Common Information
Type Value
Value
kratikal.com
Category
Type Domain
Misp Type
Description
Details Published Attributes CTI Title
Details Website 2024-11-16 2 Cyber Crisis Management Plan: Shield for Brand Reputation
Details Website 2024-11-15 2 What is Digital Lending Application (DLA) Audit?
Details Website 2024-11-12 2 Top Mobile Security Risks of 2024 by OWASP
Details Website 2024-11-08 2 What is Software Composition Analysis and It’s Importance?
Details Website 2024-10-29 2 49% of Enterprises Fail to Identify SaaS Vulnerabilities
Details Website 2024-10-25 2 Common Mistakes to Avoid During ISO 27001 Audit
Details Website 2024-10-22 2 OWASP Mobile Top 10 2024: Update Overview
Details Website 2024-10-15 3 How DDoS Botent is used to Infect your Network?
Details Website 2024-10-01 2 How Dark Patterns Trick Users into Unintended Actions?
Details Website 2024-09-27 2 How to Get SOC 2 Certified?
Details Website 2024-09-24 2 How to Choose the Right VMDR Tool?
Details Website 2024-09-20 2 Key Role of Cyber Security in Healthcare
Details Website 2024-09-17 3 What is Cross-Site Scripting and How to Prevent it?
Details Website 2024-09-10 2 Legal Impact of GDPR Data Policy Violations
Details Website 2024-09-06 3 NIST CSF 2.0 Cyber Security Framework
Details Website 2024-09-03 6 WordPress Sites at Risk from WPML Flaw
Details Website 2023-11-10 2 Top 12 Essential PCI DSS Compliance Requirements
Details Website 2023-06-09 2 The Jeopardy of Zombie APIs
Details Website 2023-05-23 2 The Alarming Rise of Ransomware Attacks
Details Website 2023-03-03 3 Top Cyber Security Companies in Delhi | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware - National Cyber Security Consulting
Details Website 2023-02-28 3 How Does a Data Breach Take Place in an Organization?
Details Website 2023-01-10 2 “Reducing the attack surface: the key to secure your OT environment”
Details Website 2023-01-03 3 “Top 5 ways hackers can bypass your firewall”
Details Website 2022-11-02 10 SOVA – A New Android Banking Trojan
Details Website 2022-10-11 4 A Way to Watering Hole Attack and its Exploitation Steps