Quantum‑resistant encryption and automated code repair took center stage as cloud and AI platforms introduced new defenses, while urgent patch cycles continued for enterprise software under active attack. Google added preview post‑quantum key exchange to Cloud KMS, and administrators moved quickly to address a 10.0‑severity flaw in Redis detailed by CSOonline. Meanwhile, extortion crews escalated pressure campaigns and high‑impact thefts, underscoring the need to pair new controls with disciplined patching and incident response.
Platform crypto and AI defenses advance
Google is pushing quantum‑safety into mainstream workflows, introducing preview support for post‑quantum Key Encapsulation Mechanisms in Cloud KMS. According to Cloud KMS, options include ML‑KEM‑768/1024 (NIST FIPS 203) and a hybrid X‑Wing mode combining X25519 with ML‑KEM‑768 to mitigate "harvest now, decrypt later" risks. Google highlights the larger key and ciphertext sizes and recommends high‑level standards such as HPKE and vetted libraries like Tink for integration, with implementations surfacing via Cloud KMS APIs and open‑source crypto libraries. The company frames hybrid deployments as a pragmatic hedge while post‑quantum algorithms mature and notes plans to upgrade its own infrastructure.
In secure development, DeepMind introduced CodeMender, an agentic system that detects and patches vulnerable code while also rewriting patterns to eliminate classes of bugs. As reported by The Hacker News, the tool couples Google’s Gemini Deep Think models with static/dynamic analysis, fuzzing, and an LLM‑based critique to reduce regressions, and has upstreamed dozens of fixes to open‑source projects. DeepMind describes a cautious rollout with human review and engagement with maintainers to validate quality—an approach meant to accelerate remediation without sacrificing trust.
To broaden external scrutiny of AI risks, Google launched a dedicated AI Vulnerability Reward Program with tiered payouts for high‑impact findings in flagship services like Search, Gemini apps and Workspace. Per BleepingComputer, top categories include rogue actions and sensitive data exfiltration, with novelty multipliers that can lift awards to $30,000. The program formalizes AI‑specific scope and reward bands to drive responsible disclosure around model‑targeted threats, complementing Google’s existing VRP.
Emergency patches and active exploits
A long‑standing use‑after‑free in Redis’ Lua integration (CVE‑2025‑49844, “RediShell”) carries a 10.0 CVSS and enables sandbox escape to host‑level code execution. CSOonline reports patches for supported branches and warns that while exploitation requires authentication, widespread unauthenticated deployments—especially in containers—leave roughly 60,000 internet‑exposed instances trivially exploitable. Organizations should patch immediately, enforce authentication, restrict exposure, and monitor for indicators of compromise. Separately, the UK’s NCSC urged Oracle E‑Business Suite customers to apply an emergency update for CVE‑2025‑61882, a pre‑auth RCE that researchers say has been exploited since August; Infosecurity details prerequisites, mitigation steps, and guidance to hunt for compromise.
Active exploitation also targets Fortra’s GoAnywhere MFT. According to The Hacker News, Microsoft linked attacks abusing CVE‑2025‑10035 (a CVSS 10.0 deserialization flaw) to the Storm‑1175 group, with observed use of RMM tools, web shells, Cloudflare tunnels, and Rclone, culminating in Medusa ransomware in some environments; fixes are available in GoAnywhere 7.8.4 and Sustain Release 7.6.3. Beyond enterprise apps, a Unity engine issue (CVE‑2025‑59489) allows crafted startup parameters to load arbitrary native libraries in games across Android, Linux, macOS and Windows. Kaspersky notes Valve has added launch‑parameter blocks in Steam, Microsoft says Xbox builds are unaffected, and Unity provides runtime updates and an application patcher; developers should rebuild with the patched runtime and republish.
Extortion and data theft campaigns escalate
Crypto theft tied to North Korea hit a new annual high. BleepingComputer cites Elliptic’s estimate of roughly $2 billion in cryptocurrency stolen in 2025, led by the Bybit breach and dozens of other heists. Analysts describe a tactical shift toward social engineering against high‑value holders and exchange staff, plus increasingly layered laundering across mixers and chains. The report underscores that despite obfuscation, blockchain transparency continues to aid tracing, and that proceeds carry geopolitical implications.
Corporate extortion also intensified. KrebsOnSecurity details a ShinyHunters campaign threatening to leak data from dozens of firms via a clearnet site after earlier voice‑phishing led to malicious app connections to Salesforce tenants. Elsewhere, electronics distributor Avnet confirmed unauthorized access to externally hosted cloud storage supporting an internal EMEA sales tool; the company says most stolen files are not easily readable without proprietary tooling, while samples reviewed by reporters appeared to include plaintext PII, per BleepingComputer. In the public sector, the Qilin group claimed a ransomware attack on Mecklenburg County Public Schools and posted samples as pressure, with 305 GB allegedly exfiltrated; the district is investigating and does not intend to pay at this time, according to Infosecurity. These cases reflect the continued blend of credential theft, third‑party exposure, and data‑leak coercion; rigorous access controls, token rotation and forensic review remain essential after suspected compromise.
Cloud platform updates
AWS expanded regional coverage for its managed document database. AWS announced Amazon DocumentDB (with MongoDB compatibility) is now available in Asia Pacific (Osaka, Thailand, Malaysia) and Mexico (Central), extending data locality options. The service supports high‑throughput JSON workloads with up to 15 read replicas and a serverless mode for variable demand; customers should validate compatibility and plan replication and backup strategies as they onboard in new regions.