Cybersecurity Brief

Cloud Platforms Add AI Agent Controls Amid Patches And Breaches

Coverage: 01 Oct 2025 (UTC)

Amazon introduced two Model Context Protocol services aimed at making AI-driven operations on its cloud more accurate and governed: the general availability of Knowledge MCP Server for authoritative AWS guidance and the v1.0.0 release of the API MCP Server to translate natural language into safer AWS CLI/API execution. The day also brought workflow upgrades, new detection features, and a steady stream of advisories and confirmed breaches that underscore the need to patch promptly and monitor identity, data pipelines, and third‑party integrations.

AI Agents Gain Trusted Context and Controls

The new AWS MCP offerings push agentic workflows toward higher reliability. The GA Knowledge MCP Server consolidates AWS documentation, Well‑Architected guidance, and What’s New content into an LLM‑ready endpoint, with structured details on regional API and CloudFormation availability to anchor answers in current facts. In parallel, the v1.0.0 API MCP Server emphasizes safer execution paths: support for streamable HTTP transport and containerized distribution for easy hosting, stronger input validation and secure file handling, configurable deny lists, and mechanisms that require human oversight for mutating operations. Together, these features aim to reduce manual context curation and limit risky automated changes while improving observability via CloudWatch logging and, when enabled, prescriptive execution plans.

Microsoft is signaling a similar direction with agentic security constructs across its SIEM and assistance layers. New capabilities in Sentinel updates include the general availability of Sentinel data lake for long‑term telemetry retention, public previews of a graph that maps relationships across alerts and logs, and an MCP-based connector to standardize how agents communicate with tools. The company highlights benefits such as decoupled storage and query costs and graph‑driven correlation, while also acknowledging limitations and risks introduced by agent-to-agent protocols and noisy automation, reinforcing the need for controls and vetting of third‑party agents.

Workflow and Data Platforms Evolve

Amazon extended its workflow and content-processing stack. AWS updated Managed Workflows for Apache Airflow to support the latest major release, bringing Airflow 3.0 support with a redesigned UI, event-driven scheduling, a Task SDK to reduce boilerplate, and the Task Execution API for tighter runtime isolation. Operators also gain scheduler-managed backfill and Python 3.12 support, combining usability gains with security improvements. In data automation, Amazon added speaker diarization and channel identification to Bedrock Data transcription, plus a guided blueprint workflow to turn natural-language prompts into reusable extraction templates—useful for customer support, telehealth, and compliance reviews where per-speaker and per-channel clarity is critical.

Google highlighted developer-focused advances and endpoint resilience. A new Gemini CLI extension for PostgreSQL turns plain-language requests into concrete actions—from installing pg_trgm and building GIN/GiST indexes to provisioning users—bridging schema best practices with code generation and lifecycle operations. On the defensive side, Drive for desktop is gaining AI‑driven ransomware detection; the feature pauses syncing on suspicious activity, alerts users, and guides them through multi-file rollback. The capability, available by default in eligible plans, is described in Google Drive coverage and underscores how rapid rollback has become a standard element in ransomware resilience.

Advisories and Patches to Apply

Multiple vendors issued fixes or hardening guidance. Broadcom released updates addressing issues across VMware NSX and vCenter; the set includes a high‑severity SMTP header injection in vCenter and username‑enumeration flaws in NSX that can aid credential attacks, with details summarized in VMware updates. Identity platforms also featured: OneLogin removed excessive data exposure in its app listing endpoint, closing CVE-2025-59363 that could have leaked OIDC client secrets to holders of valid API keys. In AI infrastructure, Red Hat warned that authenticated, low‑privileged users could escalate to cluster admin in OpenShift AI (CVSS 9.9) and advised immediate RBAC reviews and mitigations pending fixes for CVE-2025-10725.

Research-led disclosures continued. Palo Alto Networks’ Unit 42 detailed three flaws in the TOTOLINK X6000R router that enable command injection, arbitrary file writes, and potential persistent code execution; patches are available and guidance is provided in TOTOLINK X6000R. Cisco Talos published vulnerabilities in NVIDIA CUDA Toolkit utilities (cuobjdump, nvdisasm) and in Adobe Acrobat Reader that could permit code execution via crafted files or malicious PDFs, with vendor fixes released and additional detections via Snort, as documented by Cisco Talos. Why it matters: file- and API-driven attack paths remain common, so least privilege, sandboxing of untrusted content, and prompt patching reduce risk.

Incidents and Exposure

Data integrity and privacy were tested across analytics and customer platforms. Adobe reported an ingestion bug that cross‑pollinated some customers’ tracking data in other tenants’ Analytics instances for part of September 17–18, with errant values propagating into downstream tools; affected organizations were instructed to purge impacted data across systems, per Adobe Analytics guidance. Allianz Life said a July incident exposed names, addresses, dates of birth, and Social Security numbers for roughly 1.5 million individuals after access to a cloud-based CRM system; notifications and two years of monitoring are being provided, as detailed in Allianz Life. Dealer management software provider Motility disclosed ransomware that encrypted systems and may have exposed personal data for about 766,000 customers; the firm restored from backups and is offering monitoring services, according to Motility Software.

