Cloud Computing

From BRICKSTORM to GRIMBOLT: UNC6201 Exploiting a Dell RecoverPoint for Virtual Machines Zero-Day

Written by: Peter Ukhanov, Daniel Sislo, Nick Harbour, John Scarbrough, Fernando Tomlinson, Jr., Rich Reece Introduction  Mandiant and Google Threat Intelligence Group (GTIG) have identified the zero-day exploitation of a high-risk vulnerability in Dell RecoverPoint for Virtual Machines, tracked as CVE-2026-22769, with a CVSSv3.0 score of 10.0. Analysis of incident response engagements revealed that UNC6201, a […]

From BRICKSTORM to GRIMBOLT: UNC6201 Exploiting a Dell RecoverPoint for Virtual Machines Zero-Day Read More »

Data is the new oil, and your database is the only way to extract it

Ryan sits down with Shireesh Thota, CVP of Azure Databases at Microsoft, to discuss the evolution of databases at Microsoft; Azure’s comprehensive portfolio that includes SQL Server, CosmosDB, and Postgres; and the challenges that come with database architecture, from the importance of cost governance and multi-cloud strategies to the future of databases when it comes

Data is the new oil, and your database is the only way to extract it Read More »

AWS Tools Installer V2 Preview

If you’ve been managing multiple AWS Tools for PowerShell modules individually, you know how time-consuming installations and updates can be. Today, we’re excited to announce AWS Tools Installer V2, which provides performance improvements and additional guidance. Improvements in V2 Standard PowerShell installation commands like Install-Module and Install-PSResource download modules that are packaged individually. To maximize

AWS Tools Installer V2 Preview Read More »

GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use

Introduction In the final quarter of 2025, Google Threat Intelligence Group (GTIG) observed threat actors increasingly integrating artificial intelligence (AI) to accelerate the attack lifecycle, achieving productivity gains in reconnaissance, social engineering, and malware development. This report serves as an update to our November 2025 findings regarding the advances in threat actor usage of AI

GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use Read More »

Build financial resilience with AI-powered tabletop exercises on Google Cloud

In the financial sector, resilience isn’t optional. Recent cloud outages have shown us exactly how fast critical data can disappear. The risk is amplified by major regulatory drivers like the Digital Operational Resilience Act (DORA), which mandates that financial institutions are ready for any disruption. The recent designation of Google Cloud as a Critical Third-Party

Build financial resilience with AI-powered tabletop exercises on Google Cloud Read More »