Cloud Computing

Unlock next-gen database performance: C4A Axion and N4 machines for Cloud SQL now GA

For today’s business-critical database workloads, the bar that their infrastructure must meet has never been higher. Organizations expect systems that are performant, cost-efficient, scalable and secure. But meeting those expectations is no small feat. Surging data volumes, increasingly complex workloads, and new demands from advanced analytics and vector search for generative AI are intensifying the […]

Unlock next-gen database performance: C4A Axion and N4 machines for Cloud SQL now GA Read More »

Announcing prompt management in the Vertex AI SDK

As generative AI applications grow in sophistication, development workflows become more fragmented. Although AI can be a force multiplier, teams may design prompts in one environment, manage versions in spreadsheets or text files, and then manually integrate them into their code. This leads to inefficiencies, versioning chaos, and collaboration bottlenecks.  Vertex AI Studio is designed

Announcing prompt management in the Vertex AI SDK Read More »

New Group on the Block: UNC5142 Leverages EtherHiding to Distribute Malware

Written by: Mark Magee, Jose Hernandez, Bavi Sadayappan, Jessa Valdez Since late 2023, Mandiant Threat Defense and Google Threat Intelligence Group (GTIG) have tracked UNC5142, a financially motivated threat actor that abuses the blockchain to facilitate the distribution of information stealers (infostealers). UNC5142 is characterized by its use of compromised WordPress websites and “EtherHiding“, a

New Group on the Block: UNC5142 Leverages EtherHiding to Distribute Malware Read More »

DPRK Adopts EtherHiding: Nation-State Malware Hiding on Blockchains

Written by: Blas Kojusner, Robert Wallace, Joseph Dobson Google Threat Intelligence Group (GTIG) has observed the North Korea (DPRK) threat actor UNC5342 using ‘EtherHiding’ to deliver malware and facilitate cryptocurrency theft, the first time GTIG has observed a nation-state actor adopting this method. This post is part of a two-part blog series on adversaries using EtherHiding,

DPRK Adopts EtherHiding: Nation-State Malware Hiding on Blockchains Read More »

Save costs and decrease latency while using Gemini with Vertex AI context caching

As developers build increasingly sophisticated AI applications, they often encounter scenarios where substantial amounts of contextual information — be it a lengthy document, a detailed set of system instructions, a code base — need to be repeatedly sent to the model. While this data provides models with much-needed context for their responses, it often escalates

Save costs and decrease latency while using Gemini with Vertex AI context caching Read More »

Gemini Code Assist brings enterprise-grade AI code reviews to GitHub

For engineering teams, a critical DORA metric is “Lead Time for Changes,” which measures the time from a code commit to its deployment in production. The 2025 State of AI-Assisted Development Report underscores that manual code review and approval processes are a significant bottleneck, negatively impacting this metric. The report reveals that a combined 60.2%

Gemini Code Assist brings enterprise-grade AI code reviews to GitHub Read More »

Google is named a Leader in the 2025 Gartner® Magic Quadrant™ for SIEM

The evolving security landscape demands more than just speed. It requires an intelligent, automated defense. Google Security Operations is an AI-powered platform built to deliver a modern agentic security operations center (SOC), where generative AI is woven into the fabric of your operations. We go beyond traditional SIEM and SOAR by using AI as a

Google is named a Leader in the 2025 Gartner® Magic Quadrant™ for SIEM Read More »