<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:media="http://search.yahoo.com/mrss/"><channel><title>Threat Analysis Group (TAG)</title><link>https://blog.google/threat-analysis-group/</link><description>Threat Analysis Group (TAG)</description><atom:link href="https://blog.google/threat-analysis-group/rss/" rel="self"/><language>en-us</language><lastBuildDate>Thu, 29 Jan 2026 19:30:00 +0000</lastBuildDate><image><url>https://blog.google/threat-analysis-group/static/blogv2/images/google.png</url><title>Threat Analysis Group (TAG)</title><link>https://blog.google/threat-analysis-group/</link></image><item><title>TAG Bulletin: Q4 2025</title><link>https://blog.google/threat-analysis-group/tag-bulletin-q4-2025/</link><description>An overview of coordinated influence operation campaigns terminated on our platforms in Q4 2025.</description><pubDate>Thu, 29 Jan 2026 19:30:00 +0000</pubDate><guid>https://blog.google/threat-analysis-group/tag-bulletin-q4-2025/</guid><category>Threat Analysis Group</category><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>TAG Bulletin: Q4 2025</title><description>An overview of coordinated influence operation campaigns terminated on our platforms in Q4 2025.</description><site_name>Google</site_name><url>https://blog.google/threat-analysis-group/tag-bulletin-q4-2025/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Billy Leonard</name><title/><department>Threat Analysis Group</department><company/></author></item><item><title>TAG Bulletin: Q3 2025</title><link>https://blog.google/threat-analysis-group/tag-bulletin-q3-2025/</link><description>Our bulletin covering coordinated influence operation campaigns terminated on our platforms in Q3 2025.</description><pubDate>Thu, 13 Nov 2025 16:00:00 +0000</pubDate><guid>https://blog.google/threat-analysis-group/tag-bulletin-q3-2025/</guid><category>Threat Analysis Group</category><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>TAG Bulletin: Q3 2025</title><description>Our bulletin covering coordinated influence operation campaigns terminated on our platforms in Q3 2025.</description><site_name>Google</site_name><url>https://blog.google/threat-analysis-group/tag-bulletin-q3-2025/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Billy Leonard</name><title/><department>Threat Analysis Group</department><company/></author></item><item><title>TAG Bulletin: Q2 2025</title><link>https://blog.google/threat-analysis-group/tag-bulletin-q2-2025/</link><description>Our bulletin covering coordinated influence operation campaigns terminated on our platforms in Q2 2025.</description><pubDate>Mon, 21 Jul 2025 17:45:00 +0000</pubDate><guid>https://blog.google/threat-analysis-group/tag-bulletin-q2-2025/</guid><category>Threat Analysis Group</category><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>TAG Bulletin: Q2 2025</title><description>Our bulletin covering coordinated influence operation campaigns terminated on our platforms in Q2 2025.</description><site_name>Google</site_name><url>https://blog.google/threat-analysis-group/tag-bulletin-q2-2025/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Billy Leonard</name><title/><department>Threat Analysis Group</department><company/></author></item><item><title>TAG Bulletin: Q1 2025</title><link>https://blog.google/threat-analysis-group/tag-bulletin-q1-2025/</link><description>This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q1 2025. It was last updated on May 15, 2025.JanuaryWe terminated 12 YouT…</description><pubDate>Thu, 15 May 2025 17:30:00 +0000</pubDate><guid>https://blog.google/threat-analysis-group/tag-bulletin-q1-2025/</guid><category>Threat Analysis Group</category><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>TAG Bulletin: Q1 2025</title><description/><site_name>Google</site_name><url>https://blog.google/threat-analysis-group/tag-bulletin-q1-2025/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Billy Leonard</name><title/><department>Threat Analysis Group</department><company/></author></item><item><title>TAG Bulletin: Q4 2024</title><link>https://blog.google/threat-analysis-group/tag-bulletin-q4-2024/</link><description>This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q4 2024. It was last updated on February 19, 2024.OctoberWe terminated 11…</description><pubDate>Tue, 17 Dec 2024 22:00:00 +0000</pubDate><guid>https://blog.google/threat-analysis-group/tag-bulletin-q4-2024/</guid><category>Threat Analysis Group</category><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>TAG