Introducing AWS Capabilities by Region for easier Regional planning and faster global deployments

This post was originally published on this site

At AWS, a common question we hear is: “Which AWS capabilities are available in different Regions?” It’s a critical question whether you’re planning Regional expansion, ensuring compliance with data residency requirements, or architecting for disaster recovery.

Today, I’m excited to introduce AWS Capabilities by Region, a new planning tool that helps you discover and compare AWS services, features, APIs, and AWS CloudFormation resources across Regions. You can explore service availability through an interactive interface, compare multiple Regions side-by-side, and view forward-looking roadmap information. This detailed visibility helps you make informed decisions about global deployments and avoid project delays and costly rework.

Getting started with Regional comparison
To get started, go to AWS Builder Center and choose AWS Capabilities and Start Exploring. When you select Services and features, you can choose the AWS Regions you’re most interested in from the dropdown list. You can use the search box to quickly find specific services or features. For example, I chose US (N. Virginia), Asia Pacific (Seoul), and Asia Pacific (Taipei) Regions to compare Amazon Simple Storage Service (Amazon S3) features.

Now I can view the availability of services and features in my chosen Regions and also see when they’re expected to be released. Select Show only common features to identify capabilities consistently available across all selected Regions, ensuring you design with services you can use everywhere.

The result will indicate availability using the following states: Available (live in the region); Planning (evaluating launch strategy); Not Expanding (will not launch in region); and 2026 Q1 (directional launch planning for the specified quarter).

In addition to exploring services and features, AWS Capabilities by Region also helps you explore available APIs and CloudFormation resources. As an example, to explore API operations, I added Europe (Stockholm) and Middle East (UAE) Regions to compare Amazon DynamoDB features across different geographies. The tool lets you view and search the availability of API operations in each Region.

The CloudFormation resources tab helps you verify Regional support for specific resource types before writing your templates. You can search by Service, Type, Property, and Config.For instance, when planning an Amazon API Gateway deployment, you can check the availability of resource types like AWS::ApiGateway::Account.

You can also search detailed resources such as Amazon Elastic Compute Cloud (Amazon EC2) instance type availability, including specialized instances such as Graviton-based, GPU-enabled, and memory-optimized variants. For example, I searched 7th generation compute-optimized metal instances and could find c7i.metal-24xl and c7i.metal-48xl instances are available across all targeted Regions.

Beyond the interactive interface, the AWS Capabilities by Region data is also accessible through the AWS Knowledge MCP Server. This allows you to automate Region expansion planning, generate AI-powered recommendations for Region and service selection, and integrate Regional capability checks directly into your development workflows and CI/CD pipelines.

Now available
You can begin exploring AWS Capabilities by Region in AWS Builder Center immediately. The Knowledge MCP server is also publicly accessible at no cost and does not require an AWS account. Usage is subject to rate limits. Follow the getting started guide for setup instructions.

We would love to hear your feedback, so please send us any suggestions through the Builder Support page.

Channy

Binary Breadcrumbs: Correlating Malware Samples with Honeypot Logs Using PowerShell [Guest Diary], (Wed, Nov 5th)

This post was originally published on this site

[This is a Guest Diary by David Hammond, an ISC intern as part of the SANS.edu BACS program]

My last college credit on my way to earning a bachelor's degree was an internship opportunity at the Internet Storm Center. A great opportunity, but one that required the care and feeding of a honeypot. The day it arrived I plugged the freshly imaged honeypot into my home router and happily went about my day. I didn’t think too much about it until the first attack observation was due. You see, I travel often, but my honeypot does not. Furthermore, the administrative side of the honeypot was only accessible through the internal network. I wasn’t about to implement a whole remote solution just to get access while on the road. Instead, I followed some very good advice. I started downloading regular backups of the honeypot logs on a Windows laptop I frequently had with me.

