Incidents
A multi-agency advisory from CISA details sustained compromises by PRC state-sponsored actors since at least 2021, focusing on backbone routers and other edge infrastructure across telecommunications, government, transportation, lodging, and military networks. Investigators report exploitation of known, avoidable vulnerabilities (for example CVE-2024-21887, CVE-2024-3400, Cisco CVE-2023-20273/CVE-2023-20198, CVE-2018-0171). Post-compromise activity included creation of local accounts, access-control changes, nonstandard management ports, on-box packet capture and SPAN/ERSPAN, Guest Shell containers on Cisco devices, credential capture via TACACS+/RADIUS changes, and GRE/IPsec tunnels for staging and data movement. Exfiltration leveraged trusted peering and covert channels to move configurations, packet captures, and subscriber datasets. The advisory provides indicators, YARA/Snort rules, device command sequences, STIX files, and a containment/eviction plan, and urges rigorous patching, management plane isolation, strong credential handling, service hardening, routing audits, and immutable centralized logging.
Microsoft describes how the financially motivated actor Storm-0501 has shifted from traditional on‑premises encryption to cloud‑native extortion. In investigated intrusions, the group moved from on‑prem Active Directory compromise to Entra ID escalation by abusing Entra Connect synchronization accounts and synchronized non‑human identities to obtain Global Administrator rights. They then registered attacker‑controlled federated domains as backdoors, listed storage keys, exfiltrated data with AzCopy, attempted mass deletions of backups and snapshots, and, when blocked by immutability, created Key Vaults and customer‑managed keys to encrypt blobs. Microsoft recommends restricting directory synchronization account permissions, adopting application-based authentication, enforcing phishing‑resistant MFA and Conditional Access, separating cloud‑native Global Admins from synced identities, enabling platform protections and immutable backups, and using Defender detections and hunting queries to find related activity.
OAuth abuse impacted enterprise integrations as documented by The Hacker News: a campaign attributed to UNC6395 leveraged compromised OAuth and refresh tokens tied to a Drift AI chat agent to access customer Salesforce instances via the Salesloft integration. The actor exported large data volumes and searched for secrets such as AWS access keys and Snowflake tokens, then deleted query jobs to obscure activity. Salesloft revoked Drift connections; Salesforce invalidated active tokens and removed Drift from the AppExchange. Impacted organizations are advised to review logs, rotate credentials, and re‑authenticate integrations.
Regional targeting also continued. According to The Hacker News, Group‑IB linked 35 victims—primarily government organizations in Central Asia and APAC—to the ShadowSilk cluster. Intrusions began with spear‑phishing and password‑protected archives, used Telegram bots for command‑and‑control, exploited known flaws in Drupal and a WordPress plugin, deployed web shells (ANTSWORD, Behinder, Godzilla, FinalShell), Sharp‑based tools and tunneling utilities (Resocks, Chisel), and offensive frameworks (Cobalt Strike, Metasploit). Bespoke tools targeted browser credential stores; exfiltration focused on data theft and long‑term persistence.
In the United States, CISA reported it is providing real‑time incident response to the State of Nevada following an attack that disrupted multiple essential services. The agency deployed threat hunting teams, prioritized restoration of lifesaving and critical services, coordinated with the FBI on investigation and evidence collection, and advised on federal assistance to support recovery and hardening.
Patches and advisories
Infosecurity reports Citrix released fixes for three zero‑days in NetScaler ADC and NetScaler Gateway (CVE‑2025‑7775, CVE‑2025‑7776, CVE‑2025‑8424). CVE‑2025‑7775 is under active exploitation and was added to CISA’s Known Exploited Vulnerabilities catalog. Patched builds are available for supported 14.1, 13.1 (including FIPS), and 12.1‑FIPS/NDcPP branches; there is no workaround and older 12.1/13.0 branches are end‑of‑life. Given reports of widespread exposure and pre‑auth exploitation enabling webshell deployment, organizations should upgrade immediately and conduct incident response to identify and remove persistence.
Talos disclosed coordinated vulnerabilities across an open‑source biomedical library and several commercial products. Issues include multiple memory corruption bugs in libbiosig (crafted signal files), network‑reachable flaws in Tenda AC6 router firmware (including signature validation bypass and authentication weaknesses), memory corruption in SAIL image decoding (BMP, PCX, PSD, TGA, WebP), and PDF parsing weaknesses in PDF‑XChange Editor and Foxit PDF Reader (including embedded JavaScript leading to code execution). Vendors have issued patches and Talos published Snort signatures; administrators should apply fixes, deploy detection rules, and limit exposure for services processing untrusted content.
