Cloud platforms advanced their security posture while urgent fixes landed for a high‑risk enterprise transfer tool. AWS rolled out the Neuron SDK 2.26.0 to boost performance and flexibility for Inferentia and Trainium workloads. Separately, Fortra shipped patches for a CVSS 10.0 flaw in GoAnywhere MFT, with details reported by CSOonline; administrators are urged to update and keep the Admin Console off the public internet.
Access controls and visibility deepen
A new update to service control policies in AWS Organizations brings the full IAM policy language to SCPs, enabling NotAction, NotResource, and conditions in Allow statements and more flexible wildcards. The SCP update is designed to cut policy sprawl and clarify intent—for example, denying access to all but explicitly allowed S3 objects or Bedrock models—while AWS recommends validating changes with IAM Access Analyzer to avoid unintended exposure.
Google Cloud introduced integrated dashboards for Compute Engine and GKE powered by Security Command Center intelligence. The Google Cloud views surface prioritized CVEs, workload configuration risks, and active threats like cryptomining, helping teams decide which VM to patch first and track remediation trends; full widgets are available with SCC Premium. In parallel, Cloudflare argues that organizations can prepare for post‑quantum risks using software-based PQC on existing devices rather than investing in specialized quantum hardware, outlining limitations of QKD and the practical path to PQC rollout in its Cloudflare post. Why it matters: clearer controls and actionable dashboards shorten detection‑to‑remediation cycles, while pragmatic PQC adoption addresses “harvest now, decrypt later” threats without capital outlay.
Advisories and identity weaknesses addressed
Following the GoAnywhere MFT patches highlighted in the lead, the day brought two notable identity and device‑management updates. A researcher uncovered a chain involving legacy actor tokens and the deprecated Azure AD Graph API that could have enabled silent impersonation in any Microsoft Entra ID tenant. Microsoft remediated the issue and assigned CVE‑2025‑55241; see BleepingComputer for the disclosure timeline and impact. The case underscores the risk of hidden trust paths in legacy components that bypass Conditional Access and logging.
CISA detailed post‑exploitation malware observed on Ivanti EPMM servers after CVE‑2025‑4427/4428 were chained for unauthenticated code execution. According to The Hacker News, attackers deployed Java loaders that intercept crafted HTTP requests to decrypt and execute arbitrary classes, enabling persistence and remote code execution. CISA recommends updating to patched releases, restricting MDM and admin access, monitoring for specific /tmp artifacts and malicious JVM classes, and rotating credentials.
AI features expand as agent risks surface
Microsoft began a limited beta of Gaming Copilot on Windows 11, integrating an AI assistant into the Game Bar for voice‑driven help, recommendations, and insights. The rollout, covered by BleepingComputer, requires an Xbox account and can be disabled from the widget list; Microsoft cites age and regional eligibility as guardrails. OpenAI is also widening availability of its $4 GPT Go plan beyond the initial launch region, bringing a subset of GPT‑5 capabilities to more markets; see BleepingComputer for feature tiers and regional context.
At the same time, researchers demonstrated how hidden HTML instructions in a single email could coerce OpenAI’s Deep Research agent—when connected to Gmail—to exfiltrate inbox data from within the provider’s backend, bypassing endpoint defenses. The zero‑click “ShadowLeak” technique, detailed by The Hacker News, generalizes to other connectors such as cloud storage and productivity apps. The authors recommend tighter agent‑side input validation, stricter connector permissions, and real‑time checks on tool use. In parallel, the new Neuron SDK 2.26.0 noted in the lead expands framework support and observability for Trainium and Inferentia, signaling continued investment in AI performance alongside safety and governance debates.
Adversary operations and illicit infrastructure
ESET documented the first observed operational collaboration between Gamaredon and Turla in Ukraine, with Gamaredon tooling used to fetch, restart, or install Turla’s Kazuar implants on selected hosts. The ESET report traces multiple chains from February–June 2025, details payload hosting and C2 patterns, and provides IoCs for detection. The finding suggests broad initial access by Gamaredon feeding Turla’s more selective operations, complicating attribution and response.
On the criminal infrastructure front, researchers attribute roughly 80% of the REM Proxy service to the SystemBC botnet, averaging about 1,500 infected hosts per day across more than 80 C2 servers. As reported by The Hacker News, most victims are VPS instances with long‑lived infections and dozens of unpatched CVEs, and the network fuels credential brute‑forcing, spam, and access resale for follow‑on campaigns. Providers and administrators are urged to tighten patching, harden credentials (especially SSH and WordPress), and monitor for anomalous SOCKS5 traffic.
Law enforcement action also escalated: the RCMP dismantled the TradeOgre cryptocurrency exchange and seized more than $40 million in digital assets after an investigation into compliance gaps and alleged laundering risks. BleepingComputer reports it is the first shutdown of a crypto exchange by Canadian authorities and potentially the country’s largest asset seizure. Authorities indicated non‑criminal users may seek remedies through the courts if forfeiture proceeds.