Sovereignty and European competitiveness: A partnership-led approach to AI growth

Source

In our conversations with business and policy leaders across Europe, we have listened closely to their concerns about sovereignty and European competitiveness. It is clear that they often find themselves caught in a paradox that Europe must choose between autonomy and growth. At Google Cloud, we believe that this …

Cloud CISO Perspectives: New AI threats report: Distillation, experimentation, and integration

Source

Welcome to the first Cloud CISO Perspectives for February 2026. Today, John Hultquist, chief analyst, Google Threat Intelligence Group, explains the research detailed in our newest AI Threat Tracker report. As with all Cloud CISO Perspectives, the contents of this newsletter are posted to the Google Cloud blog. If …

Stone, parchment or laser-written glass? Scientists find new way to preserve data

Source

Hard disks and magnetic tape have a limited lifespan, but glass storage developed by Microsoft could last millennia Some cultures used stone, others used parchment. Some even, for a time, used floppy disks. Now scientists have come up with a new way to keep archived data safe that, they …

AI Found Twelve New Vulnerabilities in OpenSSL

Source

The title of the post is” What AI Security Research Looks Like When It Works,” and I agree: In the latest OpenSSL security release> on January 27, 2026, twelve new zero-day vulnerabilities (meaning unknown to the maintainers at time of disclosure) were announced. Our AI system is responsible for …

China-linked snoops have been exploiting Dell 0-day since mid-2024, using 'ghost NICs' to avoid detection

Source

Full scale of infections remains 'unknown' China-linked attackers exploited a maximum-severity hardcoded-credential bug in Dell RecoverPoint for Virtual Machines as a zero-day since at least mid-2024. It's all part of a long-running effort to backdoor infected machines for long-term access, according to Google's Mandiant incident response team.... [...]

China remains embedded in US energy networks 'for the purpose of taking it down'

Source

Plus 3 new goon squads targeted critical infrastructure last year Three new threat groups began targeting critical infrastructure last year, while a well-known Beijing-backed crew - Volt Typhoon - continued to compromise cellular gateways and routers, and then break into US electric, oil, and gas companies in 2025, according to Dragos' …

« newer articles | page 19 | older articles »