Follow Cyber Kendra on Google News! | WhatsApp | Telegram

Add as a preferred source on Google
Posts

Facebook and GitHub Comes up Together to Remove Leaked API Tokens

Facebook security team officially joins partnership with GitHub team to search and invalidate the Facebook API access tokens that have been accidenta…

The Latest Bluetooth vulnerability can Expose your location

Researchers at the University of California San Diego have found a way to track a phone based on its Bluetooth signal. The UCSD researchers focused o…

Robinhood Data Breach Exposed 5 million Customers Data

The popular investment and trading platform, Robinhood reported a data breach where hackers gained access to millions of its customers’ email address…

Exploit Code for BrakTooth Vulnerability released Online

The Cybersecurity and Infrastructure Security Agency (CISA) has warned that the PoC code for the BrakTooth vulnerability in Bluetooth is already av…

Telegram Introduce Ad Service for its Channels

The founder of the Telegram messenger Pavel Durov announced that the launch of a paid subscription, which turns off official advertising in channels,…

US Government Wants Signal User's Private Data

The developer of the secure messenger Signal said that the Santa Clara County police wanted to obtain very specific personal information about certai…

Zero-Day Exploit for Windows LPE Published

A security researcher, named Abdelhamid Naceri has published technical details and a demo exploit for an unpatched Windows vulnerability that allows …

Microsoft Disclose Critical LPE Bug in MacOS

Microsoft experts have disclosed details about the vulnerability in macOS, which they duly notified Apple about and which the Apple company has alrea…

2 Million Worth Bug in Polygon Blockchain Network

A security expert discovered a critical vulnerability in Polygon's second-tier solution that could lead to losses of $ 850 million. The project p…

Guide to Data Security When Managing Offshore Teams

Tech has served as a blessing in several ways but as soon as it comes to data security, it becomes easy to count different ways where we were doomed …