Cybersecurity Brief

Active Exploits Hit Enterprise Apps as AI Platforms Add Guardrails

Coverage: 06 Oct 2025 (UTC)

Cloud AI platforms leaned into control and deployability while defenders confronted live exploitation across enterprise software. Microsoft expanded Azure AI Foundry with lighter multimodal models, stronger safety, and managed agents. In parallel, Vertex AI introduced self-deploy options for proprietary partner models within customer VPCs to reinforce data locality and governance. Against that backdrop, responders detailed active abuse of Oracle E‑Business Suite and GoAnywhere MFT, and CISA added seven CVEs to the KEV Catalog to drive urgent remediation.

Platform AI expands with control and choice

Azure AI Foundry broadened its toolkit with compact, cost-optimized OpenAI models—GPT-image-1-mini, GPT-realtime-mini, and GPT-audio-mini—aimed at real-time multimodal use in constrained environments. The update adds enhanced safety for GPT-5-chat-latest and introduces GPT-5-pro with multi-path reasoning for analytics, code generation, and decision workflows. Microsoft also previewed an open-source Microsoft Agent Framework, private-preview multi-agent workflows in the Foundry Agent Service, and unified observability and Responsible AI features to aid production operations. Platform services include Voice Live API general availability and a forthcoming Sora 2 model for synchronized video and audio generation. The focus is speed-to-market and governance for agentic, multimodal systems across sectors, with partners citing lower latency, better instruction adherence, and cost efficiency.

Google Cloud is extending deployment control in its model ecosystem. Vertex AI’s Model Garden now supports self-deploy of curated proprietary models directly into customer VPCs via Marketplace licensing, enabling tighter policy enforcement, VPC-SC alignment, and regional compliance alongside pay‑as‑you‑go billing and autoscaling. Initial partners include AI21 Labs, CAMB.AI, Mistral AI, Qodo, CSM, and Virtue AI, with additional models forthcoming. The workflow lets teams select machine types, apply existing commitments, and keep proprietary data within their environment as they move evaluated models into production.

AWS introduced Amazon EC2 C8i and C8i‑flex instances powered by custom Intel Xeon 6 processors, targeting compute-bound workloads with claims of up to 15% better price‑performance and 2.5x memory bandwidth over prior Intel-based EC2 generations, and up to 20% higher performance versus C7i. C8i‑flex addresses common, cost-sensitive sizes for uneven CPU utilization, while the full C8i line spans 13 sizes, including two bare metal options and a new 96xlarge for sustained high-CPU applications. For architects, the release invites fresh benchmarking of throughput and cost efficiency for web tiers, caches, data platforms, and inference-heavy services.

Securing agentic systems

Google outlined a multi-pronged AI security strategy that pairs automated defense with clearer collaboration channels. The company introduced CodeMender, an agent built on Gemini that performs deep root‑cause analysis using fuzzing and theorem proving, generates autonomous patches, and routes them to critique agents for validation before human approval. A unified AI Vulnerability Reward Program consolidates prior reward tables to clarify scope and simplify reporting, and the updated Secure AI Framework 2.0 adds an agent risk map, extends security capabilities across Google agents, and contributes risk data to industry initiatives. The aim is to make agent systems secure by design through constrained capabilities, observable planning, and human control.

Separately, OpenAI is testing an Agent Builder interface that uses a visual flowchart paradigm to stitch together nodes, tools, and multiparty connectors across services such as Gmail, Google Calendar, Google Drive, Outlook, SharePoint, Teams, and Dropbox. Templates (for example, customer service or data enrichment) and configurable rules—model choice, prompts, reasoning effort, and structured outputs—are designed to accelerate agent development. The approach centralizes operational considerations: broad connector access heightens the need for careful permissioning, audit logging, and data‑minimization controls when automating work across productivity suites.

Exploitation campaigns drive urgent response

CrowdStrike detailed widespread exploitation of Oracle E‑Business Suite via CVE‑2025‑61882, with first known activity in August and public proof‑of‑concept posted October 3. Attackers achieve unauthenticated remote code execution by posting to specific EBS endpoints to bypass authentication and then uploading malicious XSLT templates that execute upon preview. Observed artifacts include Java-based downloaders and backdoors, web shells reachable at predictable public paths, and outbound connections over TCP/443 to attacker infrastructure. Recommended mitigations include applying Oracle’s updates, hunting for malicious TemplateCode URL references in the database, reviewing session activity for privileged users, restricting internet exposure, and deploying a web application firewall. CrowdStrike assesses one or more actors are exploiting the flaw and provides detections and SIEM rules to assist responders.