In aviation, WestJet confirmed a breach impacting roughly 1.2 million customers after initial access via social engineering and subsequent activity through Citrix and Microsoft environments; the airline is offering identity protection and continues to notify affected individuals, per WestJet. On the statecraft front, researchers attributed sustained espionage operations to a China‑aligned group labeled Phantom Taurus, which targets governments and telecoms across Africa, the Middle East, and Asia using memory‑resident IIS backdoors, DNS tunneling, and SQL exfiltration techniques, as reported by Phantom Taurus. The combination of inadvertent data exposure and targeted collection highlights the need for rigorous data governance, rapid incident response, and focused threat hunting on internet-facing services.

These and other news items from the day:

Wed, October 1, 2025

AWS API MCP Server v1.0.0 enables natural API control

🧭 The AWS API MCP Server v1.0.0 enables foundation models to interact with AWS APIs via natural language by generating and executing syntactically correct CLI commands. This release reduces startup time and removes local dependencies by converting the suggest_aws_command tool into a remote service, and adds streamable HTTP transport alongside stdio. Security and governance are strengthened with improved secure file system controls, better input validation, configurable denials, and options to require human oversight for mutating actions. Observability is improved through CloudWatch agent log collection, and an experimental get_execution_plan tool (enabled by EXPERIMENTAL_AGENT_SCRIPTS) offers prescriptive workflows; the server is available as a container and open-source on the AWS Labs GitHub repository.

read more →

Wed, October 1, 2025

AWS Knowledge MCP Server Now Generally Available Globally

🔎 The AWS Knowledge MCP Server is now generally available, giving AI agents and MCP-compatible clients access to authoritative AWS documentation, blog posts, What's New announcements, and Well-Architected guidance in an LLM-friendly format. The GA release also adds structured knowledge about regional API and CloudFormation resource availability. The server is publicly accessible at no cost and does not require an AWS account, though usage is rate-limited. Configure MCP clients to use the AWS Knowledge MCP Server endpoint to anchor agent responses in trusted AWS context and reduce manual context management.

read more →

Wed, October 1, 2025

CrowdStrike Fall 2025 Release: Agentic SOC & AI Security

🔒 CrowdStrike’s Fall 2025 release introduces the Falcon agentic security platform, redefining SOC operations by pairing analysts with AI agents that reason, act, and continuously learn. The release centers on the Enterprise Graph data layer and Charlotte AI AgentWorks for no-code agent creation, plus seven mission-ready agents and Threat AI for autonomous hunting and response. It also expands identity, data protection, patching, and MDR capabilities, integrates Pangea and Onum, and launches AI Detection and Response (AIDR) to secure AI workflows.

read more →

Wed, October 1, 2025

Microsoft Agent Framework Brings Multi-Agent Tooling

🤖 The Microsoft Agent Framework is now in public preview inside Azure AI Foundry, offering an open-source SDK and runtime to simplify orchestration of multi-agent systems. Developers can prototype locally and deploy with built-in observability, durability, and compliance while integrating tools via OpenAPI, Agent2Agent (A2A), and the Model Context Protocol (MCP). Microsoft also previews stateful multi-agent workflows and has contributed multi-agent tracing standards to OpenTelemetry. Responsible AI controls and a generally available Voice Live API add governance and real-time voice capabilities for enterprise scenarios.

read more →

Wed, October 1, 2025

Microsoft Advances Sentinel with Agentic AI Upgrades

🔒 Microsoft announced major AI upgrades for Sentinel SIEM and Security Copilot, positioning them as agentic platforms. The update makes Sentinel data lake generally available and introduces public-preview releases of Sentinel graph and the Sentinel Model Context Protocol (MCP) Server so AI agents can access and act on SIEM data. Customers can now build custom agents with natural‑language prompts and discover third‑party agents via a revamped store. Microsoft positions agents to automate investigation and response but warns of increased noise, false positives and a new attack surface.

read more →

Wed, October 1, 2025

Amazon MWAA Announces Support for Apache Airflow 3.0

🚀 Amazon Managed Workflows for Apache Airflow (MWAA) now supports Apache Airflow 3.0, enabling easier authoring, scheduling, and monitoring of complex workflows. The release introduces a redesigned UI and an event-driven scheduler that can trigger workflows directly from external events. The new Task SDK and Task Execution API reduce boilerplate, improve isolation, and limit direct metadatabase access. MWAA also adds Python 3.12 support and security fixes to enhance reliability.

read more →

Wed, October 1, 2025

Gemini CLI Brings Natural Language to PostgreSQL Workflows

🔎 The Gemini CLI extension for PostgreSQL brings natural-language queries and command-line convenience directly to database tasks. It can detect required tools (for example, pg_trgm for fuzzy search), check whether they are installed and install them automatically, and suggest performance improvements such as creating GIN or GIST indexes. The extension also generates schema-derived code snippets and supports lifecycle actions like creating instances, users, and permissions, streamlining development workflows.

read more →

Wed, October 1, 2025

Google Drive for Desktop Adds AI Ransomware Detection

🔒 Google has begun rolling out an AI-powered ransomware detection feature for Google Drive for desktop. The feature automatically pauses syncing of affected files on Windows and macOS when it detects signs of ransomware, protecting cloud copies though it does not prevent local file encryption. Administrators may disable detection or file restoration via the Admin console, and alerts require Drive version 114 or later.

