AI Security Weekly – End-of-Week Wrap

September 23, 2025

Week Summary

Critical: Chrome and Windows zero-days are under active exploitation
Breakthrough: AI model cost drops 300x, triggering governance panic
Lesson: Microsoft’s pricing power signals new MSP consulting playbook

🔴 WEEK'S TOP THREATS

Google Patches Sixth Chrome Zero-Day of 2025 Under Active Exploitation

What happened — Google pushed an emergency Chrome update patching CVE-2025-10585, a type confusion flaw in the V8 JavaScript engine, actively exploited in the wild.

Why it matters — This is the sixth exploited Chrome zero-day in 2025, showing aggressive targeting of browser internals by advanced actors.

MSP Take — Chrome updates don’t take effect until the browser is restarted. Unpatched browsers leave clients exposed across 65% of endpoints.

Action (48h) — Force browser restarts across managed fleets. Confirm version 140.0.7339.185+.

SourcesGoogle AdvisoryAnalysis

Editor Commentary — Type confusion flaws in V8 are increasingly the go-to for APTs. MSPs should elevate Chrome patching to the same level of urgency as OS or RMM updates. Expect at least 8–10 zero-days by year’s end—patching posture must become real-time.

Microsoft Patch Tuesday: 81 CVEs, SMB Relay and NTLM Flaws Exploited

What happened — Microsoft’s September update addressed 81 CVEs, including two public zero—day flaws: an SMB elevation-of-privilege flaw and a critical NTLM vulnerability.

Why it matters — Relay attacks exploiting SMB and NTLM can turn standard authentication into lateral movement across enterprise networks.

MSP Take — Legacy protocols like NTLM are under siege. The SMB flaw could expose internal systems to credential relays without triggering EDR alerts.

Action (48h) — Deploy September cumulative update. Run Microsoft’s SMB audit tool before enabling SMB signing or EPA.

SourcesMicrosoftTenable

Editor Commentary — Microsoft’s authentication stack is crumbling under modern threats. NTLM must be phased out. The SMB audit tool is Microsoft’s concession that most environments aren't ready. Use it, then harden.

🟡 WEEK'S DEVELOPMENTS

DeepSeek AI Breakthrough: Trained Flagship Model for Just $294K

What happened — DeepSeek published a peer-reviewed paper showing it trained an advanced LLM for $294,000 using only 512 Nvidia H800 chips.

Security Impact: Democratizes access to advanced AI, including by bad actors. Shadow AI risk explodes.

Action (48h) — Audit client environments for unmanaged AI usage. Update DLP rules for model uploads.

SourcesNatureGizmodo

Editor Commentary — The AI arms race has just become more affordable. Expect AI-built malware, phishing tools, and autonomous agents—deployed by orgs with a $300K budget, not $300M. The gap between innovation and security has never been wider.

Microsoft Kills Volume Discounts: Prices Up 6–12% November 1

What happened — Microsoft will end Enterprise Agreement volume discounts for Online Services, forcing all tiers to Level A pricing.

Long-term: Clients must pay the list price at renewal, eroding deal leverage and tightening IT budgets.

Action (48h) — Review client renewal calendars. Prep alternative pricing strategies and lock in Q4 renewals early.

SourcesBsure.ioUltima

Editor Commentary — MSPs must flip the narrative—become the strategic advisor on licensing and renewals, not just the license wrangler. Margin will flow to those who help clients optimize Microsoft rather than pay for it.

AI Governance Gaps Widen: 91% of SMBs Can’t Monitor Their AI

What happened — New data shows that 72% of enterprises tie AI to profitability, but 91% of SMBs lack tools to monitor internal AI use.

Opportunity: Massive risk, but also a clear MSP service gap to fill—AI visibility, controls, and policy frameworks.

Action (48h) — Develop AI governance templates. Create endpoint detection for AI agents and uploads.

SourcesLarridin StudyKiteworks

Editor Commentary — Shadow AI is the new shadow IT. Your clients are currently feeding sensitive data into unmonitored AI tools. Governance isn’t optional—it’s the new firewall.

WEEKEND READING

NEXT WEEK PREVIEW

Monday: Cisco expected to issue ASA zero-day guidance
Tuesday: Patch Tuesday fallout monitoring – NTLM relay attacks
Looking Ahead: More price shifts likely from Google and SentinelOne

Week’s Bottom Line:
Browser zero-days, collapsing AI costs, and licensing shocks—every MSP should be rethinking patch cadence, governance, and contract strategy before October hits.

#cybersecuritynews #mspcommunity #AIgovernance #securityleaders #patchtuesday #zeroday #cloudsecurity #techstack #mspstrategy