The internship program encouraged us to at least initially review our honeypot logs with command line utilities, such as jq and all its flexibility with filtering. Combined with other standard Unix-like operating system tools, such as wc (word count), less, head, and cut, it was possible to extract exactly what I was looking for. I initially tried using more graphical tools but found I enjoy "living" in the command line better. When I first start looking at logs, I was not always sure of what I’m looking for. Command line tools allow me to quickly look for outliers in the data. I can see what sticks out by negating everything that looks the same. 

So, what’s the trouble? None of these tools were available on my Windows laptop. Admittedly, most of what I mention above are available for Windows, but my ability to install software was restricted on this machine, and I knew that native alternatives existed. At the time I had several directories of JSON logs, and a long list of malware hash values corresponding to an attack I was interested in understanding better. Here’s how a few lines of PowerShell can transform scattered honeypot logs into a clear picture of what really happened.

First, let’s start with the script in two parts. Here’s the PowerShell array containing malware hash values:

$hashes = @(
"00deea7003eef2f30f2c84d1497a42c1f375d802ddd17bde455d5fde2a63631f",
"0131d2f87f9bc151fb2701a570585ed4db636440392a357a54b8b29f2ba842da",
"01ba4719c80b6fe911b091a7c05124b64eeece964e09c058ef8f9805daca546b",
"0291de841b47fe19557c2c999ae131cd571eb61782a109b9ef5b4a4944b6e76d",
"02a95dae81a8dd3545ce370f8c0ee300beff428b959bd7cec2b35e8d1cd7024e",
"062ba629c7b2b914b289c8da0573c179fe86f2cb1f70a31f9a1400d563c3042a",
"0be1c3511c67ecb8421d0be951e858bb3169ac598d068bae3bc8451e883946cc",
"0cbd5117413a0cab8b22f567b5ec5ec63c81b2f0f58e8e87146ecf7aace2ec71",
"0d2d316bc4937a2608e8d9a3030a545973e739805c3449b466984b27598fcdec",
"0d58ee0cd46d5908f31ba415f2e006c1bb0215b0ecdc27dd2b3afa74799e17bd"
)

The $hashes = @( ) between quoted, comma-separated values, establishes a PowerShell array of strings which represents the hashes we want to search for. Now let’s look at how we put this array to use.

Get-ChildItem -Path "C:UsersDaveLogs" -Filter 'cowrie.json.*' -Recurse |
ForEach-Object {
    $jsonContent = Get-Content $_.FullName
    write-output $_.FullName
    foreach ($hash in $hashes) {
        $searchResults = $null
        $searchResults = $jsonContent | Select-String $hash
        if (![string]::IsNullOrEmpty($searchResults)) { 
            write-output $searchResults 
        }
    }
}

Let's walk through the execution of the script. The first statement, Get-ChildItem, recurses every folder in the specified path (C:UsersDaveLogs) and passes along all filenames that match the filter argument. Each filename is passed through the "pipe" (|) directly into the first ForEach-Object statement. You can see what’s passed by observing the output of the write-output $_.FullName line. The $_ is a variable designation which represents whatever is passed through the pipe. In this case, we know what kind of data to expect (a filename) so we can access it’s attribute, "FullName". This tells us the specific JSON log file currently being searched.

Now let’s get into the meat of the script. The main body of the script contains two nested For-Loops. The outer loop begins with the first "ForEach-Object" block of code. The inner loop is described by the lowercase "foreach" block. We already know the name of the JSON log we’ll be searching next, so the next line, $jsonContent = Get-Content $_.FullName sets that up to happen. It takes the content of the first filename passed to $_ though the pipe, reads the contents of that filename, and stores the text in a variable named $jsonContent. Now we’ve got our first log to search, all we have to do is run through the list of hash values to search for! This takes us to the point of the script where we reach the inner-loop. The foreach inner-loop is similar to the outer loop with the exception of how it processes data. The statement, foreach ($hash in $hashes) takes each hash value found in the $hashes array and puts a copy of it into $hash before executing the code block it contains. 

