Finding Malware: Unveiling LUMMAC.V2 with Google Security Operations
Learn about LUMMAC.V2 and the detection and threat hunting opportunities you can use within Google Security Operations.
Learn about LUMMAC.V2 and the detection and threat hunting opportunities you can use within Google Security Operations.
Composite rules in Google SecOps unlock additional methods to build detection and hunting rules. In the first of a mini-series on composite rules, let’s tackle the fundamentals of a composite rule tha...
Introducing the Google SecOps SDK and CLI, your new toolkit for automating security workflows in Google Security Operations. Discover how to programmatically search logs, manage detections, ingest dat...
This blog post discusses the role of a CISO in today's manufacturing landscape, emphasizing that security must be integrated into all business and engineering processes. CISOs should evaluate the impa...
We are thrilled to announce the public preview announcement of Composite Detections in Google SecOps, empowering security teams with a new level of flexibility and sophistication in their threat detec...
Bring AI to your security tools with open-source Model Context Protocol (MCP) servers for SecOps, Google TI and Security Command Center. Learn how to seamlessly connect security tools to LLMs.
Mandiant Threat Defense evolves active threat detection and hunting within Google SecOps, combining AI and frontline intelligence for comprehensive security.
Want to convert that string to a numeric and do some math for your latest search, rule or dashboard? This blog explores how we can take strings and convert them to numeric floats in Google SecOps!
Beyond PQC prep: A CISO's must-read on building a strong crypto foundation through key inventory & management for business continuity. #Security #PQC #googlecloud
Learn how Google Cloud Security Foundation helps you address cloud adoption use cases with built-in platform security controls.
Learn how to create data tables in Google SecOps and leverage them in your detection logic for event filtering.
Detecting IngressNightmare CVE-2025-1974 using Security Command Center’s Container Threat Detection.
Think securing AI is just about prompt injection? Think again. Our latest paper shows how to practically apply SAIF in the real world.
Learn about Google Cloud's innovative, agentless approach using a non-intrusive DNS technique to reliably detect the complex IngressNightmare vulnerability, achieving accurate detection without the op...
Unapproved enterprise AI is the new Shadow AI. Learn how to balance innovation with security and prevent data leaks.
Discover how to deploy a Gemma 3 model in Google Cloud's Sovereign Cloud. Ensure data privacy, security, compliance and trust for your AI services.
Tired of alert fatigue? Learn how User and Entity Behavior Analytics (UEBA) can cut through the noise and deliver security alerts that actually matter.
Converting data types within your searches, rules and dashboards is often needed but how do we do this? In this blog we will explore how we can take strings or integers and convert them to boolean in ...
Identity and Access Management (IAM) is difficult at scale. Learn how to unlock efficiency and security through automation.
Relative time can be a funny thing and building dashboards for users who talk about last week or last month can be tricky because these relative times can mean different things to different people. Th...
AI adoption mirrors cloud's early days: innovation, excitement, and security risks. Learn from past mistakes to avoid pitfalls in your AI journey.
While many key elements of successful cloud migration are well-known, organizations often still struggle in this area. We've gathered valuable insights from countless conversations about successful cl...
Discover and collaborate on community-driven detection content for Google SecOps.
Bad guys hide their malicious commands using sneaky tricks – we call that obfuscation, and it's amazing how often it works. Here's an approach to write a YARA-L rule to identify obfuscated command lin...
Today we are adding filters to our Google SecOps dashboards and demonstrating how this capability can easily be deployed and provide users with greater visibility on the items they most care about!
Learn about FAKEUPDATES and the detection opportunities within Google Security Operations.
Security leaders have struggled to identify metrics that demonstrate the value that the SOC delivers and how it performs. So how do you choose the metrics that matter?
Dave Herrald takes a look at using BigQuery’s new SQL pipe syntax for common security analysis tasks.
In today's data-driven world, securely collaborating on sensitive information is more crucial (and challenging) than ever. How can organizations unlock the power of collaborative partnerships and thei...
AI supply chains, like software, face security risks such as data poisoning and model tampering. Robust provenance tracking and security measures are crucial to mitigate these threats and ensure the i...
User | Likes Count |
---|---|
14 | |
14 | |
10 | |
5 | |
5 |