Proactive platform moves led the day, with Qwen3 models arriving as fully managed options in AWS Bedrock and Google detailing how enterprises can scale agentic systems using Agent Builder. Together, the announcements emphasize managed AI capabilities, enterprise controls, and governance paths as organizations push pilots toward production.
Platform AI And Enterprise Controls
Google positioned the browser and its AI stack as central to enterprise workflows. Gemini in Chrome adds an integrated assistant to summarize content, understand tab context, and act within Workspace—with IT governance via Chrome Enterprise policies—while Safe Browsing’s AI‑driven protections aim to block scams and impersonation attempts. Initial availability targets desktop users with admin‑configurable controls, and enterprise features extend to qualifying Workspace editions. Details appear in Google’s post on Gemini in Chrome. Separately, Google outlined how Vertex AI Agent Builder standardizes agent development with open frameworks, managed runtime, grounding, observability, and security features, including sandboxed code execution and agent‑to‑agent collaboration. The approach highlights provider‑agnostic model choice and performance guarantees through Provision Throughput—aimed at moving agents from prototypes to scaled deployments. Why it matters: usable guardrails, data controls, and operational tooling are now core to enterprise adoption.
CrowdStrike focused on the data layer, introducing new capabilities in Falcon Data Protection to stop sensitive content from flowing into GenAI tools and modern data channels. The update adds real‑time protections across browsers, apps, shadow AI services, and cloud flows; unified detections correlating endpoint and cloud signals; and AI‑powered classification to extend coverage to complex data types. An Insider Risk dashboard is generally available to customers of Falcon Data Protection and Falcon Next‑Gen Identity Security. Timelines span late 2025 into 2026 for several features. See the announcement on Falcon Data Protection.
Bedrock Models And Hybrid Options
AWS broadened managed AI choices and creative tooling. In addition to adding Qwen3 to Bedrock, AWS introduced DeepSeek‑V3.1 as a fully managed option with reasoning‑oriented and concise response modes, enhanced tool‑calling, and regional availability across the US, Asia Pacific, and Europe. For image workflows, AWS made Stability AI Image Services generally available in Bedrock, packaging nine edit and control tools behind a managed API in three US regions. The additions aim to accelerate AI agents, coding tasks, and creative pipelines while keeping infrastructure management on the platform.
Hybrid and search capabilities also expanded. Second‑generation Outposts racks can now connect to additional Regions in Canada and the US, offering more flexibility for latency‑sensitive and data‑residency workloads, as detailed in the update on Outposts racks. For vector search, OpenSearch Serverless added disk‑optimized vectors to reduce costs for large embedding collections while maintaining retrieval quality, with tradeoffs in query latency. These options support cost‑aware scaling and compliance‑aligned architectures.
Advisories And Patches
Google shipped emergency browser updates for a high‑severity V8 type confusion tracked as CVE‑2025‑10585, the sixth in‑the‑wild Chrome zero‑day this year. Desktop builds 140.0.7339.185/.186 are rolling out, and users are urged to update and relaunch promptly. Coverage and update steps are summarized by BleepingComputer. Separately, WatchGuard patched a critical IKEv2 vulnerability (CVE‑2025‑9242) in Firebox appliances that could enable remote code execution and auth bypass over UDP 500/4500; the vendor provided fixed Fireware versions and mitigations for deployments that cannot upgrade immediately, as reported by CSOonline. Given active targeting of VPN and firewall infrastructure, rapid remediation is advised.
CISA published an analysis of malware used against on‑prem Ivanti EPMM, tied to CVE‑2025‑4427 and CVE‑2025‑4428 exploitation following a public PoC. The report details reflective class loading, AES‑encrypted listener logic, IOCs, YARA and SIGMA rules, and response guidance including upgrades, isolation, forensic imaging, and credential resets. See the CISA report. CISA also issued an CISA advisory for Dover Fueling Solutions’ ProGauge MagLink LX devices, noting an integer overflow, a hard‑coded signing key enabling auth bypass, and fixed default root credentials—issues that could allow denial‑of‑service or complete device compromise. Firmware updates and network isolation are recommended.
Additional industrial exposures were disclosed for Cognex In‑Sight Explorer and camera firmware, including hard‑coded passwords, cleartext credential exposure, and replayable authentication. The CISA advisory recommends migration to next‑generation devices and limiting network exposure. In hardware security research, academics introduced a new DDR5 Rowhammer variant, Phoenix, that bypasses TRR in tested SK Hynix DIMMs to achieve page table corruption, RSA key exfiltration, and sudo binary manipulation under lab constraints. Mitigation proposals carry performance tradeoffs, and the work is tracked as CVE‑2025‑6202; see CSOonline for technique and timing details.
Disruptions And Enforcement
Microsoft’s Digital Crimes Unit dismantled “RaccoonO365,” a subscription phishing platform tracked as Storm‑2246, seizing 338 websites. The service enabled turnkey Microsoft login phishing, bypassed MFA, and targeted victims worldwide, including healthcare organizations; Microsoft identified operators, infrastructure, crypto flows, and referred the case to law enforcement. Coverage appears via CSOonline. In a separate action, UK and US authorities charged two UK‑based teenagers linked to alleged Scattered Spider activity, including intrusions against public and private sector entities and the 2024 Transport for London incident. The coordinated casework underscores ongoing cross‑border efforts against extortion‑driven intrusion sets, as reported by Infosecurity.