Cloud providers leaned into visibility and resilience today. AWS centralized EC2 capacity management across accounts and Regions, while Cloudflare introduced multi‑service health checks to stabilize routing and failover. Advisory updates and fresh research rounded out the day, with patches for web servers and VPNs alongside reports of exposure and evolving attacker tradecraft.
Cloud capacity and data tooling evolve
AWS is enabling EC2 Capacity Manager by default to give platform teams a single place to monitor, analyze, and act on On‑Demand, Spot, and Reservation usage. The dashboards, APIs, and export options are designed to turn trends into changes, improving cost efficiency and governance across accounts and Regions. In parallel, the company expanded Graviton4‑based compute to more markets, making high‑performance Arm instances available in Europe (Milan) and Asia Pacific (Hong Kong, Osaka, Melbourne). The added reach of C8g instances offers higher vCPU and memory options, enhanced networking, and bare‑metal choices for compute‑intensive workloads.
On the analytics and database side, Google Cloud refreshed the user experience in BigQuery Studio, emphasizing resource discovery, in‑editor context, and a cleaner workspace. A full Explorer tab, context‑aware Reference panel, simplified tab behavior, and a dedicated Job history view aim to cut friction and reduce clutter for analysts and engineers. For transactional workloads, Google also made new database machine types generally available, with Axion‑powered C4A for Enterprise Plus and Intel Xeon‑based N4 for Enterprise. According to the company, Cloud SQL customers can realize notable throughput improvements and price‑performance gains, plus flexible storage tuning with Hyperdisk Balanced.
Risk‑based defenses and safer defaults
CrowdStrike introduced ExPRT.AI, a telemetry‑driven exploitability engine inside Falcon Exposure Management that scores disclosed vulnerabilities by likelihood of attacker use. The model blends threat intelligence, live telemetry, and observed tradecraft to focus remediation on the small subset most likely to be exploited, with outcomes flowing into SIEM, SOAR, and ticketing workflows.
Marking Cybersecurity Awareness Month, Google outlined a set of safety measures and guidance spanning consumer accounts and developer workflows. The company’s overview highlights new anti‑scam protections, a Recovery Contacts feature for account resilience, and CodeMender to improve code security earlier in the SDLC—part of a broader push to be private by design and secure by default.
Advisories and patches to prioritize
ASP.NET Core received a high‑severity fix for an HTTP request smuggling flaw in Kestrel. As reported by CSO Online, CVE‑2025‑55315 can let authenticated attackers hide a secondary request inside a legitimate one, potentially bypassing authentication or authorization depending on application logic. Microsoft’s guidance differentiates between framework‑dependent and self‑contained deployments, and notes that reverse proxies or gateways may already normalize smuggled requests; there is no indication of exploitation in the wild.
Separately, researchers detailed a pre‑authentication remote code execution issue in WatchGuard Fireware’s VPN component (CVE‑2025‑9242). According to The Hacker News, the out‑of‑bounds write in the iked process can grant arbitrary code execution on internet‑facing devices; vendor fixes are available across supported branches. Administrators are advised to apply updates immediately and reduce exposure of VPN and management interfaces while patching proceeds.
Exposures and evolving tradecraft
Following disclosures by F5, Shadowserver observed 266,978 publicly visible BIG‑IP devices. BleepingComputer reports that F5 issued patches for dozens of flaws across multiple product lines and that CISA ordered U.S. federal agencies to update on an expedited timeline and disconnect end‑of‑support appliances. Why it matters: widely deployed application delivery controllers can enable credential theft, lateral movement, and persistence if left unpatched.
In the finance and aviation sectors, a U.S. peer‑to‑peer lender disclosed that unauthorized queries potentially exposed data for about 17.6 million individuals, including sensitive identifiers like Social Security numbers. Infosecurity Magazine notes the firm has engaged law enforcement and plans credit monitoring for affected users. And an American Airlines subsidiary confirmed a compromise of its Oracle E‑Business Suite application tied to a broader data‑theft campaign; BleepingComputer reports Envoy Air’s review found no sensitive or customer data affected, though some business information may have been exposed.
On the network edge, Trend Micro tracked “Operation Zero Disco,” where attackers exploited a Cisco SNMP flaw (CVE‑2025‑20352) to install fileless rootkits on legacy switches. As summarized by CSO Online, the payloads inject into IOSd memory, conceal activity, and use a UDP controller for command‑and‑control—complicating detection and remediation.
Threat actors are also experimenting with resilient infrastructure. CSO Online cites Google’s observation of a North Korean‑linked group adopting EtherHiding to store payload fragments in smart contracts, turning blockchains into hard‑to‑disrupt command‑and‑control. In contrast, law enforcement moved to curtail enablers of fraud at scale: The Hacker News reports Europol dismantled a SIM‑farm service that supported millions of fake online accounts used in phishing, smishing, investment fraud, and other crimes.