-In plays a crucial role. It is crucial for CERT-In to keep evolving and improving its capabilities in order to stay on top…
Read more
The Alarming Rise of Ransomware Attacks
Categories
Ransomware

The Alarming Rise of Ransomware Attacks

May 23, 2023May 23, 2023
6 mins read
Introduction Ransomware attacks have dramatically increased over the past few years, with severe effects on both individuals and corporations. Cybercriminals now use ransomware, a type of malicious software that encrypts…
Read more
What is VAPT?
Categories
VAPT

“VAPT: The Shield Your Organization Needs Against Cyber Threats”

May 19, 2023May 19, 2023
5 mins read
Introduction Making sure our internet systems and data are secure has become crucial in today's digital world, as technology is ingrained in every part of our lives. Organizations of all…
Read more
"Salesforce Data Leak: Preventing Server Misconfiguration "
Categories
VAPT

“Salesforce Data Leak: Preventing Server Misconfiguration “

May 16, 2023May 16, 2023
5 mins read
Introduction Many businesses manage their client data with the help of the effective application Salesforce. Unfortunately, this also makes Salesforce servers a top target for hackers who want to steal…
Read more
3CX cyber attack
Categories
cyber attacks

An Overview of 3CX Supply Chain Attack

May 9, 2023May 30, 2023
7 mins read
Introduction A Popular desktop software 3CX was compromised by threat actors because of a software supply chain attack that was delivered to millions of their customers through software updates, which…
Read more
GDPR Compliant - Considering Security A Top Priority
Categories
Compliance

GDPR Compliant – Considering Security A Top Priority

May 5, 2023May 5, 2023
6 mins read
Introduction With more individuals having access to the internet, the world has undergone a profound change. The situation has altered as a result of how we now communicate and complete…
Read more
A New Security Vulnerability - Twitter Algorithm
Categories
DDoS Attack

A New Security Vulnerability – Twitter Algorithm

May 2, 2023May 2, 2023
5 mins read
Introduction More and more cyber threat actors are active everywhere due to the advancement of technology. According to the most recent news, researchers have found a weakness in Twitter's recommendation…
Read more
Insights on SOC2 Compliance and Best Practices."
Categories
Compliance

“Ensuring Trust and Security: Insights on SOC2 Compliance and Best Practices.”

April 28, 2023May 1, 2023
4 mins read
Introduction In today's digital landscape, security is more important than ever. As organizations continue to rely on technology to conduct business operations and handle sensitive information, the need for strong…
Read more

Posts navigation

1 2 … 26 Next

COMPANY

  • Contact Us
  • Our Team
  • Media Coverage
  • Career

RESOURCES

  • Blog
  • Case Studies
  • White Papers
  • Trainings

VAPT SERVICES

  • Web Application Testing
  • Network Security Testing
  • Cloud Pentration Testing
  • Secure Code Review

COMPLIANCE

  • ISO 27001
  • SOC2
  • RBI Guidelines
  • PCI DSS

Copyright © 2023 All Rights Reserved.

Copyright © 2023 All Rights Reserved.