VAPT Archives - Page 4 of 13 - Kratikal Blogs

Category :

 VAPT

 127 Articles

What is Software Composition Analysis And It’s Importance?

March 5, 2025 - 6 mins read

Software composition analysis (SCA) is a cybersecurity process that provides an in-depth examination of open-source packages used within an application,…

What is Vulnerability Testing and How Does It Work?

October 18, 2024 - 7 mins read

Security is a critical aspect of any application, network, cloud, and similar others. These inventory are often targeted by hackers…

Importance of Vulnerability Assessment: Types and Methodology

July 19, 2024 - 7 mins read

A vulnerability assessment involves identifying, classifying, and prioritizing security vulnerabilities within an IT infrastructure. This comprehensive evaluation determines if an…

Critical Vulnerability Discovered in OpenSSH Impacting Large User

July 16, 2024 - 6 mins read

In a significant development for cybersecurity, a new vulnerability has been detected in OpenSSH, the widely-used suite for secure network…

LockBit 3.0: The Rising Costs of Ransomware Attacks

July 9, 2024 - 7 mins read

Ransomware attacks have become increasingly sophisticated and costly, with LockBit 3.0 emerging as a formidable adversary. This latest iteration of…

Alert: China Spying Through ORB Proxy Network

May 28, 2024 - 4 mins read

A recent analysis indicates a concerning trend: state-backed hackers linked to China are increasingly employing ORB proxy networks for cyberespionage.…

49 Million Customers Impacted by API Security Flaw

May 21, 2024 - 5 mins read

How safe is your data? With the increasing reliance on online services, this question weighs heavily on everyone’s mind. The…

What is Secure Code Review and How to Conduct it?

May 18, 2024 - 7 mins read

Secure code review is a combination of automated and manual processes assessing an application/software’s source code. The main motive of…