Bulletin: Q4 2024</title><description/><site_name>Google</site_name><url>https://blog.google/threat-analysis-group/tag-bulletin-q4-2024/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Billy Leonard</name><title/><department>Threat Analysis Group</department><company/></author></item><item><title>TAG Bulletin: Q3 2024</title><link>https://blog.google/threat-analysis-group/tag-bulletin-q3-2024/</link><description>This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q3 2024. It was last updated on January 14, 2025.JulyWe terminated 89 You…</description><pubDate>Thu, 12 Sep 2024 23:30:00 +0000</pubDate><guid>https://blog.google/threat-analysis-group/tag-bulletin-q3-2024/</guid><category>Threat Analysis Group</category><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>TAG Bulletin: Q3 2024</title><description/><site_name>Google</site_name><url>https://blog.google/threat-analysis-group/tag-bulletin-q3-2024/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Billy Leonard</name><title/><department>Threat Analysis Group</department><company/></author></item><item><title>State-backed attackers and commercial surveillance vendors repeatedly use the same exploits</title><link>https://blog.google/threat-analysis-group/state-backed-attackers-and-commercial-surveillance-vendors-repeatedly-use-the-same-exploits/</link><media:content height="540" medium="image" url="https://storage.googleapis.com/gweb-uniblog-publish-prod/images/TAG_PzwyAeM.width-1600.format-w.max-600x600.format-webp.webp" width="540"/><media:description>an image of a blue square with the embedded text "Google" and "Threat Analysis Group"</media:description><description>&lt;img src="https://storage.googleapis.com/gweb-uniblog-publish-prod/images/TAG_PzwyAeM.width-1600.format-w.max-600x600.format-webp.webp"&gt;We’re sharing an update on suspected state-backed attacker APT29 and the use of exploits identical to those used by Intellexa and NSO.</description><pubDate>Thu, 29 Aug 2024 13:00:00 +0000</pubDate><guid>https://blog.google/threat-analysis-group/state-backed-attackers-and-commercial-surveillance-vendors-repeatedly-use-the-same-exploits/</guid><category>Safety &amp; Security</category><category>Threat Analysis Group</category><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>State-backed attackers and commercial surveillance vendors repeatedly use the same exploits</title><description>We’re sharing an update on suspected state-backed attacker APT29 and the use of exploits identical to those used by Intellexa and NSO.</description><site_name>Google</site_name><url>https://blog.google/threat-analysis-group/state-backed-attackers-and-commercial-surveillance-vendors-repeatedly-use-the-same-exploits/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Clement Lecigne</name><title/><department>Threat Analysis Group</department><company/></author></item><item><title>Iranian backed group steps up phishing campaigns against Israel, U.S.</title><link>https://blog.google/threat-analysis-group/iranian-backed-group-steps-up-phishing-campaigns-against-israel-us/</link><description>Google’s Threat Analysis Group shares insights on APT42, an Iranian government-backed threat actor.</description><pubDate>Wed, 14 Aug 2024 19:00:00 +0000</pubDate><guid>https://blog.google/threat-analysis-group/iranian-backed-group-steps-up-phishing-campaigns-against-israel-us/</guid><category>Safety &amp; Security</category><category>Threat Analysis Group</category><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>Iranian backed group steps up phishing campaigns against Israel, U.S.</title><description>Google’s Threat Analysis Group shares insights on APT42, an Iranian government-backed threat actor.</description><site_name>Google</site_name><url>https://blog.google/threat-analysis-group/iranian-backed-group-steps-up-phishing-campaigns-against-israel-us/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Google Threat Analysis Group</name><title/><department/><company/></author></item><item><title>Google disrupted over 10,000 instances of DRAGONBRIDGE activity in Q1 2024</title><link>https://blog.google/threat-analysis-group/google-disrupted-dragonbridge-activity-q1-2024/</link><description>Today we are sharing updated insights about DRAGONBRIDGE, the most prolific IO actor Google’s Threat Analysis Group (TAG) tracks.