Technology News from Around the World, Instantly on Oracnoos!

Google says hackers abuse Gemini AI to empower their attacks - Related to -, abuse, ai, empower, using

Google says hackers abuse Gemini AI to empower their attacks

Google says hackers abuse Gemini AI to empower their attacks

Multiple state-sponsored groups are experimenting with the AI-powered Gemini assistant from Google to increase productivity and to conduct research on potential infrastructure for attacks or for reconnaissance on targets.

Google's Threat Intelligence Group (GTIG) detected government-linked advanced persistent threat (APT) groups using Gemini primarily for productivity gains rather than to develop or conduct novel AI-enabled cyberattacks that can bypass traditional defenses.

Threat actors have been trying to leverage AI tools for their attack purposes to various degrees of success as these utilities can at least shorten the preparation period.

Google has identified Gemini activity associated with APT groups from more than 20 countries but the most prominent ones were from Iran and China.

Among the most common cases were assistance with coding tasks for developing tools and scripts, research on publicly disclosed vulnerabilities, checking on technologies (explanations, translation), finding details on target organizations, and searching for methods to evade detection, escalate privileges, or run internal reconnaissance in a compromised network.

Google says APTs from Iran, China, North Korea, and Russia, have all experimented with Gemini, exploring the tool's potential in helping them discover security gaps, evade detection, and plan their post-compromise activities. These are summarized as follows:

Iranian threat actors were the heaviest people of Gemini, leveraging it for a wide range of activities, including reconnaissance on defense organizations and international experts, research into publicly known vulnerabilities, development of phishing campaigns, and content creation for influence operations. They also used Gemini for translation and technical explanations related to cybersecurity and military technologies, including unmanned aerial vehicles (UAVs) and missile defense systems.

threat actors were the heaviest people of Gemini, leveraging it for a wide range of activities, including reconnaissance on defense organizations and international experts, research into publicly known vulnerabilities, development of phishing campaigns, and content creation for influence operations. They also used Gemini for translation and technical explanations related to cybersecurity and military technologies, including unmanned aerial vehicles (UAVs) and missile defense systems. China -backed threat actors primarily utilized Gemini for reconnaissance on [website] military and government organizations, vulnerability research, scripting for lateral movement and privilege escalation, and post-compromise activities such as evading detection and maintaining persistence in networks. They also explored ways to access Microsoft Exchange using password hashes and reverse-engineer security tools like Carbon Black EDR.

-backed threat actors primarily utilized Gemini for reconnaissance on [website] military and government organizations, vulnerability research, scripting for lateral movement and privilege escalation, and post-compromise activities such as evading detection and maintaining persistence in networks. They also explored ways to access Microsoft Exchange using password hashes and reverse-engineer security tools like Carbon Black EDR. North Korean APTs used Gemini to support multiple phases of the attack lifecycle, including researching free hosting providers, conducting reconnaissance on target organizations, and assisting with malware development and evasion techniques. A significant portion of their activity focused on North Korea's clandestine IT worker scheme, using Gemini to draft job applications, cover letters, and proposals to secure employment at Western companies under false identities.

APTs used Gemini to support multiple phases of the attack lifecycle, including researching free hosting providers, conducting reconnaissance on target organizations, and assisting with malware development and evasion techniques. A significant portion of their activity focused on North Korea's clandestine IT worker scheme, using Gemini to draft job applications, cover letters, and proposals to secure employment at Western companies under false identities. Russian threat actors had minimal engagement with Gemini, most usage being focused on scripting assistance, translation, and payload crafting. Their activity included rewriting publicly available malware into different programming languages, adding encryption functionality to malicious code, and understanding how specific pieces of public malware function. The limited use may indicate that Russian actors prefer AI models developed within Russia or are avoiding Western AI platforms for operational security reasons.

Google also mentions having observed cases where the threat actors attempted to use public jailbreaks against Gemini or rephrasing their prompts to bypass the platform's security measures. These attempts were reportedly unsuccessful.

OpenAI, the creator of the popular AI chatbot ChatGPT, made a similar disclosure in October 2024, so Google's latest findings comes as a confirmation of the large-scale misuse of generative AI tools by threat actors of all levels.

