Articles tagged "Google"

Found 78 articles

Researchers have discovered that 100 Chrome extensions, published through five different accounts, are part of a coordinated campaign designed to steal user data and create backdoors. These malicious extensions utilize shared command and control (C&C) infrastructure, indicating a well-organized effort by the attackers. Users who have installed these extensions are at risk of having their data compromised, which could lead to identity theft or other forms of online fraud. This incident serves as a reminder for users to be cautious when installing browser extensions and to regularly review their installed add-ons for any suspicious activity. The findings underscore the need for enhanced scrutiny of browser extensions to protect user privacy and security.

Impact: Google Chrome extensions
Remediation: Users should remove the affected extensions immediately and consider resetting their browser settings. Regularly review and audit installed extensions for any that seem suspicious.
Read Original

Security researchers have identified a new Android banking trojan called Mirax, which is targeting users across Europe. This malware utilizes a method known as Malware-as-a-Service (MaaS) to infect devices, allowing cybercriminals to gain remote access and turn affected smartphones into residential proxy nodes. By doing this, attackers can route their malicious activities through the compromised devices, making it harder to trace their actions back to them. This poses a significant risk to users, as their personal data and banking information could be at risk. The emergence of Mirax highlights ongoing vulnerabilities in mobile security and the need for users to remain vigilant against such threats.

Impact: Android devices
Remediation: Users should ensure their devices are protected with up-to-date security software, avoid downloading apps from untrusted sources, and regularly monitor their bank accounts for suspicious activity.
Read Original

Google is enhancing the security of its Pixel smartphones by focusing on the cellular baseband modem, which is responsible for mobile network communication. In the previous Pixel 9 model, the company implemented measures to mitigate memory-related vulnerabilities. With the upcoming Pixel 10, Google is taking further steps by incorporating a DNS parser built in the Rust programming language into the modem firmware. This change aims to bolster the device's defenses against potential exploitation of the modem, which can process external data. By addressing these vulnerabilities, Google is working to protect users from possible attacks that could compromise their devices through the modem interface.

Impact: Google Pixel 10 smartphones
Remediation: N/A
Read Original

In the latest update, Chrome version 147 has addressed a total of 60 vulnerabilities, including two that are classified as critical. These critical flaws are linked to the browser's WebML component and were reported by anonymous researchers. The vulnerabilities are significant enough that they come with a combined bounty of $86,000 for anyone who can exploit them. Users of Chrome should ensure they are using the updated version to protect against potential attacks. Regular updates like this are crucial as they help safeguard users from newly discovered security risks.

Impact: Chrome version 147 and earlier versions
Remediation: Update to Chrome version 147 or later
Read Original

A recently patched vulnerability in the EngageLab SDK, a third-party software development kit used in many Android applications, has potentially exposed the private data of around 50 million users, including 30 million cryptocurrency wallet holders. The flaw allowed apps on the same device to bypass Android's security measures, enabling unauthorized access to sensitive information. This incident raises significant concerns about the security of users' cryptocurrency assets, as the compromised data could have led to theft or fraud. Developers using the EngageLab SDK are urged to update their applications to protect users from potential attacks. The vulnerability was identified and addressed, but users should remain vigilant about app permissions and security practices.

Impact: EngageLab SDK used in various Android applications, particularly cryptocurrency wallets
Remediation: Developers should update their applications using the EngageLab SDK to the latest patched version as soon as possible.
Read Original

Google's threat intelligence team has identified a new extortion group known as UNC6783, which appears to be linked to the Raccoon persona. This group is specifically targeting Business Process Outsourcing (BPO) companies and helpdesk services, indicating a shift in focus towards sectors that handle sensitive customer data. The group's tactics may involve ransomware or other extortion methods, which poses significant risks to affected organizations. Companies in the BPO sector should be vigilant and enhance their security measures to protect against potential breaches and data leaks. As this threat evolves, understanding the methods and motivations behind it will be crucial for businesses in these industries.

Impact: BPO companies, helpdesk services, enterprises handling sensitive customer data
Remediation: Companies should enhance security protocols, conduct regular security audits, and train staff on recognizing phishing attempts and other social engineering tactics.
Read Original

Researchers at Google DeepMind have identified six types of web-based attacks that can target autonomous AI agents. These attacks exploit malicious web content to manipulate AI behavior, potentially leading to harmful consequences. The study emphasizes how AI agents, which increasingly navigate the internet autonomously, can be misled by deceptive information, resulting in unexpected actions. This research highlights the need for stronger security measures to protect AI systems from manipulation. As AI continues to be integrated into various applications, understanding these vulnerabilities is crucial for developers and organizations relying on AI technology.

Impact: Autonomous AI agents
Remediation: Implement security measures to validate and filter web content accessed by AI agents.
Read Original

Kaspersky has reported that SparkCat malware has resurfaced on app stores, specifically targeting cryptocurrency users in Asia. This malware has been found in applications available for both iOS and Android devices. Users downloading these apps may unknowingly expose their sensitive information, such as cryptocurrency wallet details, to attackers. This resurgence is particularly concerning given the increasing popularity of cryptocurrency among users, making them prime targets for cybercriminals. As the malware spreads, it underlines the need for users to be vigilant about the apps they download and the permissions they grant.

