Security-focused platform updates dominated the day, led by Google’s Kubernetes-native guardrails for agentic AI and steady progress on cloud data controls. Google Cloud introduced stronger isolation for AI agents on Kubernetes and GKE, while vendors shipped patches for critical enterprise software and investigators detailed active exploitation and targeted campaigns. The mix underscores a dual track: hardening core infrastructure and closing high-impact vulnerabilities as attackers continue to iterate.
Guardrails for agentic AI
Google and the cloud-native community unveiled Agent Sandbox as a Kubernetes-native primitive for non-deterministic AI agents that execute code and use tools. Built on gVisor with optional Kata Containers, the project applies kernel-level isolation and per-task sandboxes to limit data exfiltration and unintended production access. On GKE, integrations include managed gVisor, container-optimized compute, and pre-warmed pools for sub-second starts; a preview of Pod Snapshots adds full checkpoint and restore for CPU/GPU pods to suspend and rapidly resume sandboxes. The open-source effort is being developed under CNCF governance and exposes a public API and Python SDK so AI teams can provision and interact with sandboxes without deep infrastructure expertise. The approach aims to make AI agent execution safer while keeping performance and costs in check.
Complementing those controls, GKE blog outlined broader platform advances spanning cluster scale, autoscaling, and inference. Highlights include an experimental 130,000‑node cluster, enabled-by-default HPA performance tuning, and a redesigned Autopilot autoscaling stack. For inference, GKE Inference Gateway brings LLM-aware routing and disaggregated serving to cut time-to-first-token and token cost, while Pod Snapshots reduce model startup latency. The strategy pairs open-source primitives with production-ready managed features to scale agentic and large-model workloads with tighter operational control.
In data and analytics, Google Cloud detailed how native vector search in BigQuery brings embeddings and similarity search directly to the analytics layer. Users create indexes with SQL while the service handles training, indexing, scaling, and maintenance. Evolving from IVF to ScaNN-based TreeAH with asynchronous training and partitioned indexes, the feature lets teams combine semantic search with traditional queries and joins for use cases such as RAG, semantic business search, deduplication, and anomaly detection. The result reduces pipeline complexity and can make AI workflows more grounded in enterprise data.
Cloud scale and data controls expand
Data consistency got a boost as Logged Batches arrived in Amazon Keyspaces, enabling atomic multi-statement writes that all succeed or all roll back. Documented by AWS, the capability implements Cassandra’s semantics without the operational overhead of distributed transaction logs and scales automatically with workload. For teams building financial systems, inventory updates, or multi-entity profile changes on a serverless Cassandra-compatible store, this reduces effort to achieve transactional behavior while preserving performance.
Compute options also widened as Graviton4-powered EC2 families with local NVMe expanded to more regions. AWS added C8gd in Europe (London) and Canada (Central), M8gd in South America (Sao Paulo), and R8gd in Europe (London), citing gains over prior generations and support for storage- and I/O-intensive workloads. Built on the Nitro System with EFA support on select sizes, the instances target databases, analytics, caching, and other local-storage-dependent services, giving administrators additional regional capacity and tuning flexibility.
Separately, Google Cloud announced expanded on‑shore AI investments in India, including local compute built on AI Hypercomputer and the latest Trillium TPUs to run, tune, and serve Gemini with lower latency and data residency support. Early testing for new Gemini models, a preview of Document AI for local processing, and Google Maps grounding are available through Vertex AI. The company also partnered with IIT Madras and AI4Bharat on Indic Arena, a multilingual benchmarking platform, framing the move as both infrastructure and ecosystem development for sovereign-ready AI.
Advisories and patches
Microsoft released KB5068781, the first Extended Security Update for Windows 10 after end-of-support, raising enrolled systems to build 19045.6575 (Enterprise LTSC 2021 to 19044.6575). The rollup, covered by BleepingComputer, includes October Patch Tuesday fixes and resolves an incorrect end-of-support message introduced by KB5066791. Microsoft notes 63 vulnerabilities addressed this cycle and reports no known issues with the cumulative update; administrators should verify ESU enrollment and apply the update to maintain coverage on out-of-support devices.
SAP shipped November updates that remediate a maximum-severity hardcoded credential issue in SQL Anywhere Monitor (CVE-2025-42890, CVSS 10.0) and a critical code-injection flaw in Solution Manager (CVE-2025-42887, CVSS 9.9). According to BleepingComputer, exposed credentials in the non-GUI monitor can enable administrative access and arbitrary code execution, while the Solution Manager issue allows authenticated code injection via a remote-enabled function module. SAP reports no evidence of active exploitation for these two flaws. Administrators should patch promptly, rotate potentially exposed credentials, restrict access to monitoring components, and review logs for suspicious activity, prioritizing externally reachable or unattended deployments.
CISA added CVE-2025-21042—an out-of-bounds write in Samsung devices—to the Known Exploited Vulnerabilities catalog after reports tied it to spyware delivery via malicious DNG images shared over WhatsApp. As summarized by Infosecurity, the flaw was patched by Samsung in April and linked to a campaign delivering the LandFall spyware to multiple Galaxy models. Federal agencies must apply vendor mitigations or discontinue affected products by the KEV deadline; private organizations are encouraged to follow the same guidance.
Meanwhile, Mandiant and Google Threat Intelligence reported active exploitation of a critical access-control flaw in Gladinet’s Triofox (CVE-2025-12480) that can yield unauthenticated administrative access and code execution as SYSTEM. BleepingComputer reports the attack chain abuses an HTTP Host header validation issue to reach setup pages, create an admin account, and configure the antivirus scanner path to run malicious scripts. Gladinet released a fix in July; Mandiant recommends applying the later October update, auditing admin accounts, and validating scanner paths to prevent script execution. The case illustrates how post-exploit misconfiguration abuse can enable persistent remote access.
Campaigns and enforcement
Genians Security Center documented a KONNI APT operation that hijacked compromised KakaoTalk accounts to distribute a malicious MSI, then used harvested Google credentials to abuse the Find Hub device-management feature and remotely factory-reset Android devices. As detailed by Infosecurity, the campaign employed AutoIt loaders, scheduled tasks, and multiple RATs, and monitored victims’ locations to time destructive wipes. Mitigations include enabling two-factor authentication, adding verification to remote wipe workflows, strengthening EDR and behavior-based monitoring, and treating messenger-delivered files as untrusted. The report highlights that legitimate management features can be misused for disruptive actions when accounts are compromised.
In a separate enforcement outcome, London’s Metropolitan Police secured an 11-year, eight-month sentence against Zhimin Qian (aka Yadi Zhang), who ran a fraudulent investment scheme and converted proceeds to cryptocurrency. BleepingComputer reports authorities seized 61,000 Bitcoin—Britain’s largest crypto seizure—alongside other assets. The case underscores the role of blockchain analysis and multi-agency coordination in disrupting complex economic crime.