While jailbreaks and security bypasses are a concern in mainstream AI products, the AI market is gradually filling with AI models that lack the proper protections to prevent abuse. Unfortunately, some of them with restrictions that are trivial to bypass are also enjoying increased popularity.

Cybersecurity intelligence firm KELA has in the recent past 's Qwen [website], which are vulnerable to prompt injection attacks that could streamline malicious use.

Unit 42 researchers also demonstrated effective jailbreaking techniques against DeepSeek R1 and V3, showing that the models are easy to abuse for nefarious purposes.

The FBI and authorities in The Netherlands this week seized dozens of servers and domains for a hugely popular spam and malware dissemination service ......

The [website] Cybersecurity and Infrastructure Security Agency (CISA) and the Food and Drug Administration (FDA) have issued alerts about the presence of h......

​Mizuno USA, a subsidiary of Mizuno Corporation, one of the world's largest sporting goods manufacturers, confirmed in data breach notification letter......

SOC Analysts - Reimagining Their Role Using AI

SOC Analysts - Reimagining Their Role Using AI

The job of a SOC analyst has never been easy. Faced with an overwhelming flood of daily alerts, analysts (and sometimes IT teams who are doubling as SecOps) must try and triage thousands of security alerts—often false positives—just to identify a handful of real threats. This relentless, 24/7 work leads to alert fatigue, desensitization, and increased risk of missing critical security incidents. Studies show that 70% of SOC analysts experience severe stress, and 65% consider leaving their jobs within a year. This makes retention a major challenge for security teams, especially in light of the existing shortage of skilled security analysts.

On the operational side, analysts spend more time on repetitive, manual tasks like investigating alerts, and resolving and documenting incidents than they do on proactive security measures. Security teams struggle with configuring and maintaining SOAR playbooks as the cyber landscape rapidly changes. To top this all off, tool overload and siloed data force analysts to navigate disconnected security platforms, creating not only inconvenience, but more critically, missed correlations between events that might have helped identify true positives.

The above is compounded by the fact that threat actors are leveraging AI to power their cybercrime. By processing vast amounts of data rapidly, AI enables them to launch more effective, adaptive, and difficult-to-detect attacks at scale. AI tools generate highly convincing phishing emails, deepfake content, and social engineering scripts, making deception much easier even for inexperienced attackers. They can also use AI to write sophisticated malware, reverse engineer security mechanisms and automate vulnerability discovery by analyzing large codebases for exploitable flaws. Additionally, AI-driven chatbots impersonate real clients, conduct large-scale fraud, and for newbies, provide step-by-step cybercrime guidance.

, attackers have reduced the average breakout time for successful intrusions from 79 minutes to 62 minutes, with the fastest known breakout time being just two minutes and seven seconds. Even with the best detection tooling and dozens of analysts available (a dream scenario) the sheer volume and velocity of today's cyberattacks still requires SOC teams to move faster than ever and somehow manually review and triage the insane amount of alerts being generated. This has been literally a mission impossible. But not anymore.

The Modern SOC Strikes Back - A Perfect Blend of AI and Human-in-the-Loop.

If you are a SOC analyst or a CISO, you know I was not exaggerating on how dire the situation is. But the tide is turning. New AI tooling for SOCs will enable human teams to process any type and any volume of security alerts, allowing them to focus on handling real threats in record time. Here's a glimpse of what some early adopters are experiencing.

Many vendors are now offering automated triage of security alerts which significantly reduces the number of alerts that human analysts have to investigate. While multiple vendors offer automated triage for specific use cases such as phishing, endpoint, network and cloud (with the triage playbook created by human security professionals) the ideal scenario is for an AI-powered SOC analyst that can interpret any type of security alert from any sensor or defense system. This way, all security events, from the most common to the most obscure, can be fully triaged. Transparency plays a big role here as well, with the actual logic of the AI triage (down to each and every step taken) being readily available for a human analyst to review if desired.

Full Control Over Response to Real Threats.

While an AI-powered SOC platform generates an accurate response appropriate to the specific threat (providing similar value to a SOAR without all the configuration and maintenance headache), it's essential to have a human-in-the-loop to review the suggested remediation and the ability to accept, modify or immediately execute it.

