Skip to content
  • Home
  • VAPT Services
    • Web Application Security Testing
    • Mobile Application Security Testing
    • Network Penetration Testing
    • Cloud Penetration Testing
    • IoT Security Testing
    • Secure Code Review
    • Medical Device Security Testing
  • Compliance
    • Standard Compliance
      • ISO/IEC 27001
      • SOC2 Compliance
      • GDPR Compliance
      • HIPAA Compliance
      • PCI DSS Compliance
      • Cyber Jagrookta Diwas
    • Regulatory Compliance
      • RBI Guidelines
      • IRDAI Compliance Audit
      • SEBI Compliance Audit
      • CERT-In Security Audit
      • Information System Audit
      • SAR Compliance Audit
  • vCISO
  • Product
    • TSAT
    • TDMARC
    • TPIR
  • Industry
    • Industry Overview
    • Financial Services
    • Health Tech
    • Payment Services
    • Education
    • eCommerce
  • About Us
    • About Kratikal
    • Our Team
    • Our Clients
    • Media Coverage
    • Our Partner
  • Contact Us
Kratikal Blogs

Kratikal Blogs

Information Hub For Cyber Security Experts

Kratikal Blogs

Profile

One stop platform of the latest cyber security news, reports, trends, stats and much more!

Menu
  • All Blogs
  • Cyber Security
  • Phishing
  • Cyber Security Buffs
  • Ransomware
  • News Shots
  • CEO’s Desk

Category: Uncategorized

4 Articles
How to Get ISO 27001:2022 Compliant?
Categories
Compliance Cyber Security ISO 27001 Uncategorized

How to Get ISO 27001:2022 Compliant?

September 29, 2023September 29, 2023
5 mins read
The ISO 27001:2022 standard for information security management systems (ISMS) is widely recognized. It is made to help businesses protect sensitive data. This helps businesses to ensure their confidentiality, integrity,…
Read more
nOAuth-Vulnerability
Categories
cyber attacks Cyber Security Uncategorized

Microsoft Fixes NoAuth Flaws, Prevents Account Takeover

July 11, 2023July 11, 2023
7 mins read
Microsoft has admitted that a vulnerability has been discovered in its Azure Active Directory (AD) Open Authorization (OAuth) process which facilitates hackers a complete account takeover. Researchers from Descope, a…
Read more
Ransomware detection through threat hunting
Categories
Cyber Security Ransoware attack Uncategorized

Ransomware Detection Through Threat Hunting

January 14, 2022May 17, 2022
6 mins read
Ransomware is the most destructive kind of cyber attack due to the massive financial losses it inflicts on organisations worldwide. According to IBM, on average, it takes 280 days to…
Read more
5 Biggest Cyber Attacks
Categories
Uncategorized

5 Biggest Cyber Attacks of 2020 (So Far)

October 30, 2020May 17, 2022
6 mins read
The year 2020 has become remarkable in many ways, especially when it comes to the surge in cyber attacks. The Covid-19 pandemic has given an unprecedented opportunity to cyber attackers…
Read more

COMPANY

  • Contact Us
  • Our Team
  • Media Coverage
  • Career

RESOURCES

  • Blog
  • Case Studies
  • White Papers
  • Trainings

VAPT SERVICES

  • Web Application Testing
  • Network Security Testing
  • Cloud Pentration Testing
  • Secure Code Review

COMPLIANCE

  • ISO 27001
  • SOC2
  • RBI Guidelines
  • PCI DSS

Copyright © 2023 All Rights Reserved.

Copyright © 2023 All Rights Reserved.