Tag Google

Alert: Active Exploitation of New Android Zero-Day Vulnerability

Google has alerted the cybersecurity community about an exploited vulnerability in Android devices utilizing Qualcomm chipsets. The vulnerability, identified as CVE-2020-11261, has been assigned a CVSS score of 8.4 and relates to improper input validation in the Graphics component of Qualcomm’s software. This flaw could potentially allow attackers to cause…

Read MoreAlert: Active Exploitation of New Android Zero-Day Vulnerability

Google Discovers New Malware Backdoors Associated with Iran

Cyberwarfare / Nation-State Attacks, Fraud Management & Cybercrime Iranian Hacking Group Unleashes Array of Custom Malware Variants Akshaya Asokan (asokan_akshaya) • November 18, 2025 Image: Evgeniyqw/Shutterstock Google has issued a warning regarding a state-sponsored Iranian hacking group known for targeting the aerospace and defense sectors in the Middle East. This…

Read MoreGoogle Discovers New Malware Backdoors Associated with Iran

Hackers Create Fake Cybersecurity Company to Exploit Security Experts

A renewed campaign backed by the North Korean government is targeting cybersecurity researchers through sophisticated social engineering tactics involving malware. This resurgence was detailed in a recent report from Google’s Threat Analysis Group (TAG). According to TAG, the attackers established a fictitious security firm named SecuriElite and created multiple social…

Read MoreHackers Create Fake Cybersecurity Company to Exploit Security Experts

Google Takes Legal Action Against Lighthouse Smishing Operators

Identity & Access Management, Litigation, Security Operations More Than 1M Victims Affected Globally Pooja Tikekar (@PoojaTikekar) • November 14, 2025 Image: Shutterstock In a significant legal maneuver, Google has filed a lawsuit against operators of a phishing-as-a-service platform known as Lighthouse, alleging that this enterprise is responsible for orchestrating a…

Read MoreGoogle Takes Legal Action Against Lighthouse Smishing Operators

Are We Entering the Quantum Decade?

Encryption & Key Management, Next-Generation Technologies & Secure Development, Security Operations Rising Enterprise Applications and International Initiatives Propel Us Into a Quantum Future Brian Pereira (creed_digital) • November 14, 2025 Image: Shutterstock In 2025, quantum computing has risen to prominence, particularly due to the surge in discussions surrounding post-quantum cryptography.…

Read MoreAre We Entering the Quantum Decade?

The Retail Industry Requires a Cybersecurity Talent Development Hub

The retail sector is increasingly under siege from cybercriminals, facing breaches at an alarming rate that surpasses many other industries. High-profile brands such as Louis Vuitton and Dior have recently been victims of these attacks, which may have cost them collectively over $25 million. Additionally, cybersecurity experts at Google have…

Read MoreThe Retail Industry Requires a Cybersecurity Talent Development Hub

Google Resolves GCP Composer Vulnerability That Risked Remote Code Execution

In a significant security update, Google has patched a critical vulnerability in its Cloud Platform (GCP) Composer service. This flaw, identified by Tenable Research and labeled as CloudImposer, had the potential for attackers to execute remote code on GCP servers. Exploitation routes included a supply chain attack method termed dependency…

Read MoreGoogle Resolves GCP Composer Vulnerability That Risked Remote Code Execution

Google Claims This Platform Is Behind a ‘Staggering’ Scam Text Operation

Recent reports indicate a significant increase in fraudulent activities conducted by Chinese cybercriminals, who have successfully scammed individuals worldwide, primarily through the use of deceptive text messages. These messages often impersonate reputable entities such as the United States Postal Service or toll-road collection agencies, leading to the extraction of more…

Read MoreGoogle Claims This Platform Is Behind a ‘Staggering’ Scam Text Operation