Articles tagged "Google"

Found 52 articles

Google Gemini AI Tricked Into Leaking Calendar Data via Meeting Invites

Hackread – Cybersecurity News, Data Breaches, AI, and More

Researchers at Miggo Security discovered a vulnerability in Google Gemini that allows attackers to exploit calendar invites to extract private user data. This flaw enables a silent attack method, where the malicious actor can trick the AI into leaking sensitive information without raising alarms. The implications of this vulnerability are significant, as it could compromise users' personal schedules and confidential details stored within their calendar apps. Google users relying on Gemini for scheduling and other functions may be particularly at risk. It's crucial for users and organizations to be aware of this issue and take necessary precautions to safeguard their data.

Impact: Google Gemini, Google Calendar
Remediation: Users should review their calendar sharing settings and be cautious when accepting invites from unknown sources.
Read Original

Researchers have discovered 17 malicious browser extensions associated with the GhostPoster campaign that have been installed over 840,000 times across Chrome, Firefox, and Edge stores. These extensions are designed to hijack users' browsing sessions and can potentially lead to data theft or other malicious activities. The widespread installation indicates that many users may have unknowingly compromised their security by downloading these harmful extensions. It's crucial for users to regularly check their installed extensions and remove any that seem suspicious. The incident raises concerns about the security measures in place within browser extension stores and the need for more stringent vetting processes to protect users from such threats.

Impact: Chrome, Firefox, Edge browsers
Remediation: Users should uninstall any suspicious browser extensions and regularly review their installed extensions for potential threats.
Read Original

A new vulnerability known as the WhisperPair attack has been discovered, affecting millions of Bluetooth audio accessories that improperly implement Google's Fast Pair technology. This flaw allows attackers to hijack devices, potentially leading to unauthorized access to audio streams and user data. Products impacted include various Bluetooth headphones, earbuds, and speakers from multiple manufacturers. The significance of this issue lies in the widespread use of Bluetooth audio devices, making many users susceptible to exploitation. Users are urged to check for updates from their device manufacturers to mitigate the risk.

Impact: Bluetooth audio accessories using Google Fast Pair technology from various manufacturers.
Remediation: Users should update their Bluetooth audio devices to the latest firmware provided by manufacturers.
Read Original

The Black Lotus Labs team at Lumen Technologies has taken significant action against the AISURU and Kimwolf botnets by null-routing over 550 command-and-control (C2) servers since early October 2025. These botnets have gained notoriety for their ability to commandeer devices and use them in distributed denial-of-service (DDoS) attacks. By cutting off access to these C2 nodes, researchers aim to disrupt the operations of these botnets, which primarily target Android devices. This move is crucial as it not only protects potential victims from being exploited but also highlights the ongoing battle against cybercriminals who leverage such networks for malicious activities. The impact of these botnets underscores the need for continued vigilance in cybersecurity practices, especially for users of vulnerable devices.

Impact: Android devices, AISURU botnet, Kimwolf botnet
Remediation: Null-routed traffic to command-and-control nodes; users should ensure their devices are updated and secure.
Read Original

Recent updates to Chrome and Firefox have patched 26 security flaws, including several high-severity vulnerabilities that could allow attackers to execute arbitrary code. Chrome version 144 and Firefox version 147 are now available, and users are strongly encouraged to update their browsers to protect against potential exploits. These vulnerabilities can affect a wide range of users, making it crucial for individuals and organizations to stay current with software updates. Ignoring these patches could leave systems open to attacks that might compromise sensitive data or disrupt operations. The updates not only fix the bugs but also enhance overall browser security, which is vital in today’s digital landscape.

Impact: Chrome 144, Firefox 147
Remediation: Update to Chrome 144 or Firefox 147
Read Original

APT28, a Russian cyber espionage group, has been observed targeting entities involved in energy research and defense collaboration. The group has employed tactics that involve impersonating well-known webmail and VPN services, including Microsoft OWA, Google, and Sophos VPN portals, to deceive users into revealing sensitive information. This attack is significant as it aims to infiltrate organizations that play a critical role in energy security and defense, potentially leading to the theft of valuable research and intelligence. The ongoing nature of these attacks poses a serious risk to national security and the integrity of the affected sectors, highlighting the need for organizations to enhance their cybersecurity measures. Users should be cautious and verify the authenticity of services before entering any sensitive information.

Impact: Microsoft OWA, Google services, Sophos VPN
Remediation: Organizations should implement multi-factor authentication, educate users on recognizing phishing attempts, and ensure that all software is up to date with the latest security patches.
Read Original

Cybersecurity researchers have identified two malicious Chrome extensions that have collectively attracted over 900,000 users. These extensions, named 'Chat GPT for Chrome with GPT-5' and 'Claude Sonnet & DeepSeek AI,' are designed to steal conversations from OpenAI's ChatGPT and DeepSeek, along with users' browsing data. The stolen information is sent to servers controlled by the attackers. This incident raises significant concerns about user privacy and data security, as many individuals may unknowingly be exposing sensitive information through these extensions. Users are urged to remove these extensions immediately and review their online security practices to protect their data.

Impact: ChatGPT, DeepSeek, Chrome Web Store
Remediation: Users should remove the malicious extensions from their browsers and monitor their accounts for any unusual activity.
Read Original

A serious vulnerability in Dolby's software for Android devices has been identified, tracked as CVE-2025-54957. Discovered by Google researchers in October 2025, this flaw could potentially allow attackers to exploit the Dolby audio processing capabilities on affected devices. Users of Android devices utilizing Dolby technology should be particularly cautious, as the vulnerability poses risks to their audio functionality and overall device security. Immediate action is recommended to ensure that devices are updated to the latest software versions that include the necessary patches to fix this issue. This discovery emphasizes the need for regular updates and vigilance among users and security teams alike.

