Picture of the author
Kratikal's Logo
Contact Us


"Unlocking Insights and Solutions through Comprehensive Research and Analysis"

phishing Mail
Analysis of phishing mail

Delivering a phishing webpage is most commonly done via email, SMS, or spam advertising. Attackers are continuously developing new methods for conducting phishing assaults if they came from a software flaw that allowed a threat actor to gain access to your organization.

Intel Zero Day Vulnerability
Intel Zero Day Vulnerability

The discovery of the Meltdown and Spectre CPU architecture attacks on Intel-based CPUs shocked the entire globe. Online discussion regarding the origins, effects and use cases of these assaults has increased dramatically as a result of these attacks.