Follow Cyber Kendra on Google News! | WhatsApp | Telegram

Add as a preferred source on Google
Security

10 Cloud Security Risks Businesses Face in 2026

In 2024, the world witnessed two of the most devastating cloud security incidents in recent history. The Snowflake data breach exposed hundreds of or…

Fake Signal and ToTok Apps Deliver Spyware to Privacy-Focused Users in UAE

Privacy-conscious Android users in the United Arab Emirates are being targeted by sophisticated spyware campaigns disguised as secure messaging apps,…

Red Hat Breach Exposes 800 Customer Reports Containing Credentials and Network Maps

Enterprise Linux giant Red Hat has confirmed a major security incident after hackers infiltrated a GitLab instance used by its consulting division, p…

New VMware Zero-Day Exploited Chinese Hackers

A critical privilege escalation vulnerability in VMware products was exploited in the wild for nearly a year before being patched, security researche…

Hackers Exploit Cisco Firewall Zero-Days, CISA Issues Emergency Directive

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued Emergency Directive, ordering federal agencies to immediately identify an…

Critical ForcedLeak Flaw Lets Attackers Steal Salesforce Customer Data

Security researchers have uncovered a critical vulnerability in Salesforce's AI-powered Agentforce platform that allowed attackers to steal sensi…

Cisco Patches Critical IOS Zero-Day Under Active Attack—Millions of Network Devices at Risk

Cisco has released emergency security patches for a critical zero-day vulnerability in its IOS and IOS XE software that attackers are actively exploi…

UK Arrests Suspect in Global Airport Ransomware Attack

A major international investigation into a ransomware attack that disrupted airports worldwide has led to the first arrest, as authorities work to di…

China Backed BRICKSTORM Malware Targets US Tech

Sophisticated threat group exploits network appliances lacking security tools to steal secrets and potentially develop zero-day exploits A China-nexu…

Sophos Hit by Phishing Attack Despite Multi-Factor Authentication

Even cybersecurity giants aren't immune to sophisticated phishing attacks, as demonstrated by a March 2025 incident at Sophos where a senior empl…

New YiBackdoor Malware Spotted with Dangerous Links to Banking Trojans

Security researchers have uncovered a sophisticated new malware family that borrows heavily from notorious banking trojans, raising concerns about ev…

Critical Spring Gateway Flaw Enables Remote Code Execution

A critical vulnerability (CVE-2025-41243) in Spring Cloud Gateway Server WebFlux enables attackers to execute arbitrary code on affected systems by m…

Critical Microsoft Entra ID Flaw Could Have Compromised Every Azure Customer

A catastrophic vulnerability in Microsoft's Entra ID identity platform could have allowed attackers to gain "god mode" access to virtua…

SonicWall Urges Immediate Password Resets After Hackers Steal Firewall Configuration Files

Cybersecurity firm warns exposed backup files could enable "significantly easier" network exploitation. SonicWall has issued an urgent secu…

Microsoft Crushes Massive Phishing Ops That Stole 5,000 Credentials

Microsoft's Digital Crimes Unit has dismantled RaccoonO365, a subscription-based phishing service that enabled even non-technical criminals to st…

Shai-Hulud Attack Escalates: CrowdStrike NPM Packages Compromised

A sophisticated supply chain attack dubbed "Shai-Hulud" has now compromised over 700 npm packages, including multiple official CrowdStrike …

Apple Issues Emergency Spyware Alerts — Says France

Apple has once again alerted users worldwide that their devices may have been compromised by sophisticated mercenary spyware attacks, with France'…

Apple Announced iPhone 17 with New Memory Shield Protection

With the release of latest iPhone, Apple has unveiled Memory Integrity Enforcement (MIE) in its new iPhone 17 series and iPhone Air, marking what the…

Technical Details of Actively Exploited Android Kernel Flaw Released

A critical Android kernel vulnerability that Google warned was being actively exploited has been thoroughly dissected by security researcher StreyPaw…

DuckDB Packages Compromised in Latest NPM Supply Chain Attack

The NPM supply chain attack targeting major JavaScript packages has claimed another victim, with popular database library DuckDB confirming that four…