Impact: iOS and Android applications targeting cryptocurrency users
Remediation: Users should verify the legitimacy of apps before downloading, avoid apps from untrusted sources, and regularly update their devices with the latest security patches.
Read Original
Storm Infostealer Sold as Service, Targets Browsers, Wallets and Accounts

Hackread – Cybersecurity News, Data Breaches, AI and More

Actively Exploited

Recent research from Varonis Threat Labs has identified a new cybersecurity threat called Storm infostealer, which operates as a subscription service. This malicious software is designed to bypass the encryption used by Google Chrome, putting users' sensitive information at risk. It primarily targets web browsers, cryptocurrency wallets, and various online accounts. This is concerning because it can lead to identity theft and financial loss for affected individuals. As this service gains traction, it raises alarms about the potential for widespread exploitation of personal data.

Impact: Google Chrome, cryptocurrency wallets, online accounts
Remediation: Users should ensure their browsers and wallets are up-to-date and consider using additional security measures such as two-factor authentication. Regularly monitoring account activity is also recommended.
Read Original

The latest ThreatsDay Bulletin highlights a range of pressing cybersecurity threats impacting various systems. Researchers are reporting on the alarming trend of chaining together minor vulnerabilities to create significant backdoors, which could allow attackers to gain unauthorized access. Additionally, there are ongoing concerns about Android rootkits and methods for evading AWS CloudTrail logging, raising red flags for cloud security. These developments underscore the need for organizations to stay vigilant and proactive in patching software and monitoring their systems for unusual activity. With cyber threats evolving quickly, it’s crucial for companies to keep their defenses updated and educate their teams on the latest risks.

Impact: Android devices, AWS CloudTrail, various software with known vulnerabilities
Remediation: Regularly update software, patch known vulnerabilities, monitor for unusual activity
Read Original

Google has released a series of updates to address 21 vulnerabilities in its Chrome browser, including a significant zero-day flaw identified as CVE-2026-5281. This vulnerability affects the Dawn component of Chrome and has been exploited in the wild, which means attackers are actively taking advantage of it. Users of Chrome are urged to update their browsers to the latest version to protect themselves against potential exploits. Keeping browsers up to date is crucial as these vulnerabilities can allow unauthorized access or manipulation of user data. The timely patching of such vulnerabilities emphasizes the ongoing need for vigilance in maintaining cybersecurity.

Impact: Google Chrome browser, specifically the Dawn component, affected versions unspecified.
Remediation: Users should update their Chrome browser to the latest version to mitigate the risks associated with CVE-2026-5281 and the other vulnerabilities.
Read Original
Actively Exploited

Google has addressed 21 vulnerabilities in its Chrome browser, including a serious zero-day flaw identified as CVE-2026-5281. This vulnerability is categorized as a use-after-free (UAF) issue in Dawn, which is part of the WebGPU standard utilized by Chromium and its derivatives. While specific details about the exploitation of this flaw are scarce, the fact that it has been flagged as 'in-the-wild' suggests that attackers are actively using it. Users of Chrome and other Chromium-based browsers should ensure they are running the latest versions to protect themselves from potential attacks. Keeping browsers updated is crucial because such vulnerabilities can lead to unauthorized access or other malicious activities.

Impact: Google Chrome, Chromium-based browsers, Dawn (WebGPU implementation)
Remediation: Users should update their Chrome browsers to the latest version to mitigate the risks associated with CVE-2026-5281.
Read Original

Google has rolled out new location privacy features in the Android 17 Beta 3, allowing users better control over their precise location data. A key addition is the location button, which enables one-time access to location information for tasks like finding nearby places or tagging content, without the need for continuous tracking. This update aims to minimize data collection practices and enhance user privacy while providing developers with the tools necessary to design safer applications. This change is particularly relevant as location data can often be sensitive, and users are increasingly concerned about how their information is used. By implementing these features, Google is responding to user demands for greater transparency and control over personal data.

Impact: Android 17 Beta 3
Remediation: N/A
Read Original
Actively Exploited

The latest Malware newsletter from Security Affairs reports on several significant cybersecurity threats. One notable incident involves new malware specifically targeting users of Cobra DocGuard software, potentially compromising sensitive data. Additionally, Iranian cyber actors have been using Telegram as a command and control channel to distribute malware to predetermined targets, raising concerns about state-sponsored cyber activities. The newsletter also discusses the Trivy supply chain attack, which has now expanded to include compromised Docker images, putting many containerized applications at risk. Lastly, a new malware called VoidStealer has been identified, which manipulates Chrome debugging tools to extract user information. These developments highlight ongoing vulnerabilities in software and the tactics employed by cybercriminals and state actors alike.

Impact: Cobra DocGuard software, Docker images, Google Chrome
Remediation: Users of affected software should update to the latest versions and apply security patches as they become available. It's also recommended to monitor network traffic for unusual activity and to use security tools that can detect and block malware.
Read Original

Recent reports indicate that cybercriminals are increasingly using cloud phones, which are virtualized Android devices hosted on remote servers, to carry out financial fraud schemes. These devices provide attackers with anonymity and the capability to manipulate phone numbers, making it easier for them to bypass traditional security measures. As a result, victims can include individuals and businesses alike, potentially leading to significant financial losses. Security experts warn that the rise of these technologies poses a growing risk to online transactions and personal data. Companies and users need to be vigilant and adopt more stringent security practices to mitigate these threats.

Impact: Cloud phones, virtualized Android devices
Remediation: Users and companies should implement multi-factor authentication, monitor for unusual account activity, and educate staff about potential scams involving cloud phone technology.
Read Original
Page 1 of 6Next