Tag: google
-
Malicious Chrome Extension Leaks ChatGPT and DeepSeek Chats of 900,000 Users
Over 900,000 Chrome users have been compromised by two malicious extensions that secretly exfiltrate ChatGPT and DeepSeek conversations to attacker-controlled servers. Security researchers discovered the extensions impersonating the legitimate AITOPIA AI sidebar tool, with one rogue extension even earning Google’s >>Featured
-
Google fixes critical Dolby Decoder bug in Android January update
Android’s January 2026 update fixes CVE-2025-54957, a critical Dolby audio decoder flaw discovered by Google researchers in October 2025. A critical Dolby audio decoder vulnerability, tracked as CVE-2025-54957, was addressed in the January 2026 Android security update. Google fixed the flaw in December 2025 for Pixel phones and has now rolled out the fix to…
-
Google Security Safety: Why Cloud Monitor is Worth the Investment at Morgan Local Schools
How an Ohio district uses Cloud Monitor to gain visibility, prevent risk, and stay prepared in Google Workspace Morgan Local Schools is located in rural McConnelsville, Ohio, serving about 1,600 students and 250 staff. With limited home internet access throughout the community, the district relies heavily on shared device carts and Google Workspace to keep…
-
Cursor, Windsurf Google Antigravity IDEs Linked to Malicious Extension Exposure
A critical supply chain vulnerability has been discovered affecting millions of developers using popular AI-powered IDEs, including Cursor, Windsurf, and Google Antigravity. Security researchers revealed that these coding environments were actively recommending non-existent extensions, allowing potential attackers to upload malware that users would unthinkingly install. The issue stems from how these tools were built. Cursor,…
-
VS Code Forks Recommend Missing Extensions, Creating Supply Chain Risk in Open VSX
Popular artificial intelligence (AI)-powered Microsoft Visual Studio Code (VS Code) forks such as Cursor, Windsurf, Google Antigravity, and Trae have been found to recommend extensions that are non-existent in the Open VSX registry, potentially opening the door to supply chain risks when bad actors publish malicious packages under those names.The problem, according to Koi, is…
-
Trusted Google Notifications Used in Phishing Campaign Targeting 3,000+ Orgs
Researchers warn that attackers are abusing Google notifications and cloud services to deliver phishing emails that bypass traditional email security controls. The post Trusted Google Notifications Used in Phishing Campaign Targeting 3,000+ Orgs appeared first on TechRepublic. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-google-notifications-phishing-campaign-email-security/
-
VSCode IDE forks expose users to “recommended extension” attacks
Popular AI-powered integrated development environment solutions, such as Cursor, Windsurf, Google Antigravity, and Trae, recommend extensions that are non-existent in the OpenVSX registry, allowing threat actors to claim the namespace and upload malicious extensions. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/vscode-ide-forks-expose-users-to-recommended-extension-attacks/
-
Google Tasks Used to Deliver Stealth Phishing Attacks
Attackers are abusing Google Tasks notifications to deliver trusted-domain phishing emails that bypass traditional email security controls. First seen on esecurityplanet.com Jump to article: www.esecurityplanet.com/threats/google-tasks-used-to-deliver-stealth-phishing-attacks/
-
Gmail preparing to drop POP3 mail fetching
It’s January 2026, and Google is finding innovative new ways to make one of its services worse First seen on theregister.com Jump to article: www.theregister.com/2026/01/05/gmail_dropping_pop3/
-
Arkose Labs Android SDK: Enhanced Protection with Mobile Integrity Check
Arkose Labs offers comprehensive mobile SDKs for both Android and iOS, delivering enterprise-grade fraud prevention across major platforms. Now, we’re enhancing our Android SDK with Mobile Integrity Check”, powered by Google Play Integrity API”, to detect compromised devices, modified applications, and emulator-based attacks that evade traditional detection methods. This critical advancement works alongside our bot…
-
Google is testing a new image AI and it’s going to be its fastest model
Google is testing a new image AI model called “Nano Banana 2 Flash,” and it’s going to be as good as the Gemini 3 Pro Nano Banana, but it’ll be cheaper. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/google/google-is-testing-a-new-image-ai-and-its-going-to-be-its-fastest-model/
-
