Tag Google

CISA Warns of OT Vulnerabilities Following Polish Power Grid Cyberattack

Cybersecurity Incident Roundup: Key Developments in Data Breaches and Cyber-attacks Recent weeks have seen significant cybersecurity incidents impacting various sectors, with agencies and organizations navigating the evolving landscape of cyber threats. Among the most pressing events, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued warnings following a cyberattack…

Read MoreCISA Warns of OT Vulnerabilities Following Polish Power Grid Cyberattack

From Ransomware to Cyber Espionage: 55 Weaponized Zero-Day Vulnerabilities Discovered in 2022

In 2022, a total of 55 zero-day vulnerabilities were actively exploited in the wild, primarily affecting software developed by major tech companies including Microsoft, Google, and Apple. This figure shows a decrease from the previous year’s alarming count of 81 zero-day exploits, yet it highlights an ongoing trend where threat…

Read MoreFrom Ransomware to Cyber Espionage: 55 Weaponized Zero-Day Vulnerabilities Discovered in 2022

Spyware Vendors Exposed for Exploiting Zero-Day Vulnerabilities in Android and iOS Devices

Recent investigations by Google’s Threat Analysis Group (TAG) have uncovered the exploitation of several zero-day vulnerabilities last year, employed by commercial spyware vendors to target mobile devices on both Android and iOS platforms. These two separate yet focused campaigns exploited the vulnerability gap that occurs between the announcement of fixes…

Read MoreSpyware Vendors Exposed for Exploiting Zero-Day Vulnerabilities in Android and iOS Devices

EU Greenlights $32B Google-Wiz Acquisition Following Antitrust Evaluation

Cloud Security, Cloud-Native Application Protection Platform (CNAPP), Security Operations European Commission Dismisses Concerns Over Multi-Cloud Competition Michael Novinson ( MichaelNovinson) • February 10, 2026 The European Commission has approved Google’s $32 billion acquisition of Wiz, a leading cloud security company, citing no significant competition concerns stemming from the transaction. The…

Read MoreEU Greenlights $32B Google-Wiz Acquisition Following Antitrust Evaluation

Google Alert: Ongoing Cyber Assault Targeting Defense Sector

Cyberwarfare / Nation-State Attacks, Fraud Management & Cybercrime Nation-State Hackers Escalate Attacks on U.S. Defense Industrial Base, Report Finds Chris Riotta (@chrisriotta) • February 10, 2026 Image: Ramunas Bruzas/Shutterstock A recent threat intelligence report by Google reveals a concerning trend of escalating cyberattacks aimed at the U.S. defense industrial base.…

Read MoreGoogle Alert: Ongoing Cyber Assault Targeting Defense Sector

Google Unveils New Cybersecurity Initiatives to Enhance Vulnerability Management

On Thursday, Google announced a series of initiatives aimed at bolstering the vulnerability management landscape and enhancing transparency regarding exploitation. The company underscored the ongoing risks associated with vulnerabilities, emphasizing that even after being discovered and patched, threats can linger due to various factors within the ecosystem. “Zero-day vulnerabilities may…

Read MoreGoogle Unveils New Cybersecurity Initiatives to Enhance Vulnerability Management

Google Issues Critical Chrome Update to Address Actively Exploited Zero-Day Vulnerability

On Friday, Google issued urgent updates to its Chrome web browser, addressing an actively exploited zero-day vulnerability. This critical security flaw, identified as CVE-2023-2033, marks the first major bug fix of the year. The vulnerability, classified as a high-severity type confusion issue within the V8 JavaScript engine, poses significant risks…

Read MoreGoogle Issues Critical Chrome Update to Address Actively Exploited Zero-Day Vulnerability

[Guide] Safeguarding Your Devices from Meltdown and Spectre Attacks

In a significant development for cybersecurity, two critical vulnerabilities in processor architecture—dubbed Meltdown and Spectre—have come to light, prompting urgent responses from technology vendors aimed at mitigating the associated risks. These vulnerabilities affect a vast range of modern processors and pose threats to virtually all operating systems, including Windows, Linux,…

Read More[Guide] Safeguarding Your Devices from Meltdown and Spectre Attacks