When the inner-loop runs it does three things. First, $searchResults = $null empties the value of the $searchResults variable. This is also called "initializing" the variable, and it’s a good practice whenever you're working with loops that re-use the same variable names. Second, with the variable clear and ready to accept new values, the next line accomplishes a few things.

        $searchResults = $jsonContent | Select-String $hash

Starting to the right of the equals sign, we’re passing the JSON log text $jsonContent into the command "Select-String" while also passing Select-String a single argument, $hash.  Remember earlier when the lowercase foreach loop started, it takes each value found in the $hashes array and (one at a time) places their values into $hash before executing the block of code below it. So we’re passing the text in $jsonContent through another pipe to Select-String, which takes that text and searches for the value $hash within the contents of $jsonContent. The results of Search-String are then stored in the variable named $searchResults.

        if (![string]::IsNullOrEmpty($searchResults)) { 
            write-output $searchResults 
        }

Third and finally, we have an if statement to determine whether the prior Select-String produced any results. If it found the $hash value it was looking for, the $searchResults variable will contain data. If not, it will remain empty ($null). The if statement makes that determination and prints the $searchResults it found. Note the ! at the beginning of the statement which tells it to evaluate as, "if not empty."

While compact in size, this script introduces the PowerShell newcomer to a variety of useful functions: traversing files and folders, retrieving text, searching text, and nested loops are all sophisticated techniques. If you save this script, you can adapt it in many ways whenever a quick solution is needed. Understanding the tools that are available to us in any environment and having practice adapting those tools to our circumstances makes us all better cybersecurity professionals.

[1] https://www.sans.edu/cyber-security-programs/bachelors-degree/

———–
Guy Bruneau IPSS Inc.
My GitHub Page
Twitter: GuyBruneau
gbruneau at isc dot sans dot edu

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

Updates to Domainname API, (Wed, Nov 5th)

This post was originally published on this site

For several years, we have offered a "new domain" list of recently registered (or, more accurately, recently discovered) domains. This list is offered via our API (https://isc.sans.edu/api). However, the size of the list has been causing issues, resulting in a "cut-off" list being returned. To resolve this issue, I updated the API call. It is sort of backward compatible, but it will not allow you to retrieve the full list. Additionally, we offer a simple "static file" containing the complete list. This file should be used whenever possible instead of the API.

To retrieve the full list, updated hourly, use:

https://isc.sans.edu/feeds/domaindata.json.gz

We also offer past versions of this list for the last few days. For example: 

https://isc.sans.edu/feeds/domaindata.2025-11-01.json.gz

I have not decided yet how long to keep these historic lists. The same data can be retrieved via the API request below. Likely, I will keep the last week as a "precompiled" list.

For the API, you may now retrieve partial copies of the list. The full URL for the API is:

https://isc.sans.edu/api/recentdomains/[date]/[searchstring]/[start]/[count]

For example:

https://isc.sans.edu/api/recentdomains/2025-11-05/sans/0/1000?json

Will return all domains found today (November 5th) that contain the string "sans". The first 1,000 matches are returned.

date: The date in "YYYY-MM-DD" format. The word "today" can be used instead of the current date if you only want the most recent data. The default is "today".
searchstring: only domains containing this string will be returned. Use "+" as a wildcard to get all domains. This defaults to returning any domain.
start: The number of the record to start with (defaults to 0)
count: How many records to return (defaults to all records)

In return, you will receive XML by default, but you may easily switch to other formats by adding, for example, "?json" to the end of the URL, which will return JSON.

The data returned remains the same:

{
    "domainname": "applewood-artisans.com",
    "ip": null,
    "type": null,
    "firstseen": "2025-11-04",
    "score": 0,
    "scorereason": "High entropy: 3.57 (+0.36)"
  },

domainname: The domain name
ip: IPv4 address (if available)
type: currently not used
firstseen: Date the domain name was first seen
score: The "anomaly score"
scorereason: reason behind the score

One of the sources of this data is the Certificate Transparency logs. It is possible that we will see new certificates for older domains that have not yet made it into our list of "existing" domains. As a result, you will see some older domains listed as "new" because they were not previously included in our feeds.

