#google-threat

[ follow ]
#ai-innovation
Artificial intelligence
fromTechRepublic
18 hours ago

AI Upgrades, Security Breaches, and Industry Shifts Define This Week in Tech - TechRepublic

AI innovation and security threats are reshaping technology and corporate strategies across various platforms and applications.
Artificial intelligence
fromTechRepublic
2 weeks ago

AI Breakthroughs, Security Breaches, and Industry Shakeups Define the Week in Tech - TechRepublic

Tech industry faces rapid AI advancements alongside significant security vulnerabilities and human costs.
Artificial intelligence
fromTechRepublic
18 hours ago

AI Upgrades, Security Breaches, and Industry Shifts Define This Week in Tech - TechRepublic

AI innovation and security threats are reshaping technology and corporate strategies across various platforms and applications.
Artificial intelligence
fromTechRepublic
2 weeks ago

AI Breakthroughs, Security Breaches, and Industry Shakeups Define the Week in Tech - TechRepublic

Tech industry faces rapid AI advancements alongside significant security vulnerabilities and human costs.
Information security
fromHarvard Gazette
12 hours ago

Time for government, business leaders to figure out AI cybersecurity regulation - Harvard Gazette

Agentic AI poses both opportunities for cybersecurity and risks to personal data, economy, and national security, necessitating regulation by leaders.
#privacy
Privacy professionals
fromKqed
3 days ago

What Is the Point of California's Privacy Laws if Big Tech Ignores Them? | KQED

Google's non-compliance with the Global Privacy Control opt-out signal is evident in network traffic.
Privacy technologies
fromComputerWeekly.com
16 hours ago

Privacy, power, and encryption: why end-to-end security matters | Computer Weekly

Privacy is a fundamental human condition, and end-to-end encryption is essential for protecting communications in a surveillance-heavy world.
Privacy professionals
fromKqed
3 days ago

What Is the Point of California's Privacy Laws if Big Tech Ignores Them? | KQED

Google's non-compliance with the Global Privacy Control opt-out signal is evident in network traffic.
Startup companies
fromFast Company
11 hours ago

Shuttered startups are selling old Slack chats and emails to AI companies

Defunct startups are monetizing their digital data by selling it to AI companies, raising significant privacy concerns.
#data-breach
Information security
fromTechCrunch
4 days ago

Hack at Anodot leaves over a dozen breached companies facing extortion | TechCrunch

Hackers stole data from multiple companies after breaching Anodot, exposing customers to extortion and potential data publication.
Information security
fromTechCrunch
4 days ago

Hack at Anodot leaves over a dozen breached companies facing extortion | TechCrunch

Hackers stole data from multiple companies after breaching Anodot, exposing customers to extortion and potential data publication.
Digital life
fromEntrepreneur
14 hours ago

This Tech Investor Hasn't Touched a Laptop or Desktop Computer Since 2010. Here's Why.

Keith Rabois has operated without laptops since 2010, using only mobile devices for increased focus and productivity.
EU data protection
fromComputerWeekly.com
1 day ago

CYBERUK '26: UK lagging on legal protections for cyber pros | Computer Weekly

The outdated Computer Misuse Act hinders UK cyber security innovation and needs urgent reform to protect cyber professionals.
Books
fromSlate Magazine
22 hours ago

A New Kind of Scandal Is Growing Online. It's Ruining Careers-and Aimed at the Wrong Target.

A.I. detection controversies highlight concerns over authorship and the impact of technology on writing.
#generative-ai
Marketing tech
fromSFGATE
1 day ago

AI is a gold mine for spammers and scammers, but Google is using it as a tool to fight back

Generative AI tools have intensified online spam and scams, prompting tech giants like Google to enhance their defenses against these threats.
Marketing tech
fromAP News
1 day ago

AI is a gold mine for spammers and scammers, but Google is using it as a tool to fight back

Generative AI tools have intensified online spam and scams, prompting tech companies like Google to enhance their defenses against malicious ads.
Marketing tech
fromSFGATE
1 day ago

