Skip to content
Breach Spot
  • The Breach News
  • Check your exposure
REPORT BREACH
Breach SpotBreach Spot
  • The Breach News
  • Check your exposure
REPORT BREACH
Breach SpotBreach Spot

Google to Leverage AI for Estimating Users’ Ages from Search History

  • adminadmin
  • August 2, 2025
  • cyber-attacks

Last week, the United Kingdom instituted a requirement for residents to verify their ages before accessing online pornography and other adult content, aiming to enhance child protection. However, the implementation faced immediate challenges that aligned with expert forecasts.

In response to the new regulations, UK residents swiftly adopted virtual private networks (VPNs) to sidestep the mandated age verification processes, which often necessitate users to upload government-issued identification. This circumvention allows users to mask their location and bypass local restrictions. The UK’s Online Safety Act is part of a broader global trend aiming to establish age-verification measures. While proponents argue such laws could prevent minors from accessing adult content, experts caution that they may inadvertently introduce significant privacy and security vulnerabilities for all users.

In a separate cybersecurity context, the Russian state-sponsored hacking group Turla, associated with the Federal Security Service (FSB), has been utilizing its access to national internet providers to deploy espionage activities. Their techniques include deceiving foreign officials into downloading spyware capable of bypassing encryption, which could expose sensitive private data. Turla’s innovative approach includes masking its communications through various means to remain undetected, showcasing a sophisticated approach to its operations.

Additionally, industry leader Google has announced the rollout of an AI-based age estimation system for its Search and YouTube platforms, designed to enforce content restrictions even for users who do not disclose their ages. This initiative is aligned with upcoming digital safety regulations in the European Union that require platforms to take preventive measures against exposure to harmful content for minors.

Instead of relying solely on user-provided data, Google plans to infer the age of users using a combination of signals and metadata. Privacy advocates have raised concerns that this change could lead to inaccuracies, with implications for transparency and user consent. The debate surrounding algorithmic inferences of personal characteristics, such as age, raises significant questions about moderation, censorship, and privacy in digital spaces.

In another development, the U.S. Army faced backlash and rescinded the appointment of Jen Easterly as the Distinguished Chair in Social Sciences at West Point after controversy erupted following accusations of her alleged links to the Biden Administration’s Disinformation Governance Board. Despite no substantiation, the accusations prompted Army Secretary Dan Driscoll to order a thorough review of West Point’s hiring practices, leading to an immediate suspension of external faculty selection processes.

Furthermore, a bipartisan legislative proposal spearheaded by Senators Amy Klobuchar and Ted Cruz aims to empower lawmakers to request the removal of online posts featuring their personal details, such as home addresses or travel itineraries, citing escalating threats against public officials, particularly in the aftermath of recent violence against legislators.

While this bill has support, it has raised alarms among media watchdogs that it could inadvertently stifle journalistic reporting and facilitate selective censorship. Although it includes an exemption for journalists, critics argue that its vague language could allow Congress members to suppress legitimate news content, potentially chilling free expression and reporting in the public interest.

Source

Help Prevent Exploitation, Report Breaches

Help to prevent further data unauthorized access or potential exploitation. Protect others by sharing vital breach information. If you’ve discovered a new data breach

REPORT HERE
Trending now

"Fortinet" AI Apple artificial intelligence Artificial Intelligence & Machine Learning AT&T Change Healthcare CISA Cisco cloud security compliance CrowdStrike cryptocurrency Cybercrime cybersecurity data breach data breaches data privacy data security encryption Facebook FBI Fraud Management Fraud Management & Cybercrime Generative AI GitHub Google healthcare HIPAA identity theft LockBit machine learning Malware Meta Microsoft Multi-Factor Authentication OpenAI Palo Alto Networks phishing ransomware Salt Typhoon Scattered Spider Signal T-Mobile Telegram

Sector alert bulletin

Subscribe to your sector-specific insight newsletter to stay updated on potential data breaches and ongoing cyber-attacks targeting your industry

Stay informed and prepared against emerging security threats.

