Google CloudArchived Mar 17, 2026✓ Full text saved
Threat Intelligence Google Cloud
Full text archived locally
✦ AI Summary· Claude Sonnet
Threat Intelligence
Frontline Mandiant investigations, expert analysis, tools and guidance, and in-depth security research.
Threat Intelligence
GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use
Our report on adversarial misuse of AI highlights model extraction, augmented attacks, and new AI-enabled malware.
By Google Threat Intelligence Group • 33-minute read
Read article
Google Threat Intelligence News and Alerts
Subscribe now to receive timely news and alerts from Google Threat Intelligence, including the latest threat-focused blog posts, reports, webinars, podcasts and more.
Subscribe now
Threat Intelligence RSS Feed
Want to keep up-to-date on the latest Threat Intelligence posts? Add the Threat Intelligence RSS feed URL to your RSS reader today.
Threat Intelligence RSS feed URL
Threat Intelligence
Ransomware Under Pressure: Tactics, Techniques, and Procedures in a Shifting Threat Landscape
By Google Threat Intelligence Group • 53-minute read
Threat Intelligence
Proactive Preparation and Hardening Against Destructive Attacks: 2026 Edition
By Mandiant • 222-minute read
Threat Intelligence
Look What You Made Us Patch: 2025 Zero-Days in Review
By Google Threat Intelligence Group • 23-minute read
Threat Intelligence
Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit
By Google Threat Intelligence Group • 25-minute read
Threat Intelligence
Exposing the Undercurrent: Disrupting the GRIDTIDE Global Cyber Espionage Campaign
By Google Threat Intelligence Group • 52-minute read
Threat Intelligence
From BRICKSTORM to GRIMBOLT: UNC6201 Exploiting a Dell RecoverPoint for Virtual Machines Zero-Day
By Mandiant • 12-minute read
Threat Intelligence
Beyond the Battlefield: Threats to the Defense Industrial Base
By Google Threat Intelligence Group • 28-minute read
Threat Intelligence
UNC1069 Targets Cryptocurrency Sector with New Tooling and AI-Enabled Social Engineering
By Mandiant • 26-minute read
Threat Intelligence
Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft
By Mandiant • 15-minute read
Threat Intelligence
Guidance from the Frontlines: Proactive Defense Against ShinyHunters-Branded Data Theft Targeting SaaS
By Mandiant • 31-minute read
Load more stories