< ciso
brief />
Sovereign Cloud Expands; CISA Orders Edge Purge; Exploits and…

Sovereign Cloud Expands; CISA Orders Edge Purge; Exploits and…

Coverage: 06 Feb 2026 – 08 Feb 2026 (UTC)

< view all daily briefs >

Cloud sovereignty and governance moved forward today as Google expanded its portfolio with new Data Boundary, Dedicated, and Air‑Gapped options in its Sovereign Cloud, and AWS brought Amazon ECS Managed Instances to the European Sovereign Cloud via its What's New update. Regulators reinforced lifecycle discipline at the edge: CISA’s new directive requires federal agencies to inventory, update, and remove unsupported appliances under an 18‑month schedule, detailed by CSO. Alongside these preventive moves, defenders faced active exploitation, large‑scale espionage, and software‑supply‑chain risks—from SmarterMail and SolarWinds Web Help Desk to a sprawling state‑aligned campaign and compromises in developer package ecosystems.

Sovereign cloud strategies and stronger governance

Google Cloud is broadening sovereignty choices with Data Boundary, Dedicated, and Air‑Gapped offerings under a five‑pillar approach: local investment and skills, technical and legal resilience, customer control of unencrypted data, open technologies to limit lock‑in, and contributions to cybersecurity and regulatory frameworks. Regional commitments span operations under local law, new cloud regions and subsea cables, and skilling programs. Assurance includes support for EU regimes such as NIS2 and DORA, plus Security Operations and Mandiant Consulting. Dedicated places update and access management with partners and is designed to operate through extended disconnections; Air‑Gapped presents a disconnected, open‑source architecture that third parties can run independently. Data‑control features include external key management and client‑side encryption in Workspace, along with expanded local ML processing for select Gemini models. The message is that sovereignty and innovation can coexist via open technologies, AI choice, and transparency on legal requests.

AWS extended managed container compute to regulated European workloads by introducing Amazon ECS Managed Instances in the European Sovereign Cloud through What's New. The service provisions, configures, and operates EC2 capacity within customer accounts using AWS‑controlled management access, dynamically scales to workload demand, optimizes placement, and applies a regular 14‑day security‑patching cadence. Customers can select instance families, including GPU‑accelerated options, while retaining task‑level control. Adoption considerations include added management fees and the implications of AWS‑controlled access for compliance and security policies.

Broader governance coverage also improved as What's New announced AWS Config support for 30 additional resource types across services such as Amazon EKS, Amazon Q, AWS IoT, QuickSight, Glue, and Route53. With recording for all resource types enabled, the additions are automatically tracked and can be evaluated with Config rules and aggregated via Config aggregators. This reduces visibility gaps and strengthens policy enforcement across observability, networking, analytics, and IoT environments.

Securing the quantum shift and tuning AI operations

A public call to action from Google urges coordinated migration to post‑quantum cryptography (PQC) and continued research to refine timelines and threats. The commitment emphasizes crypto agility, securing shared trust infrastructure such as certificate authorities, and enabling ecosystem transitions aligned with NIST standards. Policy recommendations include cloud‑first modernization to replace hard‑coded legacy cryptography, building PQC into AI systems, reducing global fragmentation via NIST‑aligned standards, and sustained engagement with research experts to avoid strategic surprise as a cryptographically relevant quantum computer approaches.

On operational defenses, Anthropic’s newest model was used by its Frontier Red Team to surface more than 500 previously unknown high‑severity bugs in widely used open‑source projects, as reported by The Hacker News. Findings included memory‑corruption issues that required understanding of algorithms and execution sequences that can elude standard fuzzers. The team validated outputs before disclosure to affected maintainers, framing AI as an accelerator for vulnerability discovery while acknowledging the need for safeguards against misuse and the continued importance of prompt patching fundamentals.

At the platform level, Vertex AI engineering described using the GKE Inference Gateway to reduce tail latency and double cache efficiency for mixed generative‑AI workloads. By combining load‑aware routing (e.g., queue depth, KV cache utilization) with content‑aware routing keyed on request prefixes, Time to First Token improved materially across coding agents and conversational models. The team tuned scoring weights to prioritize queue depth and applied admission control at ingress to limit per‑pod queuing during bursts—practical steps for builders seeking predictable latency and lower operational overhead.