Regarding all our data: Use it at your own risk. The data is provided on a best-effort basis at no cost. Commercial use is permitted as long as the data is attributed to us and not resold. We do not recommend using the data as a block list. Instead, use it to "add color to your logs". The data may provide some useful context for other data you collect.

Why do we have a somewhat unusual API, rather than a more standard-compliant REST, GraphQL, or even SOAP API? Well, the API predates these standards (except for SOAP… and do you really want me to use SOAP?). At one point, we may offer something closer to whatever the REST standard will look like at the time, but don't hold your breath; there are a few other projects I want to complete first.

Feedback and bug reports are always welcome.


Johannes B. Ullrich, Ph.D. , Dean of Research, SANS.edu
Twitter|

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

Apple Patches Everything, Again, (Tue, Nov 4th)

This post was originally published on this site

Apple released its expected set of operating system upgrades. This is a minor feature upgrade that also includes fixes for 110 different vulnerabilities. As usual for Apple, many of the vulnerabilities affect multiple operating systems. None of the vulnerabilities is marked as already exploited. Apple only offers very sparse vulnerability descriptions. Here are some vulnerabilities that may be worth watching:

CVE-2025-43338, CVE-2025-43372: A memory corruption vulnerability in ImageIO. ImageIO is responsible for rendering images, and vulnerabilities like this have been exploited in the past for remote code execution. CVE-2025-43400, a vulnerability affecting FontParser, could have a similar impact.

CVE-2025-43431: A memory corruption issue in WebKit. This could be used to execute code via Safari.

 

