Tag: managed devices
-
Cloud Blog: Cybercrime Observations from the Frontlines: UNC6040 Proactive Hardening Recommendations
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/unc6040-proactive-hardening-recommendations/ Source: Cloud Blog Title: Cybercrime Observations from the Frontlines: UNC6040 Proactive Hardening Recommendations Feedly Summary: Written by: Omar ElAhdan, Matthew McWhirt, Michael Rudden, Aswad Robinson, Bhavesh Dhake, Laith Al Background Protecting software-as-a-service (SaaS) platforms and applications requires a comprehensive security strategy. Drawing…
-
Cloud Blog: Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/brickstorm-espionage-campaign/ Source: Cloud Blog Title: Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors Feedly Summary: Written by: Sarah Yoder, John Wolfram, Ashley Pearson, Doug Bienstock, Josh Madeley, Josh Murchie, Brad Slaybaugh, Matt Lin, Geoff Carstairs, Austin Larsen Introduction Google Threat Intelligence Group (GTIG) is tracking BRICKSTORM malware activity, which is…
-
Cloud Blog: Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines
Source URL: https://cloud.google.com/blog/topics/threat-intelligence/unc3944-proactive-hardening-recommendations/ Source: Cloud Blog Title: Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines Feedly Summary: Background UNC3944, which overlaps with public reporting on Scattered Spider, is a financially-motivated threat actor characterized by its persistent use of social engineering and brazen communications with victims. In early operations, UNC3944 largely targeted telecommunications-related organizations to…
-
Cloud Blog: What’s new in IAM, Access Risk, and Cloud Governance
Source URL: https://cloud.google.com/blog/products/identity-security/whats-new-in-iam-access-risk-and-cloud-governance/ Source: Cloud Blog Title: What’s new in IAM, Access Risk, and Cloud Governance Feedly Summary: It’s a core part of our mission at Google Cloud to help you meet your evolving policy, compliance, and business objectives. To help further strengthen the security of your cloud environment, we continue regular delivery of new…
-
Cloud Blog: Chrome Enterprise improves work and personal profile separation and brings more advanced protections for unmanaged devices
Source URL: https://cloud.google.com/blog/products/chrome-enterprise/chrome-enterprise-improves-work-and-personal-profile-separation-and-brings-more-advanced-protections-for-unmanaged-devices/ Source: Cloud Blog Title: Chrome Enterprise improves work and personal profile separation and brings more advanced protections for unmanaged devices Feedly Summary: For many employees, the browser has become where they spend the majority of their working day. As more work is being done on the web, IT and security teams continue…