Seedworm targets South Korean electronics manufacturerIran-linked group Seedworm (also known as MuddyWater)breacheda major South Korean electronics manufacturer in February 2026 as part of a broader campaign hitting at least nine organizations across four continents, including government agencies, industrial manufacturers, financial services firms, and educational institutions. The attackers used DLL sideloading via legitimately signed Fortemedia and SentinelOne binaries to deploy malicious payloads.Android 17 brings AI-driven defensesGoogle’s Android 17introduces a broad set of security upgrades, including verified financial calls (automatically drops spoofed calls impersonating participating banks) and expanded Live Threat Detection, which now flags suspicious behaviors like SMS forwarding and accessibility overlay abuse in real time. On the anti-theft front, biometric authentication can now be required to unlock a device marked as lost, and default-on theft protections are rolling out globally. The update also introduces post-quantum cryptography, automatic OTP hiding from most apps, and Android OS verification to help users confirm they’re running a legitimate build.Big Tech pushes back on Canada’s encryption billApple and Meta areopposing Bill C-22, a Canadian lawful-access bill they warn could force tech companies to build encryption backdoors or install government spyware on their systems.Metapointed to the Salt Typhoon espionage campaign as proof that authorized backdoors can be exploited, while Public Safety Canada insists the bill would not require systemic vulnerabilities, though both tech companies say the real risk lies in how the bill’s broad powers could be interpreted once enacted.Grego AI and Secludy announce launch and fundingSecludyannounced raising $4 million for its newly launched platform, designed to help organizations in regulated industries safely use valuable data for AI. The platform generates synthetic data that mirrors original datasets, enabling customers to train and evaluate AI models without exposing sensitive customer information.Grego AIemerged from stealth mode with a platform that pushes existing AI models beyond their expected capabilities to find critical software vulnerabilities. The company said it earned a $250,000 bug bounty for a vulnerability it uncovered, and claims to have helped prevent a $27 million attack. Grego AI told SecurityWeek that it raised $2 million in funding.Audi’s connected car platform exposed owner dataA security researcher discovered severalvulnerabilities in the myAudiconnected car platform, finding that anyone who knows a vehicle’s VIN can add it to their account as a guest and access sensitive data. Exposed information included the embedded SIM’s IMEI and ICCID identifiers, the GPS location of the primary owner when they triggered a ‘honk & flash’ command, as well as vehicle lock status. CARIAD, the VW Group’s software arm, has patched one issue, but the researcher says the remaining findings are still under evaluation. Audi has not responded to SecurityWeek’s request for comment.Cisco open-sources blueprint for AI-driven vulnerability evaluationCisco has releasedFoundry Security Spec, an open source specification for building agentic security evaluation systems that use frontier AI models to find and validate vulnerabilities in a structured, auditable way. Rather than sharing internal code tied to Cisco’s own infrastructure, the company is releasing the design (eight core agent roles, a finding lifecycle, and 130 functional requirements) so security teams can adapt it to their own environments.FBI issues warning after ShinyHunters hacks CanvasShinyHunters has claimed responsibility for an attack on Instructure’s Canvas system, whichdisruptedservice to educational institutions across the US, and the FBI is nowwarningthat affected students and faculty could be targets for extortion and sophisticated spearphishing using stolen data. The group is known for large-scale data theft and aggressive pressure tactics to coerce victims into paying, including threatening calls, texts to family members, and swatting. The US government has asked Instructure toprovide clarificationafter the company admitted it reached anagreementwith the hackers.Related:In Other News: Train Hacker Arrested, PamDOORa Linux Backdoor, New CISA Director FrontrunnerRelated:In Other News: Scattered Spider Hacker Arrested, SOC Effectiveness Metrics, NSA Tool Vulnerability
