Follow Cyber Kendra on Google News! | WhatsApp | Telegram

Security

Researcher Discovers Critical NVIDIA Container Vulnerability

Security researchers at Wiz have uncovered a critical vulnerability (CVE-2024-0132) in NVIDIA's Container Toolkit that could allow attackers to e…

Microsoft Warns of Advanced PowerShell Exploitation by North Korean Actors

Microsoft Threat Intelligence has uncovered a sophisticated new tactic being employed by the North Korean state-sponsored threat group Emerald Sleet,…

Takedown of 8Base Ransomware Crew in Thailand

A coordinated international law enforcement operation has led to the arrest of two Russian nationals who allegedly operated the notorious 8Base ranso…

Apple Patches Actively Exploited USB Security Flaw

Apple has released an urgent security update for iOS 18.3.1 and iPadOS 18.3.1 to address a critical vulnerability that could allow attackers to bypas…

HPE Discloses Major Data Breach by Russian Hackers

Hewlett Packard Enterprise (HPE) has revealed a significant data breach of its Office 365 email environment, attributed to the Russian state-sponsore…

Google Uncover Critical AMD CPU Vulnerability Affecting Confidential Computing

Google's Security Team has disclosed a high-severity vulnerability in AMD's CPU microcode signature verification system, affecting multiple A…

Researchers Warns Abandoned S3 Buckets Pose Massive Supply Chain Risk

In a groundbreaking cybersecurity research conducted in late 2024, Security researchers at watchTowr have uncovered a massive supply chain vulnerabil…

Cisco Webex Connect Flaw Exposed Millions of Chat Histories

A critical security vulnerability in Cisco Webex Connect allowed unauthorized access to millions of customer support chat histories of every organiza…

DeepSeek Database Leak Exposes Sensitive User Data

Security researchers at Wiz Research have uncovered a significant vulnerability in DeepSeek's infrastructure. The vulnerability exposes sensitive…

Coolify Hit by Three RCE Flaws with Maximum CVSS Score

Security researchers have uncovered three critical vulnerabilities in Coolify, the open-source platform used for managing servers, applications, and …

10K WordPress Website Delivers Cross-platform Malware

Security researchers have uncovered a large-scale malware campaign targeting MacOS and Windows users through over 10,000 compromised WordPress websit…

Apple Fix Actively Exploited Zero-Day in iPhone and iPad

Apple has released iOS 18.3 and iPadOS 18.3, introducing significant security improvements with patches for more than 20 vulnerabilities across vari…

Researcher Uncovers Critical Git Credential Theft Vulnerabilities

Critical security vulnerabilities in popular Git-related tools could allow attackers to steal user credentials, according to research published by G…

Microsoft Patches Critical BitLocker Vulnerability Enabling Data Extraction

Security researchers have disclosed a significant vulnerability in Microsoft BitLocker, the full-disk encryption feature in Windows, which could allo…

Critical Vulnerability in SonicWall SMA1000 Devices Actively Exploited

SonicWall has issued an urgent security advisory for a critical vulnerability affecting its SMA1000 series appliances, which is actively being explo…

Critical Zero-Click Vulnerability in Windows OLE Poses Widespread Risk

Microsoft has addressed a severe security vulnerability ( CVE-2025-21298 ) in Windows Object Linking and Embedding ( OLE ) that could allow attackers…

Cookie Sandwich - New Attack Steals HttpOnly Cookies

A concerning new web security vulnerability dubbed " Cookie Sandwich " has been discovered that allows attackers to bypass HttpOnly cookie …

Critical 7-Zip Vulnerability Bypasses Windows Security

A high-severity vulnerability has been discovered in the popular file compression tool 7-Zip, potentially enabling attackers to bypass crucial Window…

Critical Vulnerabilities Discovered in SimpleHelp Remote Support Software

Security researchers at Horizon3.ai have uncovered three critical vulnerabilities in SimpleHelp, a remote support software solution used globally. T…

Attackers Discover APIs in 29 Seconds and Steal 10m User Entities in a Minute

Wallarm, the recognized leader in API security, has built a globally distributed API honeypot spanning 14 locations. It baits attackers by simulating…