SUSCRIBE NOW

Related Posts

E.U. Imposes Sanctions on 3 Russian Nationals for Cyberattacks Against Estonia’s Key Government Ministries

Jan 28, 2025 – Cybersecurity / Cyber Espionage

The Council of the European Union has sanctioned three Russian nationals for their involvement in “malicious cyber activities” targeting Estonia. The individuals—Nikolay Alexandrovich Korchagin, Vitaly Shevchenko, and Yuriy Fedorovich Denisov—are identified as officers of the Russian Armed Forces’ GRU Unit 29155. According to the council’s decision, these individuals are responsible for cyberattacks aimed at compromising the computer systems of various Estonian institutions to gather intelligence on the country’s cyber security policies.

These cyber intrusions provided unauthorized access to classified and sensitive information within several government ministries, including Economic Affairs and Communications, Social Affairs, and Foreign Affairs, resulting in the theft of thousands of confidential documents, including business secrets and proprietary data.

  • August 2, 2025

Fake Google Chrome Websites Distribute ValleyRAT Malware Through DLL Hijacking

February 6, 2025
Cyber Attack / Malware

Fraudulent websites posing as Google Chrome have been employed to spread malicious installers for a remote access trojan known as ValleyRAT. First identified in 2023, this malware is linked to a threat actor referred to as Silver Fox, whose previous operations primarily targeted Chinese-speaking regions, including Hong Kong, Taiwan, and Mainland China. According to Morphisec researcher Shmuel Uzan, “This actor has increasingly focused on key organizational roles—especially in finance, accounting, and sales—underscoring a strategic emphasis on high-value positions with access to sensitive data and systems.” Early cyber attack sequences have shown ValleyRAT being delivered alongside other malware types, such as Purple Fox and Gh0st RAT, the latter having been widely utilized by various Chinese hacking groups. Just last month, counterfeit installers for legitimate software were identified as a distribution method for these attacks.

  • August 2, 2025

Cybercriminals Leverage ClickFix Technique to Distribute NetSupport RAT in Recent Attacks

February 11, 2025
Malware / Cyber Attack

In a disturbing trend since early January 2025, cybercriminals have been utilizing the ClickFix method to distribute a remote access trojan known as NetSupport RAT. This malware, often spread through deceptive websites and fraudulent browser updates, provides attackers with full control of the victim’s device. This access allows them to monitor the screen in real time, manipulate the keyboard and mouse, upload and download files, and execute harmful commands.

Originally developed as a legitimate tool for IT support under the name NetSupport Manager, the software has been weaponized by malicious actors to target organizations and harvest sensitive information, including screenshots, audio, video, and files. According to eSentire, “ClickFix involves injecting a fake CAPTCHA webpage onto compromised sites, tricking users into executing malicious PowerShell commands that download and activate malware payloads.”

  • August 2, 2025

Gcore DDoS Radar Report Highlights 56% Yearly Surge in DDoS Attacks

February 11, 2025
IoT Security / Cloud Security

The latest Gcore DDoS Radar report, which examines attack data from Q3 to Q4 2024, shows a staggering 56% year-over-year increase in DDoS attacks, with the largest recorded attack reaching 2 Tbps. The financial services sector experienced the most significant rise, with attacks jumping by 117%, while the gaming industry continued to be the primary target. These findings underscore the urgent need for robust and adaptive DDoS mitigation strategies as attacks grow both in frequency and precision.

Key Insights on the Future of DDoS Defense

Here are four crucial takeaways from the Gcore Radar report:

  1. Volume and Sophistication of DDoS Attacks on the Rise: A 17% increase in total attacks, coupled with a new peak volume of 2 Tbps, highlights the pressing necessity for advanced protective measures.

  2. Growing Risks for Financial Services: The 117% spike in attacks within this sector signals an urgent need for enhanced security protocols.

  3. Shift Towards Shorter, High-Intensity Attacks: The prevalence of rapid burst attacks necessitates a reevaluation of traditional mitigation strategies, which may no longer be sufficient.

Let’s explore the data in detail.

  • August 1, 2025

Real-time data breach monitoring by scanning public databases, criminal forums, and online markets to detect exposed credentials and sensitive data.

Industries
  • Enterprise Security Teams
  • Financial Services
  • Retail and E-commerce
  • Legal Services
  • Law Enforcement
Commonly Used For
  • Penetration Testing
  • M&A Risk Research
  • Vulnerability Assessment
  • Red Team Operation
  • Enterprise Security
Contact Us

Need help or have a question?

Email: [email protected]
Phone: +1 (914) 2943243

Copyright © 2025 - Breachspot, Security Breaches Spotted