read more →

Wed, October 1, 2025

SageMaker Unified Studio adds SSO for Spark sessions

🔐 Amazon SageMaker Unified Studio now supports corporate identities for interactive Apache Spark sessions using AWS Identity Center trusted identity propagation. Data engineers and scientists can sign on to JupyterLab Spark sessions with organizational credentials while administrators apply fine-grained access controls and maintain end-to-end data access traceability. The integration leverages AWS Lake Formation, Amazon S3 Access Grants, and Amazon Redshift Data APIs, and includes comprehensive AWS CloudTrail logging for interactive and background sessions to streamline compliance.

read more →

Wed, October 1, 2025

Chinese APT 'Phantom Taurus' Targets Gov and Telecom

🔎 Researchers at Palo Alto Networks have attributed two years of coordinated espionage to a previously unreported Chinese-aligned threat actor dubbed Phantom Taurus. The group targets government and telecommunications organizations across Africa, the Middle East, and Asia, focusing on foreign ministries, embassies, geopolitical events and military operations to maintain persistent covert access. Its toolkit includes a new IIS web-server backdoor suite called NET-STAR, DNS- and remote-access tools, in-memory implants and a wide mix of dual-use utilities. Operators have shifted from Exchange mailbox harvesting via ProxyLogon and ProxyShell exploits to targeted SQL database searches and WMI-driven data extraction.

read more →

Wed, October 1, 2025

OpenShift AI Privilege Escalation Flaw Exposes Clusters

🔒 Red Hat has disclosed a severe privilege escalation vulnerability in OpenShift AI (CVE-2025-10725) that can allow an authenticated, low-privileged user to escalate to full cluster administrator and fully compromise a deployment. The issue carries a CVSS score of 9.9 but is rated Important by Red Hat because exploitation requires an authenticated account. Affected releases include OpenShift AI 2.19, 2.21 and RHOAI. Administrators are advised to avoid broad ClusterRoleBindings such as binding kueue-batch-user-role to system:authenticated, and to grant job creation permissions only on a granular, need-to-know basis while applying vendor guidance.

read more →

Wed, October 1, 2025

TOTOLINK X6000R Router: Multiple Firmware Vulnerabilities

⚠️ TOTOLINK X6000R routers running firmware V9.4.0cu.1360_B20241207 contain three vulnerabilities that enable argument injection, unauthenticated command execution, and sanitization bypasses leading to file corruption or persistent denial-of-service. The most severe, CVE-2025-52906, is an unauthenticated command injection rated Critical (CVSS 9.3). TOTOLINK has released updated firmware and users should apply the patch immediately while defenders use device visibility and threat prevention to detect exploitation.

read more →

Wed, October 1, 2025

WestJet breach exposes travel documents of 1.2M customers

🔒 WestJet confirmed a cybersecurity incident that exposed personal data for about 1.2 million customers, including passports and government IDs. Attackers used social engineering to reset an employee password and accessed the network via Citrix, later moving through Windows and Microsoft cloud systems. The airline said no card numbers, CVVs, expiry dates, or user passwords were compromised and has offered two years of identity protection while working with the FBI.

read more →

Wed, October 1, 2025

Broadcom Patches VMware NSX and vCenter Vulnerabilities

🔒 Broadcom has released security updates for VMware vCenter and NSX addressing multiple high-severity vulnerabilities, including CVE-2025-41250, CVE-2025-41251 and CVE-2025-41252. The most serious, an SMTP header injection in vCenter (CVSSv3 8.5), allows non-administrative users to tamper with scheduled email notifications and has no available workaround. Two NSX flaws permit unauthenticated username enumeration, which can facilitate brute-force or credential-stuffing attacks. Administrators are urged to apply the fixed versions immediately.

read more →

Wed, October 1, 2025

Allianz Life July Data Breach Affects Nearly 1.5 Million

🔐Allianz Life has completed its investigation into a July cyberattack and says 1,497,036 people were impacted. A malicious actor accessed a third-party cloud-based CRM on July 16, 2025, and obtained names, addresses, dates of birth, and Social Security numbers. While some reporting linked the intrusion to a Salesforce-targeted wave attributed to ShinyHunters, Allianz Life has not confirmed that attribution. Notified individuals are offered two years of free identity monitoring from Kroll and guidance to enable credit monitoring or consider freezing credit.

read more →

Wed, October 1, 2025

Phantom Taurus: China-Aligned Hackers Target State, Telecom

🔍Phantom Taurus, newly designated by Unit 42, is a China-aligned cyber-espionage group that has targeted government and telecommunications organizations across Africa, the Middle East and Asia for at least two and a half years. Researchers traced the activity from earlier cluster tracking through a 2024 campaign codename, noting a 2025 elevation to a distinct group. Phantom Taurus has shifted from email-server exfiltration to directly querying SQL Server databases via a custom mssq.bat executed over WMI, and deploys a previously undocumented .NET IIS malware suite dubbed NET-STAR.

