Tag: Google Threat Intelligence Group
-
Cloud Blog: Cloud CISO Perspectives: Going beyond 2FA to address fast-rising, emerging threats
Source URL: https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-adding-new-layered-protections-to-2fa/ Source: Cloud Blog Title: Cloud CISO Perspectives: Going beyond 2FA to address fast-rising, emerging threats Feedly Summary: Welcome to the second Cloud CISO Perspectives for July 2025. Today, Andy Wen, director, product management, Workspace Security, discusses new efforts we’re making to defend against identity-based cyberattacks.As with all Cloud CISO Perspectives, the contents…
-
Cloud Blog: Top 25 blogs of 2025… so far
Source URL: https://cloud.google.com/blog/products/gcp/most-read-blogs-from-h1-2025/ Source: Cloud Blog Title: Top 25 blogs of 2025… so far Feedly Summary: Six months into 2025, we’ve already published hundreds of posts here on the Google Cloud blog. We asked ourselves, why wait until the busy end of the year to review your favorites? With everything from new AI models, product…
-
Cloud Blog: From Help Desk to Hypervisor: Defending Your VMware vSphere Estate from UNC3944
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/defending-vsphere-from-unc3944/ Source: Cloud Blog Title: From Help Desk to Hypervisor: Defending Your VMware vSphere Estate from UNC3944 Feedly Summary: Introduction In mid 2025, Google Threat Intelligence Group (GITG) identified a sophisticated and aggressive cyber campaign targeting multiple industries, including retail, airline, and insurance. This was the work of UNC3944, a financially motivated threat…
-
Cloud Blog: Beyond Convenience: Exposing the Risks of VMware vSphere Active Directory Integration
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/vsphere-active-directory-integration-risks/ Source: Cloud Blog Title: Beyond Convenience: Exposing the Risks of VMware vSphere Active Directory Integration Feedly Summary: Written by: Stuart Carrera, Brian Meyer Executive Summary Broadcom’s VMware vSphere product remains a popular choice for private cloud virtualization, underpinning critical infrastructure. Far from fading, organizations continue to rely heavily on vSphere for stability…
-
Cloud Blog: Ongoing SonicWall Secure Mobile Access (SMA) Exploitation Campaign using the OVERSTEP Backdoor
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/sonicwall-secure-mobile-access-exploitation-overstep-backdoor/ Source: Cloud Blog Title: Ongoing SonicWall Secure Mobile Access (SMA) Exploitation Campaign using the OVERSTEP Backdoor Feedly Summary: Written by: Josh Goddard, Zander Work, Dimiter Andonov Introduction Google Threat Intelligence Group (GTIG) has identified an ongoing campaign by a suspected financially-motivated threat actor we track as UNC6148, targeting fully patched end-of-life SonicWall…
-
Cloud Blog: How to enable Secure Boot for your AI workloads
Source URL: https://cloud.google.com/blog/products/identity-security/how-to-enable-secure-boot-for-your-ai-workloads/ Source: Cloud Blog Title: How to enable Secure Boot for your AI workloads Feedly Summary: As organizations race to deploy powerful GPU-accelerated workloads, they might overlook a foundational step: ensuring the integrity of the system from the very moment it turns on. Threat actors, however, have not overlooked this. They increasingly target…
-
Cloud Blog: Cloud CISO Perspectives: Our Big Sleep agent makes a big leap, and other AI news
Source URL: https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-our-big-sleep-agent-makes-big-leap/ Source: Cloud Blog Title: Cloud CISO Perspectives: Our Big Sleep agent makes a big leap, and other AI news Feedly Summary: Welcome to the first Cloud CISO Perspectives for July 2025. Today, Sandra Joyce, vice president, Google Threat Intelligence, talks about an incredible milestone with our Big Sleep AI agent, as well…
-
Cloud Blog: Cloud CISO Perspectives: The global threats facing EU healthcare
Source URL: https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-global-threats-eu-healthcare/ Source: Cloud Blog Title: Cloud CISO Perspectives: The global threats facing EU healthcare Feedly Summary: Welcome to the second Cloud CISO Perspectives for June 2025. Today, Thiébaut Meyer and Bhavana Bhinder from Google Cloud’s Office of the CISO discuss our work to help defend European healthcare against cyberattacks.As with all Cloud CISO…
-
Cloud Blog: What’s in an ASP? Creative Phishing Attack on Prominent Academics and Critics of Russia
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/creative-phishing-academics-critics-of-russia/ Source: Cloud Blog Title: What’s in an ASP? Creative Phishing Attack on Prominent Academics and Critics of Russia Feedly Summary: Written by: Gabby Roncone, Wesley Shields In cooperation with external partners, Google Threat Intelligence Group (GTIG) observed a Russia state-sponsored cyber threat actor impersonating the U.S. Department of State. From at least…
-
Cloud Blog: Cloud CISO Perspectives: How Google secures AI Agents
Source URL: https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-how-google-secures-ai-agents/ Source: Cloud Blog Title: Cloud CISO Perspectives: How Google secures AI Agents Feedly Summary: Welcome to the first Cloud CISO Perspectives for June 2025. Today, Anton Chuvakin, security advisor for Google Cloud’s Office of the CISO, discusses a new Google report on securing AI agents, and the new security paradigm they demand.As…