Follow Cyber Kendra on Google News! | WhatsApp | Telegram

Add as a preferred source on Google
Posts

5 Ways AI is Making Phishing Attacks More Dangerous in 2025

On September 24, Microsoft's Threat Intelligence team published findings that should keep every CISO awake at night. They'd detected and blo…

Hackers Exploit Cisco Firewall Zero-Days, CISA Issues Emergency Directive

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued Emergency Directive, ordering federal agencies to immediately identify an…

XCSSET Malware Returns with Advanced Clipboard Hijacking to Steal Crypto Wallets

A sophisticated new variant of the XCSSET malware is targeting macOS developers through infected Xcode projects, introducing dangerous clipboard hija…

Critical ForcedLeak Flaw Lets Attackers Steal Salesforce Customer Data

Security researchers have uncovered a critical vulnerability in Salesforce's AI-powered Agentforce platform that allowed attackers to steal sensi…

Cisco Patches Critical IOS Zero-Day Under Active Attack—Millions of Network Devices at Risk

Cisco has released emergency security patches for a critical zero-day vulnerability in its IOS and IOS XE software that attackers are actively exploi…

WhatsApp Finally Brings Ads to Your Updates Tab—Here's What Changes

WhatsApp has officially begun rolling out advertisements in its Updates tab, marking the messaging giant's first major step into monetizing its m…

Microsoft 365 Copilot adds Claude AI models

Microsoft has shattered the single-vendor AI approach by integrating Anthropic's Claude models into Microsoft 365 Copilot, giving millions of ent…

UK Arrests Suspect in Global Airport Ransomware Attack

A major international investigation into a ransomware attack that disrupted airports worldwide has led to the first arrest, as authorities work to di…

China Backed BRICKSTORM Malware Targets US Tech

Sophisticated threat group exploits network appliances lacking security tools to steal secrets and potentially develop zero-day exploits A China-nexu…

Why Secure Connectivity Is Becoming Essential in Cybersecurity and IT Systems

A glance across the current IT landscape will reveal a clear trend. Systems are sprawling. Devices multiply, connections snake in every direction, an…