read more →

Wed, October 1, 2025

Manufacturing Disruptions from Targeted Cyberattacks

⚠️Recent cyberattacks forced production halts at Jaguar Land Rover and Asahi, underscoring that operational disruption is now a primary objective for threat actors. JLR paused production after an August 31 compromise attributed to the Scattered Lapsus$ Hunters group, reportedly using vishing to obtain credentials, while Asahi halted orders and shipments following a systems failure. Experts emphasize that attackers exploit phishing, unpatched systems, and supply‑chain weaknesses, and urge layered defenses such as zero trust, MFA, PAM, micro‑segmentation, continuous monitoring, and air‑gapped backups to preserve business continuity.

read more →

Wed, October 1, 2025

Ransomware Incident at Dealer Software Vendor Exposes Data

🔒 A ransomware attack on Motility Software Solutions on August 19, 2025, encrypted portions of its systems and may have exposed personal information for approximately 766,000 customers. The DMS vendor supports about 7,000 dealerships and stores data including names, emails, phone numbers, dates of birth, Social Security numbers, and driver’s license numbers. Motility restored systems from backups, implemented additional security measures, and is offering one year of identity monitoring through LifeLock to affected individuals.

read more →

Wed, October 1, 2025

Android malware uses VNC to give attackers hands-on access

🔒 Klopatra is a newly observed Android banking and remote access trojan distributed via a sideloaded dropper app called Modpro IP TV + VPN that has infected over 3,000 devices across Europe. The malware abuses Android Accessibility to capture inputs, exfiltrate clipboard content, simulate taps and gestures, and monitor screens. A concealed black‑screen VNC mode lets operators interact with devices and perform manual bank transactions while the device appears idle. Cleafy notes extensive anti-analysis protections, use of commercial packers, and active development since March 2025.

read more →

Wed, October 1, 2025

Amazon Bedrock Data Automation Adds Enhanced Transcription

🔊 Amazon Bedrock Data Automation (BDA) now offers enhanced transcription with speaker diarization and channel identification, letting developers separate and process individual speakers or channels in audio files. It also provides a guided, natural language blueprint workflow for extracting custom audio insights. These capabilities simplify reading and analysis of multi-party recordings—customer calls, telehealth visits, webinars, public-safety recordings, and meetings—and support subtitle creation, compliance monitoring, and productivity analysis. BDA is available in seven AWS Regions.

read more →

Wed, October 1, 2025

Adobe Analytics ingestion bug leaked customer data

⚠️ Adobe warns that a performance optimization change to Adobe Analytics data collection introduced an ingestion bug on September 17, 2025 at 12:20 UTC that caused some organizations' tracking fields to be overwritten with values from other customers' streams. Adobe reverted the change on September 18 at 11:00 UTC, said the issue was not caused by malicious activity, and reported roughly 3–5% of collected rows were corrupted. Impacted channels include Data Feeds, Live Stream, scheduled reports, and downstream products; Adobe has instructed affected customers to immediately delete any data received during the incident window while engineering teams cleanse impacted datasets.

read more →

Wed, October 1, 2025

Cisco Talos Discloses Multiple Nvidia and Adobe Flaws

⚠ Cisco Talos disclosed five vulnerabilities in NVIDIA's CUDA Toolkit components and one use-after-free flaw in Adobe Acrobat Reader. The Nvidia issues affect tools like cuobjdump (12.8.55) and nvdisasm (12.8.90), where specially crafted fatbin or ELF files can trigger out-of-bounds writes, heap overflows, and potential arbitrary code execution. The Adobe bug (2025.001.20531) involves malicious JavaScript in PDFs that can reuse freed objects, leading to memory corruption and possible remote code execution if a user opens a crafted document.

read more →

Wed, October 1, 2025

OneLogin API Bug Exposed OIDC Client Secrets in 2025

🔒Clutch Security disclosed a high-severity flaw in the One Identity OneLogin IAM platform that could leak OpenID Connect (OIDC) application client_secret values when queried with valid API credentials. The issue, tracked as CVE-2025-59363 with a CVSS score of 7.7, stemmed from the /api/2/apps endpoint returning secrets alongside app metadata. OneLogin remedied the behavior in OneLogin 2025.3.0 after responsible disclosure; administrators should apply the update, rotate exposed API and OIDC credentials, tighten RBAC scopes, and enable network-level protections such as IP allowlisting where available.

read more →

Wed, October 1, 2025

Attackers Abuse Milesight Routers to Send Smishing SMS

📱 SEKOIA warns that unknown actors have been abusing Milesight industrial cellular routers to send phishing SMS messages across Europe since at least February 2022. The attackers exploited exposed SMS-related APIs — linked to a patched information disclosure flaw (CVE-2023-43261) — to dispatch typosquatted URLs impersonating government platforms, banks, postal and telecom providers. Of roughly 18,000 such routers visible on the public internet, SEKOIA identified about 572 potentially vulnerable devices, roughly half located in Europe. The campaigns used JavaScript-based mobile checks and domains that disabled debugging and logged visitors to a Telegram bot, indicating operational measures to hinder analysis.

read more →

Wed, October 1, 2025

Klopatra Android Banking Trojan Hits 3,000+ Devices

🔒 Cleafy has uncovered Klopatra, a previously undocumented Android banking trojan that has infected over 3,000 devices—predominantly in Spain and Italy. The malware leverages Hidden VNC for remote device control and dynamic overlays to harvest credentials, while integrating the commercial Virbox protection suite and native libraries to evade detection and analysis. Operators distribute Klopatra via social-engineered IPTV droppers, abuse Android accessibility permissions to persist and perform actions, and use a black-screen VNC mode and stolen PINs or patterns to unlock devices and execute rapid fraudulent transfers.