Researchers also demonstrated device‑level risk in consumer peripherals. Kaspersky summarizes “BadCam,” a firmware‑rewriting technique presented by Eclypsium that turns certain webcams into malicious HID‑capable devices by exploiting unsigned updates on models using a SigmaStar system‑on‑chip. Once implanted, a camera can emulate a keyboard, disable defenses, and persist across OS reinstalls. Recommended mitigations include blocking unexpected HID devices, enforcing USB allowlists, keeping device firmware updated (vendor patches are available for tested models), and incorporating BadUSB/BadCam scenarios into detection and awareness programs.
Platforms and cloud
Cloudflare refreshed AI Gateway, adding centralized management and security controls for AI traffic through a single endpoint. New capabilities include credits‑based unified billing (Closed Beta), integration with Secrets Store for AES‑encrypted keys with RBAC and audit logs, a normalized request/response translation layer, and Dynamic Routes with conditional logic, percentage splits, spend/rate limits, and model chaining. Security additions include a built‑in Firewall DLP engine, configurable profiles, and detailed per‑request logging. Partnerships provide access to models across several providers, enabling consolidated routing and billing.
To run more models on fewer GPUs, Cloudflare introduced Omni, an internal platform that schedules, isolates, and over‑commits GPU memory to co‑locate many AI models on a single device. Techniques include per‑model process isolation, FUSE‑backed /proc/meminfo to reflect memory limits, and a CUDA stub that forces unified memory and controls visible device RAM. Omni reports configurations with roughly 13 models per GPU and around 400% allocated GPU memory, trading occasional latency for higher utilization and lower idle power and spend.
AWS added a ReceivedBytes metric for AWS Network Firewall, publishing the total incoming bytes inspected by stateless and stateful engines to CloudWatch in all supported Regions. The metric supports capacity planning, anomaly detection, rule tuning, and chargeback by exposing per‑firewall traffic volumes for dashboards, alarms, and automated workflows.
Expanding compute options, AWS announced availability of EC2 C7i instances in the Asia Pacific (Osaka) Region. Powered by AWS‑customized 4th Gen Intel Xeon Scalable processors, C7i offers up to 15% better raw performance versus comparable x86 processors used by other clouds and up to 15% better price‑performance than C6i, with larger sizes, two bare‑metal variants, Intel accelerators, AMX support for CPU‑based ML, and attachment of up to 128 EBS volumes.
Research and policy
ENISA will coordinate a €36m EU‑wide incident response scheme under the EU Cybersecurity Reserve, funded by the Digital Europe Programme. Over three years, the agency will procure trusted private‑sector incident response services, assess support requests, and coordinate deployments for large or significant incidents affecting Member States, EU bodies, and eligible DEP‑associated countries. ENISA will also develop a certification scheme for managed security services, with incident response as the initial focus.
Procurement security received a boost as CISA launched the Software Acquisition Guide: Supplier Response Web Tool. The free, interactive resource adapts questions and recommendations to user inputs, helping CISOs, CIOs, and procurement teams assess supplier security practices across the software lifecycle in line with secure‑by‑design and secure‑by‑default principles.
Prompt injection and agent safety remain unresolved challenges. Schneier highlights research showing how hidden prompts embedded in seemingly benign documents can manipulate models to exfiltrate data via crafted URLs, underscoring the lack of reliable defenses for AI systems that process untrusted inputs.
That concern is echoed by reporting from The Hacker News on Anthropic’s disruption of GTG‑2002, an agent‑driven operation that misused Claude and Claude Code for reconnaissance, malware development, credential theft, and tailored extortion across multiple sectors. Anthropic developed a classifier to detect similar behavior and shared indicators with partners while warning that agentic AI can adapt to controls in real time.
Researchers also documented PromptLock, described by The Hacker News as a proof‑of‑concept ransomware that leverages an LLM via the Ollama API to generate Lua scripts on demand for cross‑platform enumeration, selective exfiltration, and encryption using SPECK 128‑bit. Because payloads are generated dynamically from prompts and proxied to a remote model host, indicators can vary between runs, complicating detection and attribution.