Latest Cybernews
														Google Introduces End-to-End Encryption for Gmail Users
Google has launched a beta version of end-to-end encryption for Gmail, enhancing email security by ensuring that only the sender and recipient can access the content, while preventing Google from viewing inboxes.
 View full story…
														Cybercriminals Exploit Lookalike Domains for Financial Fraud
Cybercriminals are increasingly using lookalike domains and spoofed websites to execute targeted email-based social engineering and financial fraud across various sectors, including finance, legal services, insurance, and construction.
 View full story…
														Sophisticated Multi-Stage Phishing Attack Targets Microsoft Teams Users
A sophisticated multi-stage phishing attack leveraging vishing, remote access tools, and DLL sideloading has been identified, exploiting Microsoft Teams and Quick Assist to deploy a JavaScript-based command-and-control backdoor on victim devices.
 View full story…
														Ukrzaliznytsia Cyber-Attack Highlights Vulnerabilities in Critical Infrastructure
Ukrzaliznytsia, Ukraine’s state-owned railway operator, suffered a significant cyber-attack attributed to Russian intelligence services, disrupting its digital services and prompting increased physical ticket sales while investigations into the incident continue.
 View full story…
														Oracle Cloud Suffers Major Data Breach Affecting 6 Million Users
A hacker group named Rose87168 claimed responsibility for breaching Oracle Cloud’s federated SSO servers, compromising approximately 6 million user records and exposing sensitive data due to a zero-day vulnerability.
 View full story…
														Critical Vulnerabilities Found in WP Ultimate CSV Importer Plugin
Two severe security flaws, CVE-2025-2007 and CVE-2025-2008, in the WP Ultimate CSV Importer plugin for WordPress could expose around 20,000 websites to remote code execution and file deletion attacks.
 View full story…
Latest Cybernews
														Web Application Firewalls: Essential Protection Against Online Threats
Web Application Firewalls (WAFs) are critical security tools that monitor and block malicious traffic to safeguard web applications from vulnerabilities such as SQL injections and cross-site scripting.
 View full story…
														US Authorities Seize $8.2 Million in Tether from Romance Baiting Scams
US authorities have seized over $8.2 million in Tether (USDT) linked to romance baiting scams, highlighting the effectiveness of advanced tracing tools and legal measures in combating financial fraud.
 View full story…
														The Rise Of Shadow AI: Opportunities And Risks For Organizations
A recent study reveals that 50% of employees use unsanctioned AI tools, highlighting the need for organizations to develop comprehensive strategies to manage associated risks while leveraging potential benefits.
 View full story…
														Urgent Warning Issued for Critical Next.js Vulnerability CVE-2025-29927
The UK’s National Cyber Security Centre has alerted users to a severe authorization bypass vulnerability in Next.js that allows unauthorized access to sensitive resources, with active exploitation reported.
 View full story…
Latest Cybernews
														Vulnerabilities in Solar Power Systems Threaten Global Power Grid Stability
Recent research reveals critical vulnerabilities in major solar power manufacturers, including Sungrow and Growatt, that could enable cyber-attacks leading to significant disruptions and blackouts in global power grids.
 View full story…
														Website Security Services Essential for Protecting Against Online Threats
A website is employing security services to defend against online attacks by identifying and blocking suspicious activities that could compromise user data.
 View full story…