AI is a gold mine for spammers and scammers, but Google is using it as a tool to fight back

Generative AI tools have intensified online spam and scams, prompting tech giants like Google to enhance their defenses against these threats.
Marketing tech
fromAP News
1 day ago

AI is a gold mine for spammers and scammers, but Google is using it as a tool to fight back

Generative AI tools have intensified online spam and scams, prompting tech companies like Google to enhance their defenses against malicious ads.
#artificial-intelligence
SF politics
fromSecurityWeek
22 hours ago

Lawmakers Gathered Quietly to Talk About AI. Angst and Fears of 'Destruction' Followed

Lawmakers expressed significant concerns about the implications of artificial intelligence on government operations, military actions, and societal impacts.
Artificial intelligence
fromFortune
3 days ago

From Molotov cocktails to data center shutdowns, the AI backlash is turning revolutionary | Fortune

Recent violent incidents against AI leaders highlight escalating tensions surrounding artificial intelligence and its perceived threats to humanity.
SF politics
fromSecurityWeek
22 hours ago

Lawmakers Gathered Quietly to Talk About AI. Angst and Fears of 'Destruction' Followed

Lawmakers expressed significant concerns about the implications of artificial intelligence on government operations, military actions, and societal impacts.
Artificial intelligence
fromFortune
3 days ago

From Molotov cocktails to data center shutdowns, the AI backlash is turning revolutionary | Fortune

Recent violent incidents against AI leaders highlight escalating tensions surrounding artificial intelligence and its perceived threats to humanity.
Media industry
fromFast Company
23 hours ago

The stigma around AI in journalism may be easing, but trust is still fragile

There is a growing acceptance of AI in journalism, despite initial reluctance and a recent controversy over AI-generated content.
Careers
fromFortune
1 day ago

This CEO pirated video games as a teen and became a hacker for the Air Force. Now he's built a $3 billion cyber firm | Fortune

Gen Z should trust instincts in career paths, as demonstrated by Kyle Hanslovan's unconventional journey to CEO of a $3 billion cybersecurity firm.
Apple
fromTNW | Tech
1 day ago

Apple secretly threatened to pull Grok from the App Store over deepfake nudes

Apple threatened to remove xAI's Grok app from the App Store due to non-compliance with content guidelines regarding non-consensual deepfakes.
Social media marketing
fromAdExchanger
2 days ago

Rewards App Faces Data Broker Accusations; Apple Loves Advertising, Apparently | AdExchanger

Freecash faced allegations of extracting sensitive user data while promoting itself as a rewards app, leading to its removal from the App Store.
#anthropic
Software development
fromTheregister
2 days ago

Anthropic's Project Glasswing CVE count is still guesswork

Anthropic's Mythos model is under testing by select companies to identify security vulnerabilities, but actual findings remain uncertain.
Artificial intelligence
fromThe Verge
12 hours ago

Anthropic's new cybersecurity model could get it back in the government's good graces

Anthropic's relationship with the Trump administration has improved due to its new cybersecurity model, Claude Mythos Preview.
Software development
fromTheregister
2 days ago

Anthropic's Project Glasswing CVE count is still guesswork

Anthropic's Mythos model is under testing by select companies to identify security vulnerabilities, but actual findings remain uncertain.
Artificial intelligence
fromThe Verge
12 hours ago

Anthropic's new cybersecurity model could get it back in the government's good graces

Anthropic's relationship with the Trump administration has improved due to its new cybersecurity model, Claude Mythos Preview.
#ai-security
Venture
fromSecurityWeek
2 days ago

Capsule Security Emerges From Stealth With $7 Million in Funding

Capsule Security provides a security layer for AI agents to prevent manipulation and ensure safe operations.
Information security
fromTNW | Anthropic
2 days ago

Anthropic, Google, and Microsoft paid AI agent bug bounties, then kept quiet about the flaws

Aonan Guan exploited prompt injection attacks to hijack AI agents from Anthropic, Google, and Microsoft, stealing sensitive API keys and tokens.
Venture
fromSecurityWeek
2 days ago

