
Google deploys AI to speed up connections at PJM, largest US power grid
NEW YORK - Alphabet Inc's Google unit is partnering with the largest electrical grid operator in North America, PJM Interconnection, to roll out artificial intelligence technologies aimed at getting new power supplies connected faster, the company said on Thursday.
The collaboration is the first time AI would be used to comprehensively manage an interconnection queue. Electricity demand has been rising as Big Tech builds more data centers to train and deploy artificial intelligence.
"The industry has been talking about building smarter grids for well over a decade, and now with AI, we have a real opportunity to turn discussion into action," Amanda Peterson Corio, Google's data center energy lead, said at a press conference.
Wait times have grown to historic lengths in recent years for connecting the country's grids to new electricity supplies generated from sources like wind, solar and natural gas.
Those delays have worsened an electricity supply crunch in many parts of the country, pushing up power bills and raising the risk of blackouts, as old power plants retire faster than new supplies connects.
Google, in partnership with the Alphabet-backed Tapestry, says it can help eliminate at least some of the wait by using artificial intelligence to synthesize information and automate parts of the review and planning processes for projects in line to connect to PJM.
"This is really about automating a lot of the things that are being laboriously reviewed," said Page Crahan, General Manager of Tapestry, which will work with PJM to develop AI tools and models that will be rolled out in 2025 and phased in over the course of several years.
Initially, the technology will be used to automate parts of processes currently done by hand by grid planners, including a review of applications to determine whether a project seeking to connect to the grid is viable.
Over time, the collaboration between Google, Tapestry and PJM will develop a model of the PJM grid like a Google Maps for grid information, "bringing in different layers that planners might need to see in a single toggle on and off view to guide faster decisions, introduce new insights, hopefully find efficiencies in those ways," Crahan said.
It remained too early to say how working with Google would cut down on times to add new power plant supply to the system, said Aftab Khan, executive vice president of operations, planning and security for PJM.
PJM controls the electrical system that covers 67 million people in the U.S. PJM's territory includes northern Virginia, the world's largest data center hub.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Tahawul Tech
a day ago
- Tahawul Tech
global service outage Archives
The outage began around 1:50 p.m. ET on 12/6/2025 and there were 14,729 reports of Google Cloud being down in the U.S.


Tahawul Tech
a day ago
- Tahawul Tech
Google suffers brief global service outage
Google said it had recently resolved a brief global service disruption on its platforms that affected multiple services within the businesses portfolio. 'The issues have now been resolved for all affected users', the company said. 'We will publish an analysis of this incident once we have completed our internal investigation.' The outage disrupted services on platforms such as Spotify, Snapchat and Discord that rely on the tech giant's cloud managed services and infrastructure. Google Cloud's dashboard said engineering teams were working to resolve a few services still seeing some residual impact. The outage began around 1:50 p.m. ET on 12/6/2025 and there were 14,729 reports of Google Cloud being down in the U.S. around 2:32 p.m. ET, according to tracking website At the peak of the disruption, there were about 46,000 outage reports on Spotify and 10,992 on Discord in the U.S. As of 6:18 p.m. ET, Spotify showed a little over 1,000 reports, while Discord outages had come down to 200. Downdetector's numbers are based on user-submitted reports. The outage might have affected a larger number of users. Source: Reuters Image Credit: Google


Arabian Post
a day ago
- Arabian Post
Phishing-as-a-Service PhaaS Surge Elevates AiTM Threats
A surge in Adversary‑in‑the‑Middle phishing attacks exploiting Phishing‑as‑a‑Service frameworks has been recorded in 2025, allowing cybercriminals to systematically bypass multi‑factor authentication and harvest corporate credentials at industrial scale. Researchers from Sekoia and Barracuda warn that tools like Tycoon 2FA, EvilProxy and Sneaky 2FA are being rapidly refined, embedding advanced evasion techniques and automation that make detection increasingly challenging. AiTM phishing campaigns leverage reverse proxies that intercept login credentials and session cookies in real time. When users enter their password and MFA code, a proxy server relays the information to the legitimate service—such as Microsoft 365 or Google—capturing session tokens in the process. Attackers then replay those tokens to impersonate legitimate users without triggering MFA prompts. Between January and February, over one million PhaaS‑powered AiTM phishing attempts were blocked globally, with Tycoon 2FA accounting for nearly 90 % of the incidents. EvilProxy and Sneaky 2FA contributed around 8 % and 3 % respectively. Tycoon 2FA has evolved markedly: its credential‑stealing scripts now employ Caesar‑cipher encryption, invisible Hangul filler characters, AES encryption, and browser fingerprinting to tailor the attack and evade detection. ADVERTISEMENT EvilProxy, in contrast, offers ease of deployment, enabling even actors with limited expertise to launch fully automated AiTM campaigns against cloud platforms by mimicking legitimate page source code and proxying credentials live. Sneaky 2FA, meanwhile, uses Telegram‑based bots and clever URL structures to pre‑populate phishing forms with user email addresses, redirect non‑target users to innocuous sites, and selectively deliver phishing pages only to likely victims. It also embeds tracking codes that reinforce its selective targeting. Darktrace analysts cite real‑world incidents where attackers abused legitimate platforms—such as Milanote—to deliver Tycoon 2FA phishing lures. This misuse of trusted resources bypasses traditional defences like email gateways, which often cannot distinguish between benign and malicious content. SC Media likewise highlights Sneaky Log's Messenger‑driven delivery mechanism and anti‑sandbox filters—including blurred backgrounds and redirects to Wikipedia—making detection by anti‑phishing tools very difficult. Microsoft's threat intelligence team reports other AiTM vectors such as OAuth‑consent and device‑code phishing. While these attacks exploit legitimate login flows—often via QR codes or OAuth prompts—they similarly bypass MFA using session token theft and abuse of authentication flows. Threat actors ultimately deploy AiTM access to conduct Business Email Compromise, financial scams, internal reconnaissance, or onward phishing. They frequently install persistent controls—including email forwarding rules and additional MFA factors—to prolong intrusions. Defensive responses emphasise layered security. Organisations are urged to deploy AI‑powered email defences, anomaly detection within identity logs, real‑time URL scanning, phishing‑resistant credentials like FIDO2 or passkeys, and contextual Conditional‑Access policies based on location or device status. Endpoint‑level inspection, token anomaly monitoring, and pre‑click URL analysis—particularly to bypass proxies like Cloudflare Turnstile—are also advised. Academic research echoes the urgency for adaptive defences: LLM‑based multi‑agent systems like MultiPhishGuard and fuzzy‑logic frameworks offer promising ways to detect adversarial phishing content while maintaining transparency and low false‑positive rates.