Microsoft reported active exploitation of a critical deserialization vulnerability in GoAnywhere MFT (CVE‑2025‑10035), initially addressed by Fortra on September 18. Activity attributed to an actor tracked as Storm‑1175 shows a multi‑stage intrusion: initial access through forged license response signatures, persistence via remote monitoring and management binaries (SimpleHelp, MeshAgent) executed under the GoAnywhere process, creation of .jsp files, discovery and lateral movement, and command‑and‑control via a Cloudflare tunnel. In at least one case, operators used Rclone for exfiltration and later deployed Medusa ransomware. Microsoft advises immediate upgrades, discovery of exposed systems, outbound egress restrictions, and enabling EDR block mode, automated investigation, and attack surface reduction rules; hunting queries and IoCs are provided.

CISA added seven vulnerabilities to the Known Exploited Vulnerabilities Catalog, spanning Mozilla, Microsoft, the Linux Kernel, and Oracle E‑Business Suite (CVE‑2025‑61882). Under BOD 22‑01, federal agencies must remediate by due dates, and all organizations are urged to treat KEV entries as high‑priority patch items by inventorying affected assets, applying vendor updates or mitigations, and documenting remediation.

Critical flaws and the criminal ecosystem

The Redis project disclosed CVE‑2025‑49844, a critical use‑after‑free vulnerability in the embedded Lua interpreter that enables authenticated attackers to escape the Lua sandbox and achieve remote code execution via crafted scripts. Fixed builds are available across supported versions and distributions, and administrators are urged to update—especially Internet‑facing servers. Mitigations include enforcing authentication, disabling Lua and unnecessary commands, running Redis under a non‑root account, tightening network access, and enabling logging and active monitoring. Given the high prevalence of exposed instances and automated botnet interest, rapid remediation and threat hunting are warranted.

A critical Unity Runtime issue (CVE‑2025‑59489) allows unsafe file loading and local file inclusion via a specific command‑line argument, enabling arbitrary code execution at a game’s privilege level. Demonstrated paths span Android (via Intents) and desktop platforms through library search path manipulation. Unity has published fixes for supported branches, Valve updated Steam to block risky URI launches, and Microsoft advised uninstalling vulnerable titles until patched. Remediation requires rebuilding with a patched runtime or replacing the runtime binary, and Unity notes no observed active exploitation as of its bulletin.

Trellix reports that new XWorm variants (6.0, 6.4, 6.5) have resurfaced in phishing and commodity malware campaigns, featuring a modular architecture with 35+ plugins for data theft, remote control, command execution, and a ransomware component. Delivery techniques include malicious JavaScript invoking PowerShell, .LNK phishing, disguised executables, AI‑themed lures, a modified ScreenConnect installer, and a multi‑stage loader in Excel add‑ins. Analysts recommend layered defenses—EDR for plugin behaviors, stronger email/web filtering, and network monitoring for command‑and‑control and exfiltration.

Extortion activity also escalated around a reported breach at Red Hat, with a group claiming to have exfiltrated a large trove of Customer Engagement Reports from a GitLab instance and aligning with a newly launched ShinyHunters leak site to increase pressure. Sample documents naming major organizations were posted alongside an October 10 disclosure deadline. If confirmed, the claims raise regulatory and contractual risks for affected customers; recommended actions include incident response and forensics, securing and auditing the impacted GitLab, rotating credentials and keys, and coordinating notifications where required.

These and other news items from the day:

Mon, October 6, 2025

Azure AI Foundry Brings Multimodal OpenAI Models at Scale

🚀 Azure AI Foundry now integrates new OpenAI models—GPT-image-1-mini, GPT-realtime-mini, and GPT-audio-mini—alongside safety upgrades to GPT-5. The rollout, with most customers able to get started on October 7, 2025, targets efficient, low-latency multimodal workloads for developers and enterprises. Microsoft also highlighted the open-source Microsoft Agent Framework, multi-agent workflows, unified observability, Voice Live API GA, and Responsible AI enhancements to accelerate production-grade agentic solutions.

read more →

Mon, October 6, 2025

Oracle issues emergency patch for EBS zero-day RCE

🔴 Oracle has released an emergency patch addressing a critical zero-day remote code execution flaw, CVE-2025-61882, in the E-Business Suite BI Publisher Integration component. The vulnerability (affecting versions 12.2.3–12.2.14) is rated 9.8 on the CVSS scale and is exploitable remotely without authentication. Cl0p actors are linked to active exploitation and high-value extortion demands; Oracle published IoCs and strongly urges immediate patching and aggressive compromise hunting.

