Home Blog Page 10

Google Blocked 1.75M Harmful Apps From Play Store in 2025

Google used AI-driven review systems to block 1.75 million policy-violating apps and ban 80,000 developer accounts in 2025, expanding Play Store and Android security enforcement. The post Google Blocked 1.75M Harmful Apps From Play Store in 2025 appeared first on TechRepublic. - Read more

Hacktivism and the Winter Olympics 2026: What We’re Seeing and What it Signals

The 2026 Winter Olympics have been live for several weeks, and the cyber activity many predicted is already unfolding.Threat intelligence reporting from Intel471 highlights a surge in hacktivist chatter and mobilization tied to protests and geopolitical tensions surrounding the Games. At the same time, Google’s Threat Intelligence Group has warned that hacktivists, state actors, and cybercriminal groups are actively...

Dramatic Escalation in Frequency and Power of DDoS Attacks

DDoS attack frequency has risen to ‘alarming levels,’ warns Radware report - Read more

Android Malware Hijacks Google Gemini to Stay Hidden

A new Android malware implant using Google Gemini to perform persistence tasks was discovered on VirusTotal and analyzed by ESET - Read more

How to build an incident response plan, with examples, template

Threats from cyberattacks continue to grow in frequency and severity. Considering the potential disruptions from such events, an organization needs an incident response plan.. - Read more

Reduce Phishing MTTR Without Adding SOC Headcount

Your SOC is not understaffed. It is overloaded with noise.Phishing response does not fail because teams lack skill. It fails because too much time is spent on manual investigation and repetitive tasks that do not scale.The Core ProblemSecurity operations centers (SOCs) are judged by metrics like Mean Time to Respond (MTTR) and False Positive Rate. These are not vanity...

CarMax – 431,371 breached accounts

In January 2026, data allegedly sourced from US automotive retailer CarMax was published online following a failed extortion attempt. The data included 431k unique email addresses along with names, phone numbers and physical addresses. - Read more

How to check the impact of third-party CVEs on your Elastic deployment

Instantly check the impact of third-party CVEs on your Elastic deployment with the new self-service CVE Impact Statements on the Support Hub. Quickly filter security scanner noise and get official assessments. - Read more

US dominance of agentic AI at the heart of new NIST initiative

This week, the US National Institute of Standards and Technology (NIST) announced a new listening exercise, the AI Agent Standards Initiative, which it hopes will provide a roadmap for addressing agentic AI hurdles and, it said, ensure that the technology “is widely adopted with confidence.” AI agents, which have now ascended to the status of...

Using AI to defeat AI

Welcome to this week’s edition of the Threat Source newsletter.  Generative AI and agentic AI are here to stay. Although I believe that the advantages that AI brings to bad guys may be overstated, these new technologies allow threat actors to conduct attacks at a faster rate than before. One capability that AI improves for threat actors is the ability to reconnoitre employees, discover...

Latest article

2025 FINMA ISAE 3000 Type II attestation report available with 183 services in scope

Amazon Web Services (AWS) is pleased to announce the issuance of the Swiss Financial Market Supervisory Authority (FINMA) Type II attestation report...

Vulnerability monitoring service secures public-sector websites faster

An automated scanning system has cut the time it takes to fix cybersecurity vulnerabilities across public sector IT systems, reducing...

Chrome Gemini Vulnerability Lets Attackers Access Victims’ Camera and Microphone Remotely

A high-severity security vulnerability has been discovered in Google Chrome’s integrated Gemini AI assistant, exposing users to unauthorized camera and microphone access, local file...

2nd March – Threat Intelligence Report

For the latest discoveries in cyber research for the week of 2nd March, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES Wynn Resorts, a...