Capsule Security Emerges From Stealth With $7 Million in Funding

Capsule Security provides a security layer for AI agents to prevent manipulation and ensure safe operations.
Information security
fromTNW | Anthropic
2 days ago

Anthropic, Google, and Microsoft paid AI agent bug bounties, then kept quiet about the flaws

Aonan Guan exploited prompt injection attacks to hijack AI agents from Anthropic, Google, and Microsoft, stealing sensitive API keys and tokens.
#uk
UK politics
fromTheregister
2 days ago

UK told its Big Tech habit is now a national security risk

Britain's reliance on US Big Tech poses national security risks and economic challenges due to control over critical infrastructure.
EU data protection
fromComputerWeekly.com
4 days ago

UK reliance on US big tech companies is 'national security risk', claims report | Computer Weekly

The UK is at risk due to over-reliance on US tech companies for critical infrastructure, impacting national security.
UK politics
fromTheregister
2 days ago

UK told its Big Tech habit is now a national security risk

Britain's reliance on US Big Tech poses national security risks and economic challenges due to control over critical infrastructure.
EU data protection
fromComputerWeekly.com
4 days ago

UK reliance on US big tech companies is 'national security risk', claims report | Computer Weekly

The UK is at risk due to over-reliance on US tech companies for critical infrastructure, impacting national security.
SOMA, SF
fromKqed
3 days ago

DOJ: Man Who Attacked Sam Altman's House Threatened to Kill Other Tech CEOs | KQED

A Texas man faces charges for attempted murder of OpenAI CEO Sam Altman after violent attacks at his home and company headquarters.
#cybersecurity
fromTechCrunch
14 hours ago
Information security

Hackers are abusing unpatched Windows security flaws to hack into organizations | TechCrunch

Information security
fromSecurityWeek
20 hours ago

In Other News: Satellite Cybersecurity Act, $90K Chrome Flaw, Teen Hacker Arrested

Senate legislation aims to enhance satellite cybersecurity amid rising threats and vulnerabilities in commercial satellite signals.
Information security
fromTechCrunch
14 hours ago

Hackers are abusing unpatched Windows security flaws to hack into organizations | TechCrunch

Hackers exploited Windows vulnerabilities published by a researcher, affecting Windows Defender and allowing high-level access.
Information security
fromSecurityWeek
20 hours ago

In Other News: Satellite Cybersecurity Act, $90K Chrome Flaw, Teen Hacker Arrested

Senate legislation aims to enhance satellite cybersecurity amid rising threats and vulnerabilities in commercial satellite signals.
Privacy technologies
fromYahoo Tech
1 week ago

Hackers Are Using Your Home Router to Spy on Microsoft 365 Users

Russian spies exploited consumer routers to steal Microsoft 365 credentials from thousands of users, turning home devices into espionage tools.
#ai-governance
fromFortune
16 hours ago
Artificial intelligence

AI cybersecurity capabilities require urgent international cooperation, AI godfather Bengio says | Fortune

Yoshua Bengio emphasizes the urgent need for international cooperation in addressing AI's risks, particularly with the release of Anthropic's Mythos model.
Artificial intelligence
fromFortune
16 hours ago

AI cybersecurity capabilities require urgent international cooperation, AI godfather Bengio says | Fortune

Yoshua Bengio emphasizes the urgent need for international cooperation in addressing AI's risks, particularly with the release of Anthropic's Mythos model.
Privacy technologies
fromAbove the Law
18 hours ago

438 Experts Said Age Verification Is Dangerous. Legislators Are Moving Forward With It Anyway. - Above the Law

Age verification mandates for the internet are technically flawed, threaten privacy, and may cause more harm than good, according to 438 researchers from 32 countries.
#ransomware
Privacy professionals
fromFortune
1 day ago

As a small business owner, I never expected to pay $100,000 protecting my business from ransomware | Fortune

Ransomware attacks can severely impact small businesses, leading to significant recovery costs despite having cyber insurance.
Privacy professionals
fromFortune
1 day ago

As a small business owner, I never expected to pay $100,000 protecting my business from ransomware | Fortune