read more →

Mon, October 6, 2025

AWS launches compute-optimized EC2 C8i and C8i-flex

🚀 AWS announced general availability of C8i and C8i-flex compute-optimized EC2 instances powered by custom Intel Xeon 6 processors exclusive to AWS. The new families deliver up to 15% better price-performance and 2.5x more memory bandwidth versus prior Intel-based instances, and up to 20% higher CPU performance compared with C7i. AWS cites up to 60% faster performance for NGINX, ~40% for deep-learning recommendation models, and ~35% for Memcached. C8i-flex covers common sizes (large–16xlarge) for cost-efficient use; C8i provides 13 sizes including two bare-metal options and a new 96xlarge. Instances are initially available in N. Virginia, Ohio, Oregon, and Spain and can be purchased via Savings Plans, On-Demand, or Spot.

read more →

Mon, October 6, 2025

Redis warns of critical Lua RCE flaw in many instances

🔒 The Redis security team has released patches for CVE-2025-49844, a maximum-severity use-after-free in the bundled Lua interpreter that can enable remote code execution when an attacker supplies a specially crafted Lua script. Wiz researchers, who disclosed the issue at Pwn2Own Berlin and dubbed it RediShell, found approximately 330,000 Redis instances exposed online and at least 60,000 requiring no authentication. Administrators should apply the published fixes (for example, 7.22.2-12 and later; OSS/CE/Stack variants also updated) immediately and implement mitigations such as enabling authentication, disabling Lua scripting where possible, running Redis as a non-root user, and restricting network access.

read more →

Mon, October 6, 2025

Vertex AI Model Garden Adds Self-Deploy Proprietary Models

🔐 Google Cloud’s Vertex AI now supports secure self-deployment of proprietary third-party models directly into customer VPCs via the Model Garden. Customers can discover, license, and deploy closed-source and restricted-license models from partners such as AI21 Labs, Mistral AI, Qodo and others, with one-click provisioning and managed inference. Deployments adhere to VPC-SC controls, selectable regions, autoscaling, and pay-as-you-go billing. This central catalog brings Google, open, and partner models together for enterprise-grade control and compliance.

read more →

Mon, October 6, 2025

Amazon EC2 C8i and C8i-flex Instances Generally Available

🚀 AWS has announced the general availability of new Amazon EC2 C8i and C8i-flex compute-optimized instances powered by custom Intel Xeon 6 processors available only on AWS. AWS cites up to 15% better price-performance and 2.5x more memory bandwidth versus prior Intel-based instances, and up to 20% higher performance compared with C7i families, with specific gains as high as 60% for NGINX, 40% for deep learning recommendation models, and 35% for Memcached. C8i-flex targets common sizes from large to 16xlarge for workloads that don’t fully use all vCPUs, while C8i offers 13 sizes including two bare-metal options and a new 96xlarge for the largest scale. These instances are available in US East (N. Virginia), US East (Ohio), US West (Oregon), and Europe (Spain) and can be purchased via Savings Plans, On-Demand, or Spot.

read more →

Mon, October 6, 2025

OpenAI Tests ChatGPT-Powered Agent Builder Tool Preview

🧭 OpenAI is testing a visual Agent Builder that lets users assemble ChatGPT-powered agents by dropping and connecting node blocks in a flowchart. Templates like Customer service, Data enrichment, and Document comparison provide editable starting points, while users can also create flows from scratch. Agents are configurable with model choice, custom prompts, reasoning effort, and output format (text or JSON), and they can call tools and external services. Reported screenshots show support for MPC connectors such as Gmail, Calendar, Drive, Outlook, SharePoint, Teams, and Dropbox; OpenAI plans to share more details at DevDay.

read more →

Mon, October 6, 2025

Google advances AI security with CodeMender and SAIF 2.0

🔒 Google announced three major AI security initiatives: CodeMender, a dedicated AI Vulnerability Reward Program (AI VRP), and the updated Secure AI Framework 2.0. CodeMender is an AI-powered agent built on Gemini that performs root-cause analysis, generates self-validated patches, and routes fixes to automated critique agents to accelerate time-to-patch across open-source projects. The AI VRP consolidates abuse and security reward tables and clarifies reporting channels, while SAIF 2.0 extends guidance and introduces an agent risk map and security controls for autonomous agents.

