Close Menu
  • Homepage
  • Local News
  • India
  • World
  • Politics
  • Sports
  • Finance
  • Entertainment
  • Business
  • Technology
  • Health
  • Lifestyle
Facebook X (Twitter) Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • DMCA
Facebook X (Twitter) Instagram Pinterest
JHB NewsJHB News
  • Local
  • India
  • World
  • Politics
  • Sports
  • Finance
  • Entertainment
Let’s Fight Corruption
JHB NewsJHB News
Home»Technology»Security flaws in Google’s Looker expose firms to data theft, system takeover: Report | Technology News
Technology

Security flaws in Google’s Looker expose firms to data theft, system takeover: Report | Technology News

February 8, 2026No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Google says millions of Android phones and smart devices were unknowingly used as part of a global proxy network.
Share
Facebook Twitter LinkedIn Pinterest Email

3 min learnNew DelhiFeb 8, 2026 02:55 PM IST

Safety researchers stated they’ve discovered two main vulnerabilities in Google’s enterprise intelligence platform, Looker, that would probably allow hackers to take over “complete methods” and “steal company secrets and techniques”.

Collectively dubbed as ‘LookOut’, one of many platform’s vulnerabilities entails a Distant Code Execution (RCE) chain that would permit an attacker to take full management of a Looker server by working their very own malicious instructions remotely, researchers at cybersecurity agency Tenable stated in a weblog put up on Thursday, February 5.

The Google-owned enterprise intelligence platform is reportedly utilized by greater than 60,000 corporations in 195 international locations. Hackers concentrating on cloud cases of Looker might probably exploit safety flaws to realize cross-tenant entry, as per the researchers. They additional stated that corporations had been weak to the whole theft of Looker’s inner administration database.

“By tricking the system into connecting to its personal ‘personal mind’ researchers used a specialised data-extraction approach to obtain delicate consumer credentials and configuration secrets and techniques,” Tenable stated.

“This degree of entry is especially harmful as a result of Looker acts as a central nervous system for company info, and a breach might permit an attacker to control information or transfer deeper into an organization’s personal inner community,” Liv Matan, Senior Analysis Engineer at Tenable, stated.

The researchers acknowledged that Google responded shortly to safe its managed cloud model of Looker after the vulnerabilities had been reported to the tech big. Nevertheless, in addition they stated that organisations internet hosting Looker on their very own personal servers or on-prem {hardware} would possibly nonetheless be weak.

“These organisations should manually apply safety patches to shut these backdoors, as they presently bear the complete burden of defending their infrastructure from potential administrative takeover,” Tenable stated.

Story continues under this advert

What’s Looker?

Looker, primarily based in Santa Cruz, California, helps corporations visualise and analyse the information they retailer within the cloud. Google agreed to purchase Looker for $2.6 billion in 2019, increasing its choices to assist clients handle information within the cloud, in line with a report by Bloomberg.

The Looker acquisition is claimed to have given Google one other software in its bigger marketing campaign to promote extra cloud storage and software program.

How can customers shield themselves?

With the intention to keep away from the potential exploitation of those vulnerabilities, Tenable researchers really helpful that directors ought to assessment their methods for particular indicators of compromise.

“First, they need to examine the file system for any surprising or unauthorised information throughout the .git/hooks/ listing of Looker venture folders, paying shut consideration to scripts named pre-push, post-commit, or applypatch-msg that will have been positioned there by an attacker,” the corporate stated.

Story continues under this advert

“Moreover, safety groups ought to look at software logs for indicators of inner connection abuse, particularly trying to find uncommon SQL errors or patterns in line with error-based SQL injection concentrating on inner Looker database connections like looker__ilooker,” it added.



Source link

data expose Firms flaws Googles Looker news report security system takeover Technology theft
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

‘This acts like a safety net’: Truecaller’s Kunal Dua on the new Family Protection feature | Technology News

March 14, 2026

Xiaomi Pad 8 Review: Versatile Value

March 14, 2026

Himax pops on report linking to Nvida AI optics, Apple smart-glasses

March 13, 2026

Hockey WC Qualifiers: Below-par India edge past Italy 1-0 to reach final, England won’t make their life easy in title clash | Hockey News

March 13, 2026
Add A Comment
Leave A Reply Cancel Reply

Editors Picks

‘This acts like a safety net’: Truecaller’s Kunal Dua on the new Family Protection feature | Technology News

March 14, 2026

Dividend stocks are catching up to tech stocks on key earnings metric

March 14, 2026

Dolly Parton ‘Saved Miley Cyrus From Drugs Death’

March 14, 2026

Xiaomi Pad 8 Review: Versatile Value

March 14, 2026
Popular Post

‘Job hugging’ has replaced job hopping

Michelle Obama Claims Her Family Had to Act ‘Perfect’ In the White House

How To Make The Most Out Of A Short Trip To Europe

Subscribe to Updates

Get the latest news from JHB News about Bangalore, Worlds, Entertainment and more.

JHB News
Facebook X (Twitter) Instagram Pinterest
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • DMCA
© 2026 Jhb.news - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.