Cyber Attack Due to Malicious Open-source Package

June 6, 2023 - 6 mins read

Table of Contents1 Introduction2 What is an open-source package?3 Recent Examples of Attacks Due to Malicious Open-source Packages3.1 Malicious Info…

Protect future threats with Threat modeling

May 30, 2023 - 3 mins read

Table of Contents0.0.1 Introduction1 Why do organizations need threat modeling?1.0.1 Multiple threat modeling methodologies are available, including:1.0.2 Conclusion: Introduction Threat…

Understanding CERT-In Empanelment and its Importance

May 26, 2023 - 5 mins read

Table of Contents1 Introduction1.1 How would you define CERT-IN?1.2 CERT-in Empanelment Auditors1.2.1 Benefits Associated with Kratikal’s CERT-In Empanelment1.2.2 Why Organizations…

The Alarming Rise of Ransomware Attacks

May 23, 2023 - 6 mins read

Ransomware attacks have dramatically increased over the past few years, with severe effects on both individuals and corporations. Cybercriminals now…

“VAPT: The Shield Your Organization Needs Against Cyber Threats”

May 19, 2023 - 5 mins read

Making sure our internet systems and data are secure has become crucial in today’s digital world, as technology is ingrained…

“Salesforce Data Leak: Preventing Server Misconfiguration “

May 16, 2023 - 5 mins read

Many businesses manage their client data with the help of the effective application Salesforce. Unfortunately, this also makes Salesforce servers…

An Overview of 3CX Supply Chain Attack

May 9, 2023 - 7 mins read

Introduction A Popular desktop software 3CX was compromised by threat actors because of a software supply chain attack that was…

GDPR Compliant – Considering Security A Top Priority

May 5, 2023 - 6 mins read

With more individuals having access to the internet, the world has undergone a profound change. The situation has altered as…