Cloud platforms delivered new building blocks for agentic AI while security teams grappled with urgent mitigations for legacy browser features and enterprise apps. Several high-impact attacks and breaches underscored active botnet activity and targeted data theft, keeping defensive posture and rapid patching in focus across sectors.
Agentic AI, Observability, and Low-Latency Retrieval
AgentCore reached general availability with a managed runtime for building and operating agents at scale, adding VPC deployment options, initial agent-to-agent protocol support, a gateway that turns APIs and Lambda functions into agent-friendly tools, identity-aware authorization with secure token vaulting, and end-to-end observability. In parallel, CloudWatch introduced Generative AI Observability to trace prompts, tools, memory, and identity interactions across AgentCore and popular orchestration frameworks, integrating with alarms and log analytics for operational and security workflows. Together, these releases give teams a path to standardize agent governance, telemetry, and access controls as automation moves to production.
ElastiCache added vector search with Valkey 8.2, enabling indexing and querying of high‑dimensional embeddings for semantic caching, RAG, recommendations, anomaly detection, and hybrid search. Delivered as a managed in‑memory service available in all Regions at no additional charge, the feature aims to reduce deployment complexity for low‑latency retrieval while leaving teams to harden access controls, encryption, and monitoring for embeddings and endpoints.
LLM‑Evalkit debuted as an open-source framework on Vertex AI SDKs that centralizes prompt engineering, versioning, datasets, and metric-driven evaluation. By moving teams from ad-hoc iteration to reproducible benchmarking with a shared system of record, the tool targets faster experimentation, clearer evidence of improvements, and easier collaboration across technical and non‑technical contributors.
Advisories and Emergency Mitigations
BleepingComputer reports that Microsoft restricted access to Internet Explorer mode in Edge after attackers abused social engineering to trigger IE mode and then exploited an unpatched Chakra engine zero‑day, chaining a second bug to escape the browser. Edge removed one‑click activation paths, requiring explicit allowlists via Settings to make IE mode an intentional, auditable action. Administrators are advised to audit and tighten site lists, consider disabling IE mode where feasible, and educate users while awaiting vendor patches.
BleepingComputer also covered an out‑of‑band Oracle update for CVE‑2025‑61884, an unauthenticated information disclosure in E‑Business Suite 12.2.3–12.2.14. The vendor urged rapid patching, especially for internet‑facing instances, amid ongoing attention to EBS flaws and recent exploitation of CVE‑2025‑61882 by extortion actors. Why it matters: internet‑exposed ERP surfaces remain attractive targets, and timely updates reduce the window for data theft and follow‑on abuse.
CSOonline details a zero‑day in Gladinet CentreStack/Triofox (CVE‑2025‑11371) that enables unauthenticated local file inclusion to recover machineKey values and revive a previously patched ViewState deserialization RCE path (CVE‑2025‑30406). With no vendor patch available and versions up to 16.7.10368.56560 affected, Huntress recommends disabling the UploadDownloadProxy temp handler as a temporary mitigation and monitoring for suspicious web payloads.
Attacks and Breaches
CSOonline describes a near‑29.6 Tbps DDoS spike attributed to the Aisuru IoT botnet that overwhelmed gaming platforms and strained major US ISPs. Telemetry points to compromised consumer routers, cameras, and DVRs on residential networks, with reports that a game‑protection provider saw over 15 Tbps and lost an upstream relationship during the peak. The campaign reflects persistent gaps in IoT security and the dual‑use evolution of botnets as both DDoS engines and residential proxies.
BleepingComputer reports that Harvard is investigating an alleged breach after the Clop gang claimed data theft via an Oracle E‑Business Suite zero‑day (CVE‑2025‑61882). The university says the impact appears limited to a small administrative unit and that emergency patches were applied upon receipt. The incident aligns with a broader extortion campaign targeting vulnerable EBS deployments.
BleepingComputer also covers SimonMed Imaging’s notification to more than 1.2 million patients after ransomware actors accessed its network in January, with the Medusa group posting an extortion claim and samples. SimonMed cites password resets, enforced MFA, EDR deployment, vendor access removal, and traffic restrictions among remediation steps while providing identity monitoring to affected individuals.
Lifecycle and Security Posture Shifts
Google Cloud outlined a move to cryptographic erasure as the default media sanitization method starting in November, retiring overwrite‑based approaches in favor of key destruction aligned with NIST SP 800‑88 guidance. The change is positioned as faster, scalable across modern storage, and verifiable, with environmental benefits from reduced physical destruction and increased hardware reuse.
Infosecurity reports Apple raised its top Security Bounty payouts to $2 million, with targeted bonuses pushing rewards beyond $5 million for exploit chains akin to mercenary spyware. Adjustments include bonuses for Lockdown Mode bypasses and beta‑software bugs, plus higher awards for categories such as Gatekeeper and iCloud access, aiming to incentivize rigorous defensive research.