Google Tasks Feature Exploited in New Sophisticated Phishing Campaign
Over 3,000 organisations, predominantly in manufacturing, fell victim to a sophisticated phishing campaign in December 2025 that leveraged Google’s own application infrastructure to bypass enterprise email security controls. Attackers sent deceptive messages from noreply-application-integration@google.com, marking a critical shift in how threat actors exploit trusted platforms. Unlike traditional phishing attempts that rely on domain spoofing or compromised…
-
Phishing campaign abuses Google Cloud Application to impersonate legitimate Google emails
Researchers uncovered a phishing campaign abusing Google Cloud Application Integration to send emails posing as legitimate Google messages. Check Point researchers have revealed a phishing campaign that abuses Google Cloud Application Integration to send emails impersonating legitimate Google messages. The attack uses layered redirection with trusted cloud services, user validation checks, and brand impersonation to…
-
Cybercriminals Abuse Google Cloud Email Feature in Multi-Stage Phishing Campaign
Cybersecurity researchers have disclosed details of a phishing campaign that involves the attackers impersonating legitimate Google-generated messages by abusing Google Cloud’s Application Integration service to distribute emails.The activity, Check Point said, takes advantage of the trust associated with Google Cloud infrastructure to send the messages from a legitimate email address (“ First seen on thehackernews.com…
-
Stop the slop by disabling AI features in Chrome
The most popular desktop browser is festooned with Google AI, but you can make at least some of it go away First seen on theregister.com Jump to article: www.theregister.com/2025/12/26/disable_ai_features_chrome/
-
Best of 2025: Google Gemini AI Flaw Could Lead to Gmail Compromise, Phishing
Researchers discovered a security flaw in Google’s Gemini AI chatbot that could put the 2 billion Gmail users in danger of being victims of an indirect prompt injection attack, which could lead to credentials being stolen or phishing attacks. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/01/google-gemini-ai-flaw-could-lead-to-gmail-compromise-phishing-2/
-
Trust Wallet Chrome Extension Hack Drains $8.5M via Shai-Hulud Supply Chain Attack
Trust Wallet on Tuesday revealed that the second iteration of the Shai-Hulud (aka Sha1-Hulud) supply chain outbreak in November 2025 was likely responsible for the hack of its Google Chrome extension, ultimately resulting in the theft of approximately $8.5 million in assets.”Our Developer GitHub secrets were exposed in the attack, which gave the attacker access…
-
DarkSpectre Browser Extension Campaigns Exposed After Impacting 8.8 Million Users Worldwide
The threat actor behind two malicious browser extension campaigns, ShadyPanda and GhostPoster, has been attributed to a third attack campaign codenamed DarkSpectre that has impacted 2.2 million users of Google Chrome, Microsoft Edge, and Mozilla Firefox.The activity is assessed to be the work of a Chinese threat actor that Koi Security is tracking under the…
-
Equifax Europe CISO: Notorious breach spurred cybersecurity transformation
Tags: access, ai, attack, authentication, awareness, breach, business, ceo, cio, ciso, cloud, computer, control, corporate, cyber, cyberattack, cybercrime, cybersecurity, data, defense, dora, espionage, finance, framework, google, government, identity, infrastructure, intelligence, network, nis-2, phishing, regulation, risk, risk-management, security-incident, service, strategy, technology, threat, updateCloud as a new technological axis: Equifax’s $3 billion migration to the cloud, “which had been brewing for about seven years” and which the company says is the largest technological investment in its history, has involved moving more than 300 systems, over 30 product families, and thousands of customers to the company’s cloud platform, Equifax Cloud, in Spain…
-
Palo Alto Networks Allies with Google to Secure AI
Palo Alto Networks will significantly expand the scope of the cybersecurity offerings it makes available on Google Cloud in the New Year while at the same time making greater use of cloud infrastructure and artificial intelligence (AI) technologies provided by Google across its portfolio. Specifically, Palo Alto Networks will make its Prisma AIRS platform for..…
-
React2Shell: Anatomy of a max-severity flaw that sent shockwaves through the web
