-
Read moreMalicious Android apps on Google Play downloaded 42 million times—learn about the threats, evasion tactics, and defenses to secure your device.
-
Read more131 rebranded Chrome extensions spam Brazilian users via WhatsApp—learn about the violations, white-label model, and tips to avoid risky add-ons and protect your messaging.
-
Read moreDeepMind's CodeMender uses Gemini models to spot, patch, and rewrite vulnerable code, upstreaming 72 fixes to OSS projects. Google launches AI VRP for threat reports up to $30K and updates SAIF v2 to combat AI risks like prompt injections—empowering developers against cyber threats.
-
Read moreSecurity scan reveals 150+ popular apps (millions of downloads) with Firebase test mode flaws allowing unauthenticated access to payments, PII, chats, passwords, and GitHub/AWS tokens in Realtime DB, Storage, Firestore, and Remote Config. Learn impacts, OpenFirebase tool, and fixes for ~80% of mobile apps.
-
Read moreTA415 (APT41) uses Google Sheets, Calendar, and VS Code Remote Tunnels for stealthy C2 in spearphishing attacks targeting U.S. policy entities on trade/sanctions. From July-August 2025, WhirlCoil loader evades detection; evolve defenses with cloud anomaly monitoring.
-
Posted: September 09, 2025Views: 111Read moreAssistant Sub-Inspector Om Parkash lost Rs 3.9 lakh after calling fake customer care numbers found on Google. Learn how scammers exploit search results and how to protect yourself.
-
Read moreResearchers found 8 malicious NPM packages targeting Windows Chrome users with obfuscated code to steal passwords, credit cards, and crypto wallets. Learn more.
-
Read moreGoogle's Salesforce instance was compromised by the ShinyHunters group using voice phishing tactics. Learn about the breach and the exposed records.
-
Read moreSecurity researchers demonstrate how Google's Gemini AI bot can be hijacked to control smart home devices using invisible prompts. Learn about the implications for generative AI security.