Leveraging generative AI allows SOC teams to research emerging threats, the latest attack methods and the best practices for combatting them. Tools like ChatGPT are incredible for rapidly ramping up on practically any topic, security included and will definitely make it easier for analysts to access and easily learn about relevant solutions in a timely manner.

Data Querying, Log Interpretation and Anomaly Detection.

SOC analysts no longer need to struggle with querying syntax. Instead, they can use natural language to find the data they need and when it comes to understanding the significance of a particular log or dataset, AI solutions can provide instant clarification. When analyzing an aggregate data set of thousands of logs, built-in anomaly detection aids in identifying unusual patterns that might warrant further investigation.

More Data for Data-Hungry AI. Without an Insane Bill.

AI tools are data-hungry because they rely on vast amounts of information to learn patterns, make predictions, and improve their accuracy over time. However, traditional data storage can be very cost-prohibitive. Upcoming technologies have made it possible to rapidly query logs and other data from ultra-affordable cold storage such as AWS S3. This means that these AI-powered SOC platforms can rapidly access, process and interpret the vast amounts of data for them to automatically triage alerts. Likewise, for humans. As a CISO or VP Security you can now fully control your data without any vendor lock-in, while giving your analysts rapid querying capabilities and unlimited retention for compliance purposes.

In the last century, social interactions were far slower—if you wanted to connect with someone, you had to call their landline and hope they answered, send a letter and wait days for a response, or meet in person. Fast forward to 2025, and instant messaging, social media, and AI-driven communication have made interactions immediate and seamless. The same transformation is happening in security operations. Traditional SOCs rely on manual triage, lengthy investigations, and complex SOAR configurations, slowing down response times. But with AI-powered SOC solutions, analysts no longer have to sift through endless alerts or manually craft remediation steps. AI automates triage, validates real threats, and hints at precise remediation, drastically reducing workload and response times. AI is reshaping SOC operations—enabling faster, smarter, and more effective security at scale.

In summary, SOC analysts struggle with alert volumes, manual triage, and escalating cyber threats, leading to burnout and inefficiencies. Meanwhile, threat actors are leveraging AI to automate attacks, making rapid response more critical than ever. The good news is that the modern SOC is evolving with AI-powered triage, automated remediation, and natural language-driven data querying, allowing analysts to focus on real threats instead of tedious processes. With AI the SOC is becoming faster, smarter, and more scalable.

Interested in learning more? Download this guide to learn more how to make the SOC more efficient, or take an interactive product tour to learn more about AI SOC analysts.

​Mizuno USA, a subsidiary of Mizuno Corporation, one of the world's largest sporting goods manufacturers, confirmed in data breach notification letter......

​The New York Blood Center (NYBC), one of the world's largest independent blood collection and distribution organizations, says a Sunday ransomware at......

BeyondTrust has revealed it completed an investigation into a recent cybersecurity incident that targeted some of the organization's Remote Support SaaS in......

Watch Out For These 8 Cloud Security Shifts in 2025

Watch Out For These 8 Cloud Security Shifts in 2025

As cloud security evolves in 2025 and beyond, organizations must adapt to both new and evolving realities, including the increasing reliance on cloud infrastructure for AI-driven workflows and the vast quantities of data being migrated to the cloud.

But there are other developments that could impact your organizations and drive the need for an even more robust security strategy. Let's take a look….

#1: Increased Threat Landscape Encourages Market Consolidation.

Cyberattacks targeting cloud environments are becoming more sophisticated, emphasizing the need for security solutions that go beyond detection. Organizations will need proactive defense mechanisms to prevent risks from reaching production. Because of this need, the market will favor vendors offering comprehensive, end-to-end security platforms that streamline risk mitigation and enhance operational efficiency.

#2: Cloud Security Unifies with SOC Priorities.

Security operations centers (SOC) and cloud security functions are converging. In 2025, SOC teams will take a more active role in cloud security, integrating cloud-specific threat detection and response into their [website] colaboration will improve coordination, enabling a unified security approach that enhances threat protection and operational resilience.

#3: Data Security Gains Priority in Cloud-Native Application Protection Platforms (CNAPPs).

With nearly 30% of cloud data containing sensitive information, data security has become a critical component of cloud protection strategies. As generative AI adoption grows, CNAPP solutions will increasingly incorporate built-in data security elements. Vendors that integrate strong data protection measures will gain a competitive advantage, helping organizations prevent unauthorized access and data breaches.