</description><pubDate>Wed, 26 Jun 2024 10:00:00 +0000</pubDate><guid>https://blog.google/threat-analysis-group/google-disrupted-dragonbridge-activity-q1-2024/</guid><category>Threat Analysis Group</category><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>Google disrupted over 10,000 instances of DRAGONBRIDGE activity in Q1 2024</title><description>Today we are sharing updated insights about DRAGONBRIDGE, the most prolific IO actor Google’s Threat Analysis Group (TAG) tracks.</description><site_name>Google</site_name><url>https://blog.google/threat-analysis-group/google-disrupted-dragonbridge-activity-q1-2024/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Zak Butler</name><title>Threat Analysis Group</title><department/><company/></author></item><item><title>TAG Bulletin: Q2 2024</title><link>https://blog.google/threat-analysis-group/tag-bulletin-q2-2024/</link><description>Our bulletin covering coordinated influence operation campaigns terminated on our platforms in Q2 2024.</description><pubDate>Tue, 04 Jun 2024 23:00:00 +0000</pubDate><guid>https://blog.google/threat-analysis-group/tag-bulletin-q2-2024/</guid><category>Threat Analysis Group</category><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>TAG Bulletin: Q2 2024</title><description>Our bulletin covering coordinated influence operation campaigns terminated on our platforms in Q2 2024.</description><site_name>Google</site_name><url>https://blog.google/threat-analysis-group/tag-bulletin-q2-2024/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Billy Leonard</name><title/><department>Threat Analysis Group</department><company/></author></item><item><title>A review of zero-day in-the-wild exploits in 2023</title><link>https://blog.google/innovation-and-ai/technology/safety-security/a-review-of-zero-day-in-the-wild-exploits-in-2023/</link><description>Today, Google released its report “We’re All in this Together: A Year in Review of Zero-Days Exploited In-the-Wild in 2023.”</description><pubDate>Wed, 27 Mar 2024 13:00:00 +0000</pubDate><guid>https://blog.google/innovation-and-ai/technology/safety-security/a-review-of-zero-day-in-the-wild-exploits-in-2023/</guid><category>Safety &amp; Security</category><category>Threat Analysis Group</category><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>A review of zero-day in-the-wild exploits in 2023</title><description>Today, Google released its report “We’re All in this Together: A Year in Review of Zero-Days Exploited In-the-Wild in 2023.”</description><site_name>Google</site_name><url>https://blog.google/innovation-and-ai/technology/safety-security/a-review-of-zero-day-in-the-wild-exploits-in-2023/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Maddie Stone</name><title/><department>Threat Analysis Group</department><company/></author><author xmlns:author="http://www.w3.org/2005/Atom"><name>James Sadowski</name><title>Principal Analyst, Mandiant Intelligence</title><department/><company/></author></item><item><title>TAG Bulletin: Q1 2024</title><link>https://blog.google/threat-analysis-group/tag-bulletin-q1-2024/</link><description>This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q1 2024. It was last updated on July 8, 2024.JanuaryWe blocked 4 domains …</description><pubDate>Wed, 06 Mar 2024 17:30:00 +0000</pubDate><guid>https://blog.google/threat-analysis-group/tag-bulletin-q1-2024/</guid><category>Threat Analysis Group</category><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>TAG Bulletin: Q1 2024</title><description/><site_name>Google</site_name><url>https://blog.google/threat-analysis-group/tag-bulletin-q1-2024/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Shane Huntley</name><title>Senior Director</title><department>Threat Analysis Group</department><company/></author></item><item><title>Tool of First Resort: Israel-Hamas War in Cyber</title><link>https://blog.google/innovation-and-ai/technology/safety-security/tool-of-first-resort-israel-hamas-war-in-cyber/</link><media:content height="540" medium="image" url="https://storage.googleapis.com/gweb-uniblog-publish-prod/images/TOFR_Keyword_Banner.max-600x600.format-webp.webp" width="540"/><media:description>blue squares forming the abstract shape of an arrow set against a white background</media:description><description>&lt;img src="https://storage.googleapis.com/gweb-uniblog-publish-prod/images/TOFR_Keyword_Banner.max-600x600.format-webp.webp"&gt;An analysis of cyber operations in the Israel-Hamas War.