Iran-linked group Seedworm (also known as MuddyWater)breacheda major South Korean electronics manufacturer in February 2026 as part of a broader campaign hitting at least nine organizations across four continents, including government agencies, industrial manufacturers, financial services firms, and educational institutions. The attackers used DLL sideloading via legitimately signed Fortemedia and SentinelOne binaries to deploy malicious payloads.Android 17 brings AI-driven defensesGoogle’s Android 17introduces a broad set of security upgrades, including verified financial calls (automatically drops spoofed calls impersonating participating banks) and expanded Live Threat Detection, which now flags suspicious behaviors like SMS forwarding and accessibility overlay abuse in real time. On the anti-theft front, biometric authentication can now be required to unlock a device marked as lost, and default-on theft protections are rolling out globally. The update also introduces post-quantum cryptography, automatic OTP hiding from most apps, and Android OS verification to help users confirm they’re running a legitimate build.Big Tech pushes back on Canada’s encryption billApple and Meta areopposing Bill C-22, a Canadian lawful-access bill they warn could force tech companies to build encryption backdoors or install government spyware on their systems.Metapointed to the Salt Typhoon espionage campaign as proof that authorized backdoors can be exploited, while Public Safety Canada insists the bill would not require systemic vulnerabilities, though both tech companies say the real risk lies in how the bill’s broad powers could be interpreted once enacted.Grego AI and Secludy announce launch and fundingSecludyannounced raising $4 million for its newly launched platform, designed to help organizations in regulated industries safely use valuable data for AI. The platform generates synthetic data that mirrors original datasets, enabling customers to train and evaluate AI models without exposing sensitive customer information.Grego AIemerged from stealth mode with a platform that pushes existing AI models beyond their expected capabilities to find critical software vulnerabilities. The company said it earned a $250,000 bug bounty for a vulnerability it uncovered, and claims to have helped prevent a $27 million attack. Grego AI told SecurityWeek that it raised $2 million in funding.Audi’s connected car platform exposed owner dataA security researcher discovered severalvulnerabilities in the myAudiconnected car platform, finding that anyone who knows a vehicle’s VIN can add it to their account as a guest and access sensitive data. Exposed information included the embedded SIM’s IMEI and ICCID identifiers, the GPS location of the primary owner when they triggered a ‘honk & flash’ command, as well as vehicle lock status. CARIAD, the VW Group’s software arm, has patched one issue, but the researcher says the remaining findings are still under evaluation. Audi has not responded to SecurityWeek’s request for comment.Cisco open-sources blueprint for AI-driven vulnerability evaluationCisco has releasedFoundry Security Spec, an open source specification for building agentic security evaluation systems that use frontier AI models to find and validate vulnerabilities in a structured, auditable way. Rather than sharing internal code tied to Cisco’s own infrastructure, the company is releasing the design (eight core agent roles, a finding lifecycle, and 130 functional requirements) so security teams can adapt it to their own environments.FBI issues warning after ShinyHunters hacks CanvasShinyHunters has claimed responsibility for an attack on Instructure’s Canvas system, whichdisruptedservice to educational institutions across the US, and the FBI is nowwarningthat affected students and faculty could be targets for extortion and sophisticated spearphishing using stolen data. The group is known for large-scale data theft and aggressive pressure tactics to coerce victims into paying, including threatening calls, texts to family members, and swatting. The US government has asked Instructure toprovide clarificationafter the company admitted it reached anagreementwith the hackers.Related:In Other News: Train Hacker Arrested, PamDOORa Linux Backdoor, New CISA Director FrontrunnerRelated:In Other News: Scattered Spider Hacker Arrested, SOC Effectiveness Metrics, NSA Tool Vulnerability