read more →

Mon, October 6, 2025

ML-Based DLL Hijacking Detection Integrated into SIEM

🛡️ Kaspersky developed a machine-learning model to detect DLL hijacking, a technique where attackers replace or sideload dynamic-link libraries so legitimate processes execute malicious code. The model inspects metadata such as file paths, renaming, size, structure and digital signatures, trained on internal analysis and anonymized KSN telemetry. Implemented in the Kaspersky Unified Monitoring and Analysis Platform, it flags suspicious loads and cross-checks cloud reputation to reduce false positives and support retrospective hunting.

read more →

Mon, October 6, 2025

Mass Exploitation of Oracle E-Business Suite Zero-Day

🔒 CrowdStrike is tracking a mass exploitation campaign abusing a novel zero-day, CVE-2025-61882, against Oracle E-Business Suite (EBS) that enables unauthenticated remote code execution and data exfiltration. First observed on 2025-08-09, activity accelerated after a proof-of-concept surfaced on 2025-10-03 and Oracle released an advisory with IOCs on 2025-10-04. CrowdStrike assesses likely involvement by the actor tracked as GRACEFUL SPIDER (moderate confidence) while acknowledging multiple actors may be exploiting internet-exposed EBS instances; detection and mitigation guidance and Falcon tooling are provided to help defenders.

read more →

Mon, October 6, 2025

Oracle issues emergency patch for CVE-2025-61882 exploit

🔒 Oracle has released an emergency update to address CVE-2025-61882, a critical (CVSS 9.8) vulnerability in the E-Business Suite Concurrent Processing component that can be exploited over HTTP without authentication. Oracle warned the flaw may allow remote code execution and issued additional fixes after discovering further potential exploitation vectors. Indicators shared with the advisory point to activity linked to Cl0p and a group associated with Scattered LAPSUS$ Hunters; organizations are urged to apply the patch and hunt for signs of compromise.

read more →

Mon, October 6, 2025

Active Exploitation of GoAnywhere CVE-2025-10035 Observed

🔒 Microsoft Threat Intelligence warns of active exploitation of a critical deserialization vulnerability in GoAnywhere MFT License Servlet (CVE-2025-10035, CVSS 10.0) that can allow forged license responses to trigger arbitrary object deserialization and potential remote code execution. Activity attributed to Storm-1175 included initial access via this flaw, deployment of RMM tools (SimpleHelp, MeshAgent), and at least one Medusa ransomware incident. Customers should upgrade per Fortra guidance, run EDR in block mode, restrict outbound connections, and use the provided Defender detections and IoCs for hunting and response.

read more →

Mon, October 6, 2025

Oracle patches critical EBS zero-day used by Clop gang

⚠️ Oracle has released an emergency update addressing CVE-2025-61882, a critical unauthenticated remote code execution flaw in Oracle E-Business Suite (Concurrent Processing / BI Publisher Integration). The vulnerability affects versions 12.2.3–12.2.14 and carries a CVSS base score of 9.8. Customers must first install the October 2023 Critical Patch Update before applying the new fix. Intelligence firms say the Clop extortion gang actively used the bug in August 2025 to steal data.

read more →

Mon, October 6, 2025

Critical GoAnywhere MFT Flaw Exploited in Medusa Attacks

⚠️ Microsoft warns that a critical deserialization vulnerability in GoAnywhere MFT (CVE-2025-10035) has been actively exploited by a Medusa ransomware affiliate tracked as Storm-1175 since early September. The License Servlet flaw enables remote compromise without user interaction, allowing attackers to gain initial access and persist via abused RMM tools. Administrators should apply Fortra's patches and inspect logs for SignedObject.getObject stack traces.

read more →

Mon, October 6, 2025

Cl0p Exploits Critical Oracle E-Business Suite Flaw

🔒 Oracle released an emergency patch to address a critical unauthenticated vulnerability in E-Business Suite (CVE-2025-61882) with a CVSS score of 9.8. The flaw allows remote code execution against the Oracle concurrent processing component over HTTP and has been actively exploited by the Cl0p group in large-scale data theft. Security firms report mass email-based distribution from hundreds of compromised accounts and recommend immediate patching and forensic checks for listed IoCs and suspicious GET/POST activity.

read more →

Mon, October 6, 2025

Trinity of Chaos Launches TOR Data Leak Site, Exposes Data

🔓 The Trinity of Chaos collective has opened a data leak site on the TOR network, publishing previously undisclosed records tied to past breaches and listing 39 major global firms. Resecurity says the group claims more than 1.5 billion records across 760 companies and has set an October 10 negotiation deadline. Samples reportedly contain substantial PII and appear to stem from compromised SaaS environments via stolen OAuth tokens and vishing; the FBI has issued a flash alert. The group also threatened to leverage existing litigation and regulatory complaints against Salesforce, which has denied new vulnerabilities.