</description><pubDate>Wed, 14 Feb 2024 00:01:00 +0000</pubDate><guid>https://blog.google/innovation-and-ai/technology/safety-security/tool-of-first-resort-israel-hamas-war-in-cyber/</guid><category>Safety &amp; Security</category><category>Threat Analysis Group</category><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>Tool of First Resort: Israel-Hamas War in Cyber</title><description>An analysis of cyber operations in the Israel-Hamas War.</description><site_name>Google</site_name><url>https://blog.google/innovation-and-ai/technology/safety-security/tool-of-first-resort-israel-hamas-war-in-cyber/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Sandra Joyce</name><title>VP, Mandiant Intelligence - Google Cloud</title><department/><company/></author><author xmlns:author="http://www.w3.org/2005/Atom"><name>Shane Huntley</name><title>Senior Director</title><department>Threat Analysis Group</department><company/></author></item><item><title>Buying Spying: How the commercial surveillance industry works and what can be done about it</title><link>https://blog.google/threat-analysis-group/commercial-surveillance-vendors-google-tag-report/</link><media:content height="540" medium="image" url="https://storage.googleapis.com/gweb-uniblog-publish-prod/images/BlogHero.max-600x600.format-webp.webp" width="540"/><media:description>a blue square that reads "Threat Analysis Group"</media:description><description>&lt;img src="https://storage.googleapis.com/gweb-uniblog-publish-prod/images/BlogHero.max-600x600.format-webp.webp"&gt;This report documents the rise of commercial surveillance vendors and the industry that threatens free speech, the free press and the open internet.</description><pubDate>Tue, 06 Feb 2024 10:00:00 +0000</pubDate><guid>https://blog.google/threat-analysis-group/commercial-surveillance-vendors-google-tag-report/</guid><category>Threat Analysis Group</category><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>Buying Spying: How the commercial surveillance industry works and what can be done about it</title><description/><site_name>Google</site_name><url>https://blog.google/threat-analysis-group/commercial-surveillance-vendors-google-tag-report/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Shane Huntley</name><title>Senior Director</title><department>Threat Analysis Group</department><company/></author></item><item><title>TAG Bulletin: Q4 2023</title><link>https://blog.google/threat-analysis-group/tag-bulletin-q4-2023/</link><description>This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q4 2023. It was last updated on January 19, 2024.OctoberWe terminated 8 Y…</description><pubDate>Fri, 19 Jan 2024 20:00:00 +0000</pubDate><guid>https://blog.google/threat-analysis-group/tag-bulletin-q4-2023/</guid><category>Threat Analysis Group</category><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>TAG Bulletin: Q4 2023</title><description/><site_name>Google</site_name><url>https://blog.google/threat-analysis-group/tag-bulletin-q4-2023/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Shane Huntley</name><title>Senior Director</title><department>Threat Analysis Group</department><company/></author></item><item><title>Russian threat group COLDRIVER expands its targeting of Western officials to include the use of malware</title><link>https://blog.google/threat-analysis-group/google-tag-coldriver-russian-phishing-malware/</link><media:content height="540" medium="image" url="https://storage.googleapis.com/gweb-uniblog-publish-prod/images/TAG_Fa6JTHm.max-600x600.format-webp.webp" width="540"/><media:description>an illustrated blue box with the phrase "Threat Analysis Group" in white</media:description><description>&lt;img src="https://storage.googleapis.com/gweb-uniblog-publish-prod/images/TAG_Fa6JTHm.max-600x600.format-webp.webp"&gt;Threat Analysis Group sheds light on Russian threat COLDRIVER’s use of malware.</description><pubDate>Thu, 18 Jan 2024 14:00:00 +0000</pubDate><guid>https://blog.google/threat-analysis-group/google-tag-coldriver-russian-phishing-malware/</guid><category>Threat Analysis Group</category><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>Russian threat group COLDRIVER expands its targeting of Western officials to include the use of malware</title><description>Threat Analysis Group sheds light on Russian threat COLDRIVER’s use of malware.