Ransomware attacks can severely impact small businesses, leading to significant recovery costs despite having cyber insurance.
Software development
fromZDNET
2 days ago

'Like handing out the blueprint to a bank vault': Why AI led one company to abandon open source

Cal is shifting from open source to proprietary licensing due to security risks posed by modern AI tools.
Media industry
fromTechCrunch
2 days ago

Exclusive: Can AI judge journalism? A Thiel-backed startup says yes, even if it risks chilling whistleblowers

Aron D'Souza's startup Objection uses AI to challenge journalism claims, aiming to restore trust in media.
Digital life
fromwww.dw.com
3 days ago

Dangerous Apps In the Web of Data Brokers

Smartphone apps collect detailed location data, often shared with data brokers, posing security risks to users, including soldiers and government officials.
Information security
fromArs Technica
21 hours ago

Recent advances push Big Tech closer to the Q-Day danger zone

Organizations are transitioning to new algorithms to replace RSA and elliptic curves due to vulnerabilities exposed by quantum computing threats.
#apple-intelligence
Apple
fromTheregister
1 week ago

Security reserchers tricked Apple Intelligence into cursing

Apple Intelligence can be hijacked through prompt injection, exposing millions of users to risk, but a fix was implemented in iOS 26.4 and macOS 26.4.
Apple
fromSecurityWeek
1 week ago

Apple Intelligence AI Guardrails Bypassed in New Attack

Researchers have successfully bypassed Apple's AI safety protocols using adversarial techniques, allowing for the execution of arbitrary tasks and manipulation of private data.
Apple
fromTheregister
1 week ago

Security reserchers tricked Apple Intelligence into cursing

Apple Intelligence can be hijacked through prompt injection, exposing millions of users to risk, but a fix was implemented in iOS 26.4 and macOS 26.4.
Apple
fromSecurityWeek
1 week ago

Apple Intelligence AI Guardrails Bypassed in New Attack

Researchers have successfully bypassed Apple's AI safety protocols using adversarial techniques, allowing for the execution of arbitrary tasks and manipulation of private data.
Privacy professionals
fromExtremeTech
1 day ago

Google, Microsoft, and Meta Ignore Your Ad Tracking Opt-Outs, Audit Reveals

Google, Microsoft, and Meta track users' browsing habits despite opt-out requests, violating privacy regulations.
Artificial intelligence
fromFuturism
14 hours ago

There Are Signs of a Massive AI Backlash

Public outrage against the tech industry's AI focus is escalating, leading to protests and political backlash against data centers and AI development.
Privacy technologies
fromPetaPixel
1 day ago

Apple and Google Direct Users to AI 'Nudify' Apps: Report

Apple and Google facilitate access to nudify apps that create deepfake nude images despite policies against nonconsensual sexualized content.
#ai
fromFortune
4 days ago
Information security

Anthropic caused panic that Mythos will expose cybersecurity weak spots, but one industry veteran says real problem is fixing, not finding, them | Fortune

Information security
fromSecurityWeek
1 day ago

OpenAI Widens Access to Cybersecurity Model After Anthropic's Mythos Reveal

OpenAI launched GPT-5.4-Cyber, a cybersecurity AI model, expanding access to verified defenders and enhancing capabilities for vulnerability analysis.
Information security
fromThe Hacker News
3 days ago

OpenAI Launches GPT-5.4-Cyber with Expanded Access for Security Teams

OpenAI launched GPT-5.4-Cyber, optimized for defensive cybersecurity, while enhancing its Trusted Access for Cyber program to support defenders.
Information security
fromTechzine Global
4 days ago

Runtime security becomes critical as AI accelerates threats

Artificial intelligence accelerates innovation and cyber threats, necessitating a focus on runtime security for effective enterprise protection.
Information security
fromFortune
4 days ago

Anthropic caused panic that Mythos will expose cybersecurity weak spots, but one industry veteran says real problem is fixing, not finding, them | Fortune

