Cloud Computing

Oracle E-Business Suite Zero-Day Exploited in Widespread Extortion Campaign

Written by: Peter Ukhanov, Genevieve Stark, Zander Work, Ashley Pearson, Josh Murchie, Austin Larsen Introduction Beginning Sept. 29, 2025, Google Threat Intelligence Group (GTIG) and Mandiant began tracking a new, large-scale extortion campaign by a threat actor claiming affiliation with the CL0P extortion brand. The actor began sending a high volume of emails to executives

Oracle E-Business Suite Zero-Day Exploited in Widespread Extortion Campaign Read More »

Want to get building production-ready AI agents? Here’s where startups should start.

Startups are using agentic AI to automate complex workflows, create novel user experiences, and solve business problems that were once considered technically impossible. Still, charting the optimal path forward — especially with the integration of AI agents — often presents significant technical complexity To help startups navigate this new landscape, we’re launching our Startup technical

Want to get building production-ready AI agents? Here’s where startups should start. Read More »

Announcing quantum-safe Key Encapsulation Mechanisms in Cloud KMS

Quantum computing presents a new frontier for technology, and a new set of security challenges, too. A sufficiently powerful quantum computer could break the public-key cryptography systems we rely on today, posing a significant risk to individuals and organizations. Although that threat might be years away, building appropriate defenses can equally take years to build.

Announcing quantum-safe Key Encapsulation Mechanisms in Cloud KMS Read More »