< ciso
brief />
Agentic Cloud Ops, Identity Consolidation, and Supply-Chain Risks

Agentic Cloud Ops, Identity Consolidation, and Supply-Chain Risks

Coverage: 11 Feb 2026 (UTC)

< view all daily briefs >

A detailed Azure blog set a preventive tone today, outlining an "agentic" operating model that embeds autonomous assistants into day‑to‑day cloud operations. In parallel, a Palo Alto blog cast identity as a platform control plane with the announcement that CyberArk is joining its ecosystem. Against that backdrop, defenders faced confirmed supply‑chain abuse and a busy patch cycle, with actively exploited vulnerabilities demanding swift remediation.

Agentic automation reaches operations

The Azure Copilot approach describes agents that discover dependencies, generate infrastructure‑as‑code, validate rollouts, and coordinate troubleshooting across telemetry from health, configuration, cost, performance, and security—while staying within existing policy, RBAC, and audit trails. The goal is to convert signals into governed action and move teams from reactive firefighting to continuous resilience and optimization. Microsoft stresses guardrails such as BYOS for conversation history and Responsible AI principles to preserve oversight.

On the SOC side, a CrowdStrike post positions Falcon Fusion SOAR as a pragmatic path to scale automation. New aids include a natural‑language workflow generator, a test‑and‑debug experience that previews execution paths, and a data‑transformation agent powered by Charlotte AI—all aimed at lowering integration friction and keeping humans in the loop. For mature programs, integration with Charlotte Agentic SOAR advances toward reasoning‑driven orchestration. Why it matters: both efforts focus on getting from intent to safe, auditable action faster, reducing toil without ceding control.

Cloud governance, compliance, and compute expand

AWS advanced regulated payments and data governance. Payment Cryptography secured Cartes Bancaires approval, enabling acquirers, processors, and issuers to include the managed service in CB‑aligned compliance frameworks as they migrate card workloads. The service complements attestations such as PCI PIN, PCI DSS, and ISO 27001, and offers elastic HSM‑class functions under a shared‑responsibility model with regional deployment options. In analytics, Lake Formation added enhanced cross‑account sharing via wildcard‑based RAM resource shares, allowing centralized, fine‑grained permissions at scale across catalogs, databases, tables, and columns. Customers must upgrade to cross‑account version 5; AWS highlights backward compatibility and urges least‑privilege governance to manage exposure.

Infrastructure choice also widened as EC2 C8i and C8i‑flex landed in Europe (Paris), Canada (Central), and US West (N. California). Backed by custom Intel Xeon 6 silicon, AWS cites up to 20% higher performance over C7i and sizable throughput gains for NGINX, deep‑learning recommenders, and Memcached, with C8i‑flex tuned for partially utilized vCPU workloads and C8i aimed at memory‑intensive, sustained‑CPU use.

Supply‑chain and marketplace abuse

Unit 42 detailed a targeted compromise of the Notepad++ update infrastructure. In its analysis, Unit 42 attributes the operation to Lotus Blossom, describing an infrastructure‑level hijack of WinGUp traffic to selectively deliver malicious manifests. Observed paths included NSIS installers with injected Lua fetching Cobalt Strike Beacon and a DLL sideload chain abusing a signed Bitdefender component to load a custom Chrysalis backdoor. Indicators, hunting queries, and guidance focus on gup.exe misuse, unexpected Bitdefender‑signed binaries in nonstandard paths, Chrysalis IOCs, and incident‑response steps. Notepad++ moved hosting and hardened WinGUp to verify XML signatures.

Separately, researchers uncovered a Microsoft Office add‑in hijack. According to BleepingComputer, an abandoned URL behind the AgreeTo Outlook add‑in was claimed by a threat actor, who swapped in a phishing kit rendering a fake Microsoft sign‑in within the Outlook sidebar. Over 4,000 credentials were exfiltrated via a Telegram bot API before redirection to the legitimate login page; Microsoft removed the add‑in after disclosure. The case underscores how post‑approval changes to developer‑hosted runtime content can subvert marketplace trust.

Patching priorities and active campaigns

Microsoft’s monthly release addressed 59 vulnerabilities, with six zero‑days observed exploited in the wild. Coverage spans Windows, Office, and related components, with high‑priority flaws including prompt‑bypass and local privilege‑escalation paths. Details are summarized by The Hacker News, which notes CISA added the six exploited CVEs to KEV with federal deadlines to patch. The broader Patch Tuesday wave saw fixes across more than 60 vendors; The Hacker News also highlights critical SAP issues (CVE‑2026‑0488, CVE‑2026‑0509) and analysis of Intel TDX 1.5 exposures, reinforcing the need for coordinated OS, application, and firmware updates and careful change management.

At the same time, North Korea‑linked operators continued targeting crypto and fintech via deepfake‑aided social engineering and macOS‑focused tooling. A CSO Online report on Mandiant’s research details a ClickFix‑style intrusion flow culminating in WAVESHAPER and HYPERCALL deployment, data theft via DEEPBREATH and CHROMEPUSH, and hands‑on‑keyboard access. The volume of tooling per host and identity harvesting suggest sustained campaigns aimed at immediate theft and future social engineering.