News

Google Cloud Blog
cloud.google.com > blog > products > identity-security > cloud-ciso-perspectives-how-google-approaches-critical-security-topics-fundamentals-to-ai

Cloud CISO Perspectives: How Google approaches critical security topics, from fundamentals to AI

5+ hour, 19+ min ago  (593+ words) VP, Engineering for Privacy, Safety, and Security The latest on security from Google Cloud's Office of the CISO, twice a month. Welcome to the second Cloud CISO Perspectives for February 2026. Today, Royal Hansen, vice-president, Engineering, explains how we tackle today's…...

Google Cloud Blog
cloud.google.com > transform > how-ai-can-boost-defenders-from-defense-in-depth-to-cyber-kill-chain-qa

How AI can boost defenders, from defense in depth to the cyber kill chain (Q&A)

2+ week, 1+ day ago  (1042+ words) Security Editor, Google Cloud The latest on security from Google Cloud's Office of the CISO, twice a month. These are just some of the questions Google's Google Cloud's Anton Chuvakin and Timothy Peacock raised with public-interest technologist and author Bruce…...

Google Cloud Blog
cloud.google.com > blog > topics > threat-intelligence > distillation-experimentation-integration-ai-adversarial-use

GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use

2+ week, 2+ day ago  (1626+ words) Visibility and context on the threats that matter most. In the final quarter of 2025, Google Threat Intelligence Group (GTIG) observed threat actors increasingly integrating artificial intelligence (AI) to accelerate the attack lifecycle, achieving productivity gains in reconnaissance, social engineering, and…...

Google Cloud Blog
cloud.google.com > blog > topics > financial-services > improve-financial-resilience-with-google-cloud

Improve financial resilience with Google Cloud

2+ week, 2+ day ago  (751+ words) Our most intelligent model is now available on Vertex AI and Gemini Enterprise In the financial sector, resilience isn't optional. Recent cloud outages have shown us exactly how fast critical data can disappear. The risk is amplified by major regulatory…...

Google Cloud
cloud.google.com > customers > moneybook

invos Group case study

2+ week, 3+ day ago  (386+ words) Enhances data processing efficiency by 9x through Vertex AI automation Realizes 99% accuracy rate in product identification for data analytics Supports continuous data input and processing with highly available database in Cloud SQL Enables agile and stable software update deployment with cloud…...

Google Cloud Blog
cloud.google.com > blog > topics > threat-intelligence > threats-to-defense-industrial-base

Threats to the Defense Industrial Base

2+ week, 4+ day ago  (833+ words) Visibility and context on the threats that matter most. Figure 1: Lure document used by TEMP.Vermin Figure 2: UNC5125 Google Forms questionnaire purporting to originate from Dronarium drone training academy We also identified suspected UNC5125 activity leveraging Android malware we track as GREYBATTLE,…...

Google Cloud Blog
cloud.google.com > blog > topics > threat-intelligence > unc1069-targets-cryptocurrency-ai-social-engineering

UNC1069 Targets Cryptocurrency Sector with New Tooling and AI-Enabled Social Engineering

2+ week, 4+ day ago  (1608+ words) Stop attacks, reduce risk, and advance your security. Written by: Ross Inman, Adrian Hernandez UNC1069 is known to use tools like Gemini to develop tooling, conduct operational research, and assist during the reconnaissance stages, as reported by GTIG. Additionally, Kaspersky recently…...

Google Cloud Blog
cloud.google.com > blog > products > identity-security > delivering-a-secure-open-sovereign-digital-world

Delivering a secure, open, and sovereign digital world

3+ week, 10+ hour ago  (699+ words) VP/GM, Infrastructure and Solutions Group, Google Cloud VP/GM, Regulated and Sovereign Cloud, Google Cloud The latest on security from Google Cloud's Office of the CISO, twice a month. The global conversation about our digital future goes beyond technology;…...

Google Cloud Blog
cloud.google.com > blog > topics > threat-intelligence > expansion-shinyhunters-saas-data-theft

Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft

4+ week, 11+ hour ago  (478+ words) Visibility and context on the threats that matter most. Figure 1: Attack path diagram Figure 2: SharePoint/M365 log example Figure 3: Salesforce log example Figure 4: Docusign log example Figure 5: ToogleBox Recall auth log entry example In at least one case, after conducting the…...

Google Cloud Blog
cloud.google.com > blog > topics > threat-intelligence > disrupting-largest-residential-proxy-network

Disrupting the World's Largest Residential Proxy Network

4+ week, 2+ day ago  (1174+ words) Visibility and context on the threats that matter most. This week Google and partners took action to disrupt what we believe is one of the largest residential proxy networks in the world, the IPIDEA proxy network. IPIDEA's proxy infrastructure is…...