Close Menu
  • Home
  • Education
  • Health
  • National News
  • Politics
  • Relationship & Wellness
  • World News
What's Hot

Day after cop dies during swing collapse rescue op at Surajkund fair, 2 arrested

February 9, 2026

India, Canada step up security cooperation | India News – The Times of India

February 9, 2026

Assam BJP posts, then deletes, AI video showing Himanta taking aim at men in skullcaps

February 9, 2026
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram
Global News Bulletin
SUBSCRIBE
  • Home
  • Education
  • Health
  • National News
  • Politics
  • Relationship & Wellness
  • World News
Global News Bulletin
Home»National News»Security flaws in Google’s Looker expose firms to data theft, system takeover: Report
National News

Security flaws in Google’s Looker expose firms to data theft, system takeover: Report

editorialBy editorialFebruary 9, 2026No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email Telegram Copy Link
Security flaws in Google’s Looker expose firms to data theft, system takeover: Report
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

3 min readNew DelhiUpdated: Feb 9, 2026 08:27 AM IST

Security researchers said they have found two major vulnerabilities in Google’s business intelligence platform, Looker, that could potentially enable hackers to take over “entire systems” and “steal corporate secrets”.

Collectively dubbed as ‘LookOut’, one of the platform’s vulnerabilities involves a Remote Code Execution (RCE) chain that could allow an attacker to take full control of a Looker server by running their own malicious commands remotely, researchers at cybersecurity firm Tenable said in a blog post on Thursday, February 5.

The Google-owned business intelligence platform is reportedly used by more than 60,000 companies in 195 countries. Hackers targeting cloud instances of Looker could potentially exploit security flaws to gain cross-tenant access, as per the researchers. They further said that companies were vulnerable to the complete theft of Looker’s internal management database.

“By tricking the system into connecting to its own ‘private brain’ researchers used a specialised data-extraction technique to download sensitive user credentials and configuration secrets,” Tenable said.

“This level of access is particularly dangerous because Looker acts as a central nervous system for corporate information, and a breach could allow an attacker to manipulate data or move deeper into a company’s private internal network,” Liv Matan, Senior Research Engineer at Tenable, said.

The researchers acknowledged that Google responded quickly to secure its managed cloud version of Looker after the vulnerabilities were reported to the tech giant. However, they also said that organisations hosting Looker on their own private servers or on-prem hardware might still be vulnerable.

“These organisations must manually apply security patches to close these backdoors, as they currently bear the full burden of protecting their infrastructure from potential administrative takeover,” Tenable said.

Story continues below this ad

What is Looker?

Looker, based in Santa Cruz, California, helps companies visualise and analyse the data they store in the cloud. Google agreed to buy Looker for $2.6 billion in 2019, expanding its offerings to help customers manage data in the cloud, according to a report by Bloomberg.

The Looker acquisition is said to have given Google another tool in its larger campaign to sell more cloud storage and software.

How can users protect themselves?

In order to avoid the potential exploitation of these vulnerabilities, Tenable researchers recommended that administrators should review their systems for specific indicators of compromise.

“First, they should inspect the file system for any unexpected or unauthorised files within the .git/hooks/ directory of Looker project folders, paying close attention to scripts named pre-push, post-commit, or applypatch-msg that may have been placed there by an attacker,” the company said.

Story continues below this ad

“Additionally, security teams should examine application logs for signs of internal connection abuse, specifically searching for unusual SQL errors or patterns consistent with error-based SQL injection targeting internal Looker database connections like looker__ilooker,” it added.

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleTrade deal will give new wings to farmers' dreams: Shivraj Singh Chouhan | India News – The Times of India
Next Article Electronics output up 6-fold, exports 8-fold in 11 yrs: Govt | India News – The Times of India
editorial
  • Website

Related Posts

Day after cop dies during swing collapse rescue op at Surajkund fair, 2 arrested

February 9, 2026

Assam BJP posts, then deletes, AI video showing Himanta taking aim at men in skullcaps

February 9, 2026

Oppo Pad 5 review: The excellent Netflix binge tablet for your next long-haul flight

February 9, 2026

French political titan Jack Lang resigns as Paris elite rocked by 700 mentions in new Jeffrey Epstein files

February 9, 2026

Delhi court seeks police report on plea against promoters of 32nd Milestone project in Gurgaon

February 9, 2026

Academic year nearly over, MCD school students yet to receive financial aid to buy uniform, bag

February 8, 2026
Add A Comment
Leave A Reply Cancel Reply

Economy News

Day after cop dies during swing collapse rescue op at Surajkund fair, 2 arrested

By editorialFebruary 9, 2026

A day after the collapse of a giant ‘Tsunami’ swing killed an on duty police…

India, Canada step up security cooperation | India News – The Times of India

February 9, 2026

Assam BJP posts, then deletes, AI video showing Himanta taking aim at men in skullcaps

February 9, 2026
Top Trending

Day after cop dies during swing collapse rescue op at Surajkund fair, 2 arrested

By editorialFebruary 9, 2026

A day after the collapse of a giant ‘Tsunami’ swing killed an…

India, Canada step up security cooperation | India News – The Times of India

By editorialFebruary 9, 2026

Ajit Doval NEW DELHI: NSA Ajit Doval’s first bilateral visit to Canada…

Assam BJP posts, then deletes, AI video showing Himanta taking aim at men in skullcaps

By editorialFebruary 9, 2026

A videograb shows an image of Assam Chief Minister Himanta Biswa Sarma…

Subscribe to News

Get the latest sports news from NewsSite about world, sports and politics.

Facebook X (Twitter) Pinterest Vimeo WhatsApp TikTok Instagram

News

  • Education
  • Health
  • National News
  • Relationship & Wellness
  • World News
  • Politics

Company

  • Information
  • Advertising
  • Classified Ads
  • Contact Info
  • Do Not Sell Data
  • GDPR Policy
  • Media Kits

Services

  • Subscriptions
  • Customer Support
  • Bulk Packages
  • Newsletters
  • Sponsored News
  • Work With Us

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

© Copyright Global News Bulletin.
  • Privacy Policy
  • Terms
  • Accessibility
  • Website Developed by Digital Strikers

Type above and press Enter to search. Press Esc to cancel.