Tag Google

Google Takes Legal Action Against Lighthouse Smishing Operators

Identity & Access Management, Litigation, Security Operations More Than 1M Victims Affected Globally Pooja Tikekar (@PoojaTikekar) • November 14, 2025 Image: Shutterstock In a significant legal maneuver, Google has filed a lawsuit against operators of a phishing-as-a-service platform known as Lighthouse, alleging that this enterprise is responsible for orchestrating a…

Read MoreGoogle Takes Legal Action Against Lighthouse Smishing Operators

Are We Entering the Quantum Decade?

Encryption & Key Management, Next-Generation Technologies & Secure Development, Security Operations Rising Enterprise Applications and International Initiatives Propel Us Into a Quantum Future Brian Pereira (creed_digital) • November 14, 2025 Image: Shutterstock In 2025, quantum computing has risen to prominence, particularly due to the surge in discussions surrounding post-quantum cryptography.…

Read MoreAre We Entering the Quantum Decade?

The Retail Industry Requires a Cybersecurity Talent Development Hub

The retail sector is increasingly under siege from cybercriminals, facing breaches at an alarming rate that surpasses many other industries. High-profile brands such as Louis Vuitton and Dior have recently been victims of these attacks, which may have cost them collectively over $25 million. Additionally, cybersecurity experts at Google have…

Read MoreThe Retail Industry Requires a Cybersecurity Talent Development Hub

Google Resolves GCP Composer Vulnerability That Risked Remote Code Execution

In a significant security update, Google has patched a critical vulnerability in its Cloud Platform (GCP) Composer service. This flaw, identified by Tenable Research and labeled as CloudImposer, had the potential for attackers to execute remote code on GCP servers. Exploitation routes included a supply chain attack method termed dependency…

Read MoreGoogle Resolves GCP Composer Vulnerability That Risked Remote Code Execution

Google Claims This Platform Is Behind a ‘Staggering’ Scam Text Operation

Recent reports indicate a significant increase in fraudulent activities conducted by Chinese cybercriminals, who have successfully scammed individuals worldwide, primarily through the use of deceptive text messages. These messages often impersonate reputable entities such as the United States Postal Service or toll-road collection agencies, leading to the extraction of more…

Read MoreGoogle Claims This Platform Is Behind a ‘Staggering’ Scam Text Operation

Google’s Transition to Rust Programming Reduces Android Memory Vulnerabilities by 68%

Google has announced a significant development in its security measures, revealing a substantial reduction in memory-related vulnerabilities within the Android operating system. Over the last six years, the percentage of memory-safe vulnerabilities has dramatically decreased from 76% to just 24%. This shift aligns with the company’s secure-by-design approach, which has…

Read MoreGoogle’s Transition to Rust Programming Reduces Android Memory Vulnerabilities by 68%

Cisco Alerts Users to Critical Vulnerabilities in Widely Used Open-Weight AI Models

Key Insights: Cisco researchers identified significant security vulnerabilities in several popular open-weight AI models. Multi-turn adversarial attacks were found to be substantially more effective than single interactions. These findings highlight critical concerns regarding AI safety, data privacy, and the integrity of AI models. Cisco has uncovered critical security vulnerabilities in…

Read MoreCisco Alerts Users to Critical Vulnerabilities in Widely Used Open-Weight AI Models

Google Researchers Uncover a New Variant of the Rowhammer Attack

A recent development in cybersecurity has emerged as Google’s security researchers unveiled a new variant of the Rowhammer vulnerability, named “Half-Double”. This technique exploits the inherent weaknesses in modern DRAM chips, enabling attackers to bypass existing protections and pose a significant threat to chip security. The Half-Double technique operates on…

Read MoreGoogle Researchers Uncover a New Variant of the Rowhammer Attack