Cloud providers emphasized prevention today as Google Cloud detailed post‑quantum protections across its services and AWS OCSF Ready launched to standardize security telemetry integrations. New traffic‑shifting, anomaly detection, and agent identity features round out the platform updates, while agencies highlighted actively exploited vulnerabilities and researchers flagged fresh supply‑chain and browser risks.
Telemetry and rollouts get safer
AWS introduced the Amazon OCSF Ready Specialization to validate partners that send or receive Open Cybersecurity Schema Framework data with AWS security services via AWS OCSF Ready. By aligning products to a common schema, customers can reduce custom parsing and speed detection use cases. In observability, Amazon Managed Service for Prometheus added built‑in anomaly detection using Random Cut Forest, exposing derived time series for alerts and dashboards through Amazon AMP. The combination targets lower integration overhead and faster issue isolation.
Amazon ECS now offers native linear and canary strategies to progressively shift production traffic, with lifecycle hooks and CloudWatch alarms to automate stop/rollback decisions via Amazon ECS. For AI agents that browse the web at scale, AWS previewed cryptographic agent verification to cut CAPTCHAs and blocks across major WAFs through AgentCore Browser. The feature adopts a draft IETF protocol and raises governance considerations around key management and agent identity lifecycle.
Moving toward a quantum‑safe baseline
Google outlined a multi‑year program to harden infrastructure against Store‑Now‑Decrypt‑Later threats, standardizing on ML‑KEM (FIPS 203) for key exchange in internal services and Cloud networking, and adding ML‑DSA and SLH‑DSA (FIPS 204/205) in Cloud KMS for long‑lived signatures as described in its Google Cloud guidance. Customers can experiment with PQC in KMS, prepare new roots of trust, and inventory/signature lifecycles as Certificate Authority Service readies quantum‑safe issuance. The focus is minimizing disruption while migrating critical cryptographic assets.
AI and developer workflows sharpen
AWS expanded access to video‑first language modeling: TwelveLabs’ Pegasus 1.2 is now available in three additional regions via Bedrock, supporting long‑form temporal reasoning and compliance/search use cases through TwelveLabs Pegasus. In safety, OpenAI updated routing so distress‑related chats are handled by a more appropriate reasoning model and surfaced with de‑escalation and resource referrals, as reported by BleepingComputer. For developer throughput, Google unveiled the Jules extension for the Gemini CLI to autonomously work multiple issues in parallel and chain with security and observability extensions, detailed in its Jules extension post. These changes aim to reduce context switching, bring safer defaults to sensitive interactions, and speed remediation pipelines with human oversight.
Advisories and active threats
CISA added two entries to the Known Exploited Vulnerabilities catalog — CVE‑2025‑24893 (XWiki eval injection) and CVE‑2025‑41244 (Broadcom VMware Aria Operations/VMware Tools privilege escalation) — with remediation required for federal agencies under BOD 22‑01, per CISA KEV. Researchers also disclosed two unauthenticated critical flaws in a WordPress plugin affecting more than 10,000 sites; the vendor shipped fixes, and operators are urged to update and audit accounts and uploads, according to King Addons. Separately, joint guidance from multiple agencies outlines hardening steps for on‑prem and hybrid Exchange environments, including modern auth, Extended Protection, and decommissioning end‑of‑life servers, summarized by BleepingComputer. And a researcher published a Blink design weakness dubbed “Brash” that can crash Chromium‑based browsers by saturating the main thread with title changes, with proof‑of‑concept and live demo now public, reported by CSO Online.
On the incident front, a supply‑chain campaign named PhantomRaven planted malicious preinstall hooks across 126 npm packages to steal GitHub tokens and CI/CD secrets via remote dynamic dependencies, evading many scanners, per The Hacker News. Business process outsourcer Conduent disclosed a breach impacting at least 10.5 million people in state filings, with exposed data including Social Security numbers and medical information, as covered by BleepingComputer. And an ex‑L3Harris Trenchant executive pleaded guilty to stealing and selling cyber‑exploit components to a Russian‑linked broker, a case the DOJ says poses national‑security risk, according to BleepingComputer. These developments underscore ongoing pressure on enterprise software supply chains and the impact of insider abuse of privileged access.