Platform hardening led the day as providers emphasized cryptography, failover resilience, and abuse reporting, while AI model releases continued on a rapid cadence. A report said OpenAI is preparing the GPT‑5.1 family with faster inference and stronger health guardrails BleepingComputer, and AWS expanded signature options by adding Ed25519 in its managed key service AWS KMS. At the same time, urgent patching needs persisted as Cisco addressed critical flaws and warned of new attack variants against firewalls.
Cloud, crypto, and app security updates
AWS broadened algorithm agility by enabling EdDSA with the Ed25519 curve in its managed key service, delivering compact signatures and faster operations for constrained environments. The addition spans all regions and supports creating asymmetric KMS keys and data key pairs inside the service; teams should verify client compatibility and update key policies before rollout. For .NET workloads on RDS and Aurora, AWS also released a driver that understands cluster topology and automates reconnection on failover to reduce downtime during switchover or outages AWS.
Cloudflare introduced a self‑serve BYOIP API that replaces weeks of manual LOA workflows with cryptographic ownership proofs. The process hinges on publishing an RPKI ROA authorizing Cloudflare’s ASN as origin and a second ownership proof via IRR or reverse‑DNS token, bringing onboarding down to minutes and reducing document‑fraud risk Cloudflare. In the data layer, Google’s AlloyDB AI preview added Auto Vector Embeddings and a self‑tuning ScaNN index, keeping vectors synchronized with live transactional data and eliminating external ETL and manual index tuning for semantic search workloads Google Cloud. The net effect is less bespoke infrastructure and lower latency for retrieval‑augmented applications.
Check Point extended CloudGuard to protect generative‑AI applications by applying its ML‑driven WAF approach to model endpoints, prompts, and data pipelines. The company positions the update as an operationally simple way to monitor and defend AI‑integrated APIs against prompt injection, data exfiltration, and manipulation risks Check Point. Separately, Google rolled out a reporting form in Maps for businesses facing review‑bomb extortion, providing a clearer escalation path alongside guidance on prevalent scams targeting users and merchants The Hacker News. Clear reporting channels and human review can help blunt reputational damage when automated moderation is evaded.
Cisco urges immediate fixes as firewall attacks shift
Cisco released patches for multiple issues in Unified Contact Center Express, including two critical flaws that can enable authentication bypass and root‑level command execution. The vendor shipped CCX versions 15.0 ES01 and 12.5 SU3 ES07 and advised immediate updates, noting additional medium‑severity fixes across related contact‑center products CSO. In parallel, Cisco confirmed that previously exploited ASA and FTD vulnerabilities are now being abused to trigger reboot loops and denial‑of‑service conditions, reinforcing the urgency of applying the September fixes and auditing exposed devices BleepingComputer. Rapid adoption of new attack variants often follows public patches, keeping unupdated systems at risk.
AI models advance while privacy research flags risks
A new Vertex AI entry suggests Google is preparing Gemini 3 Pro with a reported 1M‑token context window, alongside an image‑focused Nano Banana 2 visible on the Gemini site; the timing aligns with a year‑end push among model providers. The report frames the rollout as part of a competitive landscape where context size and generation fidelity influence agent capabilities and integration choices BleepingComputer. In tandem, coverage indicated OpenAI plans GPT‑5.1 (base, Reasoning, and Pro) with an emphasis on throughput and stronger health‑related guardrails, underscoring product and operational tuning rather than dramatic capability jumps.
Microsoft detailed “Whisper Leak,” a side‑channel that infers prompt topics by analyzing packet sizes and timing from encrypted, streaming language‑model responses. In controlled tests, trained classifiers reached high precision for a sensitive topic amid large background traffic. Providers including OpenAI, Mistral, Azure, and xAI deployed streaming obfuscations that Microsoft validated as reducing attack practicality. Recommended mitigations include avoiding highly sensitive discussions on untrusted networks, using VPNs, preferring providers with mitigations, and selecting non‑streaming modes when feasible Microsoft.
Supply‑chain campaigns and targeted mobile spyware
Researchers uncovered a NuGet supply‑chain campaign where nine packages published under “shanhai666” embedded logic‑bomb payloads set to trigger months or years after installation. The most dangerous, Sharp7Extend, piggybacks a legitimate PLC library and uses C# extension methods to subvert database and PLC operations with probabilistic terminations and delayed write failures, complicating incident response and forensics. Teams should audit for the listed packages, remove them from builds, and validate PLC integrity and safety logs The Hacker News. In a parallel extension‑ecosystem threat, the GlassWorm malware resurfaced on OpenVSX via three VS Code extensions carrying obfuscated JavaScript and using Solana transactions as a covert retrieval channel; credentials and crypto wallets were among targeted data, and a global victim footprint was observed BleepingComputer. These findings highlight the need for stronger vetting and coordinated takedowns across developer marketplaces.
Unit 42 documented LANDFALL, a commercial‑grade Android spyware framework that exploited a Samsung image‑processing zero‑day (CVE‑2025‑21042) via malformed DNG files, delivering loaders that modified SELinux in memory, elevated privileges, and persisted through injection and LD_PRELOAD. The tooling exfiltrates audio, location, contacts, and files, uses TLS pinning, and enforces session budgets; Samsung issued related patches in April and September 2025. Organizations should apply vendor updates and monitor indicators mapped to the campaign infrastructure Unit 42. Why it matters: mobile zero‑click‑like delivery through image parsing broadens exposure for high‑value users.
The U.S. Congressional Budget Office disclosed a suspected foreign intrusion, implemented additional monitoring, and warned that emails with congressional offices may have been exposed. Work continues while investigators assess scope and potential exfiltration BleepingComputer. The incident underscores the sensitivity of policy analysis networks and the importance of rapid containment and coordinated investigation.