GCP – Cloud CISO Perspectives: Data-driven insights into AI and cybersecurity
Welcome to the second Cloud CISO Perspectives for April 2025. Today, Sandra Joyce, vice president, Google Threat Intelligence, will talk about the practical applications of AI in both attack and defense, adapted from her RSA Conference keynote.
As with all Cloud CISO Perspectives, the contents of this newsletter are posted to the Google Cloud blog. If you’re reading this on the website and you’d like to receive the email version, you can subscribe here.
- aside_block
- <ListValue: [StructValue([(‘title’, ‘Get vital board insights with Google Cloud’), (‘body’, <wagtail.rich_text.RichText object at 0x3e18bacbdbe0>), (‘btn_text’, ‘Visit the hub’), (‘href’, ‘https://cloud.google.com/solutions/security/board-of-directors?utm_source=cloud_sfdc&utm_medium=email&utm_campaign=FY24-Q2-global-PROD941-physicalevent-er-CEG_Boardroom_Summit&utm_content=-&utm_term=-‘), (‘image’, <GAEImage: GCAT-replacement-logo-A>)])]>
Data-driven insights into AI and cybersecurity
By Sandra Joyce, vice president, Google Threat Intelligence
We have been talking about AI’s exciting potential for cybersecurity for a couple of years. While we should be really excited about the future, we also need to look at the here and now, where AI is already impacting our industry. It’s time for results.
Sandra Joyce, vice president, Google Threat Intelligence
When we look at the current state of AI and cybersecurity, I see three consistent patterns:
- There’s a lot of speculation. The potential of what AI is going to do in the future as compared to the value it can provide right now. It’s treated as a horizon-scanning issue.
- There’s experimentation, too. Many security teams are still testing different solutions, not entirely sure yet how they’re going to integrate AI into their workflows.
- There are lots of anecdotes. Stories that create a distorted perspective of the landscape based on one-off incidents, which can increase the risk that we lurch from one headline to the next instead of focusing on the reality of AI development in security.
Thankfully, the same AI capabilities that attackers are using for productivity gains can have a different impact when defenders seize them: They have the power to make defenders even more resilient.
Today’s real world impact
To cut through the noise so we can understand where we should actually be focusing our AI efforts, we need better data – specifically in two buckets: AI in the threat landscape, and AI for defense.
With so many different potential adversarial use cases related to AI, we need to prioritize the most prominent AI-driven attack vectors so we can properly manage the risks they present.
At the same time, CISOs need AI to deliver for defense. What is AI’s real value proposition? How does it meaningfully help deliver savings and improve security outcomes over the next 6 to 12 months?
Today, I’m going to share data-driven analyses that can help eliminate the guesswork, and help you prioritize the practical applications of AI that we’re seeing have a tangible impact.
How attackers are using AI
As part of our work countering threats to Google and our users, Google Threat Intelligence Group analysts track known threat actors, and we investigate how these threat actors are currently attempting to use generative AI, specifically Gemini. We’ve identified Advanced Persistent Threat groups from more than 20 countries that have accessed our public Gemini AI services.
Threat actors have used Gemini to support several phases of the attack lifecycle, including researching potential infrastructure and free hosting providers, performing reconnaissance on target organizations, researching vulnerabilities, payload development, and seeking assistance with malicious scripting and evasion techniques.
Crucially, we see that these are existing attack phases being made more efficient, not fundamentally new AI-driven attacks. We’ve observed threat actors experimenting with AI and finding productivity gains, but not yet developing novel capabilities.
Much of the current discourse can feel overly alarmist. Our analysis shows that while AI is a useful tool for common tasks, we haven’t seen indications of adversaries developing fundamentally new attack vectors using these models.
Attackers are using Gemini the way many of us are using AI: It’s a productivity tool to help them brainstorm and refine their work. Instead of inventing brand new attack methods using AI, they are enhancing traditional tactics. We did not observe unique AI-enabled attacks, or prompt attacks.
The good news is that Gemini’s safety measures continue to restrict adversarial operational capabilities. While Gemini provided assistance with common, neutral tasks like content creation, summarization, and simple coding, it generated safety responses when prompted with more elaborate or explicitly malicious requests. We even observed unsuccessful attempts by threat actors to use Gemini to research techniques for abusing Google products such as Gmail, stealing data, and bypassing account verification.
How defenders are using AI
Thankfully, the same AI capabilities that attackers are using for productivity gains can have a different impact when defenders seize them: They have the power to make defenders even more resilient. There are use cases we recommend CISOs lean into right now to harness the potential of AI.
The growing volume of cyber threats has increased workloads for defenders and created a need for improved automation and innovative approaches. AI has enabled increased efficiency, supporting malware analysis, vulnerability research and analyst workflows.
- The true test of any malware analysis tool lies in its ability to identify never-before-seen techniques that are not detected by traditional methods. Gemini can understand how code behaves in a deep way to spot new threats, even threats never seen before, and can make this kind of advanced analysis more widely accessible.
- Our current results using large-language models (LLM) to create new fuzzing harnesses are showing real promise. We’ve achieved coverage increases of up to 7,000% across 272 C and C++ projects in OSS-Fuzz.
- Google Project Zero and Google DeepMind collaborated on a project called Big Sleep, which has already uncovered its first real-world vulnerability using a LLM.
- At Google, we’re using LLMs to speed up our security and privacy incident workflows. Gemini helps us write incident summaries 51% faster while also measurably improving their quality in blind evaluations by human reviewers.
- We’re also using AI to reduce toil for our own analyst workflows. GTIG uses an internal AI tool that reviews thousands of event logs collected from an investigation and quickly summarizes them – in minutes – as a bite-sized overview that can be easily understood across the intelligence team, a process that previously took hours of effort.
