VAPT
Top 10 Web Application Vulnerabilities and How to Mitigate Them
The inability to identify vulnerabilities in a web application can leave it unprotected against potential attackers, resulting in the mostContinue reading The post Top 10 Web Application Vulnerabilities and How to Mitigate ...
Powerful DDoS Attack Hits Hungarian Banks and Telecoms Service
Hungarian financial institutions and telecoms infrastructure suffered a cyber attack on Thursday, last week. According to Magyar Telekom, the attackContinue reading The post Powerful DDoS Attack Hits Hungarian Banks and Telecoms Service ...
Eterbase Exchange Hacked: Hackers Stole $5.4 Mn
Eterbase Exchange, a popular Slovakian cryptocurrency exchange platform was hacked by threat actors, on September 8, 2020. Reportedly, $5.4 MillionContinue reading The post Eterbase Exchange Hacked: Hackers Stole $5.4 Mn appeared first ...
Cyberattackers Target Norwegian Parliament
The Norwegian Parliament, also known as the Storting, made an extremely shocking revelation by issuing a press release at theContinue reading The post Cyberattackers Target Norwegian Parliament appeared first on Kratikal Blog ...
Secure Code Review – A Necessity
What is a Secure Code Review? Secure Code Review is the process to check the code in the development phaseContinue reading The post Secure Code Review – A Necessity appeared first on ...
SQL Injection Attack: A Major Application Security Threat
What is SQL Injection (SQLi) and SQL Injection Attack? If you are quite familiar with the cyber world then youContinue reading The post SQL Injection Attack: A Major Application Security Threat appeared ...