read more →

Mon, October 6, 2025

CISA Adds Seven CVEs to Known Exploited Vulnerabilities

🔒 CISA has added seven vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog after observing evidence of active exploitation. The newly listed entries include CVE-2010-3765, CVE-2010-3962, CVE-2011-3402, CVE-2013-3918, CVE-2021-22555, CVE-2021-43226, and CVE-2025-61882, impacting Mozilla, Microsoft, the Linux Kernel, and Oracle E-Business Suite. Federal Civilian Executive Branch agencies must remediate these vulnerabilities under BOD 22-01, and CISA strongly urges all organizations to prioritize timely remediation as part of routine vulnerability management.

read more →

Mon, October 6, 2025

XWorm Backdoor Returns with Ransomware and 35+ Plugins

🛡️ New variants of the XWorm backdoor (6.0, 6.4, 6.5) are being distributed via phishing campaigns after the original author, XCoder, abandoned the project. Multiple operators have adopted these builds, which now support more than 35 plugins enabling data theft, remote control, and a ransomware module that encrypts user files and drops HTML ransom notes. Trellix observed diverse droppers and recommends layered defenses including EDR, email/web protections, and network monitoring.

read more →

Mon, October 6, 2025

ShinyHunters Joins Extortion Effort After Red Hat Breach

🔐 Red Hat is facing renewed extortion after a breach of its GitLab instance used by Red Hat Consulting was claimed to have exposed nearly 570GB of compressed data across thousands of repositories, including about 800 Customer Engagement Reports (CERs). The Crimson Collective initially claimed the theft and says it received no ransom response. The group announced a collaboration with Scattered Lapsus$ Hunters and has used the newly launched ShinyHunters leak site to press extortion demands, publishing CER samples and setting an October 10 deadline. Red Hat did not respond to inquiries.

read more →

Mon, October 6, 2025

Steam, Microsoft Warn of Unity Flaw Exposing Gamers

⚠️ A code execution vulnerability in Unity's Runtime (CVE-2025-59489) can allow unsafe file loading and local file inclusion, enabling code execution on Android and privilege escalation on Windows. Valve/Steam issued a Client update to block launching custom URI schemes and urges publishers to rebuild with a safe Unity version or replace the UnityPlayer.dll. Microsoft published guidance recommending users uninstall vulnerable games until patched, and Unity advises developers to update the Editor, recompile, and redeploy.

read more →

Mon, October 6, 2025

Zimbra XSS Zero-Day Used to Target Brazilian Military

⚠️A stored cross-site scripting vulnerability in the Zimbra Classic Web Client (CVE-2025-27915) was exploited in targeted attacks and has since been patched. The flaw allowed embedded JavaScript in ICS calendar entries to execute via an ontoggle event, enabling attackers to create mail filters, redirect messages, and exfiltrate mailbox data. Zimbra released fixes on January 27, 2025; administrators should apply updates and audit mailbox filters and logs for indicators of compromise.

read more →

Mon, October 6, 2025

ChatGPT Pulse Heading to Web; Pro-only for Now, Plus TBD

🤖 ChatGPT Pulse is being prepared for the web after a mobile rollout that began on September 25, but OpenAI currently restricts the feature to its $200 Pro subscription. Pulse provides personalized daily updates presented as visual cards, drawing on your chats, feedback and connected apps such as calendars. OpenAI says it will learn from early usage before expanding availability and has given no firm timeline for Plus or free-tier rollout.

read more →

Mon, October 6, 2025

Weekly Cyber Recap: Oracle 0-Day, BitLocker Bypass

🛡️Threat actors tied to Cl0p exploited a critical Oracle E-Business Suite zero-day (CVE-2025-61882, CVSS 9.8) to steal large volumes of data, with multiple flaws abused across patched and unpatched systems. The week also spotlights a new espionage actor, Phantom Taurus, plus diverse campaigns from WordPress-based loaders to self-spreading WhatsApp malware. Prioritize patching, strengthen pre-boot authentication for BitLocker, and increase monitoring for the indicators associated with these campaigns.

