Google Adds 24-Hour Wait for Unverified App Sideloading to Reduce Malware and Scams
Ravie LakshmananMar 20, 2026Data Privacy / Mobile Security Google on Thursday announced…
Android 17 Blocks Non-Accessibility Apps from Accessibility API to Prevent Malware Abuse
Ravie LakshmananMar 16, 2026Mobile Security / Data Protection Google is testing a…
Cloud attacks exploit flaws more than weak credentials
Hackers are increasingly exploiting newly disclosed vulnerabilities in third-party software to gain…
Former Google Engineers Indicted Over Trade Secret Transfers to Iran
Ravie LakshmananFeb 20, 2026Insider Threat / Corporate Espionage Two former Google engineers…
Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup
Ravie LakshmananJan 30, 2026Artificial Intelligence / Economic Espionage A former Google engineer…
Mandiant Finds ShinyHunters-Style Vishing Attacks Stealing MFA to Breach SaaS Platforms
Ravie LakshmananJan 31, 2026Social Engineering / SaaS Security Google-owned Mandiant on Friday…
WinRAR path traversal flaw still exploited by numerous hackers
Multiple threat actors, both state-sponsored and financially motivated, are exploiting the CVE-2025-8088 high-severity vulnerability…
Critical WhisperPair flaw lets hackers track, eavesdrop via Bluetooth audio devices
Security researchers have discovered a critical vulnerability in Google's Fast Pair protocol…
South Korea limits foreign crypto exchange access as Google Play enforces licensing
Only VASP-registered platforms will stay available on the Play Store. Local exchanges…