iOS 26.1 and iPadOS 26.1 macOS Tahoe 26.1 macOS Sequoia 15.7.2 macOS Sonoma 14.8.2 tvOS 26.1 watchOS 26.1 visionOS 26.1 Safari 26.1 Xcode 26.1
CVE-2025-31199: An app may be able to access sensitive user data.
Affects Spotlight
      x          
CVE-2025-43292: An app may be able to access sensitive user data.
Affects CoreMedia
    x            
CVE-2025-43294: An app may be able to access sensitive user data.
Affects MallocStackLogging
x       x x      
CVE-2025-43322: An app may be able to access user-sensitive data.
Affects Admin Framework
  x x x          
CVE-2025-43334: An app may be able to access user-sensitive data.
Affects sudo
  x x x          
CVE-2025-43335: An app may be able to access user-sensitive data.
Affects Security
  x x x          
CVE-2025-43336: An app with root privileges may be able to access private information.
Affects SoftwareUpdate
  x x x          
CVE-2025-43337: An app may be able to access sensitive user data.
Affects AppleMobileFileIntegrity
    x            
CVE-2025-43338: Processing a maliciously crafted media file may lead to unexpected app termination or corrupt process memory.
Affects ImageIO
      x          
CVE-2025-43348: An app may bypass Gatekeeper checks.
Affects Finder
  x x x          
CVE-2025-43350: An attacker may be able to view restricted content from the lock screen.
Affects Control Center
x                
CVE-2025-43351: An app may be able to access protected user data.
Affects StorageKit
  x              
CVE-2025-43361: A malicious app may be able to read kernel memory.
Affects Audio
    x x          
CVE-2025-43364: An app may be able to break out of its sandbox.
Affects NetFSFramework
  x              
CVE-2025-43372: Processing a maliciously crafted media file may lead to unexpected app termination or corrupt process memory.
Affects ImageIO
      x          
CVE-2025-43373: An app may be able to cause unexpected system termination or corrupt kernel memory.
Affects Wi-Fi
  x x x          
CVE-2025-43377: An app may be able to cause a denial-of-service.
Affects Model I/O
  x x            
CVE-2025-43378: An app may be able to access sensitive user data.
Affects AppleMobileFileIntegrity
  x x            
CVE-2025-43379: An app may be able to access protected user data.
Affects AppleMobileFileIntegrity
x x x x x x x    
CVE-2025-43380: Parsing a file may lead to an unexpected app termination.
Affects sips
  x x x          
CVE-2025-43381: A malicious app may be able to delete protected user data.
Affects CoreServicesUIAgent
  x              
CVE-2025-43382: An app may be able to access sensitive user data.
Affects AppleMobileFileIntegrity
  x x x          
CVE-2025-43383: Processing a maliciously crafted media file may lead to unexpected app termination or corrupt process memory.
Affects Model I/O
x x     x   x    
CVE-2025-43384: Processing a maliciously crafted media file may lead to unexpected app termination or corrupt process memory.
Affects Model I/O
    x            
CVE-2025-43387: A malicious app may be able to gain root privileges.
Affects DiskArbitration
  x x            
CVE-2025-43389: An app may be able to access sensitive user data.
Affects Notes
x x x x     x    
CVE-2025-43390: An app may be able to access user-sensitive data.
Affects AppleMobileFileIntegrity
  x x            
CVE-2025-43391: An app may be able to access sensitive user data.
Affects Photos
x x x x          
CVE-2025-43392: A website may exfiltrate image data cross-origin.
Affects WebKit Canvas
x x     x x x x  
CVE-2025-43393: An app may be able to break out of its sandbox.
Affects quarantine
  x              
CVE-2025-43394: An app may be able to access protected user data.
Affects bootp
  x x x          
CVE-2025-43395: An app may be able to access protected user data.
Affects configd
  x x x          
CVE-2025-43396: A sandboxed app may be able to access sensitive user data.
Affects Installer
  x x x          
CVE-2025-43397: An app may be able to cause a denial-of-service.
Affects SoftwareUpdate
  x x x          
CVE-2025-43398: An app may be able to cause unexpected system termination.
Affects Kernel
x x x x x x x    
CVE-2025-43399: An app may be able to access protected user data.
Affects Siri
  x x            
CVE-2025-43400: Processing a maliciously crafted font may lead to unexpected app termination or corrupt process memory.
