You can now find Cyber Kendra on Google News!

Vulnerability

Critical Vulnerability in Arc Browser's Legacy Boost Feature Patched

A security researcher identified a significant vulnerability in the Arc browser that could have allowed attackers to gain write access to a user'…

Citrix Patches Unauthenticated RCE Flaw in Virtual Apps and Desktops

Citrix has released security updates to address two vulnerabilities in its Virtual Apps and Desktops Session Recording feature that could allow attac…

Okta Patches Critical Authentication Bypass in AD/LDAP Integration

Okta has patched a critical vulnerability in its AD/LDAP Delegated Authentication system that could allow unauthorized access to accounts with usern…

Research Exposes Cryptographic Vulnerabilities in E2EE Cloud Storage Systems

Researchers from ETH Zurich, Jonas Hofmann and Kien Tuong Truong uncovered significant security flaws in five popular end-to-end encrypted (E2EE) clo…

Palo Alto Networks Warns of Firewall Hijack Flaw

Palo Alto Networks has disclosed multiple critical vulnerabilities in its Expedition tool that could allow attackers to hijack PAN-OS firewalls. Acco…

Arc Browser Patched Critical No User Interaction Flaw - Update Now!

A significant vulnerability was discovered in the Arc browser, developed by The Browser Company. The flaw, now identified as CVE-2024-45489, potentia…

Security Flaw Exposed in Airport Crew Verification System

A critical vulnerability in an airport security system that verifies airline crew members has been uncovered by cybersecurity researchers. The flaw c…

Telegram for Android Hit by "EvilVideo" Zero-Day Exploit

Security researchers at ESET have uncovered a zero-day exploit targeting the Android version of the popular messaging app Telegram. The vulnerability…

Critical ServiceNow Vulnerabilities Allow Full Database Access to Hackers

Security researchers at Assetnote have uncovered a chain of vulnerabilities in ServiceNow, a widely used platform for business transformation and au…

SnailLoad - New Side-Channel Network Latency Attack

Researchers at Graz University of Technology have unveiled a novel side-channel attack technique named " SnailLoad ." This innovative appr…

regreSSHion - Critical Remote Code Execution Vulnerability Discovered in OpenSSH

Security researchers at Qualys have uncovered a severe vulnerability in OpenSSH , one of the most widely used secure communication protocols on the i…

Critical Auth Bypass Flaw Discovered in Progress MOVEit Transfer Software

Security researchers from Watchtowr have uncovered a severe authentication bypass vulnerability in Progress MOVEit Transfer, a widely-used enterprise…

NVIDIA Fixed Critical Vulnerabilities in Triton AI Server

In a concerning discovery for the artificial intelligence industry, cybersecurity researchers have uncovered two critical vulnerabilities in NVIDIA&#…

VMware Releases Critical Security Updates to Fix Severe Vulnerabilities

VMware has released urgent security updates to address multiple critical vulnerabilities affecting VMware vCenter Server and VMware Cloud Foundation …

SolarWinds Patches Critical Vulnerability in Serv-U File Transfer Solution

SolarWinds has fixed a critical vulnerability in SolarWinds' widely-used Serv-U managed file transfer server that could allow remote attackers to…

[CVE-2024-3400] Palo Alto Networks Firewall Vulnerability Exploited in the Wild

In a startling revelation, cybersecurity firms Volexity and watchTowr have reported that a critical zero-day vulnerability in Palo Alto Networks Glob…

"BatBadBut" Vulnerability Discovered in Rust Standard Library on Windows

A critical security vulnerability, dubbed " BatBadBut ," has been discovered in the Rust standard library, affecting all versions before 1.…

Newly Uncovered "Branch History Injection" Attack Bypass Spectre Mitigations

A team of cybersecurity researchers has unveiled a new variant of the notorious Spectre v2 vulnerability , dubbed " Branch History Injection &qu…

New HTTP/2 Vulnerability Poses Severe Threat to Server Availability

A recently discovered class of vulnerabilities within numerous HTTP/2 protocol implementations, dubbed the "CONTINUATION Flood," has been f…