Follow Cyber Kendra on Google News! | WhatsApp | Telegram

Add as a preferred source on Google
Posts

Hackers' Mistake makes Stolen Data became Available through Google

Hackers, who attacked thousands of organizations around the world in a massive phishing campaign, forgot to protect their catch, as a result of which…

Malwarebytes also Hacked by SolarWinds Hackers

Security researchers from cybersecurity firm Malwarebytes have confirmed that the cybercriminals responsible for the attack on SolarWinds' supply…

Hackers Hacked IObit Forum to Distribute Ransomware

IObit has been the victim of a large-scale cyberattack aimed at distributing the DeroHE ransomware among its forum participants. IObit is a software …

Zerologon Vulnerability Patch Force Deployment Commences February

Microsoft has warned system administrators that pushing security updates that fix a vulnerability in Windows called Zerologon will begin next month. …

Vulnerability in Windows 10 Damages Hard Drive after Viewing a File

Vulnerability in Microsoft Windows 10 could allow attackers to damage an NTFS-formatted hard drive using a one-line command. A single line file can b…

Microsoft Patches Microsoft Defender Zero-day Vulnerability

On Tuesday, January 12th, Microsoft released the first scheduled security updates for its products this year. The January patches fix a total of 83 v…

SolarLeaks Site Claims to Sell Data Stolen in SolarWinds Attacks

Yesterday, a website "SolarLeaks" came online and selling data that they claim  was stolen form the victims who have confirmed to have been…

Largest Underground Darknet Marketplace DarkMarket Shutdown

Law enforcement officials in the cities of Koblenz and Oldenburg, Germany, reported neutralizing "arguably the largest illegal market on the da…

Microsoft Update Sysmon with New Features

The new version of Sysmon 13 is capable of detecting malicious code that uses methods to bypass security solutions. Microsoft has released another ve…

New attack lets you Clone Google Titan and YubiKey Security Key

A vulnerability in devices allows recovery of the primary encryption key and bypassing two-factor authentication. French security researchers at Ninj…