read more →

Wed, October 1, 2025

Ukraine Alerts to CABINETRAT Backdoor Delivered via XLLs

⚠ The Computer Emergency Response Team of Ukraine (CERT‑UA) warns of targeted attacks using a new backdoor dubbed CABINETRAT distributed via malicious Excel add-ins (XLL) concealed inside ZIP archives shared over Signal. The XLL implants an EXE in Startup, places BasicExcelMath.xll in the Excel XLSTART folder and drops a PNG that hides shellcode. It employs registry persistence and robust anti-VM checks, and the C-based backdoor performs reconnaissance, remote command execution, file operations and data exfiltration over TCP.

read more →

Wed, October 1, 2025

Amazon Detective Adds AWS PrivateLink VPC Endpoint Support

🔒 Amazon Detective now supports VPC endpoints via AWS PrivateLink, allowing you to initiate Detective API calls from inside your VPC without Internet traversal. The capability is available in all AWS Regions where Detective is offered. Create a VPC endpoint through the VPC console, API, or SDK; this provisions an elastic network interface with a private IP in your chosen subnets as the entry point. Detective continues to ingest and correlate logs and findings to power investigations.

read more →

Wed, October 1, 2025

Amazon CloudWatch Application Map Generally Available

🗺️ Amazon CloudWatch now provides an out-of-the-box Application Map that automatically discovers, groups, and visualizes services and dependencies across AWS accounts and regions. SRE and DevOps teams can apply dynamic grouping by teams, business units, or criticality to align views with operational responsibilities and accelerate troubleshooting. The map integrates with a contextual troubleshooting drawer that surfaces metrics, SLOs, health indicators, changes, and top observations, and users can pivot to application-specific dashboards for deeper investigation. This capability is available in all AWS commercial regions at no additional cost.

read more →

Wed, October 1, 2025

WireTap Attack Extracts Intel SGX ECDSA Key via DDR4

🔬 Researchers from Georgia Institute of Technology and Purdue University describe WireTap, a physical memory-bus interposer attack that passively inspects DDR4 traffic to recover secrets from Intel SGX enclaves. By exploiting deterministic memory encryption, the team built an oracle enabling a full key-recovery of an SGX ECDSA attestation key from the Quoting Enclave. The prototype uses inexpensive, off-the-shelf equipment (roughly $1,000) and can be introduced via supply-chain compromise or local physical access. Intel says the scenario requires physical access and falls outside its memory-encryption threat model.

read more →

Wed, October 1, 2025

EU Agency: Cyber Threat Landscape in Europe Worsens

⚠️ ENISA reports the EU cyber threat landscape has worsened, identifying ransomware as the single most damaging threat due to widespread encryption and costly recoveries. By frequency, DDoS incidents dominate (77% of reported cases), though they typically cause shorter-lived outages. The agency's analysis of 4,875 incidents from July 2024 to June 2025 also highlights concentrated attacks on public administration and a rapid rise in AI-assisted social engineering.

read more →

Wed, October 1, 2025

CISA 2015 Expires Amid Government Shutdown, Hurdles Loom

🔒 Congress allowed CISA 2015 to lapse on Sept. 30, 2025 amid a US government shutdown, removing statutory liability shields for private-sector cyber threat information sharing. The expiration reduces government visibility into corporate threat data and is likely to make companies and CISOs more cautious about exchanging indicators and defensive measures. Experts urge immediate legal review and expect Congress may pursue a temporary reauthorization, though the timing and duration remain uncertain.

read more →

Wed, October 1, 2025

Microsoft to Force-Install Microsoft 365 Companion Apps

📌 Microsoft will automatically install the Microsoft 365 companion apps on Windows 11 devices that have the Microsoft 365 desktop apps, beginning in late October 2025 and completing by the end of December 2025. The suite — People, Files, and Calendar — integrates Copilot for contextual AI assistance from the taskbar. IT admins can opt out via the Microsoft 365 Apps admin center or disable app auto‑launch in each app's Settings.

read more →

Wed, October 1, 2025

AWS Cloud WAN Now Available Across AWS GovCloud Regions

🛰️ AWS has made AWS Cloud WAN available in AWS GovCloud (US-West) and AWS GovCloud (US-East) as of Oct 1, 2025. The service provides a central dashboard and policy-driven networking to create a global network that spans VPCs, Transit Gateways, and on-premises locations. It supports BGP-based global route exchange and connectivity via Site-to-Site VPN, Direct Connect, or third-party SD-WAN solutions. The dashboard offers consolidated visibility into network health, security, and performance to simplify operations.

read more →

Wed, October 1, 2025

Smashing Security 437: ForcedLeak in Salesforce AgentForce

🔐 Researchers uncovered a security flaw in Salesforce’s new AgentForce platform called ForcedLeak, which let attackers smuggle AI-readable instructions through a Web-to-Lead form and exfiltrate data for as little as five dollars. The hosts discuss the broader implications for AI integration, input validation, and the surprising ease of exploiting customer-facing forms. Episode 437 also critiques typical breach communications and covers ITV’s phone‑hacking drama and the Rosetta Stone story, with Graham Cluley joined by Paul Ducklin.