read more →

Mon, October 6, 2025

Discord Support Data Stolen in Third-Party Breach Incident

🔒Discord has confirmed that attackers accessed data belonging to users who contacted its customer support after a breach at a third-party provider, reportedly Zendesk. Exposed information includes names, Discord usernames, emails, IP addresses, messages with support agents, limited billing details (payment type and last four card digits), and a small number of government ID images. Discord says full card numbers, CCV codes and account passwords were not accessed, and is contacting affected users while warning of potential phishing attempts.

read more →

Mon, October 6, 2025

Gemini Trifecta: Prompt Injection Exposes New Attack Surface

🔒 Researchers at Tenable disclosed three distinct vulnerabilities in Gemini's Cloud Assist, Search personalization, and Browsing Tool. The flaws let attackers inject prompts via logs (for example by manipulating the HTTP User-Agent), poison search context through scripted history entries, and exfiltrate data by causing the Browser Tool to send sensitive content to an attacker-controlled server. Google has patched the issues, but Tenable and others warn this highlights the risks of granting agents too much autonomy without runtime guardrails.

read more →

Mon, October 6, 2025

Chinese Cybercrime Group Runs Global SEO Fraud Ring

🔍 UAT-8099, a Chinese-speaking cybercrime group, has been linked to a global SEO fraud operation that targets Microsoft IIS servers to manipulate search rankings and harvest high-value data. The actor gains access via vulnerable or misconfigured file upload features, deploys web shells and privilege escalation to enable RDP, then uses Cobalt Strike and a modified BadIIS module to serve malicious content when requests mimic Googlebot. Infections have been observed across India, Thailand, Vietnam, Canada, and Brazil, affecting universities, telecoms and technology firms and focusing on mobile users.

read more →

Mon, October 6, 2025

Asahi Confirms Ransomware Attack, Data Exfiltrated

🛡️ Asahi has confirmed a ransomware attack that resulted in an "unauthorized transfer of data" from its servers. The Tokyo-based brewer said it isolated affected systems and established an Emergency Response Headquarters to investigate, working with external cybersecurity experts. Operational impacts in Japan include suspended system-based ordering, shipments and call centers, with partial manual processing underway. The company has not disclosed whether a ransom demand was made.

read more →

Mon, October 6, 2025

Amazon EKS and EKS Distro Add Kubernetes 1.34 Support

🚀 AWS announced that Amazon EKS and EKS Distro now support Kubernetes version 1.34. Starting today, you can create new clusters or upgrade existing clusters via the EKS console, eksctl, or infrastructure-as-code tools, with EKS Distro images available in ECR Public Gallery and GitHub. Kubernetes 1.34 introduces projected service account tokens for kubelet image credential providers, Pod-level resource requests and limits for simpler multi-container resource management, and Dynamic Resource Allocation prioritized alternatives to improve device scheduling and workload placement. AWS recommends using EKS Cluster Insights and consulting EKS version lifecycle guidance before upgrading.

read more →

Mon, October 6, 2025

AWS Incident Detection and Response Now in GovCloud

🛡️ AWS Incident Detection and Response is now available in the AWS GovCloud (US-West) and GovCloud (US-East) Regions for eligible AWS Enterprise Support customers. The service provides proactive incident engagement and collaborative access to AWS expertise to detect issues earlier and reduce impact. Customers work with AWS to develop customized runbooks and response plans for each onboarded workload. The capability is intended to lower failure risk and accelerate recovery for critical workloads operating in GovCloud.

read more →

Mon, October 6, 2025

Renault Notifies Customers After Supplier Data Breach

🔒 Renault has informed customers that a cyber-attack on a third-party supplier led to the extraction of personal data from one of the supplier's systems. The vendor confirmed the breach affected names, gender, contact details, postal addresses and vehicle identification and registration numbers, though no financial information or passwords appear to have been taken. Renault says its own systems were not compromised and that the incident has been contained, and it has notified the relevant authorities. Affected customers are warned to expect targeted phishing using the stolen information.

read more →

Mon, October 6, 2025

Amazon Connect adds configurable service level calculations

📞 Amazon Connect now lets supervisors and managers customize how service level is calculated directly from the analytics dashboards. Administrators can define time thresholds that determine when a contact meets service level and choose which outcomes to include, such as counting callbacks, excluding contacts transferred out while waiting, or omitting short abandons via a configurable threshold. The feature is accessible in the metric configuration section and is available in all AWS regions where Amazon Connect is offered.

