Common Information
Type | Value |
---|---|
Value |
kratikal.com |
Category | |
Type | Domain |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-16 | 2 | Cyber Crisis Management Plan: Shield for Brand Reputation | ||
Details | Website | 2024-11-15 | 2 | What is Digital Lending Application (DLA) Audit? | ||
Details | Website | 2024-11-12 | 2 | Top Mobile Security Risks of 2024 by OWASP | ||
Details | Website | 2024-11-08 | 2 | What is Software Composition Analysis and It’s Importance? | ||
Details | Website | 2024-10-29 | 2 | 49% of Enterprises Fail to Identify SaaS Vulnerabilities | ||
Details | Website | 2024-10-25 | 2 | Common Mistakes to Avoid During ISO 27001 Audit | ||
Details | Website | 2024-10-22 | 2 | OWASP Mobile Top 10 2024: Update Overview | ||
Details | Website | 2024-10-15 | 3 | How DDoS Botent is used to Infect your Network? | ||
Details | Website | 2024-10-01 | 2 | How Dark Patterns Trick Users into Unintended Actions? | ||
Details | Website | 2024-09-27 | 2 | How to Get SOC 2 Certified? | ||
Details | Website | 2024-09-24 | 2 | How to Choose the Right VMDR Tool? | ||
Details | Website | 2024-09-20 | 2 | Key Role of Cyber Security in Healthcare | ||
Details | Website | 2024-09-17 | 3 | What is Cross-Site Scripting and How to Prevent it? | ||
Details | Website | 2024-09-10 | 2 | Legal Impact of GDPR Data Policy Violations | ||
Details | Website | 2024-09-06 | 3 | NIST CSF 2.0 Cyber Security Framework | ||
Details | Website | 2024-09-03 | 6 | WordPress Sites at Risk from WPML Flaw | ||
Details | Website | 2023-11-10 | 2 | Top 12 Essential PCI DSS Compliance Requirements | ||
Details | Website | 2023-06-09 | 2 | The Jeopardy of Zombie APIs | ||
Details | Website | 2023-05-23 | 2 | The Alarming Rise of Ransomware Attacks | ||
Details | Website | 2023-03-03 | 3 | Top Cyber Security Companies in Delhi | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware - National Cyber Security Consulting | ||
Details | Website | 2023-02-28 | 3 | How Does a Data Breach Take Place in an Organization? | ||
Details | Website | 2023-01-10 | 2 | “Reducing the attack surface: the key to secure your OT environment” | ||
Details | Website | 2023-01-03 | 3 | “Top 5 ways hackers can bypass your firewall” | ||
Details | Website | 2022-11-02 | 10 | SOVA – A New Android Banking Trojan | ||
Details | Website | 2022-10-11 | 4 | A Way to Watering Hole Attack and its Exploitation Steps |