read more →

Wed, October 1, 2025

Credential ZIP Lures Use Malicious LNKs to Deploy DLLs

📎 BlackPoint researchers tracked a campaign that distributes credential-themed ZIP archives containing malicious Windows shortcut (.lnk) files. When opened, the shortcuts launch minimized, obfuscated PowerShell that downloads DLL payloads disguised as .ppt files, saves them to the user profile and invokes them via rundll32.exe. The dropper assembles commands from byte arrays, probes for antivirus processes and uses quiet flags to minimize visible indicators. Recommended mitigations include blocking LNKs in archives, enforcing Mark of the Web, denying execution from user-writable locations, and enabling PowerShell script block logging and AMSI.

read more →

Wed, October 1, 2025

ICO: Imgur UK Exit Will Not Stop Potential Regulatory Fine

⚖️ The ICO has confirmed that Imgur’s decision to block UK access does not absolve the company from scrutiny over alleged past data protection breaches. The regulator issued a notice of intent to fine parent company MediaLab on 10 September and says its findings are provisional while the investigation continues. The concerns relate to potential breaches of the Age Appropriate Design Code, including failures to request or verify ages, lack of high-privacy defaults for children, and serving targeted adverts to minors. The ICO stressed that exiting the UK market is a commercial choice and does not prevent regulatory action for prior infringements.

read more →

Wed, October 1, 2025

CISOs Urged to Rethink Vulnerability Management amid Surge

⚠️ Enterprises face an unprecedented surge in disclosed vulnerabilities — over 20,000 in H1 2025 — with roughly 35% (6,992) accompanied by public exploit code, according to Flashpoint. Security leaders are urged to adopt risk-based patching and intelligence-led remediation that prioritizes remotely exploitable and actively exploited flaws while factoring in business context. Relying solely on CVE and the NVD is increasingly impractical due to enrichment delays; experts recommend integrating threat context, exposure management, and CTEM-style operations to concentrate limited resources on what truly matters.

read more →

Wed, October 1, 2025

FortiEDR Earns AV-Comparatives 2025 EPR Certification

🔒 FortiEDR was certified in the 2025 AV-Comparatives Endpoint Prevention & Response (EPR) test, an independent, hands-on evaluation that mapped 50 multi-stage attack chains to the MITRE ATT&CK framework. The certification validates FortiEDR's prevention-first design, strong real-time blocking, automated remediation, and extensive forensic capabilities while maintaining low false positives. AV-Comparatives also ranked FortiEDR favorably for total cost of ownership by combining product pricing with operational workload.

read more →

Wed, October 1, 2025

Amazon GameLift Streams Adds IPv6 for Windows Streaming

📡 Amazon GameLift Streams now supports IPv6 for streaming applications hosted on Windows-based stream groups, enabling dual-stack connectivity (IPv4 and IPv6) for streamed Windows applications. This enhancement gives customers additional addressing options and helps meet IPv6 compliance requirements while preserving compatibility with existing IPv4 deployments. Note that Linux runtime applications will continue to require IPv4 for streaming; the capability is available in all AWS Regions where GameLift Streams is offered.

read more →

Wed, October 1, 2025

Generative AI's Growing Role in Scams and Fraud Worldwide

⚠️A new primer, Scam GPT, surveys how generative AI is being adopted by criminals to automate, scale, and personalize scams. It maps which communities are most at risk and explains how broader economic and cultural shifts — from precarious employment to increased willingness to take risks — amplify vulnerability to deception. The author argues these threats are social as much as technical, requiring cultural shifts, corporate interventions, and effective legislation to defend against them.

read more →

Wed, October 1, 2025

VirusTotal Crowdsourced AI Adds Exodia Labs for .CRX

🔍 VirusTotal has added Exodia Labs to its Crowdsourced AI lineup to provide automated analysis of Chrome extension (.CRX) files. The new contributor issues a clear verdict — benign, suspicious, or malicious — alongside a behavioral narrative to complement existing AI streams such as Code Insight. Exodia Labs results are indexed in VirusTotal Intelligence with dedicated search operators and surface in the web UI to help analysts rapidly triage extension-related threats.

read more →

Wed, October 1, 2025

AWS DataSync Supports VPC Endpoint Policies and FIPS

🔒 AWS DataSync now supports VPC endpoint policies, enabling administrators to control access to DataSync API operations through VPC service endpoints, including FIPS 140-3 enabled endpoints. You can restrict specific actions such as CreateTask, StartTaskExecution, or ListAgents and combine these controls with identity-based and resource-based policies. The capability is available in all AWS Regions and helps strengthen security posture and compliance when accessing DataSync via VPC endpoints.

read more →

Wed, October 1, 2025

Case for Multidomain Visibility and Unified Response in SOCs

🔍 The 2025 Unit 42 Global Incident Response Report shows that 84% of investigated incidents involved activity across multiple attack fronts and 70% spanned at least three vectors, underscoring coordinated, multidomain campaigns. Attackers move laterally across cloud, SaaS, IT and OT, exploiting identities, misconfigurations and vulnerabilities. The report recommends unified telemetry, AI-driven behavioral analytics and stronger identity controls to improve detection and accelerate response.