Android 17 brings AI-driven defensesGoogle’s Android 17introduces a broad set of security upgrades, including verified financial calls (automatically drops spoofed calls impersonating participating banks) and expanded Live Threat Detection, which now flags suspicious behaviors like SMS forwarding and accessibility overlay abuse in real time. On the anti-theft front, biometric authentication can now be required to unlock a device marked as lost, and default-on theft protections are rolling out globally. The update also introduces post-quantum cryptography, automatic OTP hiding from most apps, and Android OS verification to help users confirm they’re running a legitimate build.Big Tech pushes back on Canada’s encryption billApple and Meta areopposing Bill C-22, a Canadian lawful-access bill they warn could force tech companies to build encryption backdoors or install government spyware on their systems.Metapointed to the Salt Typhoon espionage campaign as proof that authorized backdoors can be exploited, while Public Safety Canada insists the bill would not require systemic vulnerabilities, though both tech companies say the real risk lies in how the bill’s broad powers could be interpreted once enacted.Grego AI and Secludy announce launch and fundingSecludyannounced raising $4 million for its newly launched platform, designed to help organizations in regulated industries safely use valuable data for AI. The platform generates synthetic data that mirrors original datasets, enabling customers to train and evaluate AI models without exposing sensitive customer information.Grego AIemerged from stealth mode with a platform that pushes existing AI models beyond their expected capabilities to find critical software vulnerabilities. The company said it earned a $250,000 bug bounty for a vulnerability it uncovered, and claims to have helped prevent a $27 million attack. Grego AI told SecurityWeek that it raised $2 million in funding.Audi’s connected car platform exposed owner dataA security researcher discovered severalvulnerabilities in the myAudiconnected car platform, finding that anyone who knows a vehicle’s VIN can add it to their account as a guest and access sensitive data. Exposed information included the embedded SIM’s IMEI and ICCID identifiers, the GPS location of the primary owner when they triggered a ‘honk & flash’ command, as well as vehicle lock status. CARIAD, the VW Group’s software arm, has patched one issue, but the researcher says the remaining findings are still under evaluation. Audi has not responded to SecurityWeek’s request for comment.Cisco open-sources blueprint for AI-driven vulnerability evaluationCisco has releasedFoundry Security Spec, an open source specification for building agentic security evaluation systems that use frontier AI models to find and validate vulnerabilities in a structured, auditable way. Rather than sharing internal code tied to Cisco’s own infrastructure, the company is releasing the design (eight core agent roles, a finding lifecycle, and 130 functional requirements) so security teams can adapt it to their own environments.FBI issues warning after ShinyHunters hacks CanvasShinyHunters has claimed responsibility for an attack on Instructure’s Canvas system, whichdisruptedservice to educational institutions across the US, and the FBI is nowwarningthat affected students and faculty could be targets for extortion and sophisticated spearphishing using stolen data. The group is known for large-scale data theft and aggressive pressure tactics to coerce victims into paying, including threatening calls, texts to family members, and swatting. The US government has asked Instructure toprovide clarificationafter the company admitted it reached anagreementwith the hackers.Related:In Other News: Train Hacker Arrested, PamDOORa Linux Backdoor, New CISA Director FrontrunnerRelated:In Other News: Scattered Spider Hacker Arrested, SOC Effectiveness Metrics, NSA Tool Vulnerability
Google’s Android 17introduces a broad set of security upgrades, including verified financial calls (automatically drops spoofed calls impersonating participating banks) and expanded Live Threat Detection, which now flags suspicious behaviors like SMS forwarding and accessibility overlay abuse in real time. On the anti-theft front, biometric authentication can now be required to unlock a device marked as lost, and default-on theft protections are rolling out globally. The update also introduces post-quantum cryptography, automatic OTP hiding from most apps, and Android OS verification to help users confirm they’re running a legitimate build.Big Tech pushes back on Canada’s encryption billApple and Meta areopposing Bill C-22, a Canadian lawful-access bill they warn could force tech companies to build encryption backdoors or install government spyware on their systems.Metapointed to the Salt Typhoon espionage campaign as proof that authorized backdoors can be exploited, while Public Safety Canada insists the bill would not require systemic vulnerabilities, though both tech companies say the real risk lies in how the bill’s broad powers could be interpreted once enacted.Grego AI and Secludy announce launch and fundingSecludyannounced raising $4 million for its newly launched platform, designed to help organizations in regulated industries safely use