What the research quickly agreed on: Across early reports from Wiz, Palo Alto Networks’ Unit 42, Google AWS, and others, there was a strong alignment on the core mechanics of React2Shell. Researchers independently confirmed that the flaw lives inside React’s server-side rendering pipeline and stems from unsafe deserialization in the protocol used to transmit component…
-
Top 5 real-world AI security threats revealed in 2025
Tags: access, ai, api, attack, breach, chatgpt, cloud, control, credentials, cybercrime, data, data-breach, defense, email, exploit, flaw, framework, github, gitlab, google, injection, least-privilege, LLM, malicious, malware, microsoft, nvidia, open-source, openai, rce, remote-code-execution, risk, service, software, supply-chain, theft, threat, tool, vulnerabilityA critical remote code execution (RCE) in open-source AI agent framework Langflow that was also exploited in the wildAn RCE flaw in OpenAI’s Codex CLIVulnerabilities in NVIDIA Triton Inference ServerRCE vulnerabilities in major AI inference server frameworks, including those from Meta, Nvidia, Microsoft, and open-source projects such as vLLM and SGLangVulnerabilities in open-source compute framework…
-
TDL 012 – The Architect of the Internet on the Future of Trust
Summary In this episode of The Defenders Log, Paul Mockapetris, the architect of DNS, discusses the evolving role of the Domain Name System from a simple directory to a sophisticated security tool. He posits that modern networking requires “making sure DNS doesn’t work when you don’t want it to,” comparing DNS filtering to essential services…
-
Google will finally allow you to change your @gmail.com address
Tags: googleGoogle will finally allow you to change your @gmail address or create a new alias, according to a new support document. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/google/google-will-finally-allow-you-to-change-your-gmailcom-address/
-
FBI seized ‘web3adspanels.org’ hosting stolen logins
The U.S. seized the ‘web3adspanels.org’ domain and database used by cybercriminals to store stolen bank login credentials. The FBI seized the domain web3adspanels[.]org and its database after cybercriminals used it to store bank login credentials stolen from U.S. victims. A criminal group ran fake ads on Google and Bing that mimicked real bank advertisements. Victims…
-
Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites
Cybersecurity researchers have discovered two malicious Google Chrome extensions with the same name and published by the same developer that come with capabilities to intercept traffic and capture user credentials.The extensions are advertised as a “multi-location network speed test plug-in” for developers and foreign trade personnel. Both the browser add-ons are available for download as…
-
Passwd: A walkthrough of the Google Workspace Password Manager
Passwd is designed specifically for organizations operating within Google Workspace. Rather than competing as a general consumer password manager, its purpose is narrow, and business-focused: secure credential storage, controlled sharing, and seamless Workspace integration. The platform emphasizes practicality over feature overload, aiming to provide a reliable system for teams that already rely First seen on…
-
Palo Alto’s new Google Cloud deal boosts AI integration, could save on cloud costs
SEC filings show the outfit cut projected 2027 cloud purchase commitments by $114M First seen on theregister.com Jump to article: www.theregister.com/2025/12/22/palo_alto_google_cloud_ai_integration/
-
2025 Year in Review at Cloud Security Podcast by Google
Tags: 2fa, ai, automation, breach, cloud, compliance, computing, control, cybersecurity, data, defense, detection, edr, finance, google, hacking, incident response, infrastructure, linux, mandiant, metric, mitigation, offense, phone, privacy, risk, security-incident, siem, soc, technology, threat, vulnerability, vulnerability-management, zero-trust(written jointly with Tim Peacock) Five years. It’s enough time to fully launch a cloud migration, deploy a new SIEM, or”Š”, “Šif you’re a very large enterprise”Š”, “Šjust start thinking about doing the first two. It’s also how long Tim and I have been subjecting the world to our thoughts on Cloud Security Podcast by Google. We…
-
Android Security Update Triggers Renewed Attention with Mid-Month Changes
Google’s latest Android security updates are drawing renewed scrutiny this week as revisions, staggered patch rollouts, and follow-on fixes converge across the Android ecosystem. While the underlying security bulletin itself is not new, the way updates are landing on devices now is creating a sense of sudden disruption for users and security teams alike. At……