read more →

Wed, October 1, 2025

AI Tops Cybersecurity Investment Priorities — PwC Report

🔒 A PwC survey finds AI-based security is the top cybersecurity investment priority for the next 12 months, with 36% of business and technology executives ranking it among their top three budget areas. Security leaders prioritized AI threat hunting (48%) and agentic AI to boost cloud and operational efficiencies (35%). While 78% expect cyber budgets to rise, organizations report significant knowledge and skills gaps and low readiness for quantum threats.

read more →

Wed, October 1, 2025

Securing the Cloud: Risks, AI Impacts, and Best Practices

🔒 This Special Report examines the distinct security challenges of cloud environments, the current threat landscape organizations face, and how rapid AI adoption is amplifying those risks. It highlights common hidden exposures across configurations, data stores, and APIs. The report also presents practical strategies and best practices for improving cloud posture, governance, and operational controls to reduce overall attack surface.

read more →

Wed, October 1, 2025

Cybersecurity Awareness Month: Security Starts With You

🔐 As Cybersecurity Awareness Month begins, Microsoft emphasizes that cybersecurity is both a personal and organizational responsibility. The post spotlights the Microsoft Secure Future Initiative (SFI), which has mobilized more than 34,000 engineers to reduce risk and implement protections such as phishing-resistant multifactor authentication on 100% of production system accounts and 92% of employee productivity accounts. It highlights new resources — including the Be Cybersmart Kit and SFI patterns and practices — plus learning paths, scholarships, and programs to help organizations and students improve security skills.

read more →

Wed, October 1, 2025

Simplifying CISA’s Zero Trust Roadmap with Microsegmentation

🔒 CISA now frames microsegmentation as a foundational element of Zero Trust rather than a late-stage optimization, and modern solutions aim to remove historical deployment barriers. Zero Networks highlights agentless, automated, identity-aware, and MFA-enabled controls that speed policy creation and adaptation while minimizing disruption. The vendor cites industry research showing strong market growth, broad practitioner support, and substantial cost reductions compared with legacy segmentation approaches.

read more →

Wed, October 1, 2025

2025 Cybersecurity Reality Check: Attack Surface Focus

🔍 Bitdefender's 2025 assessment highlights rising secrecy after breaches, a widening leadership-to-frontline disconnect, and an urgent shift to shrink enterprise attack surfaces. The report, combining surveys of over 1,200 IT and security professionals across six countries and analysis of 700,000 incidents, shows 84% of high-severity attacks leverage Living Off the Land techniques. Organizations are prioritizing attack surface reduction and simplification to improve resilience and detection.

read more →

Wed, October 1, 2025

Government Shutdown Deepens US Cybersecurity Risks

⚠️ The US government shutdown that began on Sept. 30 deepens federal cyber risk by compounding prior spending cuts and workforce reductions. Significant cuts — including roughly $1.23 billion trimmed from civilian cyber budgets and about 1,000 CISA staff fired earlier in July — have already weakened defenses. Agencies have issued contingency plans and will exempt some critical SOCs and intelligence functions, but contractors and broader response capacity face disruption. Adversaries are likely monitoring for opportunities, and the effects will persist even after funding resumes.

read more →

Wed, October 1, 2025

VMware flaws allow username enumeration, patches released

🛡️ Three important vulnerabilities were disclosed in VMware products, including two in NSX that allow unauthenticated username enumeration and one in vCenter that permits SMTP header manipulation by authenticated non‑admin users with scheduled task privileges. The U.S. National Security Agency discovered two of the issues and all three are rated Important. VMware has released patches to address the flaws. Organizations are urged to apply updates immediately, avoid exposing vCenter to the internet, enforce multi‑factor authentication, change default credentials, and deploy layered protections such as web application firewalls and brute‑force detection controls.

read more →

Wed, October 1, 2025

FortiEDR Earns AV-Comparatives 2025 EPR Certification

🔒 FortiEDR, Fortinet’s prevention-first endpoint detection and response solution, earned AV-Comparatives’ 2025 Endpoint Prevention & Response (EPR) certification following a hands-on evaluation of multi-stage attack chains. The certification highlights FortiEDR’s strong prevention, precise response capabilities, low false-positive rates, and automation that reduces analyst workload. Reviewers also noted the product’s integration across the Fortinet Security Fabric and support for legacy Windows platforms as meaningful differentiators.

read more →

Wed, October 1, 2025

Amazon Keyspaces Adds IPv6 Dual-Stack Endpoints Support

🌐 Amazon Keyspaces now supports IPv6 through new dual-stack endpoints that accept both IPv6 and IPv4 connections, expanding available address space while preserving compatibility with existing IPv4 applications. The enhancement enables gradual migration strategies for critical database services and reduces disruption during transition. IPv6 access is also supported via PrivateLink interface VPC endpoints for private connectivity without traversing the public internet. This capability is available now in all AWS Commercial and AWS GovCloud (US) Regions where Keyspaces is offered, at no additional cost.

