Cloud providers and defenders emphasized interoperability and faster response. Google Cloud introduced a Unified Security Recommended program to validate deep integrations with leading tools and enable AI‑assisted workflows across its security portfolio. Alongside platform moves, fresh ransomware guidance and a series of industrial control system advisories underscored the need for rapid patching and strong network isolation.
Unified Defenses Across Platforms
Google is formalizing how third‑party tools plug into its security stack. The Unified Security Recommended program validates comprehensive technical integrations that feed telemetry, detections, and risk signals into Google Security Operations, backed by a collaborative support model and joint AI investment. Partners align on the model context protocol to let agentic workflows triage alerts, enrich investigations, and orchestrate response across products. Early examples span endpoint risk signals shaping context‑aware access, coordinated network detections informed by FortiGuard intelligence, and cloud findings surfaced directly in Security Command Center—positioned to reduce integration friction and accelerate outcomes through Marketplace procurement and consolidated billing.
Google also expanded support for open models on Hugging Face, introducing a caching gateway on Google Cloud to speed downloads for Vertex AI and GKE users, adding native TPU support, and applying its threat intelligence and Mandiant capabilities to scan models in Model Garden prior to use. See details in Hugging Face. In parallel, AWS enabled cross‑account ECS Service Connect in GovCloud via AWS RAM and shared Cloud Map namespaces, simplifying multi‑account service discovery for regulated environments. Why it matters: these changes aim to cut integration overhead, improve governed access, and strengthen the connective tissue across endpoint, network, identity, and cloud services.
Directives and Ransomware Guidance
CISA ordered U.S. federal agencies to fully remediate two actively exploited Cisco ASA/Firepower flaws (CVE‑2025‑20333, CVE‑2025‑20362) after discovering incomplete patching and continued attacks. The directive highlights pre‑auth access to restricted endpoints and potential code execution, notes targeted exploitation of certain devices with VPN web services, and cites internet‑wide exposure numbers trending down but still significant. Read the summary at BleepingComputer. The message is clear: verify versions, not just patch status, and remediate all affected devices—not only those facing the internet.
Separately, an updated joint advisory on Akira ransomware details new indicators and evolving tradecraft. Initial access now includes exploiting edge devices and backup servers via authentication bypass, XSS, buffer overflows, and brute force; lateral movement leverages RDP/SSH, stolen Kerberos tickets, and remote tools; defense evasion mimics admin activity and tampers with security controls. The guidance urges prioritized patching for VPNs and backup software, enforced MFA for all remote access, deployment of EDR, monitoring for unauthorized domain activity, and hardening of remote management. See the joint update from CISA.
Industrial Control Systems: Vulnerabilities and Fixes
Rockwell Automation addressed two issues in FactoryTalk DataMosaix Private Cloud: CVE‑2025‑11084 allows bypass of multi‑factor enrollment during setup to obtain a login‑token cookie, and CVE‑2025‑11085 enables persistent cross‑site scripting. Updates are available for affected 7.11/8.00/8.01 builds, with vendor guidance to upgrade to 8.02 (for CVE‑2025‑11084) and 8.01 (for CVE‑2025‑11085). Details are in CISA. In a separate advisory, locally exploitable flaws in Studio 5000 Simulation Interface (CVE‑2025‑11696 path traversal leading to admin‑level script execution on reboot, and CVE‑2025‑11697 local SSRF for NTLM hash capture) are fixed in Version 3.0.0; see CISA. Both advisories reinforce defense‑in‑depth: upgrade where possible, minimize exposure, segment networks, and use secure remote access.
Siemens issued multiple fixes and mitigations. For Spectrum Power 4, several vulnerabilities (including incorrect privilege handling and functionality from an untrusted control sphere) can lead to credential exposure, local privilege escalation, or command execution as an administrative application user; Siemens recommends updating to V4.70 SP12 Update 2 or later. See CISA. LOGO! 8 and SIPLUS LOGO! devices are affected by a buffer overflow (CVE‑2025‑40815) and missing authentication issues that can change device IP and system time; Siemens is preparing firmware, and interim steps include password‑protecting LSC and restricting access to UDP port 10006 to trusted sources—documented by CISA. These flaws carry high CVSS v4 scores and are remotely exploitable in some cases, warranting strict network control.
Additional advisories focus on warehouse and gateway systems. Brightpick AI Mission Control/Internal Logic Control includes missing authentication, hardcoded credentials in client‑side code, and an unauthenticated WebSocket that can disclose credentials and telemetry—raising operational and safety concerns in automated environments; see CISA. General Industrial Controls Lynx+ Gateway devices have weak passwords, unauthenticated reset and information disclosure endpoints, and cleartext transmission of credentials, with high CVSS scores and low attack complexity; details are in CISA. For operators, immediate steps include removing direct internet exposure, isolating control networks, and applying vendor updates where available.
Exposure Management, Not Just Scans
CrowdStrike argues that compliance‑driven vulnerability scanning cannot keep pace with AI‑accelerated threats and advocates a platform approach to exposure management: native telemetry across assets, adversary‑aware prioritization, and agentic remediation. The company highlights Falcon Exposure Management’s use of the existing sensor for real‑time visibility, AI‑driven ranking to isolate truly exploitable issues, and automated workflows to patch, isolate, or trigger fixes under human oversight—framing outcomes in reduced time‑to‑remediation and lower cost from tool sprawl. Read the perspective at CrowdStrike.