What’s new with Google Cloud

Want to know the latest from Google Cloud? Find it here in one handy location. Check back regularly for our newest updates, announcements, resources, events, learning opportunities, and more.  Tip: Not sure where to find what you’re looking for on the…

How Secure Are Your Machine Identities?

How Effective Is Your Non-Human Identity Management? Are your data security strategies truly effective in safeguarding machine identities within your organization’s cloud infrastructure? Where businesses increasingly rely on machine identities—or Non-Human Identities (NHIs) —to automate and streamline processes, the importance…

Hackers Weaponizing Telegram Messenger with Dangerous Android Malware to Gain Full System Control

A sophisticated backdoor named Android.Backdoor.Baohuo.1.origin has been discovered in maliciously modified versions of Telegram X messenger, granting attackers complete control over victims’ accounts while operating undetected. The malware infiltrates devices through deceptive in-app advertisements and third-party app stores, masquerading as…

CISA Beware! Hackers Are Actively Exploiting Windows Server Update Services RCE Flaw in the Wild

Cybersecurity researchers are sounding the alarm after discovering that hackers are actively exploiting a critical remote code execution (RCE) vulnerability in Microsoft’s Windows Server Update Services (WSUS). The flaw, tracked as CVE-2025-59287, allows unauthenticated attackers to run arbitrary code on…