Anthropic's Claude Mythos Preview AI model identifies cybersecurity vulnerabilities, but experts question its impact on fixing existing issues.
#nudify-apps
Privacy technologies
fromEngadget
2 days ago

Apple and Google are reportedly pointing users to nudify apps

Apple and Google continue to promote nudify apps despite policies against such content, raising concerns about their enforcement and user safety.
Privacy technologies
fromDigital Trends
1 day ago

Damning report finds Apple and Google's app stores boosting nudify apps

Apple and Google are promoting harmful nudify apps through their search and advertising systems, despite policies against adult content.
Privacy technologies
fromEngadget
2 days ago

Apple and Google are reportedly pointing users to nudify apps

Apple and Google continue to promote nudify apps despite policies against such content, raising concerns about their enforcement and user safety.
Privacy technologies
fromDigital Trends
1 day ago

Damning report finds Apple and Google's app stores boosting nudify apps

Apple and Google are promoting harmful nudify apps through their search and advertising systems, despite policies against adult content.
Privacy professionals
fromSecurityWeek
4 days ago

BrowserGate: Claims of LinkedIn 'Spying' Clash With Security Research Findings

LinkedIn allegedly scans users' computers to collect data on browser extensions, raising concerns about corporate espionage.
#openai
Artificial intelligence
fromFortune
1 day ago

Attacks on Sam Altman's home are extreme. But the AI backlash is going mainstream | Fortune

OpenAI faces increasing public concern and backlash over AI's societal impacts, highlighted by recent violent incidents involving its CEO.
Information security
fromAxios
3 days ago

OpenAI expands access to cyber AI as hacking risks grow

OpenAI is shifting to a model that emphasizes identity verification for access to sensitive cybersecurity tools while expanding availability.
Information security
fromWIRED
3 days ago

In the Wake of Anthropic's Mythos, OpenAI Has a New Cybersecurity Model-and Strategy

OpenAI announced GPT-5.4-Cyber, emphasizing cybersecurity safeguards and the need for advanced protections in AI models.
Artificial intelligence
fromFortune
1 day ago

Attacks on Sam Altman's home are extreme. But the AI backlash is going mainstream | Fortune

OpenAI faces increasing public concern and backlash over AI's societal impacts, highlighted by recent violent incidents involving its CEO.
Information security
fromAxios
3 days ago

OpenAI expands access to cyber AI as hacking risks grow

OpenAI is shifting to a model that emphasizes identity verification for access to sensitive cybersecurity tools while expanding availability.
Information security
fromWIRED
3 days ago

In the Wake of Anthropic's Mythos, OpenAI Has a New Cybersecurity Model-and Strategy

OpenAI announced GPT-5.4-Cyber, emphasizing cybersecurity safeguards and the need for advanced protections in AI models.
Privacy professionals
fromwww.bbc.com
3 days ago

Palantir defends its record as MPs demand more scrutiny of data use

Palantir defends its NHS data contracts amid scrutiny, emphasizing its role in integrating fragmented healthcare systems and ensuring data security.
#north-korea
Privacy professionals
fromThe Verge
3 days ago

Privacy advocates want Google to stop handing consumer data over to ICE

Google is being investigated for allegedly failing to notify users before disclosing their data to law enforcement.
#microsoft
Privacy technologies
fromThe Verge
2 days ago

Microsoft faces fresh Windows Recall security concerns

A new tool, TotalRecall Reloaded, extracts data from Microsoft's redesigned Recall feature, raising ongoing security and privacy concerns.
Privacy technologies
fromThe Verge
2 days ago

Microsoft faces fresh Windows Recall security concerns

A new tool, TotalRecall Reloaded, extracts data from Microsoft's redesigned Recall feature, raising ongoing security and privacy concerns.
Artificial intelligence
fromWIRED
2 days ago

AI Could Democratize One of Tech's Most Valuable Resources

Nvidia faces potential competition as startups like Wafer optimize AI code for various chips, challenging its dominance in AI hardware.
Privacy professionals
fromRoute Fifty
4 days ago

