Anthropic’s latest model arrived on two major clouds, expanding options for enterprise agents and developer workflows. Google made Claude Sonnet 4.5 generally available on Vertex AI, while AWS introduced access via Bedrock. The day also brought platform hardening updates from hyperscalers—ranging from IPv6 scaling support and security architecture guidance to regional AI rollouts—and a mix of confirmed intrusions and crime enforcement actions.
Agentic AI arrives across clouds
Google Cloud positioned Claude Sonnet 4.5 as Anthropic’s most capable model for long‑running, tool‑using workflows on Vertex AI. The release emphasizes multi‑agent orchestration through the Agent Development Kit and Agent Engine, enterprise security and governance, and developer tooling such as Claude Code improvements, a VS Code extension, and a next‑generation terminal with checkpoints and a 1 million‑token context window. Platform features like prompt caching, batch predictions, citation grounding, global endpoints, and committed capacity aim to balance performance with cost and availability. Documentation and marketplace listings support enablement and evaluation.
AWS made Claude Sonnet 4.5 available through Bedrock, highlighting agentic, long‑horizon workflows and measurable gains in coding tasks and instruction following. New runtime behaviors include automatic pruning of stale tool‑call context to maximize effective window usage, plus a dedicated memory tool to preserve state across sessions—targeted at persistent agents. Bedrock’s managed, cross‑region inference and operational controls are framed for use cases from security posture management to financial analysis. Why it matters: access to the same frontier model on multiple platforms lets enterprises match agent capabilities with their preferred governance and networking controls.
Cloud platforms harden and scale
Cloudflare marked its anniversary with a broad set of launches spanning security, AI, performance, and developer tooling. The Birthday Week wrap detailed per‑customer ML anomaly detection for bot defense, Project Galileo extensions to protect journalists from AI crawlers, responsible bot principles and confidence scorecards, and WARP client support for post‑quantum crypto. The company also reported automatic SSL/TLS upgrades for millions of domains, proxy performance gains from a Rust re‑engineering, Workers hardening with V8 sandboxes and hardware protections, and observability improvements via new dashboards and Radar metrics. The thread: incremental security, reliability, and governance features coupled with expanded developer access.
To relieve address exhaustion and enable larger fleets, AWS added IPv6 support to two core services. EC2 Auto Scaling now supports dual‑stack groups so teams can plan migrations while maintaining IPv4 continuity. ECS IPv6‑only allows tasks and services to run without IPv4 addresses across launch types, simplifying address management and scale. Both updates call for revisiting security group/NACL rules, DNS records, load balancers, observability, and third‑party integrations to ensure IPv6 parity.
Google Cloud outlined a controlled path to newer VM families. Using GKE compute classes, platform teams can declare prioritized machine lists for the autoscaler with automatic fallbacks, easing compatibility testing and capacity variance during transitions. Compute Flexible CUDs complement this with spend‑based discounts that carry across multiple machine families and services, retaining savings as workloads shift.
Regional AI access also expanded. AWS made Bedrock available in additional Asia Pacific regions via Bedrock APAC and launched support in the Middle East through Bedrock UAE. The expansions aim to reduce latency, address data residency expectations, and integrate with local compliance postures while leveraging managed orchestration and security controls.
Secure architectures and trust layers for AI
An AWS guidance post details a layered approach to protect generative AI applications from DDoS, bot abuse, and application‑layer threats. The AWS Security blueprint combines CloudFront, WAF (including Bot Control), and Shield at the edge; Network Firewall, security groups, and NACLs at the perimeter; and private Bedrock access via PrivateLink, with GuardDuty, Inspector, Detective, and CloudWatch for detection and forensics. A reference workflow ties these controls into a low‑latency path for inference while narrowing exposure.
Google discussed an open trust layer for agent‑enabled payments. In an Agent Factory episode, the team explained the Agent Payment Protocol (AP2) as a role‑based framework using verifiable credentials to ensure shopping agents never handle raw card data and to keep merchants out of unnecessary PCI scope. The Agent Factory recap describes Cart, Intent, and Payment Mandates signed and exchanged during negotiated handoffs. Separately, OpenAI confirmed dynamic routing for sensitive or potentially harmful conversations, with GPT‑4o temporarily switching to a safety‑focused variant to add care and reasoning; the mechanism is built‑in and not user‑configurable, per BleepingComputer. These moves target safer automation in contexts where trust, consent, and content handling are paramount.
Intrusions and enforcement
Recorded Future’s Insikt Group detailed a broad espionage campaign attributed to a Chinese state‑sponsored actor tracked as RedNovember, using exploits against internet‑facing network appliances from multiple vendors and weaponizing public proof‑of‑concept code within days of release. Targets spanned defense, government, legal, and technology sectors across several regions, with compromises including U.S. defense contractors via Ivanti flaws patched in early 2024. The report underscores rapid exploitation of edge devices and heavy use of publicly available tools; coverage via CSOonline urges accelerated patching and enhanced monitoring for network appliances.
In the UK, the government issued a £1.5 billion loan guarantee to support Jaguar Land Rover following a cyberattack that disrupted production and resulted in data theft disclosures, according to BleepingComputer. Separately, researchers reported a widespread “EvilAI” malware campaign that masquerades as legitimate AI and productivity tools, uses numerous code‑signing certificates, and deploys stagers for follow‑on payloads like BaoLoader; analysis on The Hacker News highlights the need for behavioral detections and stricter signing‑certificate vetting.
UK authorities also secured a guilty plea tied to the world’s largest single cryptocurrency seizure. Investigators say funds from a fraudulent investment scheme were converted to Bitcoin and later seized by the Metropolitan Police; the holdings are now valued at approximately £5.5 billion. The case, described by officials as a major money‑laundering prosecution, is covered by BleepingComputer.