Top 10 Web Application Vulnerabilities and How to Mitigate Them

Top 10 Web Application Vulnerabilities and How to Mitigate Them

The inability to identify vulnerabilities in a web application can leave it unprotected against potential attackers, resulting in the mostContinue reading The post Top 10 Web Application Vulnerabilities and How to Mitigate ...
DDoS Attack

Powerful DDoS Attack Hits Hungarian Banks and Telecoms Service

Hungarian financial institutions and telecoms infrastructure suffered a cyber attack on Thursday, last week. According to Magyar Telekom, the attackContinue reading The post Powerful DDoS Attack Hits Hungarian Banks and Telecoms Service ...
Eterbase Exchange Hacked: Hackers Stole $5.4 Mn

Eterbase Exchange Hacked: Hackers Stole $5.4 Mn

Eterbase Exchange, a popular Slovakian cryptocurrency exchange platform was hacked by threat actors, on September 8, 2020. Reportedly, $5.4 MillionContinue reading The post Eterbase Exchange Hacked: Hackers Stole $5.4 Mn appeared first ...
Cyberattackers Target Norwegian Parliament

Cyberattackers Target Norwegian Parliament

The Norwegian Parliament, also known as the Storting, made an extremely shocking revelation by issuing a press release at theContinue reading The post Cyberattackers Target Norwegian Parliament appeared first on Kratikal Blog ...
secure code review

Secure Code Review – A Necessity

What is a Secure Code Review? Secure Code Review is the process to check the code in the development phaseContinue reading The post Secure Code Review – A Necessity appeared first on ...
SQL Injection Attack: A Major Application Security Threat

SQL Injection Attack: A Major Application Security Threat

What is SQL Injection (SQLi) and SQL Injection Attack? If you are quite familiar with the cyber world then youContinue reading The post SQL Injection Attack: A Major Application Security Threat appeared ...