Affects FontParser
        x x      
CVE-2025-43401: A remote attacker may be able to cause a denial-of-service.
Affects CoreAnimation
  x x x          
CVE-2025-43402: An app may be able to cause unexpected system termination or corrupt process memory.
Affects WindowServer
  x              
CVE-2025-43404: An app may be able to access sensitive user data.
Affects Sandbox
  x              
CVE-2025-43405: An app may be able to access user-sensitive data.
Affects Photos
  x x x          
CVE-2025-43406: An app may be able to access sensitive user data.
Affects Sandbox
  x              
CVE-2025-43407: An app may be able to break out of its sandbox.
Affects Assets
x x x x x   x    
CVE-2025-43408: An attacker with physical access may be able to access contacts from the lock screen.
Affects Share Sheet
  x x x          
CVE-2025-43409: An app may be able to access sensitive user data.
Affects Spotlight
  x x            
CVE-2025-43411: An app may be able to access user-sensitive data.
Affects PackageKit
  x x x          
CVE-2025-43412: An app may be able to break out of its sandbox.
Affects TCC
  x x x          
CVE-2025-43413: A sandboxed app may be able to observe system-wide network connections.
Affects libxpc
x x x x x x x    
CVE-2025-43414: A shortcut may be able to access files that are normally inaccessible to the Shortcuts app.
Affects Shortcuts
  x x x          
CVE-2025-43420: An app may be able to access sensitive user data.
Affects Dock
  x x x          
CVE-2025-43421: Processing maliciously crafted web content may lead to an unexpected process crash.
Affects WebKit
x x         x x  
CVE-2025-43422: An attacker with physical access to a device may be able to disable Stolen Device Protection.
Affects Stolen Device Protection
x                
CVE-2025-43423: An attacker with physical access to an unlocked device paired with a Mac may be able to view sensitive user information in system logging.
Affects Audio
x x x       x    
CVE-2025-43424: A malicious HID device may cause an unexpected process crash.
Affects Multi-Touch
x x              
CVE-2025-43425: Processing maliciously crafted web content may lead to an unexpected process crash.
Affects WebKit
x x     x x x x  
CVE-2025-43426: An app may be able to access sensitive user data.
Affects Contacts
x x              
CVE-2025-43427: Processing maliciously crafted web content may lead to an unexpected process crash.
Affects WebKit
x x     x   x x  
CVE-2025-43429: Processing maliciously crafted web content may lead to an unexpected process crash.
Affects WebKit
x x     x x x x  
CVE-2025-43430: Processing maliciously crafted web content may lead to an unexpected process crash.
Affects WebKit
          x      
CVE-2025-43431: Processing maliciously crafted web content may lead to memory corruption.
Affects WebKit
x x     x x x x  
CVE-2025-43432: Processing maliciously crafted web content may lead to an unexpected process crash.
Affects WebKit
x x     x x x x  
CVE-2025-43434: Processing maliciously crafted web content may lead to an unexpected Safari crash.
Affects WebKit
x x       x x x  
CVE-2025-43436: An app may be able to enumerate a user's installed apps.
Affects CoreServices
x x     x x x    
CVE-2025-43439: An app may be able to fingerprint the user.
Affects On-device Intelligence
x           x    
CVE-2025-43440: Processing maliciously crafted web content may lead to an unexpected process crash.
Affects WebKit
x x     x x x x  
CVE-2025-43442: An app may be able to identify what other apps a user has installed.
Affects Accessibility
x                
CVE-2025-43443: Processing maliciously crafted web content may lead to an unexpected process crash.
Affects WebKit
x x     x x x x  
CVE-2025-43444: An app may be able to fingerprint the user.
Affects Installer
x x     x x x    
CVE-2025-43445: Processing a maliciously crafted media file may lead to unexpected app termination or corrupt process memory.
Affects CoreText
x x x x x x x    
CVE-2025-43446: An app may be able to modify protected parts of the file system.
Affects Assets
  x x x          
CVE-2025-43448: An app may be able to break out of its sandbox.
Affects CloudKit
x x x x x x x    
CVE-2025-43449: A malicious app may be able to track users between installs.
Affects Apple TV Remote
x                
