< ciso
brief />
Critical ICS Advisories, Agentic SOC Moves, and AI Runtime Safeguards

Critical ICS Advisories, Agentic SOC Moves, and AI Runtime Safeguards

Coverage: 24 Mar 2026 (UTC)

< view all daily briefs >

Patch guidance for industrial controls, new agentic SOC capabilities, and safer AI execution environments defined the day. A CISA advisory details a critical unauthenticated command execution flaw in Pharos Controls Mosaic Show Controller. On the defensive-operations side, CrowdStrike introduced agentic MDR with automation under analyst guardrails. To help safely run AI‑generated code, Cloudflare rolled out isolate‑based dynamic sandboxes, and Google Cloud highlighted stronger enterprise browser controls that tie sessions to devices and harden data at rest.

Advisories and patches across ICS and enterprise

CISA published an advisory on Schneider Electric Plant iT/Brewmaxx deployments that include Redis ≤8.2.1, outlining four CVEs that can enable privilege escalation and, at worst, remote code execution; mitigations include applying ProLeiT-2025-001, disabling Redis eval, enforcing secure templates, and isolating control networks (CISA ICS). CISA also detailed a critical Missing Authentication for Critical Function in Pharos Controls Mosaic Show Controller (CVE‑2026‑2417, CVSS 9.8), with vendor updates to firmware 2.16 and network‑exposure reductions recommended. These advisories emphasize segmentation, minimized exposure, and secure remote access for controllers. Why it matters: unauthenticated access paths in control systems can lead directly to high‑impact service disruption if reachable.

PTC warned of a critical unsafe deserialization issue (CVE‑2026‑4681) affecting Windchill and FlexPLM, sharing indicators of compromise and urging immediate interim mitigations such as denying access to the affected servlet path or disconnecting internet‑facing instances if rules cannot be applied (BleepingComputer). Separately, Citrix NetScaler updates address two flaws, led by CVE‑2026‑3055 (CVSS 9.3), which can expose appliance memory when configured as a SAML IdP; affected versions span 14.1 and 13.1 branches, with a temporary Global Deny List available on specific builds and a fix in 14.1‑66.59 for a session mix‑up race condition (CVE‑2026‑4368) (Infosecurity). Administrators should verify SAML IdP exposure, prioritize upgrades, and treat deny‑list signatures as a stopgap until patch windows open.

Agentic operations and data security tools emerge

CrowdStrike introduced agentic managed detection and response as part of Falcon Complete, combining deterministic automation, adaptive AI agents, and analyst oversight to compress containment to machine speed while preserving human accountability. The service uses Falcon Fusion SOAR and expert playbooks for triage, enrichment, containment, and remediation, and is generally available to Falcon Complete customers at no additional cost. A new SOC Transformation Services practice targets the prerequisites for safe automation—governance, data quality, workflows, and decision rights—via structured assessment and a modernization roadmap that can include migration planning to Falcon Next‑Gen SIEM. The approach aims to let teams move faster today while building the guardrails and validated processes needed to scale agentic operations over time.

To focus cloud remediation on attacker‑relevant paths, CrowdStrike advanced its CNAPP with application‑layer visibility, adversary‑informed risk mapping to tracked threat groups, and automated root‑cause reconstruction (CrowdStrike). The company also announced Falcon Data Security, which applies a common, AI‑assisted classification engine and eBPF‑based runtime telemetry to see and control sensitive data across endpoints, browsers, SaaS, cloud workloads, and GenAI interactions, integrating signals into the Falcon platform for automated investigation and response (CrowdStrike). Why it matters: adversary context and data‑in‑motion insight can reduce noise, speed triage, and help analysts validate that fixes actually close exposure.

Extending access to expertise, CrowdStrike expanded its Falcon Flex consumption model to cover incident response and advisory services, offering a credits‑based entitlement that decouples services from platform subscriptions and avoids repeated procurement cycles; a Zero Dollar Flex Fund provides a promotional 200 hours for qualifying first‑time services customers on a 12‑month agreement (CrowdStrike). The intent is to align services spend to shifting priorities and speed access to frontline responders.

Safer AI execution and open infrastructure

Cloudflare opened beta access to Dynamic Workers, enabling applications to instantiate new V8‑isolate sandboxes with runtime‑provided JavaScript so AI‑generated or user‑supplied code runs in a tightly scoped environment rather than via eval in the host. The isolates start in milliseconds, consume a few megabytes, and inherit Cloudflare’s edge scale; recommended patterns include compact TypeScript RPC interfaces, a Cap’n Web bridge for safe cross‑boundary calls, and outbound HTTP mediation that keeps secrets out of sandboxes (Cloudflare). In the enterprise browsing layer, Google’s Chrome Enterprise team introduced Device Bound Session Credentials to tie cookies to devices, cache encryption to protect data at rest, app‑bound encryption to blunt infostealers, and granular download controls with managed storage routing, plus partner integrations to strengthen access from unmanaged devices (Google Cloud).

At the infrastructure level, Google Cloud announced that llm‑d has entered the CNCF Sandbox, formalizing an effort to make distributed LLM inference hardware‑ and cloud‑agnostic. Integrations such as the GKE Inference Gateway routing via llm‑d’s Endpoint Picker improved Time‑to‑First‑Token and tail latency in Vertex AI production validation, and upstream work includes a Kubernetes LeaderWorkerSet API for scalable expert parallelism and native vLLM extensions for Cloud TPUs (Google Cloud). At KubeCon EU 2026, Google also detailed GKE and OSS initiatives for agentic and AI workloads: per‑workload Autopilot activation in Standard clusters, an open‑sourced Cluster Autoscaler, CNCF Kubernetes AI Conformance support, DRA drivers for TPUs and NVIDIA, and sandboxing and snapshot features aimed at safer, faster agent startup (Google Cloud).

Active intrusions and policy actions

Researchers reported that two malicious LiteLLM PyPI releases (1.82.7/1.82.8) were used to deploy the ‘TeamPCP Cloud Stealer,’ harvest a wide range of credentials and secrets, attempt Kubernetes lateral movement, and establish systemd persistence; the tainted versions have been removed, and organizations are urged to find affected installs, rotate exposed tokens and keys, remove persistence artifacts, and review clusters for unauthorized pods (BleepingComputer). Separately, the FBI linked the Handala group to MOIS‑associated espionage and hack‑and‑leak operations using multi‑stage Windows payloads delivered via social engineering, with capabilities including remote access, capture, and exfiltration; recommended mitigations include timely patching, trusted download sources, anti‑malware, MFA, and prompt reporting (Infosecurity).

On the policy front, the FCC updated its Covered List to restrict the sale of new consumer routers manufactured outside the U.S., citing national security and supply‑chain risks, while providing a conditional approval path that requires deep transparency and plans to onshore critical components; existing routers can continue to be sold and used under the policy (BleepingComputer). The move tightens controls on network equipment while defining a rigorous compliance route for vendors willing to meet disclosure and relocation conditions.