read more →

Mon, October 6, 2025

LinkedIn Sues ProAPIs Over Use of 1M Fake Accounts

⚖️ LinkedIn has filed suit against Delaware-based ProAPIs Inc. and its founder, Rehmat Alam, alleging the company created more than one million fake accounts to scrape member data using a product called iScraper API. The complaint, filed in California, accuses ProAPIs of violating LinkedIn’s terms of service and of using invalid credit cards to obtain premium access. LinkedIn seeks a permanent injunction, deletion of scraped data, and payment of damages and attorney fees.

read more →

Mon, October 6, 2025

Report Links BIETA Research Firm to China's MSS Operations

📰 Recorded Future assesses that the Beijing Institute of Electronics Technology and Application (BIETA) is likely directed by China's Ministry of State Security, citing links between at least four BIETA personnel and MSS officers and ties to the University of International Relations. Its subsidiary Beijing Sanxin Times Technology Co., Ltd. (CIII) develops steganography, covert-communications tools, and network-penetration and simulation software. The report warns these capabilities can support intelligence, counterintelligence, military, and other state-aligned cyber operations.

read more →

Mon, October 6, 2025

Ransomware and Phishing Threats Escalate for German SMEs

🔒 German SMEs face a sharp rise in ransomware and data-exfiltration incidents, with leak-site publications more than quadrupling from 2021 to 2024. Authorities report that 80% of analyzed ransomware incidents targeted small and medium-sized enterprises, often using double extortion. Attackers favor targeted phishing—executives receive on average 57 such attempts yearly—and many firms lack adequate defenses amid staffing shortages and overly complex security stacks.

read more →

Mon, October 6, 2025

Amazon Connect introduces case-linking and search APIs

🔗 Amazon Connect now exposes new APIs within Amazon Connect Cases that let developers link related cases, attach custom related items, and search across those relationships programmatically. Agents get consolidated context to resolve issues faster and coordinate responses. Typical uses include airlines grouping flight-related tickets and retailers attaching order or shipment records to refund cases. The capability is available in multiple AWS regions.

read more →

Mon, October 6, 2025

Simplifying Zero Trust Contractor Access with Secure Browser

🔒 A secure enterprise browser provides a practical, cost-efficient Zero Trust approach to managing contractor access, reducing reliance on complex VPNs and broad network privileges. By isolating sessions and enforcing granular policies per user and resource, organizations can grant contractors only the access required for their role. This reduces attack surface, simplifies administration, and lowers operational costs while supporting both short-term and long-term engagements.

read more →

Mon, October 6, 2025

Europol Urges Stronger EU Data Laws to Aid Investigations

🔐 At Europol’s 4th Annual Cybercrime Conference in The Hague, officials warned that criminals are exploiting encryption, anonymization and emerging technologies faster than law enforcement and regulators can adapt. Speakers including Europol executive director Catherine De Bolle and European commissioner Magnus Brunner urged stronger cooperation, updated laws and enhanced cross-border data-sharing to ensure lawful access to digital evidence while respecting privacy.

read more →

Mon, October 6, 2025

AI's Role in the 2026 U.S. Midterm Elections and Parties

🗳️ One year before the 2026 midterms, AI is emerging as a central political tool and a partisan fault line. The author argues Republicans are poised to exploit AI for personalized messaging, persuasion, and strategic advantage, citing the Trump administration's use of AI-generated memes and procurement to shape technology. Democrats remain largely reactive, raising legal and consumer-protection concerns while exploring participatory tools such as Decidim and Pol.Is. The essay frames AI as a manipulable political resource rather than an uncontrollable external threat.

read more →

Mon, October 6, 2025

Palo Alto Login Portal Scanning Spikes 500% Globally

🔍 Security researchers observed a roughly 500% surge in reconnaissance activity targeting Palo Alto Networks login portals on October 3, when GreyNoise recorded about 1,300 unique IP addresses probing its Palo Alto Networks Login Scanner tag versus typical daily volumes under 200. Approximately 91% of the IPs were US-based and 93% were classed as suspicious, with 7% confirmed malicious. GreyNoise also reported parallel scanning of other remote-access products including Cisco ASA, SonicWall, Ivanti and Pulse Secure, and noted shared TLS fingerprinting and regional clustering tied to infrastructure in the Netherlands. Analysts will continue monitoring for any subsequent vulnerability disclosures.

read more →

Mon, October 6, 2025

Inside Microsoft Threat Intelligence: Calm in Chaos

🔎 Microsoft’s Incident Response (IR) team emphasizes calm, clarity, and rapid action when customers encounter major breaches. Adrian Hill explains how IR establishes trust within the first 30 seconds and coordinates with other vendors and stakeholders to stabilize compromised environments. Field discoveries are fed back into Microsoft Threat Intelligence, enabling new detections and product protections. Follow-up recovery, containment, and strategic guidance turn response into lasting partnership.

