Guardrails at the gateway: Securing AI inference on GKE with Model Armor

Source

Enterprises are rapidly moving AI workloads from experimentation to production on Google Kubernetes Engine (GKE), using its scalability to serve powerful inference endpoints. However, as these models handle increasingly sensitive data, they introduce unique AI-driven attack vectors — from prompt injection to sensitive data leakage — that traditional firewalls aren't designed …

On Microsoft’s Lousy Cloud Security

Source

ProPublica has a scoop : In late 2024, the federal government’s cybersecurity evaluators rendered a troubling verdict on one of Microsoft’s biggest cloud computing offerings. The tech giant’s “lack of proper detailed security documentation” left reviewers with a “lack of confidence in assessing the system’s overall …

Iran-linked hackers disrupt operations at US critical infrastructure sites

Source

Hackers working on behalf of the Iranian government are disrupting operations at multiple US critical infrastructure sites, likely in response to the country's ongoing war with the US, a half-dozen government agencies are warning. In an advisory published Tuesday, the FBI, Cybersecurity and Infrastructure Security Agency, National Security Agency …

A framework for securely collecting forensic artifacts into S3 buckets

Source

When customers experience a security incident, they need to acquire forensic artifacts to identify root cause, extract indicators of compromise (IoCs), and validate remediation efforts. NIST 800-86, Guide to Integrating Forensic Techniques into Incident Response, defines digital forensics as a process comprised of four basic phases: collection, examination, analysis …

Google Cloud named a Leader in The Forrester Wave™: Sovereign Cloud Platforms, Q2 2026

Source

In today’s global economy, data is a strategic asset. For many organizations — particularly those in highly regulated industries and the public sector — the ability to innovate with AI is often balanced against the rigorous requirements of data sovereignty, residency, and operational autonomy. We are proud to announce that …

Thousands of consumer routers hacked by Russia's military

Source

The Russian military is once again hacking home and small office routers in widespread operations that send unwitting users to sites that harvest passwords and credential tokens for use in espionage campaigns, researchers said Tuesday. An estimated 18,000 to 40,000 consumer routers, mostly those made by MikroTik …

Building AI defenses at scale: Before the threats emerge

Source

At AWS, we’ve spent decades developing processes and tools that enable us to defend millions of customers simultaneously, wherever they operate around the world. Every day, our security and threat intelligence teams are doing work with AI and automation that most people never see. Our AI-powered log analysis …

See beyond the IP and secure URLs with Google Cloud NGFW

Source

In a cloud-first world, traditional IP-based defenses are no longer enough to protect your perimeter. As services migrate to shared infrastructure and content delivery networks, relying on static IP addresses and FQDNs can create security gaps. Because single IP addresses can host multiple services, and IPs addresses can change …

Cybersecurity in the Age of Instant Software

Source

AI is rapidly changing how software is written, deployed, and used. Trends point to a future where AIs can write custom software quickly and easily: “instant software.” Taken to an extreme, it might become easier for a user to have an AI write an application on demand—a spreadsheet …

Russia Hacked Routers to Steal Microsoft Office Tokens

Source

Hackers linked to Russia’s military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security experts warned today. The spying campaign allowed state-backed Russian hackers to quietly siphon authentication tokens from users on more than 18,000 networks …

« newer articles | page 7 | older articles »