Google flags intensifying cyber campaigns against the global defense supply chain
Read Our Expert Analysis
Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.
Recommended for you
Global cyber-espionage campaign breaches sensitive targets in 37 countries
A coordinated, long-duration hacking campaign has established persistent access to high-value government and diplomatic networks in 37 countries, prioritizing intelligence collection over immediate disruption. The operation leverages polymorphic tooling, credential harvesting and social-engineering techniques that complicate detection and raise urgent needs for identity-focused defenses and cross-border incident coordination.
Cyberwar in 2026: Pre-positioning, AI and the Blurred Line Between Crime and Statecraft
Nation-state operations are increasingly about long-term pre-positioning inside critical infrastructure rather than one-off disruptive strikes, and the rapid spread of generative and agentic AI lowers the barrier to assemble and coordinate complex campaigns. That convergence — together with scalable impersonation, commodified access in underground markets, and the latent threat from future quantum decryption — forces defenders to prioritize early detection, identity-first controls, post-quantum planning, and calibrated public–private response mechanisms.
Google warns of large-scale prompting campaign to clone Gemini
Google disclosed that actors prompted its Gemini model at scale to harvest outputs for use in building cheaper imitations, with at least one campaign issuing over 100,000 queries. The company frames the activity as theft of proprietary capabilities and signals a rising threat vector for LLM operators, with technical and legal consequences ahead.