CVE-2025-43450: An app may be able to learn information about the current camera view before being granted camera access.
Affects Camera
x                
CVE-2025-43452: Keyboard suggestions may display sensitive information on the lock screen.
Affects Text Input
x                
CVE-2025-43454: A device may persistently fail to lock.
Affects Siri
x                
CVE-2025-43455: A malicious app may be able to take a screenshot of sensitive information in embedded views.
Affects Apple Account
x x       x x    
CVE-2025-43459: An attacker with physical access to a locked Apple Watch may be able to view Live Voicemail.
Affects Phone
          x      
CVE-2025-43460: An attacker with physical access to a locked device may be able to view sensitive user information.
Affects Status Bar
x                
CVE-2025-43461: An app may be able to access protected user data.
Affects configd
  x              
CVE-2025-43462: An app may be able to cause unexpected system termination or corrupt kernel memory.
Affects Apple Neural Engine
x x     x x x    
CVE-2025-43463: An app may be able to access sensitive user data.
Affects StorageKit
  x              
CVE-2025-43464: Visiting a website may lead to an app denial-of-service.
Affects dyld
  x              
CVE-2025-43465: An app may be able to access sensitive user data.
Affects ATS
  x              
CVE-2025-43466: An app may be able to access sensitive user data.
Affects AppleMobileFileIntegrity
  x              
CVE-2025-43467: An app may be able to gain root privileges.
Affects Installer
  x              
CVE-2025-43468: An app may be able to access sensitive user data.
Affects AppleMobileFileIntegrity
  x x x          
CVE-2025-43469: An app may be able to access sensitive user data.
Affects NSSpellChecker
  x x x          
CVE-2025-43471: An app may be able to access sensitive user data.
Affects Admin Framework
  x              
CVE-2025-43472: An app may be able to gain root privileges.
Affects zsh
  x x x          
CVE-2025-43473: An app may be able to access sensitive user data.
Affects Shortcuts
  x              
CVE-2025-43474: An app may be able to cause unexpected system termination or read kernel memory.
Affects GPU Drivers
  x x x          
CVE-2025-43476: An app may be able to break out of its sandbox.
Affects SharedFileList
  x x x          
CVE-2025-43477: An app may be able to access sensitive user data.
Affects Siri
  x x x          
CVE-2025-43478: An app may be able to cause unexpected system termination.
Affects ASP TCP
  x x x          
CVE-2025-43479: An app may be able to access sensitive user data.
Affects CoreServices
  x x x          
CVE-2025-43480: A malicious website may exfiltrate data cross-origin.
Affects WebKit
x x     x x x x  
CVE-2025-43481: An app may be able to break out of its sandbox.
Affects Disk Images
  x x            
CVE-2025-43493: Visiting a malicious website may lead to address bar spoofing.
Affects Safari
x x         x x  
CVE-2025-43495: An app may be able to monitor keystrokes without user permission.
Affects WebKit
x                
CVE-2025-43496: Remote content may be loaded even when the 'Load Remote Images' setting is turned off.
Affects Mail Drafts
x x x     x x    
CVE-2025-43497: An app may be able to break out of its sandbox.
Affects BackBoardServices
  x              
CVE-2025-43498: An app may be able to access sensitive user data.
Affects FileProvider
x x x x     x    
CVE-2025-43499: An app may be able to access sensitive user data.
Affects Shortcuts
  x x x          
CVE-2025-43500: An app may be able to access sensitive user data.
Affects Sandbox Profiles
x x       x x    
CVE-2025-43502: An app may be able to bypass certain Privacy preferences.
Affects Safari
x x         x x  
CVE-2025-43503: Visiting a malicious website may lead to user interface spoofing.
Affects Safari
x x       x x x  
CVE-2025-43504: A user in a privileged network position may be able to cause a denial-of-service.
Affects lldb
                x
CVE-2025-43505: Processing a maliciously crafted file may lead to heap corruption.
Affects GNU
                x
CVE-2025-43506: iCloud Private Relay may not activate when more than one user is logged in at the same time.
Affects Networking
  x              
CVE-2025-43507: An app may be able to fingerprint the user.
Affects Find My
x x       x x    