Impact: Android devices using Dolby audio processing technology.
Remediation: Users should update their Android devices to the latest versions that include patches for CVE-2025-54957. Regularly checking for software updates is advised to mitigate the risk associated with this vulnerability.
Read Original

The Kimwolf Android botnet has expanded significantly, now comprising around 2 million devices. This botnet primarily targets residential proxy networks, allowing its operators to profit through various means, including launching Distributed Denial of Service (DDoS) attacks, installing applications without user consent, and selling proxy bandwidth. The growth of this botnet poses serious risks to users, as it can lead to unauthorized use of their devices and potential data breaches. It also raises concerns for internet service providers and businesses that may be targeted by DDoS attacks. The situation highlights the ongoing challenges in securing IoT devices and the need for users to be vigilant about their device security.

Impact: Android devices, residential proxy networks
Remediation: Users should ensure their devices are secured with up-to-date software, avoid installing unverified applications, and consider using security solutions that can detect and mitigate botnet activities.
Read Original

Researchers have discovered a phishing campaign that leverages Google Cloud Application Integration to send emails that mimic legitimate messages from Google. This scheme uses a combination of trusted cloud services, user validation checks, and brand impersonation to trick users into believing the emails are authentic. The attackers aim to capture sensitive information by exploiting the trust associated with Google’s brand. This incident raises concerns for both individuals and organizations that rely on Google services, as it highlights the vulnerabilities in cloud-based email systems. Users are advised to be cautious and verify the authenticity of emails, especially those requesting sensitive data or actions.

Impact: Google Cloud Application Integration, Google email services
Remediation: Users should verify the authenticity of emails before responding or providing sensitive information. Organizations can implement additional security measures like email filtering and user training to recognize phishing attempts.
Read Original

Researchers have identified a campaign dubbed 'Zoom Stealer' that targets users of popular web browsers, specifically Chrome, Firefox, and Microsoft Edge. This attack has already impacted around 2.2 million users through 18 malicious browser extensions. These extensions are designed to gather sensitive information related to online meetings, including URLs, IDs, topics, descriptions, and even embedded passwords. The implications of this data theft are significant, as it can lead to unauthorized access to corporate meetings and sensitive discussions. Companies using these browsers should be vigilant and consider removing any unverified extensions to protect their data.

Impact: Chrome, Firefox, Microsoft Edge users; 18 malicious browser extensions
Remediation: Users should remove any suspicious or unverified browser extensions and ensure their browsers are updated to the latest versions.
Read Original

Users of the Trust Wallet Chrome extension have reported significant cryptocurrency losses after a malicious update was released on December 24. This compromised update allowed attackers to drain wallets, leading to millions in losses for affected individuals. In conjunction with this incident, researchers discovered a phishing domain set up by the hackers, further indicating a coordinated effort to exploit Trust Wallet users. The company has responded urgently, advising users to take precautions and remain vigilant to avoid further losses. This incident serves as a stark reminder of the risks associated with browser extensions and the importance of ensuring that software updates are legitimate and secure.

Impact: Trust Wallet Chrome extension
Remediation: Users are advised to uninstall the compromised extension and monitor their wallets for unauthorized transactions.
Read Original

Two malicious Chrome extensions called 'Phantom Shuttle' have been discovered in the Chrome Web Store, masquerading as tools for a proxy service. These extensions are designed to hijack user traffic and steal sensitive information, including login credentials. Users who have installed these extensions are at risk of having their personal data compromised. This incident serves as a reminder for users to be cautious when downloading browser extensions and to regularly review their installed plugins. Google has a responsibility to monitor the extensions available in its store to protect users from such threats.

Impact: Chrome Web Store extensions, user credentials, sensitive data
Remediation: Users should remove the 'Phantom Shuttle' extensions from their browsers immediately and change any passwords that may have been compromised.
Read Original

The Kimwolf Android botnet has been discovered infecting over 1.8 million devices, according to security researchers at XLab. This botnet, which is linked to the previously identified Aisuru botnet, has been responsible for sending more than 1.7 billion commands for Distributed Denial of Service (DDoS) attacks. The scale of these attacks is significant, raising concerns about the potential for disruption to various online services. The fact that millions of devices are compromised highlights the ongoing vulnerability of Android systems to malware. Users should be cautious and consider securing their devices to prevent further infections and attacks.

Impact: Android devices
Remediation: Users should secure their Android devices by updating to the latest software versions, avoiding suspicious downloads, and using security applications.
Read Original

A new botnet named Kimwolf has compromised around 1.8 million Android-based devices, including TVs, set-top boxes, and tablets. Researchers from QiAnXin XLab report that this botnet may be linked to another one known as AISURU. Kimwolf is built using the Native Development Kit (NDK), which allows attackers to control these devices and use them for large-scale distributed denial-of-service (DDoS) attacks. This incident raises concerns about the security of smart devices, as many consumers may not realize their equipment can be hijacked in this way. Users of affected devices should be vigilant and consider measures to secure their systems against such threats.

Impact: Android TVs, set-top boxes, tablets
Remediation: Users should ensure their devices are updated to the latest firmware, disable unnecessary features, and consider using network security measures such as firewalls.
Read Original
PreviousPage 2 of 4Next