Friday, February 28, 2025
HomeCyber Security NewsGoogle's New Dark Web Monitoring Feature for Gmail Users

Google’s New Dark Web Monitoring Feature for Gmail Users

Published on

SIEM as a Service

Follow Us on Google News

Google declared that all Gmail users within the United States would shortly be able to utilize the dark web report security feature to determine whether their e-mail address has been found on the dark web.

Google already offers a dark web monitoring service to paid US customers through its Google One subscription service. Nonetheless, Google I/O today extended free security monitoring to all Gmail users. 

This enables Gmail users to search the dark web for their email addresses and implement security measures based on Google’s recommendations.

  • Improved data control and transparency
  • Gmail’s Dark Web Scan
  • Spam View in Google Drive
  • Effortless deletion of Maps search history
  • AI-powered Safe Browsing

“We’re expanding access to our dark web report in the next few weeks, so anyone with a Gmail account in the US will be able to run scans to see if your Gmail address appears on the dark web and receive guidance on what actions to take to protect yourself,” Google says.

Dark Web Monitoring

Additionally, Google will periodically alert Gmail users to see whether their email addresses have been connected to any data breaches resulting in darknet forum posts for cybercrime.

Subscribers to Google One can enable it by heading to Google One and selecting “Set up > Start monitoring” and “Dark web report.”

“Google One’s dark web report helps you scan the dark web for your personal info — like your name, address, email, phone number and Social Security number — and will notify you if it’s found,” said Google One Director of Product Management Esteban Kozak in March when the feature was first announced.

Google One users, according to Kozak, are also shown results for “other related info that may be found in those data breaches.”

“And if any matching info is found on the dark web, we’ll notify you and provide guidance on how you might protect that information.”

According to the company, it is possible to remove a profile from the dark web report settings or delete it and all personal information added to it from the monitoring profile.

Google also revealed today at Google I/O that it has enhanced its Safe Browsing service to recognize and block 25% more phishing attempts on Chrome and Android.

Additionally, the business has improved Google Maps’ search history deletion capability and added a new spam view to Google Drive.

Struggling to Apply The Security Patch in Your System? – 
Try All-in-One Patch Manager Plus

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Chinese Hackers Exploit Check Point VPN Zero-Day to Target Organizations Globally

A sophisticated cyberespionage campaign linked to Chinese state-sponsored actors has exploited a previously patched...

PingAM Java Agent Vulnerability Allows Attackers to Bypass Security

A critical security flaw (CVE-2025-20059) has been identified in supported versions of Ping Identity’s...

New GitHub Scam Uses Fake “Mods” and “Cracks” to Steal User Data

A sophisticated malware campaign leveraging GitHub repositories disguised as game modifications and cracked software...

260 Domains Hosting 5,000 Malicious PDFs to Steal Credit Card Data

Netskope Threat Labs uncovered a sprawling phishing operation involving 260 domains hosting approximately 5,000...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Chinese Hackers Exploit Check Point VPN Zero-Day to Target Organizations Globally

A sophisticated cyberespionage campaign linked to Chinese state-sponsored actors has exploited a previously patched...

PingAM Java Agent Vulnerability Allows Attackers to Bypass Security

A critical security flaw (CVE-2025-20059) has been identified in supported versions of Ping Identity’s...

New GitHub Scam Uses Fake “Mods” and “Cracks” to Steal User Data

A sophisticated malware campaign leveraging GitHub repositories disguised as game modifications and cracked software...