Active exploitation and patch imperatives

CISA warned that a critical unauthenticated RCE in SmarterTools SmarterMail (CVE‑2026‑24423) is under ransomware exploitation and added it to the KEV catalog, with agencies directed to patch or discontinue use by February 26, 2026, per BleepingComputer. The flaw, addressed across builds through 9526, lets attackers abuse the ConnectToHub API to execute OS commands; researchers also flagged an authentication bypass (WT‑2026‑0001) that appears to have been abused shortly after the initial fix. Given SmarterMail’s broad deployment among MSPs and SMBs, upgrading, log review, and credential hygiene are urgent.

The Microsoft Defender Research Team detailed multi‑stage intrusions exploiting internet‑exposed SolarWinds Web Help Desk (WHD) to achieve unauthenticated remote code execution, lateral movement, and in one case, DCSync—evidence of potential full domain compromise. The activity, observed in December 2025, likely leveraged multiple WHD issues disclosed across 2025–2026. Post‑exploitation tradecraft included BITS‑assisted payload fetches, RMM abuse, scheduled tasks spinning up a QEMU VM under SYSTEM, reverse SSH/RDP tunnels, and DLL sideloading to harvest LSASS credentials. Recommended actions include immediate patching, reduced public admin exposure, enhanced logging, RMM artifact discovery and removal, and rotation of compromised credentials, according to Microsoft.

Administrators of Kubernetes ingress and automation stacks face new risks. Four flaws in open‑source Ingress NGINX (two at CVSS 8.8) allow authentication bypass and configuration injection that could enable code execution and secret exposure; maintainers advise upgrading beyond 1.13.7/1.14.3 and accelerating migration before active maintenance ends in March, reported CSO. Separately, Upwind disclosed six vulnerabilities in the n8n workflow platform (four at CVSS 9.4) spanning RCE, command injection, arbitrary file access, XSS, and information disclosure—particularly risky in multi‑user or shared deployments. Mitigations include applying updates, restricting network exposure, enforcing least privilege, rotating credentials, auditing community extensions, and isolating development/testing environments, per CSO. Why it matters: a single unpatched edge or orchestration component can become the pivot to high‑privilege compromise across environments.

Espionage and supply chain pressure

Palo Alto Networks’ Unit 42 tracks a state‑sponsored actor (TGR‑STA‑1030/UNC6619) behind the "Shadow Campaigns" espionage effort, which performed reconnaissance across 155 countries and compromised at least 70 government and critical infrastructure organizations in 37 countries. The activity combined targeted phishing (MEGA‑hosted archives), exploitation of at least 15 known vulnerabilities, common webshells and C2 frameworks, and a Linux kernel eBPF rootkit dubbed ShadowGuard to hide processes and files. Unit 42 provides IoCs and urges patching and kernel‑level anomaly hunting, as summarized by BleepingComputer.

Cisco Talos analyzed DKnife, a Linux gateway‑monitoring and adversary‑in‑the‑middle framework active since at least 2019 and attributed to China‑nexus operators. Modular implants provide deep packet inspection, TLS termination, DNS hijacking, credential harvesting, in‑transit payload substitution, and persistent update mechanisms. Observed operations included delivering ShadowPad and DarkNimbus backdoors and interfering with security‑product traffic. Defenders should watch for bridged TAP interfaces, anomalous DPI/TLS‑termination behaviors, and Talos‑published IoCs, according to The Hacker News.

Software supply chains also drew fire. Researchers documented malicious releases of dYdX developer packages on npm and PyPI that implanted a JavaScript wallet stealer and a Python RAT, with dYdX advising users to isolate affected machines, move funds from clean systems, rotate keys, and audit for compromise indicators. The case reinforces secure package‑consumption practices and registry hygiene, per The Hacker News. In payments, BridgePay confirmed a ransomware attack that encrypted files and caused a nationwide outage across gateway APIs and hosted pages; the company reported no evidence of usable payment card data exposure and is working with federal law enforcement and external forensics teams, reported BleepingComputer.

Agent marketplaces are tightening screening as OpenClaw integrated automated malware checks using SHA‑256 hashing and VirusTotal Code Insight for uploaded skills, with benign results auto‑approved and malicious content blocked. The platform plans daily rescans, a public threat model, and a full codebase audit, while researchers stress that sandboxing, credential protection, behavioral detection, and stronger governance remain necessary, according to The Hacker News.