Articles tagged "Google"

Found 78 articles

Google has accelerated its timeline for implementing post-quantum encryption, moving the target date from 2035 to 2029. This decision reflects the company's growing concern over the potential risks posed by quantum computing to their systems and data security. As quantum technology advances, traditional encryption methods may become vulnerable, prompting tech companies like Google to prioritize stronger security measures. By adopting post-quantum encryption sooner, Google aims to better protect its infrastructure and user data against future threats. This shift is significant not just for Google, but for other tech firms that rely on similar encryption methods.

Impact: Google systems and devices
Remediation: N/A
Read Original

Researchers at Expel have raised concerns about malicious Chrome extensions that are targeting users' conversations with AI tools. These extensions, often disguised as useful add-ons, can secretly collect and transmit sensitive information, including chat history and personal data. Users who install these extensions unknowingly expose their private interactions to potential attackers. This incident is particularly concerning as AI technology becomes more integrated into daily tasks, increasing the risk of data breaches. Users are advised to be cautious about the extensions they install and to regularly review their browser settings for any unauthorized additions.

Impact: Google Chrome browser extensions
Remediation: Users should avoid installing unverified extensions and regularly check their browser for suspicious add-ons. Removing any dubious extensions is recommended.
Read Original

VoidStealer is a new type of information-stealing malware that has been discovered to exploit a flaw in Chrome's Application-Bound Encryption (ABE). This malware uses a clever method to bypass security measures and access the master key needed to decrypt sensitive data stored in the Chrome browser. As a result, users' personal information, including passwords and credit card details, could be at risk. This development is concerning for anyone using Chrome, as it highlights vulnerabilities that attackers can exploit to gain unauthorized access to private data. Users should remain vigilant and consider enhancing their security measures to protect against such threats.

Impact: Google Chrome
Remediation: Users should ensure their Chrome browser is updated to the latest version and consider using additional security tools to monitor for suspicious activity.
Read Original

Google has decided to reverse its plan to require Android developers to link their apps to verified developer accounts, a move that had sparked significant backlash from users. The original requirement, which was set to take effect in September 2026, involved a $25 fee and the submission of personal identification for verification. Many users expressed concerns over privacy and accessibility, arguing that the new rule could limit the diversity of apps available on the platform. By stepping back from this policy, Google aims to maintain a more open app ecosystem while addressing user concerns about potential barriers to entry for developers. This decision reflects the ongoing tension between security measures and user freedom in the app development landscape.

Impact: Android apps on certified devices
Remediation: N/A
Read Original

A malicious Chrome extension called ShieldGuard was discovered to be a crypto scam masquerading as a security tool. This extension primarily targeted users looking to protect their cryptocurrency wallets but instead siphoned off sensitive wallet information and drained user data. Researchers found that once installed, the extension would exploit its permissions to access and transfer funds from users' crypto wallets. This incident affects anyone who installed the ShieldGuard extension, highlighting the ongoing risks of using unverified browser extensions in the cryptocurrency space. Users are urged to be cautious and only download extensions from reputable sources to safeguard their assets.

Impact: ShieldGuard Chrome extension
Remediation: Users should uninstall the ShieldGuard extension immediately and monitor their crypto wallets for unauthorized transactions.
Read Original
Actively Exploited

Researchers have discovered a serious vulnerability in Android that allows attackers to hijack mobile payment applications using a technique called LSPosed-based runtime manipulation. This attack can bypass security measures such as SIM binding, which is intended to protect users' financial transactions. As a result, anyone using affected payment apps could be at risk of fraud and unauthorized transactions. This incident highlights the ongoing challenges in mobile security, especially for users who rely on their devices for financial activities. Users should be cautious and consider reviewing their app security settings until further protections are implemented.

Impact: Android mobile payment applications, particularly those using LSPosed framework
Remediation: Users should monitor their payment app security settings and stay updated with any security patches from app developers.
Read Original

A recent report from Google reveals a significant shift in the ransomware landscape, indicating that attackers are increasingly focusing on data extortion rather than traditional ransom demands. This change complicates the understanding of the full scope of cybercrime and its impact on businesses and individuals. Researchers found that this evolution allows cybercriminals to extract sensitive information from victims and threaten to release it publicly if their demands are not met. This trend raises serious concerns for organizations, as it puts their data security at risk and can lead to severe reputational damage. Companies need to be more vigilant about securing their data and preparing for potential breaches, as the consequences of data extortion can be devastating.

Impact: N/A
Remediation: Organizations should enhance data security measures, implement robust backup solutions, and prepare incident response plans to handle potential data extortion threats.
Read Original

In 2025, Google awarded over $17 million to 747 security researchers through its Vulnerability Reward Program (VRP) for reporting various security vulnerabilities. This initiative not only incentivizes researchers to identify and report bugs but also strengthens the overall security of Google's products and services. By paying for these reports, Google is actively encouraging contributions from the security community, which helps mitigate potential threats before they can be exploited. This program is essential for maintaining user trust and safeguarding sensitive information across the company's platforms. The financial commitment reflects the increasing importance of cybersecurity in the tech industry.

