cyber attacks Archives - Page 8 of 8 - Kratikal Blogs

Category :

 cyber attacks

 75 Articles

What is RepoJacking and How Organizations are Vulnerable to It?

June 27, 2023 - 5 mins read

Introduction In recent months, a threat to open-source repositories has emerged in the form of repository hijacking, commonly known as…

Zyxel Firewall Protection: Patching to Combat Attacks

June 23, 2023 - 6 mins read

Introduction Zyxel firewall helps to secure networks against threats and unauthorized access. In today’s world where we share a tremendous…

The Jeopardy of Zombie APIs

June 9, 2023 - 5 mins read

Let’s unveil the hidden threats to Organizations. In the current digital landscape, organizations are exposed to a variety of risks.…

Cyber Attack Due to Malicious Open-source Package

June 6, 2023 - 6 mins read

Introduction Open-source tools and packages are an essential part of the modern software development ecosystem. They are widely used by…

Protect future threats with Threat modeling

May 30, 2023 - 3 mins read

Introduction Threat modeling is a process that aims to identify potential threats and their corresponding impact on an application or…

An Overview of 3CX Supply Chain Attack

May 9, 2023 - 7 mins read

Introduction A Popular desktop software 3CX was compromised by threat actors because of a software supply chain attack that was…

R3NIN Sniffer Toolkit – A Complete Guide to New Sniffer

April 25, 2023 - 4 mins read

Digitization is advancing along with technology, and online credit card purchases are commonplace. A set of network analysis and sniffing…

Clipboard Hijacking Can Turn Your Copied Text into A Threat

March 28, 2023 - 5 mins read

Introduction In today’s world, where people spend a significant portion of their time online, cyber threats are becoming increasingly sophisticated…