Skip to content
  • Home
  • VAPT Services
    • Web Application Security Testing
    • Mobile Application Security Testing
    • Network Penetration Testing
    • Cloud Penetration Testing
    • IoT Security Testing
    • Secure Code Review
    • Medical Device Security Testing
  • Compliance
    • Standard Compliance
      • ISO/IEC 27001
      • SOC2 Compliance
      • GDPR Compliance
      • HIPAA Compliance
      • PCI DSS Compliance
      • Cyber Jagrookta Diwas
    • Regulatory Compliance
      • RBI Guidelines
      • IRDAI Compliance Audit
      • SEBI Compliance Audit
      • CERT-In Security Audit
      • Information System Audit
      • SAR Compliance Audit
  • vCISO
  • Product
    • TSAT
    • TDMARC
    • TPIR
  • Industry
    • Industry Overview
    • Financial Services
    • Health Tech
    • Payment Services
    • Education
    • eCommerce
  • About Us
    • About Kratikal
    • Our Team
    • Our Clients
    • Media Coverage
    • Our Partner
  • Contact Us
Kratikal Blogs

Kratikal Blogs

Information Hub For Cyber Security Experts

Kratikal Blogs

Profile

One stop platform of the latest cyber security news, reports, trends, stats and much more!

Menu
  • All Blogs
  • Cyber Security
  • Phishing
  • Cyber Security Buffs
  • Ransomware
  • News Shots
  • CEO’s Desk

Category: cyber attacks

17 Articles
Zombie APIs
Categories
cyber attacks DDoS Attack Hacking

The Jeopardy of Zombie APIs

June 9, 2023June 9, 2023
5 mins read
Let's unveil the hidden threats to Organizations. In the current digital landscape, organizations are exposed to a variety of risks. There is a rise in Zombie APIs ranking among the…
Read more
Opensource attacks
Categories
Attacks cyber attacks Hacking Ransoware attack

Cyber Attack Due to Malicious Open-source Package

June 6, 2023June 7, 2023
6 mins read
Introduction Open-source tools and packages are an essential part of the modern software development ecosystem. They are widely used by developers to speed up the development process and reduce the…
Read more
Categories
cyber attacks Cyber Security VAPT

Protect future threats with Threat modeling

May 30, 2023June 7, 2023
3 mins read
Introduction Threat modeling is a process that aims to identify potential threats and their corresponding impact on an application or computer system. It involves adopting the perspective impact on an…
Read more
3CX cyber attack
Categories
cyber attacks

An Overview of 3CX Supply Chain Attack

May 9, 2023May 30, 2023
7 mins read
Introduction A Popular desktop software 3CX was compromised by threat actors because of a software supply chain attack that was delivered to millions of their customers through software updates, which…
Read more
R3NIN Sniffer toolkit - A complete guide to New Sniffer
Categories
cyber attacks VAPT

R3NIN Sniffer Toolkit – A Complete Guide to New Sniffer

April 25, 2023April 25, 2023
4 mins read
Introduction Digitization is advancing along with technology, and online credit card purchases are commonplace. A set of network analysis and sniffing tools is included in the R3NIN Sniffer toolkit. It…
Read more
PasteJacking attack
Categories
cyber attacks Cyber Security

Clipboard Hijacking Can Turn Your Copied Text into A Threat

March 28, 2023March 28, 2023
5 mins read
Introduction In today's world, where people spend a significant portion of their time online, cyber threats are becoming increasingly sophisticated and dangerous. One such threat is "PasteJacking or clipboard hijacking."…
Read more
"Silent theft in a digital world: Beware of Web Skimming!"
Categories
cyber attacks Hacking

“Web Skimming Attacks – Digital Hacking Techniques for Payment Card”

March 14, 2023March 22, 2023
5 mins read
Introduction A recent notion, Web Skimming attacks, which have been around for a while, was introduced with the rise in cyber threats. After the Magecart attack on British Attacks in…
Read more
data breach image
Categories
cyber attacks VAPT

How Does a Data Breach Take Place in an Organization?

February 28, 2023March 1, 2023
6 mins read
Introduction Recent incidents of data breaches have become a great concern for organizations. Regardless of the organization's size, threat actors are targeting every business type. Threat actors have also started…
Read more
Kratikal News Shots
Categories
cyber attacks

RedFoxtrot Targets Indian Organizations

June 21, 2021May 2, 2022
2 mins read
RedFoxtrot cyber threat group, which is believed to have links with the Chinese military, has been targeting Indian organizations since becoming active in 2014. This hacker group has particularly focussed…
Read more
Cyber attack on water treatment plant
Categories
cyber attacks

Cyber Attack Haunts a Public Water Supply System. Again!

April 26, 2021April 3, 2023
4 mins read
In my previous blog, I had described how and why it is important for critical agencies to ensure that they are secure from cyber threats lurking around. If you have…
Read more

Posts navigation

1 2 Next

COMPANY

  • Contact Us
  • Our Team
  • Media Coverage
  • Career

RESOURCES

  • Blog
  • Case Studies
  • White Papers
  • Trainings

VAPT SERVICES

  • Web Application Testing
  • Network Security Testing
  • Cloud Pentration Testing
  • Secure Code Review

COMPLIANCE

  • ISO 27001
  • SOC2
  • RBI Guidelines
  • PCI DSS

Copyright © 2023 All Rights Reserved.

Copyright © 2023 All Rights Reserved.