valuable data for AI. The platform generates synthetic data that mirrors original datasets, enabling customers to train and evaluate AI models without exposing sensitive customer information.Grego AIemerged from stealth mode with a platform that pushes existing AI models beyond their expected capabilities to find critical software vulnerabilities. The company said it earned a $250,000 bug bounty for a vulnerability it uncovered, and claims to have helped prevent a $27 million attack. Grego AI told SecurityWeek that it raised $2 million in funding.Audi’s connected car platform exposed owner dataA security researcher discovered severalvulnerabilities in the myAudiconnected car platform, finding that anyone who knows a vehicle’s VIN can add it to their account as a guest and access sensitive data. Exposed information included the embedded SIM’s IMEI and ICCID identifiers, the GPS location of the primary owner when they triggered a ‘honk & flash’ command, as well as vehicle lock status. CARIAD, the VW Group’s software arm, has patched one issue, but the researcher says the remaining findings are still under evaluation. Audi has not responded to SecurityWeek’s request for comment.Cisco open-sources blueprint for AI-driven vulnerability evaluationCisco has releasedFoundry Security Spec, an open source specification for building agentic security evaluation systems that use frontier AI models to find and validate vulnerabilities in a structured, auditable way. Rather than sharing internal code tied to Cisco’s own infrastructure, the company is releasing the design (eight core agent roles, a finding lifecycle, and 130 functional requirements) so security teams can adapt it to their own environments.FBI issues warning after ShinyHunters hacks CanvasShinyHunters has claimed responsibility for an attack on Instructure’s Canvas system, whichdisruptedservice to educational institutions across the US, and the FBI is nowwarningthat affected students and faculty could be targets for extortion and sophisticated spearphishing using stolen data. The group is known for large-scale data theft and aggressive pressure tactics to coerce victims into paying, including threatening calls, texts to family members, and swatting. The US government has asked Instructure toprovide clarificationafter the company admitted it reached anagreementwith the hackers.Related:In Other News: Train Hacker Arrested, PamDOORa Linux Backdoor, New CISA Director FrontrunnerRelated:In Other News: Scattered Spider Hacker Arrested, SOC Effectiveness Metrics, NSA Tool Vulnerability
Big Tech pushes back on Canada’s encryption billApple and Meta areopposing Bill C-22, a Canadian lawful-access bill they warn could force tech companies to build encryption backdoors or install government spyware on their systems.Metapointed to the Salt Typhoon espionage campaign as proof that authorized backdoors can be exploited, while Public Safety Canada insists the bill would not require systemic vulnerabilities, though both tech companies say the real risk lies in how the bill’s broad powers could be interpreted once enacted.Grego AI and Secludy announce launch and fundingSecludyannounced raising $4 million for its newly launched platform, designed to help organizations in regulated industries safely use valuable data for AI. The platform generates synthetic data that mirrors original datasets, enabling customers to train and evaluate AI models without exposing sensitive customer information.Grego AIemerged from stealth mode with a platform that pushes existing AI models beyond their expected capabilities to find critical software vulnerabilities. The company said it earned a $250,000 bug bounty for a vulnerability it uncovered, and claims to have helped prevent a $27 million attack. Grego AI told SecurityWeek that it raised $2 million in funding.Audi’s connected car platform exposed owner dataA security researcher discovered severalvulnerabilities in the myAudiconnected car platform, finding that anyone who knows a vehicle’s VIN can add it to their account as a guest and access sensitive data. Exposed information included the embedded SIM’s IMEI and ICCID identifiers, the GPS location of the primary owner when they triggered a ‘honk & flash’ command, as well as vehicle lock status. CARIAD, the VW Group’s software arm, has patched one issue, but the researcher says the remaining findings are still under evaluation. Audi has not responded to SecurityWeek’s request for comment.Cisco open-sources blueprint for AI-driven vulnerability evaluationCisco has releasedFoundry Security Spec, an open source specification for building agentic security evaluation systems that use frontier AI models to find and validate vulnerabilities in a