Follow Cyber Kendra on Google News! | WhatsApp | Telegram

Add as a preferred source on Google
Posts

What is VPN, Purpose of VPN and How it works? [2024 Guide]

A Virtual Private Network , commonly called a VPN , has become an essential tool for internet users in today's digital world, who care about priv…

AnyDesk Credentials Up for Sale on Dark Web After Cyberattack

On February 3, 2024, AnyDesk disclosed that they were the victim of a cyberattack which compromised their production systems. Following a public sta…

AnyDesk Confirm it was Hacked

Remote access software company AnyDesk recently disclosed a security incident involving compromised production systems.  In a public statement, AnyDe…

Is AnyDesk Compromise? What's Going on?

There is some noise rising up on X (formerly Twitter) about AnyDesk, one of the most popular remote desktop applications. And this noise is not point…

Ex-CIA Engineer Jailed 40 years over 'Vault 7' Leaks

A former Central Intelligence Agency (CIA) software engineer who was convicted for stealing and leaking classified information in the biggest breach …

Cloudflare Suffers Security Breach After Failing to Rotate Okta Credentials

Cloud services provider Cloudflare disclosed this week that its systems were breached last November by a sophisticated hacker believed to be a nati…

FritzFrog Botnet Expands Attack Arsenal with Log4Shell Exploits

The notorious FritzFrog botnet has added a new exploit to its arsenal: Log4Shell . This finding comes from threat researchers at Akamai, who have bee…

Critical ‘Leaky Vessels’ Vulnerabilities Disclosed in Docker and runC

Security researchers have disclosed multiple high-severity flaws dubbed ‘ Leaky Vessels ’ affecting core container infrastructure components includin…

Two New Zero-Day Flaws Disclosed in Ivanti Products, One Under Active Exploitation

Ivanti, a leading provider of cybersecurity software, has disclosed two new high-severity vulnerabilities affecting its Connect Secure and Policy Sec…

Researchers Find Hundreds of Network Operator Credentials Selling on Dark Web

A recent report from cyber intelligence firm Resecurity has revealed that credentials belonging to hundreds of network operators are being traded on …