< ciso
brief />
Platform Controls Lead: OpenAI Health, AWS mTLS, Critical Patches

Platform Controls Lead: OpenAI Health, AWS mTLS, Critical Patches

Coverage: 08 Jan 2026 (UTC)

< view all daily briefs >

Platform hardening led the day as vendors expanded authentication and data isolation, alongside a dense round of critical advisories and active defense updates. The Hacker News detailed OpenAI’s new ChatGPT Health, which carves health data into a separate encrypted and isolated environment with explicit-permission app connections and guardrails tuned for clinical safety benchmarks. Meanwhile, infrastructure and identity controls are tightening across clouds and enterprise stacks, with urgent patches landing for widely deployed systems.

Platform controls expand

Certificate-based authentication with mutual TLS is now available for RabbitMQ brokers on Amazon MQ, reducing reliance on passwords and aligning access with PKI-driven architectures. The feature requires RabbitMQ 4.2 and configuration of the SSL authentication plugin, and is available wherever Amazon MQ RabbitMQ 4 runs; see What's New for version and instance prerequisites. Amazon also broadened orchestration in its AI workspace by adding native invocation of third‑party agents and a larger built‑in actions library, enabling workflows across tools like Box, Canva, PagerDuty, GitHub, and Notion without context switching; the update positions Quick as an agentic workflow hub across enterprise toolchains (details in What's New).

AWS Blog outlined an automated “active threat defense” that turns live honeypot intelligence into Network Firewall rules and GuardDuty detections in about 30 minutes, layering blocks at DNS, HTTP host, TLS SNI, and IP to shrink the time from observation to enforcement. In parallel, AWS added support for .NET 10 as a managed Lambda runtime and base image, with managed updates and LTS coverage to November 2028 for predictable security maintenance (What's New).

Microsoft will enforce MFA for all Microsoft 365 admin center sign-ins starting February 9, 2026, blocking access for accounts without MFA and reducing exposure to password-focused attacks; organizations should enable verification methods ahead of the deadline (BleepingComputer). In identity operations, CrowdStrike announced an agreement to acquire SGNL, aiming to integrate runtime access enforcement into Falcon for continuous, context-aware authorization across human, non‑human, and AI agent identities.

Critical advisories and patch priorities

CISA republished a vendor advisory on a critical Java deserialization flaw in Hitachi Energy Asset Suite (CVE-2025-10492), rated CVSS 9.8 and affecting versions 9.7 and earlier; updating to 9.8 is the remediation, with mitigations including report restrictions, network segmentation, and secured remote access. CISA also added two issues to the KEV catalog—an older Microsoft Office PowerPoint RCE (CVE-2009-0556) and HPE OneView RCE (CVE-2025-37164)—with OneView requiring upgrades to v11.00 or later; Federal agencies face a January 28 deadline, and private organizations are urged to prioritize patching (The Hacker News).

Researchers disclosed “Ni8mare” (CVE-2026-21858), a maximum‑severity flaw in n8n’s webhook payload parsing that can enable unauthenticated file reads, credential exposure, session cookie forgery, and potential code execution. Administrators should upgrade to 1.121.0 or later immediately due to the platform’s central role in automation and access to third‑party systems (Infosecurity). Separately, 11 critical vulnerabilities in the Coolify self‑hosting platform allow authentication bypass, OS command injection, RCE, container escape, and full server compromise; operators should apply the vendor’s beta fixes, rotate exposed keys, harden access, and review logs for signs of intrusion (The Hacker News). The combination of unauthenticated RCE paths and exposed internet‑facing instances makes rapid remediation essential.

Exploitation and espionage activity

Analysis of incidents in December 2025 points to a sophisticated VMware ESXi exploit toolkit likely chaining three zero‑days later disclosed in March 2025, with build artifacts suggesting portions existed in late 2023. The toolkit installs a hypervisor backdoor and enables VM escape to kernel, with components for VSOCK‑based command execution and persistence; defenders should apply current ESXi updates, deploy provided detection rules, and investigate edge VPN appliances and privileged account activity (BleepingComputer). In parallel, Cisco Talos attributed sustained targeting of telecom infrastructure in South Asia to UAT‑7290, a China‑nexus actor that leverages one‑day exploits and brute‑force of public‑facing devices, with Linux‑centric tooling including RushDrop, DriveSwitch, and the modular SilentRaid implant; the group also provisions relay nodes usable by other operators (Talos).

Botnets and phishing tradecraft

Investigations into the Aisuru and Kimwolf botnets traced mass compromise of factory‑installed Android TV boxes repurposed as residential proxies and DDoS participants, with links to proxy marketplaces and SDK‑based traffic monetization. Researchers observed decentralized control using ENS records and an ecosystem spanning device makers, proxy resellers, and hosting providers, with impacts ranging from account takeover to large‑scale scraping; users should disconnect vulnerable devices and platform operators should pursue takedowns of associated infrastructure (KrebsOnSecurity). The FBI warned of Kimsuky spearphishing that uses QR codes to prompt mobile logins and steal session tokens, enabling cloud account hijack even with MFA; recommended mitigations include QR‑specific training, MDM controls, and strong authentication policies (BleepingComputer). Why it matters: mobile‑first quishing and residential proxy abuse erode traditional perimeter and email defenses, underscoring the need for layered identity and network controls.