< ciso
brief />
Agent Governance, Cloud Resilience, and Linux KEV Lead the Day

Agent Governance, Cloud Resilience, and Linux KEV Lead the Day

Coverage: 01 May 2026 – 03 May 2026 (UTC)

< view all daily briefs >

Controls for AI agents stepped forward as Microsoft made Agent 365 generally available, while a new CISA guide outlined practical safeguards for adopting agentic AI. Cloud platforms emphasized reliability and developer velocity with workflow and networking updates, and defenders faced a busy slate of advisories and incidents—from a Linux kernel bug added to KEV to active ransomware against hosting panels and fresh social‑engineering campaigns.

Governing the rise of AI agents

Microsoft positioned its new control plane to discover, observe, and secure agents across endpoints, cloud services, and SaaS, integrating with Defender and Intune to inventory local tools and surface activity for investigation. The roadmap for Agent 365 includes policy-based runtime controls and enriched alerts, cross‑cloud registry sync for discovery, and Windows 365 for Agents to run workloads under Intune governance. The release also highlights network‑level protections via Entra and partner ecosystem support for onboarding and lifecycle management. In parallel with platform controls, Anthropic introduced a code‑scanning capability designed to reduce false positives and accelerate remediation; Claude Enterprise customers can access the public beta of Claude Security from the Claude.ai sidebar, with findings that include confidence, severity, reproduction steps, and patch guidance.

AWS expanded its agent platform to Latin America with Bedrock AgentCore now available in the South America (São Paulo) Region. AgentCore provides runtime, identity, gateway, policy, observability, and built‑in tools such as a code interpreter and browser, enforcing controls at the infrastructure layer that agents cannot bypass. The regional launch targets reduced latency and in‑region data handling to support residency and compliance requirements for agent workloads.

Cloud platforms tighten resilience and reach

Cloudflare released an open‑source TypeScript library that brings durable, per‑tenant execution to Workers. Dynamic Workflows routes events to tenant‑specific sandboxes, supports on‑the‑fly loading and caching, and resumes long‑running steps with minimal idle cost—an approach aimed at multi‑tenant agent logic, CI pipelines, and SDKs. The company also closed a two‑quarter hardening program: Code Orange delivered progressive, health‑mediated rollouts via Snapstone, deliberate fail‑stale/fail‑open/fail‑close behaviors to limit blast radius, backup authorization paths for key services, and AI‑assisted rule enforcement across the development lifecycle, alongside strengthened customer SLOs and incident communications.

AWS broadened data access and high‑performance networking options. OpenSearch UI now supports cross‑region querying of OpenSearch domains—including those inside VPCs—so teams can centralize analytics and observability while keeping data in place and aligning with residency constraints. For demanding AI/ML and HPC workloads on Kubernetes, a new EKS DRA driver allocates Elastic Fabric Adapter interfaces with topology awareness, pairing network paths with nearby GPUs or accelerators to reduce latency and improve bandwidth, while preserving a migration path from the legacy device plugin.

For embedded and IoT environments, the latest long‑term support release modernizes protocols and hardens memory safety. FreeRTOS LTS (202604) advances the kernel to v11.3.0, extends MPU support to enable finer isolation between system and application code, adds MQTT v5.0 features like topic aliases, and brings year‑2038‑ready time handling—paired with two years of security updates and critical fixes.

Linux ‘Copy Fail’ added to KEV

CISA added CVE‑2026‑31431 to the Known Exploited Vulnerabilities catalog, citing evidence of active exploitation. The CISA KEV entry describes a straightforward local privilege escalation stemming from a logic error in the Linux kernel’s crypto subsystem that enables controlled in‑memory modification of readable files. Fixes are available in current kernel branches, and multiple distributors have issued updates. Administrators should inventory affected systems, prioritize vendor patches or mitigations, and incorporate KEV tracking into vulnerability management to reduce exposure. Why it matters: the in‑memory overwrite path, reliable exploitation, and impact on containerized hosts raise the risk of tenant breakout and lateral movement until patched.

Incidents: hosting ransomware, edtech breach, and app abuse

A critical authentication bypass in cPanel/WHM (CVE‑2026‑41940) is under mass exploitation to gain administrative access and deploy the “Sorry” ransomware, according to BleepingComputer. Reports indicate widespread compromise of exposed instances, use of a Go‑based Linux encryptor, and ransom notes directing victims to a Tox ID for contact. Administrators are urged to apply the vendor’s emergency updates, investigate for compromise, and restore from known‑good backups as exploitation continues.

Education technology provider Instructure confirmed a cybersecurity incident affecting Canvas users, with personal information such as names, emails, student IDs, enrolled courses, and private messages likely involved, per BleepingComputer. The company says passwords, dates of birth, government identifiers, and financial data are not evidenced as exposed; it has patched the vulnerability, rotated application keys, increased monitoring, and is requiring customers to re‑authorize API access while the investigation proceeds.

Separately, CTM360 detailed a widespread fraud platform abusing Telegram Mini Apps to host crypto phishing and deliver Android malware, as covered by BleepingComputer. And Guardio reported a large Facebook phishing operation leveraging Google AppSheet emails and trusted hosting services to harvest credentials and 2FA codes from business account owners, with roughly 30,000 accounts impacted, according to The Hacker News. Organizations should tighten domain filtering and mobile install policies, and educate users to avoid submitting credentials or sideloading APKs from messaging apps or unverified pages.