Weekly Security Roundup: .NET Smuggling, AI Threats, Cloud Controls

Security continues to adapt as cloud and AI tools become more common in software development. Timely vulnerability response, automation, and risk management remain priorities as generative AI and low-code tools see wider adoption. Guidance focuses on dependency scanning, identity security, and browser/cloud protection. Developers are urged to adopt modern tooling and practices for source code, cloud resource, and AI-generated code security.

.NET, AI, and DevOps Security Risks and Mitigations

A new .NET vulnerability, CVE-2025-55315, involving HTTP request smuggling, requires developers to patch .NET 8+ apps and audit HTTP request handling. Recommendations include upgrading proxies, using HTTP/2 or HTTP/3, and validating with published tools. Development changes and AI-driven environments call for updated security models. Automated guardrails, policy as code, and real-time compliance measures are recommended. Visibility and “mean time to intercept” metrics are now essential across the SDLC. Guides cover best practices for safely removing secrets from Git with git filter-repo, generating SBOMs for supply chain security, and integrating quantum-safe tools to prepare for future risk environments.

Generative AI and Agentic AI Security

Microsoft identifies five security threats to generative AI: poisoning, evasion, prompt injection, deepfakes/phishing, and adaptive malware, recommending use of posture management and operational intelligence for model and data pipeline defense. Recent surveys show that almost a quarter of application code is AI-generated, with increased vulnerabilities and incidents. This places greater importance on funding, review automation, and technical debt management. Real-time checks and ‘shift-left’ security are emphasized for managing these risks. The challenge of agent identity is addressed with Aembit’s AI agent IAM, providing verifiable credentials and adaptive policy for agent operations across cloud environments.

Azure and Cloud Platform Security Controls

Updated resources continue to clarify Azure's shared security model, helping organizations understand their responsibilities for IaaS, PaaS, and SaaS. Coverage includes OS patching, role-based access, and automated policy enforcement. Key management articles compare built-in KMS, customer-managed keys, HSM, and Azure Key Vault, including recommendations for tenant isolation and backup. Practical guidance for web app security adds details for HTTP header configuration and middleware, supporting secure defaults and compliance.

Other Security News

Microsoft Edge has expanded its Scareware Blocker to use computer vision and real-time smart protections, updating the SmartScreen network and offering new controls for enterprise browser management.