Follow Cyber Kendra on Google News! | WhatsApp | Telegram

Security

Apache Tomcat Releases Security Updates for DoS and Bypass Vulnerabilities

The Apache Software Foundation has released important security updates addressing two vulnerabilities in Apache Tomcat, the popular open-source web s…

Critical SAP Zero-Day Vulnerability Under Active Exploitation

A critical zero-day vulnerability in SAP NetWeaver systems (CVE-2025-31324) is currently being actively exploited by threat actors, according to secu…

Critical React Router Flaws Affects Framework Mode Applications

Security researchers have identified two high-severity vulnerabilities in React Router, a popular routing library for React applications. The flaws a…

Critical RCE Vulnerability in Commvault Backup Software

Security researchers at watchTowr have disclosed a critical remote code execution (RCE) vulnerability in Commvault's backup and recovery software…

Researcher Expose Critical Gaps in Email Security Gateway Protection

IRONSCALES, the AI-powered email security leader, reveals that traditional Secure Email Gateways (SEGs) are failing to catch a concerning number of p…

Critical Ivanti Connect Secure Vulnerability Under Active Exploitation by Chinese Hackers

A critical security vulnerability in Ivanti Connect Secure VPN appliances ( CVE-2025-22457 ) is being actively exploited by suspected Chinese state-…

Europol Shuts Down Massive Child Exploitation Website "Kidflix"

In a sweeping international operation, law enforcement agencies across 35 countries have successfully dismantled Kidflix, one of the world’s largest …

Researchers Uncover Three Bypasses of Ubuntu's Namespace Restrictions

Security researchers at Qualys have identified three methods to bypass Ubuntu's unprivileged user namespace restrictions, a security feature intr…

Gmail's New End-to-End Encryption for Enterprise Users

In celebration of Gmail’s birthday , Google has announced a significant advancement in email security that democratizes end-to-end encryption (E2EE) …

Critical Authentication Bypass Vulnerability Discovered in CrushFTP

A severe authentication bypass vulnerability has been identified in CrushFTP, a popular multi-protocol file transfer server used by many organization…

BLASTPASS Explained: How NSO’s WebP Zero-Day Exploit Hacked iPhones Silently

In September 2023, Apple rushed to patch a critical vulnerability after researchers uncovered an alarming zero-click exploit chain attributed to…

Kaspersky Uncovers New Chrome 0-Day Actively Exploited

In the latest discovery, Kaspersky Lab exposed a highly sophisticated cyber attack, dubbed “ Operation ForumTroll ,” that leverages a critical zero-d…

IngressNightmare - Critical RCE Vulnerabilities Expose Kubernetes Clusters

Cybersecurity researchers at Wiz ( recently acquired by Google ) have uncovered multiple severe vulnerabilities in the Ingress NGINX Controller for K…

Oracle Cloud Security Breach Exposes 6 Million Records Affecting 140,000 Tenants

A significant security breach at Oracle Cloud has been reported, with a cybercriminal claiming to have stolen approximately 6 million records from Or…

Auth Bypass Vulnerability Disclosed in Next.js Middleware

A critical security vulnerability has been identified in Next.js, the popular React framework, which could allow attackers to bypass authorization ch…

Zero-Click WhatsApp Exploit Used in Paragon Spyware Attacks

In a groundbreaking investigation, Citizen Lab has uncovered a sophisticated spyware operation leveraging a zero-click exploit in WhatsApp to target…

Email Marketing Security: How to Protect Customer Data from Cyber Threats

According to recent studies , email marketing continues to deliver impressive ROI for businesses across industries, with an average return of $36 for…

Chinese APT Group MirrorFace Expands Operations to Europe, Revives ANEL Backdoor

ESET researchers have uncovered a significant shift in tactics by the China-aligned advanced persistent threat (APT) group MirrorFace , which has exp…

Critical Windows Vulnerability Leaks NTLM Hashes Without User Interaction

Security researchers have discovered and documented a critical Windows vulnerability (CVE-2025-24071) that enables attackers to steal authentication …

The Rise of Deepfake Scams: How to Protect Your Finances

The rapid expansion of deepfake technology has introduced a new dimension to financial fraud, posing significant threats to individuals and organizat…