read more →

Wed, October 1, 2025

Solicitors urged to curb payment diversion fraud losses

🔒 The National Crime Agency and The Law Society have warned that UK house buyers faced average losses of £82,000 from payment diversion fraud over the past year. This form of payment diversion fraud (PDF) — a type of business email compromise — relies on hijacked or spoofed emails and lookalike domains to alter bank transfer instructions. The campaign urges solicitors and conveyancers to tighten checks and advises clients to verify bank details, use strong passwords, avoid public Wi‑Fi and transfer small initial amounts to confirm receipt.

read more →

Wed, October 1, 2025

Microsoft: Classic Outlook Crash Requires Support Ticket

🔧 Microsoft is investigating a known issue that causes classic Outlook on Windows to crash at launch for some Microsoft 365 customers. The vendor has not provided a public fix; affected customers must open a support case in the Microsoft 365 Admin portal so Exchange Online support can request a service change. Microsoft notes the error can stem from different causes but recent cases have involved user mailboxes, and it recommends capturing a Fiddler trace for triage. Temporary workarounds include using new Outlook for Windows or Outlook Web Access until mitigation is applied.

read more →

Wed, October 1, 2025

F-Droid: Google developer verification may end project

⚠️ F-Droid warns that Google’s planned Developer Verification rule — requiring identity verification for all developers on certified Android devices starting in 2026 — could effectively end the project and restrict access to many free, open-source apps. F-Droid, which builds reproducible packages, checks for trackers and allows anonymous downloading without accounts, says many open-source authors will refuse to register or pay fees and that F-Droid cannot seize app identifiers on their behalf. Google says sideloading will remain possible for verified developers, with exemptions for hobbyists and no change to Android Studio workflows.

read more →

Wed, October 1, 2025

Phishing and Patching: Cyber Basics Still Critical

🔐 Fortinet’s 2025 Global Threat Landscape Report underscores that two fundamentals — protecting against phishing and keeping software up to date — remain the most effective defenses. Attackers are scaling campaigns with automation and generative AI to produce more convincing messages, and they combine email, SMS, and voice techniques to raise success rates. Organizations should strengthen employee training, deploy MFA, and adopt centralized or automated patch management to reduce exposure and limit lateral movement.

read more →

Wed, October 1, 2025

Amazon Connect Adds Agent Time-Off Balance Data to Analytics

🔍 Amazon Connect now surfaces agent time-off balance data in the analytics data lake, enabling managers and analysts to generate reports and insights from both current and historical balances across categories such as paid time-off, sick leave, and leave of absence. The capability includes a chronological transaction log that shows each adjustment and its impact on balances, removing the need for manual reconciliation and improving manager productivity and response to agent inquiries. It is available in all AWS Regions where Amazon Connect scheduling is supported.

read more →

Wed, October 1, 2025

Microsoft Media Creation Tool Fails on Windows 11 ARM64

⚠️ Microsoft has confirmed that the Windows 11 Media Creation Tool (version 26100.6584), released on September 29, 2025, may not run on devices with Arm64 processors after the Windows 11 25H2 rollout. Affected users report an error that reads, "We're not sure what happened, but we're unable to run this tool on your PC," blocking creation of bootable installation media. Microsoft says the tool does not support creating media for Arm64 devices and that the normally available ability for Arm64 systems to produce x64 media is also failing. As a temporary workaround, Microsoft recommends using a PC with an AMD64 processor to create installation media while it investigates and prepares a fix.

read more →

Wed, October 1, 2025

Cybersecurity Awareness Month 2025: Knowledge Is Power

🔐 October marks Cybersecurity Awareness Month, underscoring that the human element is the first and most critical line of defense against cyberthreats. Cybercriminals exploit social engineering and increasingly rely on AI-driven tools to create believable, hyper-personalized scams and deepfakes. Watch the video with ESET Chief Security Evangelist Tony Anscombe for practical insights, and consider ESET's cybersecurity awareness training to strengthen individual and organizational resilience.

read more →

Wed, October 1, 2025

How CISOs Identify and Reject Poor Security Products

🔍 CISOs increasingly face a torrent of vendor pitches and must probe beyond marketing to find tools that genuinely improve security. Experienced security leaders recommend five core questions about business fit, operational impact, integration and maintenance, update cadence, and concrete use cases. They emphasize live demos and practitioner testing so teams can spot technical gaps and avoid products that merely add noise. Be wary of vague claims, fearmongering, buzzword-heavy pitches, or vendors who resist feedback.

read more →

Wed, October 1, 2025

Five Essential Cybersecurity Tips for Awareness Month

🔒 October is Cybersecurity Awareness Month, a timely reminder that prevention-first strategies are essential as digital threats evolve rapidly. This piece presents five practical tips organizations and individuals can implement — from user training and multi-factor authentication to regular patching and least-privilege access — and stresses the rising risk of AI-driven attacks and the need for layered defenses.

read more →

Wed, October 1, 2025

Blending AI and Human Workflows for Secure Automation

🔍 Join The Hacker News for a free webinar, "Workflow Clarity: Where AI Fits in Modern Automation," featuring Thomas Kinsella, Co‑founder & Chief Customer Officer at Tines. The piece argues that human-only processes are slow, rigid rule engines break when reality changes, and fully autonomous AI can create opaque, unauditable paths. Attendees will learn practical mapping of tasks to people, rules, or AI, how to spot AI overreach, and patterns for building secure, auditable workflows that scale without sacrificing control.

read more →