Google Blocked 1.75M Harmful Apps From Play Store in 2025
Google used AI-driven review systems to block 1.75 million policy-violating apps and ban 80,000 developer accounts in 2025, expanding Play Store and Android security enforcement.
The post Google Blocked 1.75M Harmful Apps From Play Store in 2025 appeared first on TechRepublic. - Read more
Hacktivism and the Winter Olympics 2026: What We’re Seeing and What it Signals
The 2026 Winter Olympics have been live for several weeks, and the cyber activity many predicted is already unfolding.Threat intelligence reporting from Intel471 highlights a surge in hacktivist chatter and mobilization tied to protests and geopolitical tensions surrounding the Games. At the same time, Google’s Threat Intelligence Group has warned that hacktivists, state actors, and cybercriminal groups are actively...
Dramatic Escalation in Frequency and Power of DDoS Attacks
DDoS attack frequency has risen to ‘alarming levels,’ warns Radware report - Read more
Android Malware Hijacks Google Gemini to Stay Hidden
A new Android malware implant using Google Gemini to perform persistence tasks was discovered on VirusTotal and analyzed by ESET - Read more
How to build an incident response plan, with examples, template
Threats from cyberattacks continue to grow in frequency and severity. Considering the potential disruptions from such events, an organization needs an incident response plan.. - Read more
Reduce Phishing MTTR Without Adding SOC Headcount
Your SOC is not understaffed. It is overloaded with noise.Phishing response does not fail because teams lack skill. It fails because too much time is spent on manual investigation and repetitive tasks that do not scale.The Core ProblemSecurity operations centers (SOCs) are judged by metrics like Mean Time to Respond (MTTR) and False Positive Rate. These are not vanity...
CarMax – 431,371 breached accounts
In January 2026, data allegedly sourced from US automotive retailer CarMax was published online following a failed extortion attempt. The data included 431k unique email addresses along with names, phone numbers and physical addresses. - Read more
How to check the impact of third-party CVEs on your Elastic deployment
Instantly check the impact of third-party CVEs on your Elastic deployment with the new self-service CVE Impact Statements on the Support Hub. Quickly filter security scanner noise and get official assessments. - Read more
US dominance of agentic AI at the heart of new NIST initiative
This week, the US National Institute of Standards and Technology (NIST) announced a new listening exercise, the AI Agent Standards Initiative, which it hopes will provide a roadmap for addressing agentic AI hurdles and, it said, ensure that the technology “is widely adopted with confidence.” AI agents, which have now ascended to the status of...
Using AI to defeat AI
Welcome to this week’s edition of the Threat Source newsletter. Generative AI and agentic AI are here to stay. Although I believe that the advantages that AI brings to bad guys may be overstated, these new technologies allow threat actors to conduct attacks at a faster rate than before. One capability that AI improves for threat actors is the ability to reconnoitre employees, discover...




