Follow Cyber Kendra on Google News! | WhatsApp | Telegram

Posts

Exploit Code for BrakTooth Vulnerability released Online

The Cybersecurity and Infrastructure Security Agency (CISA) has warned that the PoC code for the BrakTooth vulnerability in Bluetooth is already av…

Telegram Introduce Ad Service for its Channels

The founder of the Telegram messenger Pavel Durov announced that the launch of a paid subscription, which turns off official advertising in channels,…

US Government Wants Signal User's Private Data

The developer of the secure messenger Signal said that the Santa Clara County police wanted to obtain very specific personal information about certai…

Zero-Day Exploit for Windows LPE Published

A security researcher, named Abdelhamid Naceri has published technical details and a demo exploit for an unpatched Windows vulnerability that allows …

Microsoft Disclose Critical LPE Bug in MacOS

Microsoft experts have disclosed details about the vulnerability in macOS, which they duly notified Apple about and which the Apple company has alrea…

2 Million Worth Bug in Polygon Blockchain Network

A security expert discovered a critical vulnerability in Polygon's second-tier solution that could lead to losses of $ 850 million. The project p…

Guide to Data Security When Managing Offshore Teams

Tech has served as a blessing in several ways but as soon as it comes to data security, it becomes easy to count different ways where we were doomed …

Apache HTTP Zero-day CVE-2021-41773 fix Bypassed With CVE-2021-42013

A couple of days back we have reported a  Path Traversal Vulnerabilities (CVE-2021-41773) in Apache HTTP Server 2.4.49 , which was exploited in wild…

Twitch Hacked: Source Code and Creators Earnings Leaked

Twitch seems to have been hacked, leaking source code for the company’s streaming service, an unreleased Steam competitor from Amazon Game Studios, a…

Apache web servers Flaw allows Hacker Access Root Files

A flaw was found in a change made to path normalization in Apache HTTP Server 2.4.49. An attacker could use a path traversal attack to map URLs to ac…