< ciso
brief />
Cloudflare, AWS Bolster Controls; Cisco, FreeScout Urge Patching

Cloudflare, AWS Bolster Controls; Cisco, FreeScout Urge Patching

Coverage: 04 Mar 2026 (UTC)

< view all daily briefs >

Vendors emphasized safer onboarding and tighter controls today. Cloudflare introduced an always‑on detection model for its WAF with Attack Signature telemetry decoupled from blocking. In telecom, Google Cloud expanded its autonomous operations framework with agentic components including a Gemini-powered data backbone and VoLTE monitoring via the new Data Steward. AWS added targeted protections for multiplayer games by launching DDoS Protection in Amazon GameLift Servers.

Identity And Traffic Controls Tighten

Cloudflare’s new detection-first model runs signature checks on every proxied request and exposes rich metadata for analytics and rules, allowing teams to tune policies before moving to enforcement. By separating signal from action, teams can model exceptions, reduce false positives, and then promote precise blocks with lower risk. Cloudflare is also building response-aware correlation to flag successful exploits and data exfiltration scenarios as part of its roadmap.

For organizations constrained by unmanaged devices or complex tenant landscapes, Cloudflare added an identity-aware Authorization Proxy that issues signed cookies at the edge and enables per-user logging and filtering without client installation. Complementing that, Cloudflare introduced MFA and auth controls that enforce client sign-in before network access and provide a secondary factor at the edge, supporting methods such as WebAuthn/FIDO2 and TOTP to harden access to sensitive resources.

On the operations side, AWS extended its observability pipeline by allowing metrics to flow natively from OpenSearch Ingestion into Amazon Managed Service for Prometheus via OpenSearch Ingestion, helping teams route logs, traces, and metrics to purpose-built stores with consistent preprocessing. Fortinet positioned FortiAIGate as a runtime gateway for AI traffic, inspecting prompts and responses to mitigate risks such as prompt injection, data exfiltration, and model abuse at scale. Meanwhile, AWS’s earlier GameLift addition focuses on authenticated UDP relays and per-player rate limits to preserve gameplay during network attacks.

Data Foundations For Autonomous Networks

Google Cloud’s telecom update advances agentic operations across the stack. The Gemini-powered Autonomous Data Steward exposes real-time telemetry via a zero-copy catalog, translates natural-language intent into vendor counters, and generates ETL jobs on demand, while a Core IMS quality agent monitors VoLTE, correlates SIP/Diameter signaling with core performance, and issues autonomous remediation recommendations. The goal is to shrink MTTR for operations teams and reduce data-engineering bottlenecks by operationalizing reasoning and action across fragmented systems.

To address data readiness at scale, Google Cloud and DigitalRoute detailed reusable pipelines on GKE that normalize heterogeneous telemetry and align subscriber traces, feeding both real-time twins and historical analytics. In parallel, Google outlined a resilient, AI-native core on Kubernetes with GKE telco extensions—multi-networking, telco CNI, persistent IP behavior, and HA policies—to support hybrid deployments that keep user-plane latency low while centralizing orchestration and analytics.

Urgent Fixes For Exposed Systems

Cisco addressed two maximum-severity issues in Secure FMC that could grant unauthenticated attackers root access via authentication bypass and serialized object handling; updates are available and no exploitation has been reported so far, according to Secure FMC. Separately, researchers disclosed CVE‑2026‑28289 in FreeScout, a zero-click RCE via crafted email attachments abusing zero-width space filename bypasses; version 1.8.207 was released to fix the issue, and administrators should patch and review web-accessible dotfiles per FreeScout RCE. Timely updates reduce the risk of device takeover, policy manipulation, and downstream compromise.

Threat Operations And Takedowns

Microsoft profiled Tycoon2FA, a widely used AiTM phishing kit that relayed legitimate sign-in flows to capture session cookies at scale and evade many MFA schemes. In a coordinated action, law enforcement and industry partners disrupted the service and seized hundreds of related domains, as detailed in Europol action. Google’s threat team also analyzed the Coruna kit, a surveillance-grade iOS exploit framework with multiple chains now seen in financially motivated campaigns targeting wallet apps; enabling Lockdown Mode and updating iOS are recommended mitigations. In digital asset security, Check Point argued that whitelists and multisig alone can form predictable attack paths when trusted parties are compromised, urging layered verification and rapid revocation in its Whitelist Illusion analysis.

Cloudflare, AWS Bolster Controls; Cisco, FreeScout Urge Patching · CISO Brief