structured, auditable way. Rather than sharing internal code tied to Cisco’s own infrastructure, the company is releasing the design (eight core agent roles, a finding lifecycle, and 130 functional requirements) so security teams can adapt it to their own environments.FBI issues warning after ShinyHunters hacks CanvasShinyHunters has claimed responsibility for an attack on Instructure’s Canvas system, whichdisruptedservice to educational institutions across the US, and the FBI is nowwarningthat affected students and faculty could be targets for extortion and sophisticated spearphishing using stolen data. The group is known for large-scale data theft and aggressive pressure tactics to coerce victims into paying, including threatening calls, texts to family members, and swatting. The US government has asked Instructure toprovide clarificationafter the company admitted it reached anagreementwith the hackers.Related:In Other News: Train Hacker Arrested, PamDOORa Linux Backdoor, New CISA Director FrontrunnerRelated:In Other News: Scattered Spider Hacker Arrested, SOC Effectiveness Metrics, NSA Tool Vulnerability
Apple and Meta areopposing Bill C-22, a Canadian lawful-access bill they warn could force tech companies to build encryption backdoors or install government spyware on their systems.Metapointed to the Salt Typhoon espionage campaign as proof that authorized backdoors can be exploited, while Public Safety Canada insists the bill would not require systemic vulnerabilities, though both tech companies say the real risk lies in how the bill’s broad powers could be interpreted once enacted.Grego AI and Secludy announce launch and fundingSecludyannounced raising $4 million for its newly launched platform, designed to help organizations in regulated industries safely use valuable data for AI. The platform generates synthetic data that mirrors original datasets, enabling customers to train and evaluate AI models without exposing sensitive customer information.Grego AIemerged from stealth mode with a platform that pushes existing AI models beyond their expected capabilities to find critical software vulnerabilities. The company said it earned a $250,000 bug bounty for a vulnerability it uncovered, and claims to have helped prevent a $27 million attack. Grego AI told SecurityWeek that it raised $2 million in funding.Audi’s connected car platform exposed owner dataA security researcher discovered severalvulnerabilities in the myAudiconnected car platform, finding that anyone who knows a vehicle’s VIN can add it to their account as a guest and access sensitive data. Exposed information included the embedded SIM’s IMEI and ICCID identifiers, the GPS location of the primary owner when they triggered a ‘honk & flash’ command, as well as vehicle lock status. CARIAD, the VW Group’s software arm, has patched one issue, but the researcher says the remaining findings are still under evaluation. Audi has not responded to SecurityWeek’s request for comment.Cisco open-sources blueprint for AI-driven vulnerability evaluationCisco has releasedFoundry Security Spec, an open source specification for building agentic security evaluation systems that use frontier AI models to find and validate vulnerabilities in a structured, auditable way. Rather than sharing internal code tied to Cisco’s own infrastructure, the company is releasing the design (eight core agent roles, a finding lifecycle, and 130 functional requirements) so security teams can adapt it to their own environments.FBI issues warning after ShinyHunters hacks CanvasShinyHunters has claimed responsibility for an attack on Instructure’s Canvas system, whichdisruptedservice to educational institutions across the US, and the FBI is nowwarningthat affected students and faculty could be targets for extortion and sophisticated spearphishing using stolen data. The group is known for large-scale data theft and aggressive pressure tactics to coerce victims into paying, including threatening calls, texts to family members, and swatting. The US government has asked Instructure toprovide clarificationafter the company admitted it reached anagreementwith the hackers.Related:In Other News: Train Hacker Arrested, PamDOORa Linux Backdoor, New CISA Director FrontrunnerRelated:In Other News: Scattered Spider Hacker Arrested, SOC Effectiveness Metrics, NSA Tool Vulnerability