Getting privacy policy right in a competitive digital economy

State and local leaders aim to balance privacy protection with economic competitiveness, as inconsistent privacy laws can hinder business operations and consumer trust.
Information security
fromDevOps.com
14 hours ago

The Open Source Trap: Why Trust Isn't a Security Strategy - DevOps.com

The software supply chain is vulnerable due to reliance on under-resourced open source maintainers, requiring active organizational support for security.
Information security
fromThe Hacker News
18 hours ago

Three Microsoft Defender Zero-Days Actively Exploited; Two Still Unpatched

Threat actors are exploiting three vulnerabilities in Microsoft Defender for elevated privileges, with one flaw already addressed by Microsoft.
#malware
fromSecurityWeek
2 days ago
Information security

$10 Domain Could Have Handed Hackers 25k Endpoints, Including in OT and Gov Networks

Information security
fromSecurityWeek
2 days ago

$10 Domain Could Have Handed Hackers 25k Endpoints, Including in OT and Gov Networks

A sophisticated threat disguised as adware compromised over 25,000 endpoints, allowing silent control through an unregistered domain.
Artificial intelligence
fromForbes
4 days ago

The Hottest Debate In Tech: Ads In AI

The debate in AI centers on the introduction of advertising in chatbot interactions and the financial implications of running AI systems.
Information security
fromTechRepublic
1 day ago

McGraw-Hill Confirms Data Exposure, Hackers Claim 45M Salesforce Records Leaked

Unauthorized access to limited internal data at McGraw-Hill was linked to a Salesforce misconfiguration, raising concerns about potential identity fraud and harassment.
Information security
fromComputerWeekly.com
1 day ago

Cyber Essentials closes the MFA loophole but leaves some organisations adrift | Computer Weekly

Multi-factor authentication becomes mandatory under Cyber Essentials v3.3, with no exceptions for organizations failing to implement it.
Information security
fromComputerworld
1 day ago

Cisco Systems issues three advisories for critical vulnerabilities in Webex, ISE

Identity and access management is crucial for cybersecurity, with a focus on IAM hygiene necessary to mitigate risks from vulnerabilities.
Information security
fromSecurityWeek
2 days ago

100 Chrome Extensions Steal User Data, Create Backdoor

Over 20,000 users installed malicious Chrome extensions that steal information, provide backdoors, or inject ads, as reported by cybersecurity firm Socket.
#cisco
Information security
fromThe Hacker News
1 day ago

Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution

Cisco has released patches for four critical security vulnerabilities in Identity Services and Webex Services that could allow unauthorized access and code execution.
Information security
fromSecurityWeek
1 day ago

Cisco Patches Critical Vulnerabilities in Webex, ISE

Cisco patched 15 vulnerabilities, including critical flaws in Webex and Identity Services Engine, allowing potential unauthorized access and command execution.
Information security
fromThe Hacker News
1 day ago

Cisco Patches Four Critical Identity Services, Webex Flaws Enabling Code Execution

Cisco has released patches for four critical security vulnerabilities in Identity Services and Webex Services that could allow unauthorized access and code execution.
Information security
fromSecurityWeek
1 day ago

Cisco Patches Critical Vulnerabilities in Webex, ISE

Cisco patched 15 vulnerabilities, including critical flaws in Webex and Identity Services Engine, allowing potential unauthorized access and command execution.
Information security
fromArs Technica
3 days ago

UK gov's Mythos AI tests help separate cybersecurity threat from hype

Mythos outperformed previous models in TLO tests, showing capability in attacking vulnerable systems but still facing limitations in complex scenarios.
Information security
fromTechzine Global
3 days ago

Attackers are targeting developers via Slack and Google Sites

A targeted phishing campaign exploits trust in the open-source community, tricking developers into providing credentials and installing malicious software.
Information security
fromThe Hacker News
3 days ago

Analysis of 216M Security Findings Shows a 4x Increase In Critical Risk (2026 Report)

Critical risk findings surged by nearly 400% amid a 52% increase in raw alert volume, driven by AI-assisted development.
Information security
fromThe Hacker News
1 week ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
[ Load more ]