read more →

Mon, October 6, 2025

Microsoft bug: Multiple Office apps break Copilot pane

🔧 Microsoft is investigating a bug that prevents the Copilot pane and other WebView2-dependent features from launching when multiple Office applications (Excel, Word, PowerPoint, OneNote, Publisher, Access) run concurrently. The issue occurs when one app initializes a WebView2 instance and a second app attempts to start another; closing the first app allows the pane to open normally. The Office team is working on a resolution and will provide updates when available.

read more →

Mon, October 6, 2025

Zeroday Cloud contest: $4.5M bounties for cloud tools

🔐 Zeroday Cloud is a new hacking competition focused on open-source cloud and AI tools, offering a $4.5 million bug bounty pool. Hosted by Wiz Research with Google Cloud, AWS, and Microsoft, it takes place December 10–11 at Black Hat Europe in London. The contest features six categories covering AI, Kubernetes, containers, web servers, databases, and DevOps, with bounties ranging from $10,000 to $300,000. Participants must deliver complete compromises and register via HackerOne.

read more →

Mon, October 6, 2025

Cost-Saving Strategies When Migrating to Google Cloud

💡 Google Cloud presents practical strategies to lower Compute Engine and block storage costs during migration and modernization. The article recommends adopting latest-generation VMs and specialized instance families, right-sizing or using custom machine types, and tuning storage with Hyperdisk and storage pools to align capacity and performance. It also emphasizes financial levers—committed use discounts, Spot VMs, autoscaling, and recommender-driven actions—to reduce spend while preserving performance.

read more →

Mon, October 6, 2025

AI in Today's Cybersecurity: Detection, Hunting, Response

🤖 Artificial intelligence is reshaping how organizations detect, investigate, and respond to cyber threats. The article explains how AI reduces alert noise, prioritizes vulnerabilities, and supports behavioral analysis, UEBA, and NLP-driven phishing detection. It highlights Wazuh's integrations with models such as Claude 3.5, Llama 3, and ChatGPT to provide conversational insights, automated hunting, and contextual remediation guidance.

read more →

Mon, October 6, 2025

Five Critical Questions for Selecting AI-SPM Solutions

🔒 As enterprises accelerate AI and cloud adoption, selecting the right AI Security Posture Management (AI-SPM) solution is critical. The article presents five core questions to guide procurement: does the product deliver centralized visibility into models, datasets, and infrastructure; can it detect and remediate AI-specific risks like adversarial attacks, data leakage, and bias; and does it map to regulatory standards such as GDPR and NIST AI? It also stresses cloud-native scalability and seamless integration with DSPM, DLP, identity platforms, DevOps toolchains, and AI services to ensure proactive policy enforcement and audit readiness.

read more →

Mon, October 6, 2025

Beware of threats lurking in booby-trapped PDF files

📄 PDF files are a ubiquitous, convenient format that cybercriminals increasingly abuse as lures, with ESET telemetry placing PDFs among the top malicious attachment types. Attack techniques include embedded scripts, hidden links, malformed objects that exploit reader vulnerabilities, and files that merely masquerade as .pdf while actually being executables or archives. Verify sender context, enable Protected View or sandboxing, consider disabling JavaScript in your PDF reader, and scan or sandbox suspicious attachments before opening; when in doubt, confirm via a separate channel.

read more →

Mon, October 6, 2025

CISOs Rethink Security Organization for the AI Era

🔒 CISOs are re-evaluating organizational roles, processes, and partnerships as AI accelerates both attacks and defenses. Leaders say AI is elevating the CISO into strategic C-suite conversations and reshaping collaboration with IT, while security teams use AI to triage alerts, automate repetitive tasks, and focus on higher-value work. Experts stress that AI magnifies existing weaknesses, so fundamentals like IAM, network segmentation, and patching remain critical, and recommend piloting AI in narrow use cases to augment human judgment rather than replace it.

read more →

Mon, October 6, 2025

Ten Essential Physical Security Measures for CISOs

🔒 Chief information security officers (CISOs) play a strategic role in physical security when systems such as badges, keycards and video surveillance are tied to IT and grant access to critical assets. This article outlines ten essential measures—from hardening data centers and mapping physical–cyber connections to securing IoT and surveillance systems—that CISOs should coordinate with facilities, legal and physical security teams. Implementing these controls reduces risk and supports incident response and compliance.

read more →