Microsoft detailed governance and secure-by-default progress in its Secure Future Initiative, outlining engineering changes across Azure, Windows, and Microsoft 365 in a new progress report from Microsoft. In parallel, AWS enabled post‑quantum signatures in managed PKI via AWS Private CA, and expanded regulated AI options by bringing Anthropic’s latest model to GovCloud through Amazon Bedrock. The day also featured urgent patching themes, with agencies pressed to remediate a Samsung zero‑day and researchers detailing an authentication bypass in Triofox exploited for remote access tools.
Platform Controls and Recovery Strengthen
AWS broadened built-in protection for containerized workloads as AWS Backup added native support for Amazon EKS. The agent-free integration centralizes policy-driven backups of cluster state and persistent volumes, with immutable vaults and cross-Region, cross-account copies for stronger recovery isolation. Streaming operations also gain simplified capacity management with MSK Express brokers now rebalancing partitions automatically at no extra cost, aiming to reduce operational load and improve throughput during scale events.
For latency-sensitive storage, S3 Express One Zone now supports IPv6 on gateway VPC endpoints, allowing native or DualStack access without translation layers. Combined with post‑quantum certificate support in AWS Private CA, operators have more options to modernize network and trust foundations while maintaining performance and compliance baselines.
Microsoft’s Secure Future Initiative report describes expanded governance (including Deputy CISO roles and a European Security Program), phishing‑resistant MFA for 99.6% of employees and devices, and secure-by-default changes across platforms. The company cites improved security sentiment, broader memory‑safe engineering for firmware and drivers, and more than 50 new detections, alongside customer guidance through SFI patterns and Zero Trust workshops. The stated focus is accelerating high‑impact mitigations and automation to raise baseline resilience.
AI in Regulated Clouds and Developer Workflows
AWS made Anthropic’s Claude Sonnet 4.5 available in GovCloud via Amazon Bedrock, positioning the model for long‑running agents and complex, multi‑step tasks in regulated workloads. The release highlights an automatic context editor and a memory tool to curb context bloat and improve accuracy, with an emphasis on speed and cost efficiency for high‑volume deployments in compliance‑oriented environments.
On developer experience, Google introduced persistent memory for Gemini Code Assist, letting code-review agents infer reusable rules from merged pull requests. The system applies broad repository guidance and retrieves specific rules to refine suggestions, aiming for consistent, context‑aware reviews while isolating storage per installation.
To scale model optimization, Google described running RL for LLMs on GKE, pairing JAX‑native TPU options with NVIDIA GPU support, high‑throughput storage, and orchestration across mega‑clusters. The approach emphasizes open‑source interoperability (vLLM, Ray) and multi‑cluster scheduling for large production runs.
For general compute, Google announced the GA of N4D VMs based on AMD EPYC “Turin,” claiming material price‑performance gains and cost‑control levers such as Custom Machine Types and Hyperdisk Storage Pools. The offering targets web and app servers, analytics, and containerized microservices, complementing higher‑end C4D instances.
Advisories and Exploited Vulnerabilities
Developers were warned of a critical RCE in the JavaScript expression parser expr‑eval, disclosed as CVE‑2025‑12735, where unvalidated function objects in evaluation contexts enable code execution and data exfiltration. In the absence of an official primary advisory in the provided sources, coverage from BleepingComputer notes a patched fork (expr‑eval‑fork v3.0.0) with allowlists and a registration system for custom functions, and urges rapid migration and interim hardening.
CISA directed agencies to patch a Samsung zero‑day, CVE‑2025‑21042, actively exploited to deliver LandFall spyware via malicious DNG images. As summarized by BleepingComputer, the flaw affects devices on Android 13 and later; it has been added to the KEV catalog with a near‑term remediation deadline under BOD 22‑01.
Mandiant Threat Defense detailed active exploitation of a Triofox authentication bypass (CVE‑2025‑12480) that abused Host header trust to reach setup pages, create an admin account, and execute arbitrary code by redirecting the antivirus engine path to a malicious script. The analysis on Mandiant describes SYSTEM‑level execution, deployment of Zoho Assist and AnyDesk, reverse SSH tunneling, and concrete upgrade and hunting guidance.
Container isolation also drew attention with three newly disclosed high‑severity flaws in runc that enable host‑level writes and escapes through procfs and bind‑mount logic. Reporting from CSO attributes fixes to recent runc releases and notes that rootless configurations mitigate many inadvertent writes, while monitoring for symlink and mount anomalies can aid detection.
Campaigns and Policy Shifts
A leaked Commission draft would move cookie regulation into the GDPR, allow certain AI training under legitimate interests with safeguards, and introduce browser/OS signals for consent once standards exist. The proposed Articles 88a–88b, reported by CSO, could reduce banner prompts while raising documentation burdens and changing how sensitive‑data protections apply. Why it matters: governance changes may alter data‑processing bases for tracking and AI workflows across the EU.
On the threat side, a China‑aligned actor tracked as UTA0388 ran tailored phishing with rapport‑building lures and DLL search order hijacking, delivering evolving GOVERSHELL variants over Netlify and OneDrive, according to Infosecurity. Separately, The Hacker News covered GlassWorm’s malicious VS Code extensions that stole developer tokens and cryptocurrency, hid payloads with invisible Unicode, and used a Solana transaction as a resilient C2 pointer.
Law enforcement outcomes continued: a Russian national pleaded guilty to acting as an initial access broker for the Yanluowang ransomware operation, with evidence of negotiated shares of ransom and ties to multiple U.S. victims, as detailed by BleepingComputer. The case highlights the role of access brokers in enabling targeted extortion and the cross‑border work required to disrupt them.