#4: Application Security Budgets Shift to Unified Platforms.

A growing number of organizations are reallocating application security budgets from fragmented tools to unified platforms. Research indicates that 64% of security decision-makers anticipate budget increases for application security. Moving away from disparate security solutions will provide businesses with comprehensive visibility, improving their ability to detect and prevent cyber threats.

#5: Increased Focus on Protecting Intellectual Property in AI-Generated Code.

As AI-generated code becomes more widespread, organizations face increased risks related to proprietary intellectual property (IP). AI models trained on vast datasets may inadvertently introduce copyrighted or sensitive content. To mitigate these risks, businesses must implement rigorous data auditing, quality assurance processes, and compliance frameworks to ensure the responsible use of AI.

#6: Stricter Compliance Frameworks for AI Data Handling.

Regulatory bodies worldwide are tightening governance over AI data security. As AI models process larger volumes of sensitive information, new security measures will be required to address emerging vulnerabilities. Organizations will need to invest in advanced compliance strategies, staff training, and enhanced security protocols to meet evolving regulatory requirements and maintain operational trust.

#7: Drive for Innovation Will Compromise Security.

Some developers may bypass restrictive AI security policies in pursuit of innovation, inadvertently exposing organizations to new vulnerabilities. Striking a balance between security and innovation will be crucial. Companies must develop security frameworks that support rapid development while maintaining compliance and minimizing risks.

#8: AI-Powered Malware Emerges as a Threat.

Advancements in large language models (LLMs) introduce new risks, including AI-driven malware capable of automating phishing attacks, evading detection, and enhancing social engineering tactics. Traditional cybersecurity measures may prove inadequate against these evolving threats. Organizations will need to invest in adaptive security defenses that leverage AI to counteract these emerging risks.

The theme for cloud security in 2025 is all about being proactive—understanding the changes that are happening so you can be prepared. Take your first step into the future of security innovation at Symphony 2025 — the ultimate cybersecurity transformation event. Get insights on how to stay ahead of adversaries, a sneak peek into the future of AI-driven SecOps and see what real-time cloud security is all about. Claim your VIP pass today.

​Food delivery firm GrubHub disclosed a data breach impacting the personal information of an undi...

Five Eyes cybersecurity agencies in the UK, Australia, Canada, New Zealand, and the [website] have issued...

Microsoft today unleashed updates to plug a whopping 161 security vulnerabilities in Windows and rel...

Market Impact Analysis

Market Growth Trend

2018201920202021202220232024
8.7%10.5%11.0%12.2%12.9%13.3%13.4%
8.7%10.5%11.0%12.2%12.9%13.3%13.4% 2018201920202021202220232024

Quarterly Growth Rate

Q1 2024 Q2 2024 Q3 2024 Q4 2024
12.5% 12.9% 13.2% 13.4%
12.5% Q1 12.9% Q2 13.2% Q3 13.4% Q4

Market Segments and Growth Drivers

Segment Market Share Growth Rate
Network Security26%10.8%
Cloud Security23%17.6%
Identity Management19%15.3%
Endpoint Security17%13.9%
Other Security Solutions15%12.4%
Network Security26.0%Cloud Security23.0%Identity Management19.0%Endpoint Security17.0%Other Security Solutions15.0%

Technology Maturity Curve

Different technologies within the ecosystem are at varying stages of maturity:

Innovation Trigger Peak of Inflated Expectations Trough of Disillusionment Slope of Enlightenment Plateau of Productivity AI/ML Blockchain VR/AR Cloud Mobile

Competitive Landscape Analysis

Company Market Share
Palo Alto Networks14.2%
Cisco Security12.8%
Crowdstrike9.3%
Fortinet7.6%
Microsoft Security7.1%

Future Outlook and Predictions

The Their Google Says landscape is evolving rapidly, driven by technological advancements, changing threat vectors, and shifting business requirements. Based on current trends and expert analyses, we can anticipate several significant developments across different time horizons:

Year-by-Year Technology Evolution

Based on current trajectory and expert analyses, we can project the following development timeline:

2024Early adopters begin implementing specialized solutions with measurable results
2025Industry standards emerging to facilitate broader adoption and integration
2026Mainstream adoption begins as technical barriers are addressed
2027Integration with adjacent technologies creates new capabilities
2028Business models transform as capabilities mature
2029Technology becomes embedded in core infrastructure and processes
2030New paradigms emerge as the technology reaches full maturity

Technology Maturity Curve

Different technologies within the ecosystem are at varying stages of maturity, influencing adoption timelines and investment priorities:

Time / Development Stage Adoption / Maturity Innovation Early Adoption Growth Maturity Decline/Legacy Emerging Tech Current Focus Established Tech Mature Solutions (Interactive diagram available in full report)

Innovation Trigger

  • Generative AI for specialized domains
  • Blockchain for supply chain verification

Peak of Inflated Expectations

  • Digital twins for business processes
  • Quantum-resistant cryptography

Trough of Disillusionment

  • Consumer AR/VR applications
  • General-purpose blockchain

Slope of Enlightenment

  • AI-driven analytics
  • Edge computing

Plateau of Productivity

  • Cloud infrastructure
  • Mobile applications

Technology Evolution Timeline

1-2 Years
  • Technology adoption accelerating across industries
  • digital transformation initiatives becoming mainstream
3-5 Years
  • Significant transformation of business processes through advanced technologies
  • new digital business models emerging
5+ Years
  • Fundamental shifts in how technology integrates with business and society
  • emergence of new technology paradigms

Expert Perspectives

Leading experts in the cyber security sector provide diverse perspectives on how the landscape will evolve over the coming years:

"Technology transformation will continue to accelerate, creating both challenges and opportunities."

— Industry Expert

"Organizations must balance innovation with practical implementation to achieve meaningful results."

— Technology Analyst

"The most successful adopters will focus on business outcomes rather than technology for its own sake."

— Research Director

Areas of Expert Consensus

  • Acceleration of Innovation: The pace of technological evolution will continue to increase
  • Practical Integration: Focus will shift from proof-of-concept to operational deployment
  • Human-Technology Partnership: Most effective implementations will optimize human-machine collaboration
  • Regulatory Influence: Regulatory frameworks will increasingly shape technology development

Short-Term Outlook (1-2 Years)

In the immediate future, organizations will focus on implementing and optimizing currently available technologies to address pressing cyber security challenges:

  • Technology adoption accelerating across industries
  • digital transformation initiatives becoming mainstream

These developments will be characterized by incremental improvements to existing frameworks rather than revolutionary changes, with emphasis on practical deployment and measurable outcomes.

Mid-Term Outlook (3-5 Years)

As technologies mature and organizations adapt, more substantial transformations will emerge in how security is approached and implemented:

  • Significant transformation of business processes through advanced technologies
  • new digital business models emerging

This period will see significant changes in security architecture and operational models, with increasing automation and integration between previously siloed security functions. Organizations will shift from reactive to proactive security postures.

Long-Term Outlook (5+ Years)

Looking further ahead, more fundamental shifts will reshape how cybersecurity is conceptualized and implemented across digital ecosystems:

  • Fundamental shifts in how technology integrates with business and society
  • emergence of new technology paradigms

These long-term developments will likely require significant technical breakthroughs, new regulatory frameworks, and evolution in how organizations approach security as a fundamental business function rather than a technical discipline.

Key Risk Factors and Uncertainties

Several critical factors could significantly impact the trajectory of cyber security evolution:

Evolving threat landscape
Skills shortage
Regulatory compliance complexity

Organizations should monitor these factors closely and develop contingency strategies to mitigate potential negative impacts on technology implementation timelines.

Alternative Future Scenarios

The evolution of technology can follow different paths depending on various factors including regulatory developments, investment trends, technological breakthroughs, and market adoption. We analyze three potential scenarios:

Optimistic Scenario

Rapid adoption of advanced technologies with significant business impact

Key Drivers: Supportive regulatory environment, significant research breakthroughs, strong market incentives, and rapid user adoption.

Probability: 25-30%

Base Case Scenario

Measured implementation with incremental improvements

Key Drivers: Balanced regulatory approach, steady technological progress, and selective implementation based on clear ROI.

Probability: 50-60%

Conservative Scenario

Technical and organizational barriers limiting effective adoption

Key Drivers: Restrictive regulations, technical limitations, implementation challenges, and risk-averse organizational cultures.