Impact: Google products and services
Remediation: N/A
Read Original

A significant hardware vulnerability has been identified that affects approximately 25% of Android phones, particularly those in the budget category. This flaw allows attackers to potentially steal sensitive information, including cryptocurrency wallet seed phrases, in under a minute. Users of affected devices should be concerned as this could lead to serious financial losses and privacy breaches. The issue emphasizes the need for manufacturers to improve security measures in their devices and for users to be vigilant about their phone's security. It's crucial for owners of budget Android phones to check if their devices are impacted and take necessary precautions.

Impact: Budget Android phones from various manufacturers.
Remediation: Users should check for updates from their device manufacturer and apply any security patches as they become available. Additionally, users can enhance their security by changing sensitive information, such as wallet seed phrases, and being cautious about app installations.
Read Original

Two Google Chrome extensions have been compromised after a transfer of ownership, allowing attackers to inject malicious code and steal sensitive user data. The extensions, originally developed by a user identified as 'akshayanuonline@gmail.com', are QuickLens and another unnamed extension. This incident raises significant concerns as it exposes users who have installed these extensions to potential malware and data breaches. Users of these extensions should be cautious and consider removing them to protect their information. This situation serves as a reminder of the risks associated with third-party software and the importance of monitoring the permissions and developers of browser extensions.

Impact: QuickLens Chrome extension and another unnamed extension associated with 'akshayanuonline@gmail.com'.
Remediation: Users should uninstall the affected extensions immediately and monitor their accounts for any suspicious activity.
Read Original

Google has reported a significant increase in zero-day attacks targeting enterprise software, with nearly a quarter of these incidents aimed at security and networking appliances in 2025. This trend indicates that attackers are increasingly focusing on vulnerabilities within critical infrastructure components used by businesses. The implications are serious, as these vulnerabilities can lead to unauthorized access, data breaches, and disruptions in service. Companies that rely on these types of software need to prioritize security measures and stay updated on patches to protect their systems. As the threat landscape evolves, organizations must remain vigilant to mitigate risks associated with these attacks.

Impact: Security and networking appliances
Remediation: Companies should apply security patches as soon as they are available and regularly update their software to defend against these vulnerabilities.
Read Original
Actively Exploited

The latest Security Affairs Malware newsletter covers several significant malware threats that have emerged recently. Notably, a group identified as Stan Ghouls is targeting users in Russia and Uzbekistan using the NetSupport Remote Access Trojan (RAT), which allows attackers to control infected systems remotely. Another concerning development is the discovery of ZeroDayRAT, a new spyware designed to infiltrate both Android and iOS devices. Additionally, researchers have uncovered a Linux botnet named SSHStalker, which utilizes old-school IRC methods to compromise new victims. These activities demonstrate the evolving tactics of cybercriminals and emphasize the need for users and organizations to remain vigilant against these persistent threats.

Impact: NetSupport RAT, ZeroDayRAT (Android and iOS), SSHStalker Linux Botnet
Remediation: Users should implement security updates, monitor network activity for unusual behavior, and utilize endpoint protection solutions to mitigate these threats.
Read Original
287 Chrome Extensions Caught Harvesting Browsing Data from 37M Users

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

A recent investigation by Q Continuum has uncovered that 287 Chrome extensions are leaking private browsing data from approximately 37.4 million users to companies like Similarweb and Alibaba. These extensions, often perceived as harmless tools, have been found to convert users' browsing histories into marketable products. The data breach raises significant privacy concerns, particularly for users who may not be aware that their online activities are being monitored and sold. This incident highlights the need for users to be vigilant about the extensions they install and the permissions they grant. As these extensions may not seem malicious at first glance, it serves as a reminder of the potential risks associated with browser add-ons.

Impact: Chrome extensions, user browsing data
Remediation: Users should review and remove any unnecessary or suspicious Chrome extensions and check their permissions. Regularly monitoring browser settings and being cautious about the extensions installed is advisable.
Read Original

A newly identified hacking group, suspected to be linked to Russian intelligence, has launched attacks against various Ukrainian sectors, including defense, government, and energy. This group is using a malware called CANFAIL, which was uncovered by researchers from Google Threat Intelligence Group. The targeting of critical infrastructure and military entities raises significant concerns about national security and the ongoing conflict in the region. As these attacks could disrupt essential services and information systems, the situation highlights the need for enhanced cybersecurity measures among the affected organizations. This incident is part of a broader pattern of cyber warfare tactics being employed against Ukraine.

Impact: Ukrainian defense, government, and energy sectors
Remediation: Organizations should enhance cybersecurity protocols, conduct regular security assessments, and ensure timely updates and patches to their systems.
Read Original

The article discusses various cybersecurity topics, including vulnerabilities in software and tools used by organizations. It mentions issues related to the Chrome browser and System Center Configuration Manager (SCCM), suggesting that users should stay updated to protect against potential exploits. Additionally, it brings attention to a tool named SSHStalker, which appears to be associated with security risks. The piece emphasizes the importance of maintaining software updates and being aware of the tools in use, as attackers often target widely used applications to compromise systems. Overall, the article serves as a reminder for users and organizations to remain vigilant about their cybersecurity practices.

Impact: Chrome browser, System Center Configuration Manager (SCCM), SSHStalker
Remediation: Users should ensure that their software is updated to the latest versions and consider applying any available patches.
Read Original
PreviousPage 2 of 6Next