
Cloud Platforms Fortify AI Capacity as Edge Flaws Draw Urgent Fixes
Coverage: 18 Feb 2026 (UTC)
< view all daily briefs >Cloud platforms emphasized steadier operations for production AI while defenders faced active exploitation across edge and device fleets. Google Cloud advanced predictable capacity for agentic workloads with Vertex AI, and AWS expanded analytics performance by adding storage‑optimized i7i instances to OpenSearch. At the same time, a maximum‑severity zero‑day in Dell’s recovery platform, critical flaws in CCTV and VoIP gear, and rapid weaponization of mail‑server bugs reinforced the case for segmentation, swift patching, and closer monitoring of exposed services.
Agentic AI meets governed data
Google is extending agent‑ready plumbing and governance. Managed Model Context Protocol servers now cover AlloyDB, Spanner, Cloud SQL, Bigtable, Firestore, and a Developer Knowledge endpoint, so agents can reach operational data and docs over identity‑first controls with full audit trails (managed MCP). In parallel, Google and Ab Initio outlined an integration that federates enterprise data and active metadata into BigQuery and Dataplex for provenance‑aware reasoning, with Gemini consuming enriched context and lineage to support explainable agent behavior (Ab Initio). Together with the new Provisioned Throughput on Vertex AI, the stack targets predictable capacity, scoped access, and verifiable history—key ingredients for reliable agent deployments.
AWS is aligning database development with agent workflows by shipping an integration between Amazon’s distributed SQL engine and curated agent capabilities. The update packages an MCP server, steering files, and an agent skill so assistants can help with schema design, performance tuning, and operations without repeated context bootstrapping (Aurora DSQL). The approach aims to shorten onboarding, standardize best practices, and reduce trial‑and‑error in teams that increasingly lean on AI assistance across the database lifecycle.
Infrastructure and performance at scale
AWS broadened performance options for analytics, logging, and security telemetry by enabling the latest storage‑optimized instance family in its managed search service. The new i7i nodes bring 5th‑gen Xeon CPUs and 3rd‑gen Nitro SSDs for higher throughput and lower, more consistent storage latency, with availability across commercial regions and AWS GovCloud (OpenSearch). For teams running high‑ingest observability and real‑time security analytics, the gains can translate to tighter SLAs and improved price‑performance.
At the network layer, Google announced a multi‑year subsea and terrestrial build that links India with Singapore, South Africa, and Australia while adding a new international gateway in Visakhapatnam. The initiative complements existing cable corridors and introduces alternative digital trade routes intended to expand capacity, resilience, and access to AI‑enabled services across regions (America-India Connect). The program pairs infrastructure with skills efforts via government training platforms, positioning connectivity as a prerequisite for broad‑based AI adoption.
Exposed appliances and urgent patching
Mandiant and Google Threat Intelligence detailed long‑running exploitation of a maximum‑severity flaw in Dell’s replication appliance for virtualized environments. A hard‑coded Tomcat Manager credential in affected versions of RecoverPoint for VMs allowed unauthenticated access, web‑shell deployment, and root execution, with operators shifting tooling over time and using covert techniques such as temporary “ghost NICs” and timed proxy rules to persist and pivot (RecoverPoint). In a parallel move to accelerate remediation, CISA added the Dell issue and a GitLab SSRF bug to its Known Exploited Vulnerabilities catalog, directing federal agencies to prioritize fixes and urging broader adoption of KEV‑driven patching (CISA KEV).
Additional device classes also drew critical findings. Researchers reported an authentication bypass in multiple Honeywell CCTV models that lets an attacker change the recovery email and seize accounts through an exposed API; operators are advised to minimize network exposure, segment systems, and engage vendor support for patches (Honeywell). Separately, Rapid7 disclosed an unauthenticated stack buffer overflow in the web API of Grandstream GXP1600‑series phones, enabling remote code execution as root; fixed firmware is available and administrators should update, restrict management interfaces, and audit for compromise (Grandstream). The common thread: internet‑facing appliances that lack robust EDR and detailed telemetry can yield stealthy footholds and long dwell times; segmentation and prompt patching reduce risk.
Rapid weaponization and the developer supply chain
Monitoring of underground channels showed how quickly critical email flaws can turn into mass exploitation. Within days of disclosure, adversaries reversed patches for two SmarterMail bugs (RCE and auth bypass), published tooling, and automated scanning, with active exploitation later added to CISA’s KEV. Researchers observed credential dumps, lateral movement into identity services, and links to ransomware activity—reaffirming that mail servers function as trust anchors and should be protected accordingly (SmarterMail). In a separate supply‑chain incident, Notepad++ hardened its auto‑update mechanism after attackers hijacked update traffic to deliver a selective backdoor; the 8.9.2 release adds dual signature verification, removes insecure SSL options and side‑loading vectors, and urges users to update and verify signatures (Notepad++).
Developer environments also drew scrutiny. OX Security reported critical vulnerabilities across four popular Visual Studio Code extensions—spanning file exfiltration from a local dev server, arbitrary JavaScript execution from crafted Markdown, and risky configuration paths that enable code execution—with some issues still unpatched. The advisory recommends pruning non‑essential extensions, avoiding untrusted repos and configurations, and hardening localhost services and egress rules (VS Code). Because developer workstations often hold API keys and cloud credentials, a single extension flaw can become an enterprise pivot.
On the research front, an AI system credited with responsible disclosures surfaced a large share of recent OpenSSL CVEs, including high‑severity bugs that persisted for decades despite extensive testing. In several cases, the AI’s proposed patches were accepted, underscoring how AI is accelerating both discovery and remediation (Schneier). Google’s latest tracker cataloged adversary use of AI across the intrusion lifecycle—from model distillation and agentic reconnaissance to AI‑integrated malware—and highlighted defensive experiments and a framework for safer AI development (AI Threat Tracker). Mobile threats also evolved: Kaspersky documented Keenadu, a backdoor that can arrive preinstalled in Android firmware, inherit elevated privileges, and quietly install additional payloads; enterprise response centers on supply‑chain integrity and EMM‑enforced baselines (Keenadu). Why it matters: the same AI techniques that speed defensive work are appearing in attacker toolchains, while supply‑chain and developer‑adjacent vectors continue to compress the window from disclosure to exploitation.