Skip to content
TheCyberThrone

Thinking Security ! Always

  • Latest Story
  • AI
  • Application Security
  • Cloud Security
    • AWS Security
    • Azure Security
    • Google Security
  • Container Security
  • Data Breaches
  • Email Security
  • Mobile Security
  • Security Acquisition
  • ZeroDay
  • Certification Guide
    • Cloud Certifications
    • Network Certifications
    • Security Certifications
  • Security NewsLetter
  • About Author
  • facebook.com
  • twitter.com
  • t.me
  • instagram.com
  • youtube.com
Subscribe

Google

  • Home
  • Google
  • Page 2
Google Bug Bounty Rewards for Android Applications

Google Bug Bounty Rewards for Android Applications

Google has enhanced the security of its first-party Android applications by launching the Mobile Vulnerability Reward Program. The Mobile VRP aims to encourage researchers and security experts to identify and…
Posted by PravinKarthik May 24, 2023
Google Dark Web Reporting to US Gmail Users

Google Dark Web Reporting to US Gmail Users

Google is expanding its dark web reporting service to all Gmail users in the U.S. amid other new online safety features announced at its annual I/O conference today in Mountain…
Posted by PravinKarthik May 12, 2023
Google Initiative to Uplift Vulnerability Management

Google Initiative to Uplift Vulnerability Management

Google is coming up with proposals to improve a vulnerability management ecosystem that’s plagued with an endless “merry-go-round” of problems. A whitepaper argues that while the security industry has improved…
Posted by PravinKarthik April 14, 2023
Google New Data Scraping Policy for Android Apps

Google New Data Scraping Policy for Android Apps

Google has unveiled a new policy for Android apps that enable account creation. The rule mandates such apps to provide users with an option to delete both the accounts and…
Posted by PravinKarthik April 7, 2023
Microsoft Defender Reports Zoom and Google as malicious

Microsoft Defender Reports Zoom and Google as malicious

Microsoft Defender, that comes with Windows is tagging sites such as Google and Zoom as being malicious, several users reported Defender is meant to stop users from visiting malicious sites,…
Posted by PravinKarthik March 30, 2023
Google Adds Client Side Encryption to Gmail and Calendar

Google Adds Client Side Encryption to Gmail and Calendar

Google has expanded client-side encryption support to additional products (Gmail and Calendar) in its Workspace suite. The security feature was already available on Drive, Docs, Slides, Sheets, and Meet. This…
Posted by PravinKarthik March 2, 2023
Google Android Security Updates – January 2023

Google Android Security Updates – January 2023

Google has released security updates for Android, which patch a total of 60 vulnerabilities. Updates with security levels 2023-01-01 address 19 security defects in the framework and system components. 11…
Posted by PravinKarthik January 5, 2023
Google’s New Privacy Enhancement Open Source Tools

Google’s New Privacy Enhancement Open Source Tools

Google has published two open-source technologies to help companies for processing user data for meeting privacy requirements. The first one is a tool called Magritte for blurring objects such as…
Posted by PravinKarthik December 26, 2022

Posts pagination

Previous page 1 2 3 4 … 9 Next page
Trending post
  • The Ungoverned Machine - Shadow AI Risk and the Enterprise Governance
    The Ungoverned Machine - Shadow AI Risk and the Enterprise Governance
  • Itron Discloses Corporate Network Breach
    Itron Discloses Corporate Network Breach
  • CISSP Domain 2 – Data Handling and Security Policies
    CISSP Domain 2 – Data Handling and Security Policies
  • IRDAI 2026: India's Insurance Sector Has Run Out of Excuses on Cybersecurity
    IRDAI 2026: India's Insurance Sector Has Run Out of Excuses on Cybersecurity
  • Mini Shai-Hulud: SAP's npm Pipeline Poisoned to Drain Enterprise Secrets
    Mini Shai-Hulud: SAP's npm Pipeline Poisoned to Drain Enterprise Secrets
  • CISSP Domain 2 – DLP Preventing Data Leakage
    CISSP Domain 2 – DLP Preventing Data Leakage
Archives

Click to Subscribe

Follow Us

  • Facebook
  • Twitter
  • Instagram
Copyright 2026 — TheCyberThrone. All rights reserved. Bloghash WordPress Theme
Scroll to Top