![Google Play](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/19120107/google-play-mobile2-400x200.jpg)
Google Play will mark independently validated VPN apps
Android VPN apps that have gone through an independent security validation will now be able to claim that distinction on Google Play with a prominent badge in their Data …
![Google](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/27104125/google-eye2-400x200.jpg)
Google expands bug bounty program to cover AI-related threats
Google has expanded its bug bounty program, aka Vulnerability Rewards Program (VRP), to cover threats that could arise from Google’s generative AI systems. …
![Person](https://img.helpnetsecurity.com/wp-content/uploads/2021/03/18121755/person-data-400x200.jpg)
Legacy authentication leads to growing consumer frustration
Despite widespread usage of passwords lingering on, consumers want to use stronger, more user-friendly alternatives, according to FIDO Alliance. Entering a password manually …
![Google Play Protect](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/19123137/google-play-protect2-400x200.jpg)
Google Play Protect takes on malicious apps with code-level scanning
Google is enhancing Google Play Protect’s real-time scanning to include code-level scanning, to keep Android devices safe from malicious and unwanted apps, especially …
![WinRAR](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/21122249/winrar-400x200.jpg)
State-sponsored APTs are leveraging WinRAR bug
A number of government-backed APTs are exploiting CVE-2023-38831, a file extension spoofing vulnerability in WinRAR, a widely used file archiver utility for Windows. …
![Phil Venables](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/16101632/phil_venables-2-google-400x200.jpg)
The collaborative power of CISOs, CTOs and CIOs for a secure future
In this Help Net Security interview, Phil Venables, CISO at Google Cloud, discusses the results of a recent Google report on board collaboration with the C-suite — …
![CVE-2023-44487](https://img.helpnetsecurity.com/wp-content/uploads/2023/10/10150116/http2rapidreset-400x200.jpg)
Dangerous vulnerability can be exploited to carry out massive DDoS attacks (CVE-2023-44487)
Cloudflare, Google, and Amazon AWS revealed that a zero-day vulnerability in the HTTP/2 protocol has been used to mount massive, high-volume DDoS attacks, which they dubbed …
![money](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103700/money-1-400x200.jpg)
Exploit writers invited to probe Chrome’s V8 engine, Google Cloud’s KVM
Google is asking bug hunters and exploit writers to develop 0-day and n-day exploits in Chrome’s V8 JavaScript engine and Google Cloud’s Kernel-based Virtual …
![patch Tuesday](https://img.helpnetsecurity.com/wp-content/uploads/2022/11/08204602/patch-tuesday-2022-400x200.jpg)
October 2023 Patch Tuesday forecast: Operating system updates and zero-days aplenty
UPDATE: October 10, 12:10 PM PT – October 2023 Patch Tuesday is now live: Microsoft fixes exploited WordPad, Skype for Business zero-days September has been a packed …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/19153547/email4-400x200.jpg)
Google unveils stricter anti-spam rules for bulk email senders
To keep Gmail users’ inboxes “safer and more spam-free”, Google is introducing new requirements for bulk senders (of commercial email). “Last year we …
![hardware](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/21110220/hardware_red-400x200.jpg)
Zero-day in Arm GPU drivers exploited in targeted attacks (CVE-2023-4211)
A vulnerability (CVE-2023-4211) in the kernel drivers for several Mali GPUs “may be under limited, targeted exploitation,” British semiconductor manufacturer Arm …
![HNS](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/10093706/hns-2023-large_logo-400x200.jpg)
Blackpoint Cyber unveils Cloud Response for Google Workspace
Blackpoint Cyber has announced the expansion of its cloud security product, Cloud Response, to Google Workspace. Blackpoint first introduced Cloud Response for Microsoft 365, …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD