Weekly Security Roundup: Supply Chain, Cloud Hardening, AI Agents
Security coverage this week centers on defending the software supply chain, cloud hardening, agent identity controls, and updated developer tools for risk management. As attacks involving AI and regulatory changes become more frequent, teams face growing pressure to reinforce automated workflows and compliance.
Modern Supply Chain Threats and the Role of AI
A new multi-stage attack targeted Nx and npm, using stolen tokens and compromised GitHub workflows to deploy malicious packages—with AI-driven reconnaissance marking the first public case of LLMs used for open source exploits. This incident affected over 5,500 repositories and triggered stronger 2FA requirements, Trusted Publisher policies, and workflow security. Upcoming EU regulations require machine-readable SBOMs and regular vulnerability disclosures by December 2027, prompting an increased focus on automating compliance checks and securing DevOps processes.
- Malicious Nx Packages Used in Two Waves of Supply Chain Attack
- The EU’s Cyber Resilience Act: Redefining Secure Software Development
- AI Coding Assistants Bring Security and Licensing Challenges to Embedded Systems
- Coding at the Speed of AI: Innovation, Vulnerability, and the GenAI Paradox
GitHub Security Ecosystem: Releases, Secret Scanning, and Risk Assessment
GitHub previewed immutable releases with asset and tag locking, using Sigstore cryptographic attestations for asset validation. Secret scanning now adds validators for ten new types and launches a free Secret Risk Assessment tool for organizations, summarizing exposed tokens and guiding review and remediation. These tools expand coverage for credential leak detection and offer administrators new workflow protections.
- GitHub Releases Introduce Immutability for Enhanced Supply Chain Security
- GitHub Secret Scanning Expands with New Validators and Validity Checks
- GitHub Introduces Free Secret Risk Assessment Tool for Organizations
Cloud Infrastructure and Platform Security Enhancements
Azure improved platform security with Boost hardware isolation, integrated HSMs (FIPS 140-3), Caliptra silicon root-of-trust, and firmware Code Transparency Services. Confidential VMs and containers support compliant data-at-rest and in-use security. Microsoft’s ransomware report details hybrid attacks exploiting Entra ID and misconfigurations, with guidance for detection and cloud estate locks.
- Protecting Azure Infrastructure: Defense-in-Depth from Silicon to Systems
- Storm-0501’s Evolving Cloud-Based Ransomware Tactics: Microsoft Analysis
Securing the Next Generation: AI Agents and Cryptographic Identity
Best practices for AI agent security include using Entra Agent ID, RBAC, agent registries, and Defender/Purview analytics to manage prompt injection risk and lifecycle drift. Microsoft’s Crescent cryptographic library supports privacy-preserving digital identity using Groth16 SNARK, improving JWT and mobile credential privacy without major infrastructure changes.
- Securing and Governing Autonomous AI Agents in the Enterprise
- Introducing Crescent: Microsoft's Cryptographic Library for Privacy-Preserving Digital Identity
Automated Vulnerability Remediation in Microsoft DevOps Workflows
Qwiet AI expands its support for Azure DevOps, Azure Boards, and GitHub, providing SARIF static analysis, policy integration, and secret management. The AutoFix engine automates risk inspection and patching, integrating remediation directly into developer workflows.
Other Security News
ASP.NET 10 APIs now return HTTP 401 Unauthorized instead of HTTP 302 for unauthenticated requests, streamlining client-side error handling per REST standards.
- ASP.NET Community Standup: Preventing Login Redirects for APIs A podcast with Kat Cosgrove examines common issues with vulnerability patching, container protection, and Kubernetes hardening, recommending daily automation practices for improved resilience.
- Digging Into Security With Kat Cosgrove A step-by-step guide for healthcare data compliance in Fabric shows how to set up Microsoft Purview DLP policies to detect PHI, automate data governance, and prepare for HIPAA audits.
- Enabling Healthcare Compliance with Microsoft Purview DLP Policies in Fabric For Windows 11, ransomware protection tips cover Defender Antivirus, Controlled Folder Access, app whitelisting, and backup setup for a secure developer environment.
- How to Enable Ransomware Protection in Windows 11