Security updates centered on platform hardening and identity controls. AWS expanded managed directory capabilities with certificate-based authentication for LDAPS and smart cards via its private certificate authority, accelerating secure deployments of Active Directory–aware workloads in the cloud through AWS Managed AD. Alongside new AI and developer tooling, the day also brought September patch releases from Microsoft and critical fixes for e‑commerce and ERP platforms, plus multiple ICS advisories affecting building management and industrial controllers.
Identity and edge controls tighten
AWS added ECDSA support for signed URLs and cookies in its global CDN, enabling shorter tokens and faster verification for high‑volume distribution and resource‑constrained clients. Organizations adopting elliptic curve signatures should validate library support and key management changes before rollout; details are in CloudFront. Combined with certificate auto‑enrollment for LDAPS and smart cards in managed directories, the day’s updates sharpen access control at both the identity plane and the content edge.
AI and developer ecosystems evolve
Contact center teams can now choose among LLM families inside the Amazon Connect console, letting administrators trade off latency and reasoning quality without code changes. The new UI flow supports routing different interactions to different models and underscores the need for evaluation and cost governance around agent behavior; see Amazon Q. On the developer side, Google Cloud released an official Rust SDK covering 140+ APIs with built‑in authentication, aiming to improve security, maintainability, and feature completeness for Rust workloads on its platform.
Google Cloud also introduced public preview of multi‑tenant clusters in Dataproc to consolidate notebook workloads with per‑user isolation via OS users and Kerberos, while keeping least‑privilege access through IAM. Further, partners showcased AI‑enabled security integrations across detection, response, and identity—summarized in a Google partners post—reflecting a push to operationalize AI safely. For multimodal retrieval, TwelveLabs’ embeddings model now returns low‑latency text and image vectors directly via synchronous inference in Bedrock, easing interactive search and similarity use cases; see Marengo 2.7. Why it matters: these changes give operators and builders more granular control over model choice, identity enforcement, and data‑science workflows without heavy re‑architecture.
Patching cadence and active threats
Microsoft shipped its September cumulative update for Windows 10 (KB5065429), addressing two disclosed zero‑days and 81 additional CVEs alongside functional fixes; see KB5065429. Complementing that, Cisco’s threat team outlined 86 vulnerabilities fixed across Microsoft products this month and released Snort detections for prominent issues, including NTFS and DirectX kernel flaws; analysis from Talos recommends prioritizing network‑exploitable RCEs and privilege escalations.
In enterprise applications, Adobe issued an emergency patch for a critical Commerce/Magento vulnerability dubbed SessionReaper, with reports of a leaked hotfix and the risk of unauthenticated account takeover via the REST API when sessions are filesystem‑backed; coverage by BleepingComputer. SAP also addressed 21 issues, including a maximum‑severity insecure deserialization flaw in NetWeaver RMIP4 that can lead to OS command execution, plus critical upload and auth‑bypass bugs; details via BleepingComputer. Why it matters: e‑commerce and ERP platforms sit at the core of business operations, so timely patching limits lateral movement and fraud risk.
Separately, a supply‑chain incident hit multiple npm packages after a maintainer account was phished, leading to malicious releases of widely used modules such as chalk and debug. The payload targeted browser contexts and attempted wallet‑address substitution; see reporting from The Hacker News. The incident reinforces practices such as phishing‑resistant 2FA for maintainers, version pinning, and CI/CD hardening.
ICS/OT: building controls and industrial software
CISA published an advisory on ABB Cylon ASPECT/NEXUS/MATRIX devices, including an authentication bypass (CVSS v4 up to 9.3) and buffer overflow conditions that could enable device control or DoS when reachable on the local segment; advisory at CISA. Rockwell Automation Stratix IOS was also updated to fix a high‑severity injection flaw enabling malicious configuration upload with potential RCE; patch guidance via CISA. Operators are urged to avoid Internet exposure, segment networks, and apply vendor firmware.
Additional Rockwell Automation advisories cover a cryptographic authentication issue in FactoryTalk Activation Manager (update to 5.02+) and an over‑permissive Redis instance in Analytics LogixAI (update to 3.02+), both carrying high CVSS scores and risking data exposure or manipulation; see CISA and CISA.
Lastly, a server‑side request forgery in ThinManager (CVE‑2025‑9065) could expose NTLM hashes when abused by an authenticated user; upgrade to 14.1+ per CISA. Why it matters: ICS environments frequently rely on flat networks and legacy protocols, making exposure paths and credential leaks disproportionately risky without strict segmentation and access controls.