Curated (GTI-G developed) YARA rules in Campaign and Software Toolkit/Tool knowledge cards. Actionability is one of GTI’s strategic imperatives. GTI provides in-depth monographic views for threat actors, malware & tools, campaigns and other significant events. These “cards” include information such as region/industry targeting, motivations, TTPs, etc. Malware knowledge cards and finished intelligence reports include high fidelity YARA rules developed by GTI-Group analysts, formerly known as Mandiant Intelligence. We’ve extended curated YARA rule development efforts to threat campaigns and other kinds of software toolkits used by attackers. See example.

Track relevant vulnerabilities in your threat profile. Threat Profile allows Google Threat Intelligence users to customize what matters most to them and focus on relevant threat actors, malware, campaigns, etc. We now have the ability to track and add vulnerability objects manually to any threat profile, allowing customers to follow trending vulnerabilities they read about in the news, significant events and beyond. This represents the first stepping stone towards technology watchlists and CMDB/SBOM connectors later in the year.

Public preview of categorized threat lists / feeds. Categorized threat lists are real-time IoC lists that can be used to drive hunting/detection/blocking workflows in different technologies. They are grouped into categories that can be used to target specific technologies/tech stacks/threats: ransomware, malicious network infrastructure, mobile, OS X, TOP + Trending IoCs, etc. GTI Users can now test the new functionality.
Gemini summary for all finished intelligence reports. Google Threat Intelligence incorporates finished intelligence reporting with the differentiated frontline visibility of our Mandiant experts. Based on Mandiant’s 1k+ yearly incident responses, comprehensive underground collection strategy, fusion centers, etc. analysts produce hundreds of intelligence reports each week focusing on topic areas that span cyber crime, cyber espionage, DDoS, healthcare, etc. and report types go all the way from threat activity alerts to quarterly industry focused intelligence. We’ve extended Gemini AI summarization beyond 3rd-party articles and any kind of online references ingested through direct connection to the Google crawler (OSINT articles). Now all finished intelligence content includes AI summaries, accelerating users ability to understand whether a given article is relevant to them.

Semantic search across {threat actors, malware profiles, campaigns, vulnerabilities, finished intelligence reports}. Many describe GTI as the “Google search engine” for all kinds of attacker behavior. Indeed, users can make use of both free text searches and advanced faceted queries to identify interesting threat objects. We’ve improved search matching over written content and profiles with semantic searching, which leverages ML and embeddings to understand queries and find relevant content even when there is no exact keyword matches. Example searches:
- Threats against the energy industry in Qatar
- Most active threat actors targeting Spain
- Malware that executes powershell
Search improvements are work in progress and we continue to execute towards full blown agentic search (reasoning included) against all our threat corpuses, including deep dark web visibility.
Private Scanning UK storage region. Private Scanning allows its users to “see files through Google Threat Intelligence’s eyes” without making those files or their reports downloadable/visible to any 3rd-party beyond their own organizations, i.e. in a non-shareable fashion. All standard platform analysis components are included (reputation, static, dynamic - sandboxes, code, similarity analysis) except for VirusTotal multi-antivirus scanning. We’ve extended the available file storage regions (US, Canada, Europe) and added the UK as an option, which will help in certain regulated environments.

Private URL scanning. We’ve extended the aforementioned private scanning functionality to also act on URLs. Users can now submit any website and effortlessly identify redirection chains, web trackers, downloaded files, etc. The analysis pipeline visits the pertinent URL with a Chrome headless instance, screenshots the site and extracts dynamic properties such as the DOM tree, Javascript variables, HTTP transactions, etc. All of the extracted data points are pivotable and allow you to identify similar threats across the open GTI dataset, which becomes instrumental in performing attribution or identifying the malware behind a given network infrastructure. Similarly. Private Scanning optionally allows you to open up the URL in our dynamic analysis environments (sandboxes), enhancing analysis of potential downloaded files.

Private URL scanning is also exposed through API endpoints in order to power automations and programmatic workflows.
Private URL scanning in Palo Alto XSOAR. The aforementioned programmatic URL private scanning endpoint has now been added to the GTI Palo Alto XSOAR integration, making it even easier to build automated workflows and threat detection / incident response playbooks.
DTM RBAC NO ACCESS. Google Threat Intelligence strives to tackle all threat intelligence use cases, including Digital Risk Protection, including our Digital Threat Monitoring component (DTM) focused on deep dark web visibility. DTM provides alerts about compromised credentials, data leaks, credit card theft, domain abuse and other potential risks. Given that DTM often surfaces sensitive leaked/compromised organizational data, GTI administrators often desire to limit its access across their org. We’ve released new role based access controls in order to address such needs. If you are a GTI org administrator, you can find user listings and RBAC controls in the org profile view, accessible via the dropdown below your username in the top right hand corner of the platform.