Grego AI and Secludy announce launch and fundingSecludyannounced raising $4 million for its newly launched platform, designed to help organizations in regulated industries safely use valuable data for AI. The platform generates synthetic data that mirrors original datasets, enabling customers to train and evaluate AI models without exposing sensitive customer information.Grego AIemerged from stealth mode with a platform that pushes existing AI models beyond their expected capabilities to find critical software vulnerabilities. The company said it earned a $250,000 bug bounty for a vulnerability it uncovered, and claims to have helped prevent a $27 million attack. Grego AI told SecurityWeek that it raised $2 million in funding.Audi’s connected car platform exposed owner dataA security researcher discovered severalvulnerabilities in the myAudiconnected car platform, finding that anyone who knows a vehicle’s VIN can add it to their account as a guest and access sensitive data. Exposed information included the embedded SIM’s IMEI and ICCID identifiers, the GPS location of the primary owner when they triggered a ‘honk & flash’ command, as well as vehicle lock status. CARIAD, the VW Group’s software arm, has patched one issue, but the researcher says the remaining findings are still under evaluation. Audi has not responded to SecurityWeek’s request for comment.Cisco open-sources blueprint for AI-driven vulnerability evaluationCisco has releasedFoundry Security Spec, an open source specification for building agentic security evaluation systems that use frontier AI models to find and validate vulnerabilities in a structured, auditable way. Rather than sharing internal code tied to Cisco’s own infrastructure, the company is releasing the design (eight core agent roles, a finding lifecycle, and 130 functional requirements) so security teams can adapt it to their own environments.FBI issues warning after ShinyHunters hacks CanvasShinyHunters has claimed responsibility for an attack on Instructure’s Canvas system, whichdisruptedservice to educational institutions across the US, and the FBI is nowwarningthat affected students and faculty could be targets for extortion and sophisticated spearphishing using stolen data. The group is known for large-scale data theft and aggressive pressure tactics to coerce victims into paying, including threatening calls, texts to family members, and swatting. The US government has asked Instructure toprovide clarificationafter the company admitted it reached anagreementwith the hackers.Related:In Other News: Train Hacker Arrested, PamDOORa Linux Backdoor, New CISA Director FrontrunnerRelated:In Other News: Scattered Spider Hacker Arrested, SOC Effectiveness Metrics, NSA Tool Vulnerability
Secludyannounced raising $4 million for its newly launched platform, designed to help organizations in regulated industries safely use valuable data for AI. The platform generates synthetic data that mirrors original datasets, enabling customers to train and evaluate AI models without exposing sensitive customer information.Grego AIemerged from stealth mode with a platform that pushes existing AI models beyond their expected capabilities to find critical software vulnerabilities. The company said it earned a $250,000 bug bounty for a vulnerability it uncovered, and claims to have helped prevent a $27 million attack. Grego AI told SecurityWeek that it raised $2 million in funding.Audi’s connected car platform exposed owner dataA security researcher discovered severalvulnerabilities in the myAudiconnected car platform, finding that anyone who knows a vehicle’s VIN can add it to their account as a guest and access sensitive data. Exposed information included the embedded SIM’s IMEI and ICCID identifiers, the GPS location of the primary owner when they triggered a ‘honk & flash’ command, as well as vehicle lock status. CARIAD, the VW Group’s software arm, has patched one issue, but the researcher says the remaining findings are still under evaluation. Audi has not responded to SecurityWeek’s request for comment.Cisco open-sources blueprint for AI-driven vulnerability evaluationCisco has releasedFoundry Security Spec, an open source specification for building agentic security evaluation systems that use frontier AI models to find and validate vulnerabilities in a structured, auditable way. Rather than sharing internal code tied to Cisco’s own infrastructure, the company is releasing the design (eight core agent roles, a finding lifecycle, and 130 functional requirements) so security teams can adapt it to their own environments.FBI issues warning after ShinyHunters hacks CanvasShinyHunters has claimed responsibility for an attack on Instructure’s Canvas system, whichdisruptedservice to educational institutions across the US, and the FBI is nowwarningthat affected students and faculty could be targets for extortion and sophisticated spearphishing using stolen data. The group is known for large-scale data theft and aggressive pressure tactics to coerce victims into paying, including threatening calls, texts to family members, and swatting. The US government has asked Instructure toprovide clarificationafter the company admitted it reached anagreementwith the hackers.Related:In Other News: Train Hacker Arrested, PamDOORa Linux Backdoor, New CISA Director FrontrunnerRelated:In Other News: Scattered Spider Hacker Arrested, SOC Effectiveness Metrics, NSA Tool Vulnerability
