Articles tagged "Google"

Found 81 articles

A new variant of the NGate malware is targeting Android users by disguising itself within a trojanized version of HandyPay, a legitimate mobile payment app. This malware is designed to steal NFC payment data, posing a significant risk to users who rely on their smartphones for transactions. By embedding itself in a trusted application, attackers are increasing the chances that unsuspecting users will download and use the malicious version. Users of Android devices should be cautious about installing apps from unofficial sources and ensure they are using the latest security updates to protect their sensitive financial information. The implications of this malware are serious, as it could lead to unauthorized transactions and financial loss for those affected.

Impact: Android devices using the HandyPay app
Remediation: Users should avoid downloading apps from unofficial sources and keep their devices updated with the latest security patches.
Read Original

Vercel experienced a security breach due to a compromise of a third-party AI tool called Context.ai, which was being used by one of its employees. The breach occurred when attackers gained access to the employee's Google Workspace account, enabling them to infiltrate limited internal systems and access non-sensitive data. While the breach did not expose highly sensitive information, it raises concerns about the security of third-party tools and their impact on corporate networks. Vercel has reported this incident, and it serves as a reminder for companies to scrutinize the security measures of any external tools they integrate into their operations. Users and organizations relying on third-party applications must remain vigilant to protect their data and systems.

Impact: Vercel internal systems, Google Workspace accounts, Context.ai tool
Remediation: Companies should review and tighten security protocols for third-party tools, monitor employee accounts for suspicious activity, and implement multi-factor authentication where possible.
Read Original

Google has agreed to pay $135 million in a settlement related to allegations that it collected data from Android phone users without their consent. The lawsuit claims that the company transmitted users' information over cellular connections even when they believed their data was secure. Affected users can file a claim to receive a portion of the settlement. This case raises important questions about user privacy and data handling practices, as many individuals may not be aware of how their data is being used. If you have an Android phone, it’s worth checking if you qualify to claim your share of this settlement.

Impact: Android phones
Remediation: N/A
Read Original

Researchers have discovered that 100 Chrome extensions, published through five different accounts, are part of a coordinated campaign designed to steal user data and create backdoors. These malicious extensions utilize shared command and control (C&C) infrastructure, indicating a well-organized effort by the attackers. Users who have installed these extensions are at risk of having their data compromised, which could lead to identity theft or other forms of online fraud. This incident serves as a reminder for users to be cautious when installing browser extensions and to regularly review their installed add-ons for any suspicious activity. The findings underscore the need for enhanced scrutiny of browser extensions to protect user privacy and security.

Impact: Google Chrome extensions
Remediation: Users should remove the affected extensions immediately and consider resetting their browser settings. Regularly review and audit installed extensions for any that seem suspicious.
Read Original

Security researchers have identified a new Android banking trojan called Mirax, which is targeting users across Europe. This malware utilizes a method known as Malware-as-a-Service (MaaS) to infect devices, allowing cybercriminals to gain remote access and turn affected smartphones into residential proxy nodes. By doing this, attackers can route their malicious activities through the compromised devices, making it harder to trace their actions back to them. This poses a significant risk to users, as their personal data and banking information could be at risk. The emergence of Mirax highlights ongoing vulnerabilities in mobile security and the need for users to remain vigilant against such threats.

Impact: Android devices
Remediation: Users should ensure their devices are protected with up-to-date security software, avoid downloading apps from untrusted sources, and regularly monitor their bank accounts for suspicious activity.
Read Original

Google is enhancing the security of its Pixel smartphones by focusing on the cellular baseband modem, which is responsible for mobile network communication. In the previous Pixel 9 model, the company implemented measures to mitigate memory-related vulnerabilities. With the upcoming Pixel 10, Google is taking further steps by incorporating a DNS parser built in the Rust programming language into the modem firmware. This change aims to bolster the device's defenses against potential exploitation of the modem, which can process external data. By addressing these vulnerabilities, Google is working to protect users from possible attacks that could compromise their devices through the modem interface.

Impact: Google Pixel 10 smartphones
Remediation: N/A
Read Original

In the latest update, Chrome version 147 has addressed a total of 60 vulnerabilities, including two that are classified as critical. These critical flaws are linked to the browser's WebML component and were reported by anonymous researchers. The vulnerabilities are significant enough that they come with a combined bounty of $86,000 for anyone who can exploit them. Users of Chrome should ensure they are using the updated version to protect against potential attacks. Regular updates like this are crucial as they help safeguard users from newly discovered security risks.

Impact: Chrome version 147 and earlier versions
Remediation: Update to Chrome version 147 or later
Read Original

A recently patched vulnerability in the EngageLab SDK, a third-party software development kit used in many Android applications, has potentially exposed the private data of around 50 million users, including 30 million cryptocurrency wallet holders. The flaw allowed apps on the same device to bypass Android's security measures, enabling unauthorized access to sensitive information. This incident raises significant concerns about the security of users' cryptocurrency assets, as the compromised data could have led to theft or fraud. Developers using the EngageLab SDK are urged to update their applications to protect users from potential attacks. The vulnerability was identified and addressed, but users should remain vigilant about app permissions and security practices.