</description><site_name>Google</site_name><url>https://blog.google/threat-analysis-group/google-tag-coldriver-russian-phishing-malware/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Wesley Shields</name><title>Threat Analysis Group</title><department/><company/></author></item><item><title>Zimbra 0-day used to target international government organizations</title><link>https://blog.google/threat-analysis-group/zimbra-0-day-used-to-target-international-government-organizations/</link><media:content height="540" medium="image" url="https://storage.googleapis.com/gweb-uniblog-publish-prod/images/TAG_rYhcbet.max-600x600.format-webp.webp" width="540"/><media:description>a blue box that reads "Threat Analysis Group"</media:description><description>&lt;img src="https://storage.googleapis.com/gweb-uniblog-publish-prod/images/TAG_rYhcbet.max-600x600.format-webp.webp"&gt;TAG’s discovery of a 0-day exploit used to steal email data from international government organizations.</description><pubDate>Thu, 16 Nov 2023 16:00:00 +0000</pubDate><guid>https://blog.google/threat-analysis-group/zimbra-0-day-used-to-target-international-government-organizations/</guid><category>Threat Analysis Group</category><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>Zimbra 0-day used to target international government organizations</title><description>TAG’s discovery of a 0-day exploit used to steal email data from international government organizations.</description><site_name>Google</site_name><url>https://blog.google/threat-analysis-group/zimbra-0-day-used-to-target-international-government-organizations/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Clement Lecigne</name><title/><department>Threat Analysis Group</department><company/></author><author xmlns:author="http://www.w3.org/2005/Atom"><name>Maddie Stone</name><title/><department>Threat Analysis Group</department><company/></author></item><item><title>Government-backed actors exploiting WinRAR vulnerability</title><link>https://blog.google/threat-analysis-group/government-backed-actors-exploiting-winrar-vulnerability/</link><description>Google's Threat Analysis Group analyzes recent state-sponsored campaigns exploiting the WinRAR vulnerability, CVE-2023-38831.</description><pubDate>Wed, 18 Oct 2023 15:00:00 +0000</pubDate><guid>https://blog.google/threat-analysis-group/government-backed-actors-exploiting-winrar-vulnerability/</guid><category>Threat Analysis Group</category><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>Government-backed actors exploiting WinRAR vulnerability</title><description>Google's Threat Analysis Group analyzes recent state-sponsored campaigns exploiting the WinRAR vulnerability, CVE-2023-38831.</description><site_name>Google</site_name><url>https://blog.google/threat-analysis-group/government-backed-actors-exploiting-winrar-vulnerability/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Kate Morgan</name><title>Threat Analysis Group</title><department/><company/></author></item><item><title>TAG Bulletin: Q3 2023</title><link>https://blog.google/threat-analysis-group/tag-bulletin-q3-2023/</link><description>This bulletin includes coordinated influence operation campaigns terminated on our platforms in Q3 2023. It was last updated on November 8, 2023.</description><pubDate>Thu, 05 Oct 2023 18:30:00 +0000</pubDate><guid>https://blog.google/threat-analysis-group/tag-bulletin-q3-2023/</guid><category>Threat Analysis Group</category><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>TAG Bulletin: Q3 2023</title><description/><site_name>Google</site_name><url>https://blog.google/threat-analysis-group/tag-bulletin-q3-2023/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Shane Huntley</name><title>Senior Director Threat Analysis Group</title><department/><company/></author></item><item><title>0-days exploited by commercial surveillance vendor in Egypt</title><link>https://blog.google/threat-analysis-group/0-days-exploited-by-commercial-surveillance-vendor-in-egypt/</link><description>Last week Google’s Threat Analysis Group (TAG), in partnership with The Citizen Lab, discovered an in-the-wild 0-day exploit chain for iPhones. Developed by the commerci…</description><pubDate>Fri, 22 Sep 2023 17:00:00 +0000</pubDate><guid>https://blog.google/threat-analysis-group/0-days-exploited-by-commercial-surveillance-vendor-in-egypt/</guid><category>Threat Analysis Group</category><og xmlns:og="http://ogp.me/ns#"><type>article</type><title>0-days exploited by commercial surveillance vendor in Egypt</title><description/><site_name>Google</site_name><url>https://blog.google/threat-analysis-group/0-days-exploited-by-commercial-surveillance-vendor-in-egypt/</url></og><author xmlns:author="http://www.w3.org/2005/Atom"><name>Maddie Stone</name><title/><department>Threat Analysis Group</department><company/></author></item></channel></rss>