Grego AIemerged from stealth mode with a platform that pushes existing AI models beyond their expected capabilities to find critical software vulnerabilities. The company said it earned a $250,000 bug bounty for a vulnerability it uncovered, and claims to have helped prevent a $27 million attack. Grego AI told SecurityWeek that it raised $2 million in funding.Audi’s connected car platform exposed owner dataA security researcher discovered severalvulnerabilities in the myAudiconnected car platform, finding that anyone who knows a vehicle’s VIN can add it to their account as a guest and access sensitive data. Exposed information included the embedded SIM’s IMEI and ICCID identifiers, the GPS location of the primary owner when they triggered a ‘honk & flash’ command, as well as vehicle lock status. CARIAD, the VW Group’s software arm, has patched one issue, but the researcher says the remaining findings are still under evaluation. Audi has not responded to SecurityWeek’s request for comment.Cisco open-sources blueprint for AI-driven vulnerability evaluationCisco has releasedFoundry Security Spec, an open source specification for building agentic security evaluation systems that use frontier AI models to find and validate vulnerabilities in a structured, auditable way. Rather than sharing internal code tied to Cisco’s own infrastructure, the company is releasing the design (eight core agent roles, a finding lifecycle, and 130 functional requirements) so security teams can adapt it to their own environments.FBI issues warning after ShinyHunters hacks CanvasShinyHunters has claimed responsibility for an attack on Instructure’s Canvas system, whichdisruptedservice to educational institutions across the US, and the FBI is nowwarningthat affected students and faculty could be targets for extortion and sophisticated spearphishing using stolen data. The group is known for large-scale data theft and aggressive pressure tactics to coerce victims into paying, including threatening calls, texts to family members, and swatting. The US government has asked Instructure toprovide clarificationafter the company admitted it reached anagreementwith the hackers.Related:In Other News: Train Hacker Arrested, PamDOORa Linux Backdoor, New CISA Director FrontrunnerRelated:In Other News: Scattered Spider Hacker Arrested, SOC Effectiveness Metrics, NSA Tool Vulnerability
Audi’s connected car platform exposed owner dataA security researcher discovered severalvulnerabilities in the myAudiconnected car platform, finding that anyone who knows a vehicle’s VIN can add it to their account as a guest and access sensitive data. Exposed information included the embedded SIM’s IMEI and ICCID identifiers, the GPS location of the primary owner when they triggered a ‘honk & flash’ command, as well as vehicle lock status. CARIAD, the VW Group’s software arm, has patched one issue, but the researcher says the remaining findings are still under evaluation. Audi has not responded to SecurityWeek’s request for comment.Cisco open-sources blueprint for AI-driven vulnerability evaluationCisco has releasedFoundry Security Spec, an open source specification for building agentic security evaluation systems that use frontier AI models to find and validate vulnerabilities in a structured, auditable way. Rather than sharing internal code tied to Cisco’s own infrastructure, the company is releasing the design (eight core agent roles, a finding lifecycle, and 130 functional requirements) so security teams can adapt it to their own environments.FBI issues warning after ShinyHunters hacks CanvasShinyHunters has claimed responsibility for an attack on Instructure’s Canvas system, whichdisruptedservice to educational institutions across the US, and the FBI is nowwarningthat affected students and faculty could be targets for extortion and sophisticated spearphishing using stolen data. The group is known for large-scale data theft and aggressive pressure tactics to coerce victims into paying, including threatening calls, texts to family members, and swatting. The US government has asked Instructure toprovide clarificationafter the company admitted it reached anagreementwith the hackers.Related:In Other News: Train Hacker Arrested, PamDOORa Linux Backdoor, New CISA Director FrontrunnerRelated:In Other News: Scattered Spider Hacker Arrested, SOC Effectiveness Metrics, NSA Tool Vulnerability
Source: SecurityWeek