Tag: Google Threat Intelligence Group
-
Cloud Blog: How to enable Secure Boot for your AI workloads
Source URL: https://cloud.google.com/blog/products/identity-security/how-to-enable-secure-boot-for-your-ai-workloads/ Source: Cloud Blog Title: How to enable Secure Boot for your AI workloads Feedly Summary: As organizations race to deploy powerful GPU-accelerated workloads, they might overlook a foundational step: ensuring the integrity of the system from the very moment it turns on. Threat actors, however, have not overlooked this. They increasingly target…
-
Cloud Blog: Cloud CISO Perspectives: Our Big Sleep agent makes a big leap, and other AI news
Source URL: https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-our-big-sleep-agent-makes-big-leap/ Source: Cloud Blog Title: Cloud CISO Perspectives: Our Big Sleep agent makes a big leap, and other AI news Feedly Summary: Welcome to the first Cloud CISO Perspectives for July 2025. Today, Sandra Joyce, vice president, Google Threat Intelligence, talks about an incredible milestone with our Big Sleep AI agent, as well…
-
Cloud Blog: Cloud CISO Perspectives: The global threats facing EU healthcare
Source URL: https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-global-threats-eu-healthcare/ Source: Cloud Blog Title: Cloud CISO Perspectives: The global threats facing EU healthcare Feedly Summary: Welcome to the second Cloud CISO Perspectives for June 2025. Today, Thiébaut Meyer and Bhavana Bhinder from Google Cloud’s Office of the CISO discuss our work to help defend European healthcare against cyberattacks.As with all Cloud CISO…
-
Cloud Blog: What’s in an ASP? Creative Phishing Attack on Prominent Academics and Critics of Russia
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/creative-phishing-academics-critics-of-russia/ Source: Cloud Blog Title: What’s in an ASP? Creative Phishing Attack on Prominent Academics and Critics of Russia Feedly Summary: Written by: Gabby Roncone, Wesley Shields In cooperation with external partners, Google Threat Intelligence Group (GTIG) observed a Russia state-sponsored cyber threat actor impersonating the U.S. Department of State. From at least…
-
Cloud Blog: Cloud CISO Perspectives: How Google secures AI Agents
Source URL: https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-how-google-secures-ai-agents/ Source: Cloud Blog Title: Cloud CISO Perspectives: How Google secures AI Agents Feedly Summary: Welcome to the first Cloud CISO Perspectives for June 2025. Today, Anton Chuvakin, security advisor for Google Cloud’s Office of the CISO, discusses a new Google report on securing AI agents, and the new security paradigm they demand.As…
-
Slashdot: Fake IT Support Calls Hit 20 Orgs, End in Stolen Salesforce Data and Extortion, Google Warns
Source URL: https://it.slashdot.org/story/25/06/04/1654250/fake-it-support-calls-hit-20-orgs-end-in-stolen-salesforce-data-and-extortion-google-warns?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Fake IT Support Calls Hit 20 Orgs, End in Stolen Salesforce Data and Extortion, Google Warns Feedly Summary: AI Summary and Description: Yes Summary: The text discusses a cybersecurity incident involving a group of financially motivated scammers, known as UNC6040, who executed voice-phishing attacks to manipulate employees into installing…
-
Cloud Blog: Hello, Operator? A Technical Analysis of Vishing Threats
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/technical-analysis-vishing-threats/ Source: Cloud Blog Title: Hello, Operator? A Technical Analysis of Vishing Threats Feedly Summary: Written by: Nick Guttilla Introduction Organizations are increasingly relying on diverse digital communication channels for essential business operations. The way employees interact with colleagues, access corporate resources, and especially, receive information technology (IT) support is often conducted through…
-
Cloud Blog: The Cost of a Call: From Voice Phishing to Data Extortion
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/voice-phishing-data-extortion/ Source: Cloud Blog Title: The Cost of a Call: From Voice Phishing to Data Extortion Feedly Summary: Introduction Google Threat Intelligence Group (GTIG) is tracking UNC6040, a financially motivated threat cluster that specializes in voice phishing (vishing) campaigns specifically designed to compromise organization’s Salesforce instances for large-scale data theft and subsequent extortion.…
-
Cloud Blog: Cloud CISO Perspectives: How governments can use AI to improve threat detection and reduce cost
Source URL: https://cloud.google.com/blog/products/identity-security/cloud-ciso-perspectives-how-governments-can-use-AI-improve-threat-detection-reduce-cost/ Source: Cloud Blog Title: Cloud CISO Perspectives: How governments can use AI to improve threat detection and reduce cost Feedly Summary: Welcome to the second Cloud CISO Perspectives for May 2025. Today, Enrique Alvarez, public sector advisor, Office of the CISO, explores how government agencies can use AI to improve threat detection…
-
Cloud Blog: Mark Your Calendar: APT41 Innovative Tactics
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/apt41-innovative-tactics/ Source: Cloud Blog Title: Mark Your Calendar: APT41 Innovative Tactics Feedly Summary: Written by: Patrick Whitsell Google Threat Intelligence Group’s (GTIG) mission is to protect Google’s billions of users and Google’s multitude of products and services. In late October 2024, GTIG discovered an exploited government website hosting malware being used to target…