Impact: EngageLab SDK used in various Android applications, particularly cryptocurrency wallets
Remediation: Developers should update their applications using the EngageLab SDK to the latest patched version as soon as possible.
Read Original

Google's threat intelligence team has identified a new extortion group known as UNC6783, which appears to be linked to the Raccoon persona. This group is specifically targeting Business Process Outsourcing (BPO) companies and helpdesk services, indicating a shift in focus towards sectors that handle sensitive customer data. The group's tactics may involve ransomware or other extortion methods, which poses significant risks to affected organizations. Companies in the BPO sector should be vigilant and enhance their security measures to protect against potential breaches and data leaks. As this threat evolves, understanding the methods and motivations behind it will be crucial for businesses in these industries.

Impact: BPO companies, helpdesk services, enterprises handling sensitive customer data
Remediation: Companies should enhance security protocols, conduct regular security audits, and train staff on recognizing phishing attempts and other social engineering tactics.
Read Original

Researchers at Google DeepMind have identified six types of web-based attacks that can target autonomous AI agents. These attacks exploit malicious web content to manipulate AI behavior, potentially leading to harmful consequences. The study emphasizes how AI agents, which increasingly navigate the internet autonomously, can be misled by deceptive information, resulting in unexpected actions. This research highlights the need for stronger security measures to protect AI systems from manipulation. As AI continues to be integrated into various applications, understanding these vulnerabilities is crucial for developers and organizations relying on AI technology.

Impact: Autonomous AI agents
Remediation: Implement security measures to validate and filter web content accessed by AI agents.
Read Original

Kaspersky has reported that SparkCat malware has resurfaced on app stores, specifically targeting cryptocurrency users in Asia. This malware has been found in applications available for both iOS and Android devices. Users downloading these apps may unknowingly expose their sensitive information, such as cryptocurrency wallet details, to attackers. This resurgence is particularly concerning given the increasing popularity of cryptocurrency among users, making them prime targets for cybercriminals. As the malware spreads, it underlines the need for users to be vigilant about the apps they download and the permissions they grant.

Impact: iOS and Android applications targeting cryptocurrency users
Remediation: Users should verify the legitimacy of apps before downloading, avoid apps from untrusted sources, and regularly update their devices with the latest security patches.
Read Original
Storm Infostealer Sold as Service, Targets Browsers, Wallets and Accounts

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

Recent research from Varonis Threat Labs has identified a new cybersecurity threat called Storm infostealer, which operates as a subscription service. This malicious software is designed to bypass the encryption used by Google Chrome, putting users' sensitive information at risk. It primarily targets web browsers, cryptocurrency wallets, and various online accounts. This is concerning because it can lead to identity theft and financial loss for affected individuals. As this service gains traction, it raises alarms about the potential for widespread exploitation of personal data.

Impact: Google Chrome, cryptocurrency wallets, online accounts
Remediation: Users should ensure their browsers and wallets are up-to-date and consider using additional security measures such as two-factor authentication. Regularly monitoring account activity is also recommended.
Read Original

The latest ThreatsDay Bulletin highlights a range of pressing cybersecurity threats impacting various systems. Researchers are reporting on the alarming trend of chaining together minor vulnerabilities to create significant backdoors, which could allow attackers to gain unauthorized access. Additionally, there are ongoing concerns about Android rootkits and methods for evading AWS CloudTrail logging, raising red flags for cloud security. These developments underscore the need for organizations to stay vigilant and proactive in patching software and monitoring their systems for unusual activity. With cyber threats evolving quickly, it’s crucial for companies to keep their defenses updated and educate their teams on the latest risks.

Impact: Android devices, AWS CloudTrail, various software with known vulnerabilities
Remediation: Regularly update software, patch known vulnerabilities, monitor for unusual activity
Read Original

Google has released a series of updates to address 21 vulnerabilities in its Chrome browser, including a significant zero-day flaw identified as CVE-2026-5281. This vulnerability affects the Dawn component of Chrome and has been exploited in the wild, which means attackers are actively taking advantage of it. Users of Chrome are urged to update their browsers to the latest version to protect themselves against potential exploits. Keeping browsers up to date is crucial as these vulnerabilities can allow unauthorized access or manipulation of user data. The timely patching of such vulnerabilities emphasizes the ongoing need for vigilance in maintaining cybersecurity.

Impact: Google Chrome browser, specifically the Dawn component, affected versions unspecified.
Remediation: Users should update their Chrome browser to the latest version to mitigate the risks associated with CVE-2026-5281 and the other vulnerabilities.
Read Original
Actively Exploited

Google has addressed 21 vulnerabilities in its Chrome browser, including a serious zero-day flaw identified as CVE-2026-5281. This vulnerability is categorized as a use-after-free (UAF) issue in Dawn, which is part of the WebGPU standard utilized by Chromium and its derivatives. While specific details about the exploitation of this flaw are scarce, the fact that it has been flagged as 'in-the-wild' suggests that attackers are actively using it. Users of Chrome and other Chromium-based browsers should ensure they are running the latest versions to protect themselves from potential attacks. Keeping browsers updated is crucial because such vulnerabilities can lead to unauthorized access or other malicious activities.

Impact: Google Chrome, Chromium-based browsers, Dawn (WebGPU implementation)
Remediation: Users should update their Chrome browsers to the latest version to mitigate the risks associated with CVE-2026-5281.
Read Original
Page 1 of 6Next