Follow Cyber Kendra on Google News! | WhatsApp | Telegram

Add as a preferred source on Google
Security

AI Autonomously Discovers Critical Zero-Day Threatening 70,000+ Industrial Networks

Tens of thousands of industrial networks just became vulnerable targets after an autonomous AI security agent discovered a critical zero-day flaw in …

Critical Flaw in Dropbear SSH Puts Millions of Routers and IoT Devices at Risk

Security researchers have disclosed a severe privilege escalation vulnerability in Dropbear SSH that could allow authenticated users to gain root acc…

MongoDB's No-Login Memory Leak Exposes Years of Database Deployments

MongoDB has rushed patches for a high-severity vulnerability that transforms the database giant's compression feature into an open door for memor…

Three Patches, Zero Fix: WordPress Cache Plugin's Persistent RCE Nightmare

Security researchers have uncovered a security bug with three successive patches for same vulnerability in W3 Total Cache—one of WordPress's most…

Critical n8n Flaw Exposes Thousands of Workflow Automation Servers to Remote Takeover

A severe security vulnerability in n8n, the rapidly growing open-source automation platform, has left thousands of self-hosted servers vulnerable to …

HPE's IT Management Platform Exposes Thousands of Enterprises to Perfect-Score Exploit

IT administrators managing HPE infrastructure just got an urgent wakeup call. A vulnerability in HPE OneView—the centralized dashboard that controls …

First Rust Vulnerability in Linux Kernel Proves Memory Safety Isn't Bulletproof

The Linux kernel's ambitious experiment with Rust—a language championed for preventing memory bugs—has hit its first security vulnerability, reve…

Apple and Google Patch Critical Zero-Days Used in Sophisticated Attacks

Apple and Google have issued emergency security updates after discovering two zero-day vulnerabilities actively exploited in highly targeted attacks …

Samsung Galaxy Hit by Zero-Click WhatsApp Spyware Through an Images

Sophisticated zero-click attack exploited Samsung's image processing library for months before detection Google's Project Zero team has unvei…

Critical FreePBX Flaws Expose Business Phone Systems to Complete Takeover

Security researchers have uncovered a trio of severe vulnerabilities in FreePBX, an open-source business phone system management platform, that could…

The Future of Email Protection: Key Features Your Security Software Must Have

Email is still one of the most common ways for people to talk, work, and send important files. But it has also become one of the easiest things for h…

React Patches Two New Flaws Following React2Shell Chaos

Two additional vulnerabilities discovered in React Server Components after critical React2Shell disclosure ; immediate patches required Security rese…

Hackers Exploit ChatGPT's Share Feature to Spread AMOS Infostealer on macOS

Cybercriminals have weaponized ChatGPT's legitimate chat-sharing feature to distribute the AMOS infostealer, creating a deceptively trustworthy i…

13-Year-Old QEMU Bug Enabled Guest-to-Host Escape Attacks

A critical vulnerability that lurked in QEMU virtualization software for over a decade has been exposed, allowing attackers to break out of virtual m…

React2Shell Exploited: CISA Issues Emergency Patch Order

The React2Shell vulnerability saga has evolved from disclosure to active warfare in just 72 hours, with Chinese state-sponsored threat groups launch…

Over 1 Million AI-Generated Explicit Images Exposed in MagicEdit Security Breach

A Silicon Valley-based AI image generator has exposed over 1 million user-generated images in an unprotected database, including explicit deepfakes a…

Critical React2Shell Vulnerability Exposes Millions of React Apps to Unauthenticated RCE

A critical security vulnerability in React Server Components is putting millions of web applications at immediate risk, with security researchers war…

AI Agents Successfully Exploit $4.6 Million in Blockchain Smart Contracts

Advanced AI models have demonstrated they can autonomously discover and exploit real-world software vulnerabilities, successfully extracting $4.6 mil…

Hackers Exploit Novel SQLite Attack to Compromise Synology Storage Devices

Security researchers have uncovered a critical vulnerability chain in Synology BeeStation devices that allows attackers to gain complete system contr…

Sha1-Hulud 2.0: Destructive Worm Hijacks 25,000+ GitHub Repos in Massive NPM Supply Chain Attack

Over 700 npm packages compromised as self-replicating malware targets developer credentials across Zapier, PostHog, Postman, and ENS Domains—with a s…