Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • Security Week
  • Google Targets SOC Overload With Automated AI Alert and Malware Analysis Tools
  • Security Week

Google Targets SOC Overload With Automated AI Alert and Malware Analysis Tools

Ryan Naraine Published: April 9, 2025 | Updated: April 9, 2025 3 min read
0 views

Technology giant Google this week announced plans to unleash automated AI agents into overtaxed SOCs to reduce the manual workload for cybersecurity investigators.

The AI-driven agents, which promises workload relief for Tier 1 and Tier 2 SOC analysts, are a key component of a larger Google Unified Security platform offering security tools across threat intelligence, security operations, cloud security, and secure enterprise browsing.

At Google Cloud Next conference, the company said the AI-driven security agents are aimed at easing the pressures on security operations centers that are often overwhelmed by the sheer volume of alerts and incident data. By automating routine tasks, Google believes that AI agents will allow human analysts to focus on more complex investigations and speed up incident response tasks.

The company said the first tool is an alert triage agent embedded in Google Security Operations that’s slated for preview with select customers in Q2 2025.  The agent will automatically analyze incoming security alerts, gather contextual data, review historical patterns, and produce an automatic verdict on each alert.

Google said the AI agent will provide a full history of its analysis, helping teams understand its decision-making process.

The second tool, part of the Google Threat Intelligence suite, is a malware analysis agent that is programmed to auto-evaluate suspicious code. Google said this agent is designed to execute deobfuscation scripts and summarize its findings to determine whether identified code is safe. This agent, too, is on track for a Q2 2025 preview.

The plans for agentic AI security tooling follows Google’s rollout of an experimental artificial intelligence model designed to support incident response and threat analysis workflows coming from its Mandiant threat-intel unit.

The AI model, called Sec-Gemini v1, touts a combination of Google’s Gemini large language model capabilities with near real-time security data and tooling, including integration with Google Threat Intelligence (GTI), the Open Source Vulnerability (OSV) database, and other internal resources.  

Advertisement. Scroll to continue reading.

In addition to the new AI agents, the company announced the general availability of Google Unified Security, a platform that consolidates data from networks, endpoints, clouds, and applications into a single searchable interface. It promises automatic  enrichment of security data with fresh threat intelligence from Mandiant and improved detection and response times across disparate security tools.

Google also introduced new data pipeline management capabilities that help customers manage scale and a partnership with Bindplane to transform, filter, and route data. The company said Mandiant Threat Defense is also now available, providing active threat detection and response services through AI-assisted techniques and managed services.

The company also fitted its Chrome Enterprise Premium browser with enhanced employee phishing protections powered by Google Safe Browsing data, along with expanded data masking and browsing controls that extend to Android devices. 

Related: Google Pushing ‘Sec-Gemini’ AI Model for Threat-Intel Workflows

Related: Can AI Early Warning Systems Reboot the Threat Intel Industry?

Related: Google Brings AI Magic to Fuzz Testing With Eye-Opening Results

Related: Chinese APT Pounces on Misdiagnosed RCE in Ivanti VPN Appliances 

Related: Google DeepMind Unveils Framework to Exploit AI’s Cyber Weaknesses

About The Author

Ryan Naraine

See author's posts

Original post here

What do you feel about this?

  • Security Week

Post navigation

Previous: Groucho’s Wit, Cloud Complexity, and the Case for Consistent Security Policy
Next: AkiraBot Targets 420,000 Sites with OpenAI-Generated Spam, Bypassing CAPTCHA Protections

Author's Other Posts

Huntress Documents In-The-Wild Exploitation of Critical Gladinet Vulnerabilities Cybersecurity_News-SecurityWeek.jpg

Huntress Documents In-The-Wild Exploitation of Critical Gladinet Vulnerabilities

April 14, 2025 0 0
Trend Micro Flags Incomplete Nvidia Patch That Leaves AI Containers Exposed Nvidia.jpeg

Trend Micro Flags Incomplete Nvidia Patch That Leaves AI Containers Exposed

April 14, 2025 0 0
Rapid7 Reveals RCE Path in Ivanti VPN Appliance After Silent Patch Debacle Ivanti-e1736941837602.jpg

Rapid7 Reveals RCE Path in Ivanti VPN Appliance After Silent Patch Debacle

April 11, 2025 0 0
Trump Revokes Security Clearance for Ex-CISA Director Chris Krebs White-House-Cybersecurity.jpg

Trump Revokes Security Clearance for Ex-CISA Director Chris Krebs

April 10, 2025 0 0

Related Stories

Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Insurance Firm Lemonade Says API Glitch Exposed Some Driver’s License Numbers

Ionut Arghire April 15, 2025 0 0
ransomware.jpeg
  • Security Week

Kidney Dialysis Services Provider DaVita Hit by Ransomware

Ionut Arghire April 15, 2025 0 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Conduent Says Names, Social Security Numbers Stolen in Cyberattack

Ionut Arghire April 15, 2025 0 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

2.6 Million Impacted by Landmark Admin, Young Consulting Data Breaches

Ionut Arghire April 15, 2025 0 0
VC-Funding_China-tech.jpg
  • Security Week

China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games

Associated Press April 15, 2025 0 0
Satellite-Link-Cybersecurity.jpg
  • Security Week

Blockchain, Quantum, and IoT Firms Unite to Secure Satellite Communications Against Quantum Threats

Kevin Townsend April 15, 2025 0 0

Trending Now

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill 1

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers SMS Phishers Pivot to Points, Taxes, Fake Retailers 2

SMS Phishers Pivot to Points, Taxes, Fake Retailers

December 4, 2025 0 0
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse whatsapp-sim.jpg 3

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

December 2, 2025 0 0
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera korean.jpg 4

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

December 2, 2025 0 1

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill 1
  • Uncategorized

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers SMS Phishers Pivot to Points, Taxes, Fake Retailers 2
  • Uncategorized

SMS Phishers Pivot to Points, Taxes, Fake Retailers

December 4, 2025 0 0
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse whatsapp-sim.jpg 3
  • The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

December 2, 2025 0 0
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera korean.jpg 4
  • The Hacker News

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

December 2, 2025 0 1
GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools hacked.jpg 5
  • The Hacker News

GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools

December 2, 2025 0 0
Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools npm-mal.jpg 6
  • The Hacker News

Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools

December 2, 2025 0 1
Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks iran-hacking.jpg 7
  • The Hacker News

Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks

December 2, 2025 0 0

You may have missed

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill
  • Uncategorized

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

Sean December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers
  • Uncategorized

SMS Phishers Pivot to Points, Taxes, Fake Retailers

Sean December 4, 2025 0 0
whatsapp-sim.jpg
  • The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

[email protected] The Hacker News December 2, 2025 0 0
korean.jpg
  • The Hacker News

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

[email protected] The Hacker News December 2, 2025 0 1
Copyright © 2026 All rights reserved. | MoreNews by AF themes.