Agentic AI moved further into enterprise workflows as Google Cloud introduced Gemini Enterprise and AWS brought Amazon Quick Suite to general availability. AWS also expanded high‑throughput compute options in Latin America. Alongside platform launches, defenders confronted active exploitation and breach disclosures that emphasize patching urgency, credential hygiene, and governance around automation.
Agentic platforms and ecosystems take shape
Gemini Enterprise arrives as a unified, enterprise‑grade platform designed to bring multimodal models and agentic workflows into daily operations. The release packages model intelligence, a no‑/low‑code workbench, prebuilt and extensible agents, secure connectors into major business systems, and centralized governance to visualize, secure, and audit agent behavior. It highlights features such as automated video generation, real‑time voice translation, a Data Science Agent (preview), and next‑generation conversational agents for customer engagement. The company frames these capabilities as a response to siloed first‑wave AI deployments by emphasizing extensibility, auditability, and integration into existing enterprise systems.
Partner momentum is central to the strategy. In a companion update, Google Cloud detailed a growing agent ecosystem enabled by the Agent2Agent (A2A) protocol for secure inter‑agent coordination and an AI agent finder that supports discovery via natural‑language search and validation status. A new Google Cloud Ready – Gemini Enterprise designation signals agents that meet performance and quality criteria, with availability through Marketplace or direct purchase. Systems integrators and consulting firms are expanding services and centers of excellence to help customers adopt agentic AI securely at scale.
Skills and enablement accompany the platform push. Google Cloud introduced Google Skills, consolidating nearly 3,000 courses and labs from across Google, adding verifiable badges for code assist, MCP server work, and agent development, and launching the Gemini Enterprise Agent Ready (GEAR) program to accelerate agentic adoption. Gamified features, organizational tools, and an employer-linked pathway with Jack Henry aim to make AI skill building measurable and more directly tied to hiring outcomes.
AWS rolls out agents and regional compute
Amazon Quick Suite is positioned as an agentic AI workspace that can search enterprise and public sources and then act on results across common systems, from creating Salesforce opportunities to opening tickets in operational tools. The service emphasizes privacy and administrator control, with an initial rollout across four regions and a 30‑day trial for new customers. For network‑bound workloads, AWS made EC2 C6in instances available in the Mexico (Central) Region, offering up to 200 Gbps networking, up to 100 Gbps EBS bandwidth, EFA support on larger sizes, and positioning for virtual appliances, 5G UPF, analytics, HPC, and CPU‑based AI/ML. Local availability can reduce latency and support data residency for organizations operating in Mexico.
Storage‑optimized capacity also broadened in Europe as AWS introduced EC2 I7i in the Spain region. Powered by 5th‑generation Intel Xeon processors and 3rd‑generation Nitro SSDs, I7i targets I/O‑intensive, latency‑sensitive workloads with up to 45 TB NVMe storage, up to 100 Gbps networking, and storage improvements versus I4i including lower I/O latency and variability and torn‑write prevention up to 16 KB block sizes.
Zero‑day extortion and WordPress takeovers
Google Threat Intelligence and Mandiant reported a widespread extortion operation exploiting Oracle E‑Business Suite via multiple chains culminating in unauthenticated remote code execution, with activity observed as early as July and emergency patches released on Oct. 4 for CVE‑2025‑61882. Their analysis describes exploitation paths through UiServlet and SyncServlet, XSL template abuse in XDO tables, and post‑exploitation tooling including GOLDVEIN and SAGE Java families. Recommended steps include immediate patching, targeted database hunts for malicious templates/LOBs, restricting outbound internet access from EBS servers, analyzing Java process memory, and monitoring for indicative servlet and preview requests. The operation illustrates how fast zero‑day exploitation can translate into data theft and extortion at scale. Full details are in Google TI.
Separately, site owners using the Service Finder WordPress theme face active exploitation of a critical authentication bypass in its bundled Bookings plugin, tracked as CVE‑2025‑5947 (CVSS 9.8). Wordfence reports attempts beginning August 1, 2025, with the flaw patched in version 6.1 on July 17, 2025. Successful exploitation allows unauthenticated account takeover, including administrators, enabling code injection, web shells, and malicious redirects. Administrators should verify they are on Service Finder 6.1+, audit logs and file integrity, remove unauthorized admin accounts, rotate credentials, and review outbound connections and scheduled tasks for persistence artifacts, per The Hacker News.
Intrusions, data theft, and tool abuse
Cisco Talos detailed how ransomware operators leveraged an outdated build of the legitimate DFIR tool Velociraptor (v0.73.4.0) vulnerable to CVE‑2025‑6264 to gain elevated execution, persist, and deploy encryptors across Windows and ESXi environments. The activity, attributed with moderate confidence to Storm‑2603, included creating local admin accounts synced to Entra ID, vSphere console access, Impacket‑style lateral movement, Microsoft Defender tampering via GPO, and a fileless PowerShell encryptor. Talos shared IOCs and advises updating or removing exposed Velociraptor agents, hardening EDR and Defender configurations, remediating unauthorized GPO and account changes, restricting admin sync to Entra ID, and monitoring identified C2 infrastructure. Read the campaign analysis from Talos.
SonicWall confirmed that an unauthorized actor obtained firewall configuration backup files for all customers who used its cloud backup service, with the files containing encrypted credentials and configuration data. The vendor, working with Mandiant, published device‑level impact lists and triage priorities in its portal and advised teams to disable or restrict WAN‑facing services first, then rotate credentials and review configurations for exposure at the time of backup. The company reports additional infrastructure hardening and will provide guidance for customers who used cloud backup but do not see serials in the portal, according to Infosecurity. In a separate case, a threat actor claims to have exfiltrated 1.6 TB of support data from a third‑party service integrated with Discord; the company disputes the scale and emphasizes this was not a breach of Discord itself. Extortion demands reportedly failed, and the scope remains contested; BleepingComputer reviewed samples but could not verify the full extent.
Targeted fraud also continued against higher‑education HR functions. Microsoft Threat Intelligence tracks “payroll pirate” attacks by Storm‑2657 using tailored phishing with adversary‑in‑the‑middle links to intercept MFA and hijack Workday accounts, then modifying payroll settings and enrolling attacker‑controlled MFA devices for persistence. Microsoft observed compromised accounts at multiple universities used to launch further phishing, with inbox rules hiding notifications and SSO abused for financial redirection. Guidance emphasizes phishing‑resistant MFA, monitoring for mailbox rule changes, and rapid incident response, per BleepingComputer.
Meanwhile, ransomware operators are testing coordination mechanisms. Reporting indicates LockBit, DragonForce, and Qilin announced a coalition to align resources and influence market conditions amid law‑enforcement pressure, with LockBit signaling a willingness to target previously off‑limits critical infrastructure until an agreement is reached. Analysts have not yet observed shared infrastructure or joint leak sites; mitigations highlighted include tighter remote access controls and network segmentation consistent with the Purdue Model, according to CSO.