Johannes B. Ullrich, Ph.D. , Dean of Research, SANS.edu
Twitter|

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

AWS Weekly Roundup: Project Rainier online, Amazon Nova, Amazon Bedrock, and more (November 3, 2025)

This post was originally published on this site

Last week I met Jeff Barr at the AWS Shenzhen Community Day. Jeff shared stories about how builders around the world are experimenting with generative AI and encouraged local developers to keep pushing ideas into real prototypes. Many attendees stayed after the sessions to discuss model grounding, evaluation, and how to bring generative AI into real applications.

Community builders showcased creative Kiro-themed demos, AI-powered IoT projects, and student-led experiments. It was inspiring to see new developers, students, and long-time Amazon Web Services (AWS) community leaders connecting over shared curiosity and excitement for generative AI innovation.

Project Rainier, one of the world’s most powerful operational AI supercomputers is now online. Built by AWS in close collaboration with Anthropic, Project Rainier brings nearly 500,000 AWS custom-designed Trainium2 chips into service using a new Amazon Elastic Compute (Amazon EC2) UltraServer and EC2 UltraCluster architecture designed for high-bandwidth, low-latency model training at hyperscale.

Anthropic is already training and running inference for Claude on Project Rainier, and is expected to scale to more than one million Trainium2 chips across direct usage and Amazon Bedrock by the end of 2025. For architecture details, deployment insights, and behind-the-scenes video of an UltraServer coming online, refer to AWS activates Project Rainier for the full announcement.

Last week’s launches
Here are the launches that got my attention this week:

Additional updates
Here are some additional projects, blog posts, and news items that I found interesting:

  • Building production-ready 3D pipelines with AWS VAMS and 4D Pipeline – A reference architecture for creating scalable, cloud-based 3D asset pipelines using AWS Visual Asset Management System (VAMS) and 4D Pipeline, supporting ingest, validation, collaborative review, and distribution across games, visual effects (VFX), and digital twins.
  • Amazon Location Service introduces new API key restrictions – You can now create granular security policies with bundle IDs to restrict API access to specific mobile applications, improving access control and strengthening application-level security across location-based workloads.
  • AWS Clean Rooms launches advanced SQL configurations – A performance enhancement for Spark SQL workloads that supports runtime customization of Spark properties and compute sizes, plus table caching for faster and more cost-efficient processing of large analytical queries.
  • AWS Serverless MCP Server adds event source mappings (ESM) tools – A capability for event-driven serverless applications that supports configuration, performance tuning, and troubleshooting of AWS Lambda event source mappings, including AWS Serverless Application Model (AWS SAM) template generation and diagnostic insights.
  • AWS IoT Greengrass releases an AI agent context pack – A development accelerator for cloud-connected edge applications that provides ready-to-use instructions, examples, and templates, helping teams integrate generative AI tools such as Amazon Q for faster software creation, testing, and fleet-wide deployment. It’s available as open source on the GitHub repository.
  • AWS Step Functions introduces a new metrics dashboard – You can now view usage, billing, and performance metrics at the state-machine level for standard and express workflows in a single console view, improving visibility and troubleshooting for distributed applications.

Upcoming AWS events
Check your calendars so that you can sign up for these upcoming events:

  • AWS Builder Loft – A community tech space in San Francisco where you can learn from expert sessions, join hands-on workshops, explore AI and emerging technologies, and collaborate with other builders to accelerate their ideas. Browse the upcoming sessions and join the events that interest you.
  • AWS Community Days – Join community-led conferences that feature technical discussions, workshops, and hands-on labs led by experienced AWS users and industry leaders from around the world: Hong Kong (November 2), Abuja (November 8), Cameroon (November 8), and Spain (November 15).
  • AWS Skills Center Seattle 4th Anniversary Celebration – A free, public event on November 20 with a keynote, learned panels, recruiter insights, raffles, and virtual participation options.

Join the AWS Builder Center to learn, build, and connect with builders in the AWS community. Browse here for upcoming in-person events, developer-focused events, and events for startups.

That’s all for this week. Check back next Monday for another Weekly Roundup!

Betty

XWiki SolrSearch Exploit Attempts (CVE-2025-24893) with link to Chicago Gangs/Rappers, (Mon, Nov 3rd)

This post was originally published on this site

XWiki describes itself as "The Advanced Open-Source Enterprise Wiki" and considers itself an alternative to Confluence and MediaWiki. In February, XWiki released an advisory (and patch) for an arbitrary remote code execution vulnerability. Affected was the SolrSearch component, which any user, even with minimal "Guest" privileges, can use. The advisory included PoC code, so it is a bit odd that it took so long for the vulnerability to be widely exploited.

Scans for Port 8530/8531 (TCP). Likely related to WSUS Vulnerability CVE-2025-59287, (Sun, Nov 2nd)

This post was originally published on this site

Sensors reporting firewall logs detected a significant increase in scans for port 8530/TCP and 8531/TCP over the course of last week. Some of these reports originate from Shadowserver, and likely other researchers, but there are also some that do not correspond to known research-related IP addresses.