ForumsGeneralWeekly Threat Landscape: Chrome 0-Days, AWS Breaches, and the Rise of Rogue AI

Weekly Threat Landscape: Chrome 0-Days, AWS Breaches, and the Rise of Rogue AI

SOC_Analyst_Jay 3/16/2026 USER

Saw the weekly recap this morning and that 'ah, great' feeling hit hard. It’s not just one thing; it’s the combination of active Chrome zero-days, router botnets, and that AWS breach analysis that is keeping me up. It feels like the theoretical risks of last year are this year's active exploitation campaigns.

Specifically, the Chrome 0-days (CVE-2026-1510 in Skia and CVE-2026-1512 in V8) are concerning because they bypass standard sandboxing. If you haven't pushed the latest patch yet, prioritize it. We threw together a quick KQL query to hunt for suspicious child processes spawned by Chrome, which is often the first sign of exploit chains trying to escape the renderer:

DeviceProcessEvents
| where InitiatingProcessFileName == "chrome.exe"
| where ProcessVersionInfoCompanyName != "Google LLC" or ProcessVersionInfoOriginalFileName in ("cmd.exe", "powershell.exe", "wscript.exe")
| project Timestamp, DeviceName, FileName, ProcessCommandLine, InitiatingProcessCommandLine
| order by Timestamp desc

Equally troubling is the section on Rogue AI Agents. We’re seeing prompt injection evolve from "ignore instructions" to actual data exfiltration via "reasoning" attacks. It’s getting harder to distinguish between a curious user and a compromised agent.

On the infra side, the router botnet activity (specifically targeting MIPS-based devices) is a reminder to check those edge logs.

How is everyone handling the AI agent exposure in your orgs? Are you sandboxing them completely, or trying to implement strict output filtering?

ZE
ZeroDayHunter3/16/2026

The AI Agent stuff is spooking my dev team. We've moved all our agentic testing instances into an isolated VPC with egress-only internet gateways. It adds latency, but it's better than risking data exfil via a cleverly phrased prompt. For the AWS breach mentioned in the recap, it highlights again that IAM Access Analyzer isn't optional anymore.

SC
SCADA_Guru_Ivan3/16/2026

Regarding the router botnets, if you are running Mikrotik or older Cisco gear, check your interface lists. We saw a similar campaign last month where they enabled a hidden user on port 8291. A quick nmap sweep of your management subnets might save you a headache later:

nmap -p 8291 --open 192.168.1.0/24
WH
whatahey3/16/2026

Solid KQL query. I'd suggest adding a filter for FolderPath excluding the standard Chrome update directory, as we've seen some FPs during auto-updates. On the Chrome 0-days, we are disabling the JIT compiler for high-risk user segments via Group Policy as a temporary mitigation until the patch cycle completes.

Verified Access Required

To maintain the integrity of our intelligence feeds, only verified partners and security professionals can post replies.

Request Access

Thread Stats

Created3/16/2026
Last Active3/16/2026
Replies3
Views45