Bringing Rust to the Pixel Baseband
Posted by Jiacheng Lu, Software Engineer, Google Pixel Team Google is continuously advancing the security of Pixel devices. We have been focusing on hardenin...
Highly organized RaaS that leaked its own playbook in 2022. Responsible for attacks on the Irish Health Service and Costa Rican government.
Also known as: conti ransomware, conti gang, conti malware
Posted by Jiacheng Lu, Software Engineer, Google Pixel Team Google is continuously advancing the security of Pixel devices. We have been focusing on hardenin...
Iranian hacking group Handala has declared continuous cyberattacks against Israel and an imminent resumption of cyber operations against the U.S.
Security researchers from Access Now and Lookout have detailed a sophisticated espionage campaign that began in 2023 and continued through 2025.
Threat actors are employing a custom Python scanner that continuously probes cloud IP ranges for vulnerable ComfyUI deployments.
Online crime continues to generate rising financial losses, with totals reaching $20.877 billion in 2025.
The industry needs tools that can verify users throughout the entire identity lifecycle without disrupting daily business processes.
Microsoft, Google, Meta and Snapchat released a statement on Friday saying they “reaffirm their continued commitment to protecting children and preserving pr...
Security spending continues to edge upward across large organizations, though the changes remain gradual and tightly managed. The 2026 RH-ISAC CISO Benchmark...
Posted by Adam Gavish, Google GenAI Security Team Indirect prompt injection (IPI) is an evolving threat vector targeting users of complex AI applications wit...
Attackers continue to evade defenders by using legitimate platforms like AWS and Microsoft utilities.
A water treatment plant in the city of Minot, North Dakota, was hit with ransomware but city officials said it continues to operate normally.
CrowdStrike and HCLTech have expanded their partnership with a new continuous threat exposure management service combining CrowdStrike's Falcon platform with...
The FBI's public service announcement details how certain mobile apps may continuously collect user data, even when permissions are granted only for active use.
Venom Stealer malware-as-a-service automates ClickFix social engineering, credential and crypto exfiltration
Secure your UK public sector digital estate. Cortex Xpanse delivers active External Attack Surface Management (EASM) with continuous monitoring, NCSC alignme...
TeamPCP continues its string of supply chain attacks, and announces a partnership with Vect ransomware group. The post Weaponizing the Protectors: TeamPCP’s ...
Licensed malware with built-in persistence and automation enables attackers to continuously siphon credentials, session data, and cryptocurrency assets. The ...
Yet another critical flaw in a Fortinet product has come to light as attackers continue to target the company, this time by actively exploiting a critical SQ...
The rise of autonomous systems has created a critical need to secure AI agent identities with the same rigor used for human employees, Ping Identity CEO Andr...
The European Commission is continuing to investigate the theft of data from its cloud infrastructure earlier this week. On Thursday, the Commission revealed ...