Probability: 15-20%

Scenario Comparison Matrix

FactorOptimisticBase CaseConservative
Implementation TimelineAcceleratedSteadyDelayed
Market AdoptionWidespreadSelectiveLimited
Technology EvolutionRapidProgressiveIncremental
Regulatory EnvironmentSupportiveBalancedRestrictive
Business ImpactTransformativeSignificantModest

Transformational Impact

Technology becoming increasingly embedded in all aspects of business operations. This evolution will necessitate significant changes in organizational structures, talent development, and strategic planning processes.

The convergence of multiple technological trends—including artificial intelligence, quantum computing, and ubiquitous connectivity—will create both unprecedented security challenges and innovative defensive capabilities.

Implementation Challenges

Technical complexity and organizational readiness remain key challenges. Organizations will need to develop comprehensive change management strategies to successfully navigate these transitions.

Regulatory uncertainty, particularly around emerging technologies like AI in security applications, will require flexible security architectures that can adapt to evolving compliance requirements.

Key Innovations to Watch

Artificial intelligence, distributed systems, and automation technologies leading innovation. Organizations should monitor these developments closely to maintain competitive advantages and effective security postures.

Strategic investments in research partnerships, technology pilots, and talent development will position forward-thinking organizations to leverage these innovations early in their development cycle.

Technical Glossary

Key technical terms and definitions to help understand the technologies discussed in this article.

Understanding the following technical concepts is essential for grasping the full implications of the security threats and defensive measures discussed in this article. These definitions provide context for both technical and non-technical readers.

Filter by difficulty:

API beginner

algorithm APIs serve as the connective tissue in modern software architectures, enabling different applications and services to communicate and share data according to defined protocols and data formats.
API concept visualizationHow APIs enable communication between different software systems
Example: Cloud service providers like AWS, Google Cloud, and Azure offer extensive APIs that allow organizations to programmatically provision and manage infrastructure and services.

platform intermediate

interface Platforms provide standardized environments that reduce development complexity and enable ecosystem growth through shared functionality and integration capabilities.

EDR intermediate

platform Unlike traditional antivirus, EDR solutions monitor and record system activities and events across endpoints, applying behavioral analysis and threat intelligence to detect sophisticated attacks.

zero-day intermediate

encryption These vulnerabilities are particularly dangerous because defenders have no time to develop and deploy patches before exploitation occurs. They are highly valued in both offensive security markets and criminal underground.
Zero-day vulnerability timelineTimeline showing vulnerability discovery to patch development
Example: The SUNBURST attack exploited a zero-day vulnerability in SolarWinds Orion software, remaining undetected for months while compromising numerous government agencies and private organizations.

threat intelligence intermediate

API

SOC intermediate

cloud computing

malware beginner

middleware Malware can take many forms including viruses, worms, trojans, ransomware, spyware, adware, and rootkits. Modern malware often employs sophisticated evasion techniques to avoid detection by security solutions.
Types of malwareCommon malware types and their characteristics
Example: The Emotet trojan began as banking malware but evolved into a delivery mechanism for other malware types, demonstrating how sophisticated malware can adapt and change functionality over time.

phishing beginner

scalability Modern phishing attacks are increasingly sophisticated, often leveraging AI to create convincing spear-phishing campaigns that target specific individuals with personalized content that appears legitimate.
Phishing attack flowAnatomy of a typical phishing attack
Example: Business Email Compromise (BEC) attacks are sophisticated phishing campaigns where attackers impersonate executives to trick employees into transferring funds or sensitive information.

ransomware beginner

DevOps Ransomware typically encrypts victim data using strong cryptographic algorithms, making recovery impossible without the decryption key. Advanced variants now also exfiltrate data before encryption, enabling double-extortion tactics.
Example: The REvil ransomware group leveraged a supply chain attack against Kaseya VSA to deploy ransomware to thousands of organizations simultaneously, demanding a $70 million ransom payment.

encryption intermediate

microservices Modern encryption uses complex mathematical algorithms to convert readable data into encoded formats that can only be accessed with the correct decryption keys, forming the foundation of data security.
Encryption process diagramBasic encryption process showing plaintext conversion to ciphertext via encryption key