< ciso
brief />
Patches, Platform Upgrades, and Criminal Infra Disrupted

Patches, Platform Upgrades, and Criminal Infra Disrupted

Coverage: 14 Jan 2026 (UTC)

< view all daily briefs >

Platform and tooling changes dominated the day, with new cloud networking and data features alongside major patch releases. AWS broadened dynamic routing options across more regions, and BigQuery introduced AI-assisted query generation to speed analysis. On the defensive front, The Hacker News detailed Microsoft’s January Patch Tuesday with one actively exploited flaw, while targeted advisories urge urgent updates in Fortinet and Node.js ecosystems.

Platform defenses roll out

AWS expanded the availability of VPC Route Server to 30 regions, enabling virtual appliances to advertise routes via BGP directly into VPC route tables. According to AWS, the capability reduces manual route propagation and simplifies integration of third‑party firewalls, NAT devices, and edge routers. For global teams, wider coverage supports lower‑latency placement and data residency needs while improving failover and multi‑region routing designs.

Google’s BigQuery added Comments to SQL, an AI feature that turns plain‑English notes into executable queries. The BigQuery blog shows how natural‑language expressions embedded in comments are converted into standard SQL across SELECT, JOIN, window functions, and cohort analyses, with a diff view to iterate and refine. The approach can accelerate prototyping for beginners and experts while keeping analytical intent visible in query text.

Separately, AWS said AWS Transform custom now supports PrivateLink and is available in Europe (Frankfurt), allowing access from within a VPC without traversing the public internet. The update, outlined by AWS, strengthens security for automated language and framework upgrades across large codebases and aligns with regional data residency and compliance needs.

CrowdStrike moved to extend in‑session protections with an agreement to acquire Seraphic Security, bringing browser‑native runtime controls to Falcon. As covered by CSOonline, the plan is to enforce policy inside live browser sessions and correlate with endpoint and identity telemetry, including controls to govern generative‑AI usage and protect unmanaged devices.

Advisories and patches

Microsoft released fixes for 114 vulnerabilities, including eight Critical and one actively exploited information‑disclosure bug in Desktop Window Manager (CVE‑2026‑20805). The Hacker News notes the flaw can aid ASLR bypass when chained and has been added to CISA’s KEV, with guidance to prioritize exploited and virtualization‑related issues and ensure Secure Boot certificates are updated.

Fortinet customers should immediately patch FortiSIEM after researchers published exploit code for a phMonitor command‑injection path. BleepingComputer reports fixes are available across supported 7.1–7.4 branches, with 7.5 and FortiSIEM Cloud not impacted; network‑level restrictions on TCP 7900 are the practical workaround if patching is delayed. Public exploit availability raises the urgency to update and review logs for signs of compromise.

Node.js shipped updates addressing a critical condition where stack overflow during async_hooks activity could force process exit (CVE‑2025‑59466). The Hacker News says patched versions include 20.20.0, 22.22.0, 24.13.0, and 25.3.0, mitigating denial‑of‑service risks across ecosystems that rely on AsyncLocalStorage, APM tooling, and popular frameworks. Older EoL lines remain affected and unpatched, reinforcing the need to stay on supported releases.

Criminal infrastructure disrupted

Microsoft Threat Intelligence detailed its role in disrupting RedVDS, a virtual desktop marketplace linked to large‑scale phishing and BEC activity. The Microsoft report describes cloned Windows Server images that yielded consistent fingerprints, widespread use by financially motivated groups, and guidance to harden email, identity, and financial workflows. Investigators tie the infrastructure to thousands of campaigns and provide Defender XDR analytics and playbooks for detection and response.

Separately, researchers observed a fast‑growing proxy/DDoS operation mixing AISURU and its Android variant Kimwolf. According to The Hacker News, teams null‑routed more than 550 C2 nodes after a surge that ultimately exceeded two million infected Android devices with exposed ADB; the ecosystem leveraged a malicious SDK and compromised SOHO routers to rent out residential IPs, making traffic blend with consumer patterns. The scale underscores how consumer devices and proxy markets are being weaponized for evasion and monetization.

Threat techniques and enforcement

Push Security researchers documented “ConsentFix,” an OAuth phishing technique that tricks users into transporting a localhost authorization code into an attacker’s flow, bypassing passwords and MFA. BleepingComputer notes the campaign targeted pre‑consented first‑party Microsoft applications and exploited legacy scopes and Conditional Access gaps. Recommended defenses include expanded logging, targeted hunting for application/resource IDs, stricter Conditional Access for CLI tools, and browser‑based behavioral blocking to catch malicious web flows.

In France, CNIL levied €42 million in fines against Free Mobile and parent Free for GDPR violations tied to a 2024 breach. As reported by BleepingComputer, the case cited weak VPN authentication, insufficient anomaly detection, late or deficient notifications, and excessive data retention. Regulators ordered security measures to be completed within three months and data minimization within six months, emphasizing robust access controls, faster detection, and disciplined retention for large subscriber datasets.

Patches, Platform Upgrades, and Criminal Infra Disrupted · CISO Brief