Security teams faced urgent triage on edge appliances as two actively exploited Cisco firewall zero-days drew an emergency response, while major platforms advanced runtime hardening and secure-by-default features for developers and AI agents. CISA issued an emergency directive after Cisco reported attempted exploitation of flaws in ASA/FTD; see The Hacker News for details on the vulnerabilities, potential chaining, and required forensic actions for exposed web VPN services.
Emergency actions on Cisco firewalls
Cisco confirmed in-the-wild activity against two vulnerabilities in the VPN web server of ASA and FTD, tracked as CVE-2025-20333 and CVE-2025-20362. According to The Hacker News, the first can enable code execution as root with valid VPN credentials, and the second allows unauthenticated access to restricted endpoints; the pair may be chained to bypass authentication. CISA added the CVEs to KEV and issued an emergency directive with 24-hour actions for federal networks, highlighting forensics for potential persistence and ROM modification on certain devices.
A separate report describes another critical zero-day, CVE-2025-20363, affecting Cisco firewall and IOS platforms. CSO Online notes Cisco released software updates and that there are no practical workarounds, urging rapid upgrades. Investigations into related activity included ROMMON tampering on older ASA 5500-X models, reinforcing the need to patch, collect artifacts, and replace end-of-support hardware where feasible.
Runtime and agent security hardening
Cloudflare detailed isolation improvements for the Workers runtime, adapting V8’s software sandbox and using hardware Memory Protection Keys to harden per-isolate boundaries. Engineering changes such as isolate-specific sandboxes and careful virtual memory layout aim to contain heap corruption and reduce cross-tenant risk, with additional defenses against microarchitectural threats. The update requires no customer action and represents defense-in-depth for multi-tenant edge compute.
AWS expanded Amazon Bedrock AgentCore with VPC and PrivateLink connectivity, CloudFormation support, and tagging across the Runtime, Browser, and Code Interpreter features. The additions let teams run dynamic agents that access private services without traversing the public internet and provision deployments as code, improving governance and reducing exposure for AI-driven automation.
AI agents and CRM safeguards
Salesforce addressed a prompt-injection chain in Agentforce that could exfiltrate CRM data via malicious Web-to-Lead inputs. As reported by The Hacker News, the ForcedLeak issue (CVSS 9.4) combined context validation gaps with a Content Security Policy misconfiguration, enabling untrusted instructions to drive data queries and outbound calls. Salesforce re-secured a domain and enforced Trusted URL allowlists for Agentforce and Einstein agents; recommended mitigations include auditing historical leads, tightening input validation, and treating agent contexts as sensitive execution surfaces.
Cloud platforms and developer stack advances
In a broad developer platform roundup, Cloudflare expanded runtime compatibility (notably Node.js APIs), introduced AI Search, and shipped ergonomics such as Remote Bindings and faster Workers Builds. Complementing that, Node.js compatibility in Workers now spans many core modules integrated with platform primitives, easing migration of existing JavaScript stacks.
Cloudflare also unveiled serverless analytics on object storage with R2 SQL, a distributed query engine for Iceberg tables that prunes I/O and runs elastic compute across its network, and formalized a managed data stack via the Data Platform packaging Pipelines, R2 Data Catalog, and R2 SQL. The aim is to reduce operational overhead for ingest, metadata, and query while keeping egress costs low.
Messaging and data access integrations broadened as well: the Email Service entered private beta for transactional sending from Workers (Email Service), and PlanetScale databases can be deployed directly from Workers with Hyperdrive connection pooling and caching (PlanetScale integration). These additions target end-to-end application flows, from notifications to low-latency database access.
Cloud infrastructure and operations
CloudWatch now supports tag-based telemetry for vended metrics, enabling dynamic, tag-aligned queries and alarms that adapt to changing infrastructure. For FinOps teams, enhanced Billing View capabilities allow consolidated cost management across multiple AWS Organizations from a single account, with sharing into external accounts for centralized oversight.
On capacity and scheduling, EC2 I7i instances arrived in additional regions, offering higher compute and NVMe performance for I/O-intensive workloads compared to I4i. Google Cloud introduced Flex-start VMs, a queue-based model for scarce GPUs that trades flexible start times for improved obtainability and lower pricing for defined-duration jobs.