- Another internal AI tool also helps us provide crucial information to customers on the hacktivist threats they face, and reduce toil, in a way that would not be feasible without AI. Our analysts will onboard a hacktivist group’s main social channel (such as Telegram) into the AI tool, and when we have collected enough data from that channel, it creates a comprehensive report on the group’s behavior – including TTPs, preferred targets, and attacks that they’ve claimed credit for. That report is then reviewed, validated, and edited by a GTIG analyst.
We’ve only scratched the surface today of how AI is actively shaping the cybersecurity landscape right now. If you’re reading this from the RSA Conference, please come visit the Google Cloud Security Hub and speak to our experts about the tangible value we’re already gaining from integrated and agentic AI, and how to make Google part of your security team to benefit as well.
You can check out all our RSA Conference announcements here, and of course visit us anytime at our CISO Insights Hub.
- aside_block
- <ListValue: [StructValue([(‘title’, ‘Join the Google Cloud CISO Community’), (‘body’, <wagtail.rich_text.RichText object at 0x3e18bacbdd90>), (‘btn_text’, ‘Learn more’), (‘href’, ‘https://rsvp.withgoogle.com/events/ciso-community-interest?utm_source=cgc-blog&utm_medium=blog&utm_campaign=2024-cloud-ciso-newsletter-events-ref&utm_content=-&utm_term=-‘), (‘image’, <GAEImage: GCAT-replacement-logo-A>)])]>
In case you missed it
Here are the latest updates, products, services, and resources from our security teams so far this month:
- From insight to action: M-Trends, agentic AI, and how we’re boosting defenders at RSAC 2025: From the latest M-Trends report to updates across Google Unified Security, our product portfolio, and our AI capabilities, here’s what’s new from us at RSAC. Read more.
- The dawn of agentic AI in security operations at RSAC 2025: Agentic AI promises a fundamental, tectonic shift for security teams, where intelligent agents work alongside human analysts. Here’s our vision for the agentic future. Read more.
- Building an open ecosystem for AI-driven security with MCP: Bring AI to your security tools with open-source model context protocol (MCP) servers for Google Security Operations, Google Threat Intelligence, and Security Command Center. Learn how to connect security tools to LLMs. Read more.
- 3 new ways to use AI as your security sidekick: Generative AI is already providing clear and impactful security results. Here’s three decisive examples that organizations can adopt right now. Read more.
- Introducing the Cyber Savvy Boardroom podcast: Our new monthly podcast features security and business leaders known for intuition, expertise, and guidance, discussing what matters most with experts from our Office of the CISO. Read more.
- Your comprehensive guide to Google Cloud Security at RSA 2025: From connecting with experts to witnessing innovative cloud technology in action, Google Cloud Security is the place to be at the RSA Conference. Read more.
Please visit the Google Cloud blog for more security stories published this month.
- aside_block
- <ListValue: [StructValue([(‘title’, ‘Tell us what you think’), (‘body’, <wagtail.rich_text.RichText object at 0x3e18bacbdfa0>), (‘btn_text’, ‘Vote now’), (‘href’, ‘https://www.linkedin.com/feed/update/urn:li:activity:7322982998843273216/’), (‘image’, <GAEImage: GCAT-replacement-logo-A>)])]>
Threat Intelligence news
- Zero-day exploitation continues to grow gradually: Google Threat Intelligence Group (GTIG) has released a comprehensive overview and analysis of the 75 zero-day vulnerabilities exploited in the wild in 2024. While zero-day exploitation continues to grow at a slow but steady pace, we’ve also started seeing vendor efforts to mitigate zero-day exploitation start to pay off. Read more.
- M-Trends 2025: Data, insights, and recommendations from the frontlines: The 16th edition of our annual threat intelligence report provides data, analysis, and learnings drawn from more than 450,000 hours of incident investigations conducted in 2024. Providing actionable insights into current cyber threats and attacker tactics, this year’s report continues our tradition of helping organizations understand the evolving threat landscape and improve their defenses based on real-world data. Read more.
Please visit the Google Cloud blog for more threat intelligence stories published this month.
Now hear this: Podcasts from Google Cloud
- How cyber-savvy is your board: We’ve long extolled the importance of bringing boards of directors up to speed on cybersecurity challenges both foundational and cutting-edge, which is why we’ve launched “Cyber Savvy Boardroom,” a new monthly podcast from our Office of the CISO’s David Homovich, Alicja Cade, and Nick Godfrey. Our first three episodes feature security and business leaders known for their intuition, expertise, and guidance, including Karenann Terrell, Christian Karam, and Don Callahan. Listen here.
- Going big with cloud security rewards: From vulnerability response at cloud scale to what makes a great vulnerability report, Google Cloud’s Michael Cote and Aadarsh Karumathil discuss and debate the ever-evolving world of vulnerability report rewards with hosts Anton Chuvakin and Tim Peacock. Listen here.
- Defender’s Advantage: Going from Windows RDP to rogue: Host Luke McNamara is joined by GTIG Senior Security Researcher Rohit Nambiar to discuss interesting usage of Windows Remote Desktop Protocol by UNC5837. Listen here.
- Behind the Binary: Inside a community’s fight against malware: We chat with founder Roman Huessy about the future of community-driven threat intelligence and abuse.ch, a vital non-profit project built by and for the global cybersecurity community to fight against threat actors. Listen here.
To have our Cloud CISO Perspectives post delivered twice a month to your inbox, sign up for our newsletter. We’ll be back in a few weeks with more security-related updates from Google Cloud.
Read More for the details.