Big Tech Opposes Canada’s Encryption Bill, Cisco Releases Open-Source AI Security Spec, Audi App Exposes Owner Data

Published:

spot_img

Big Tech Opposes Canada’s Encryption Bill, Cisco Releases Open-Source AI Security Spec, Audi App Exposes Owner Data

Recent developments in cybersecurity highlight the ongoing challenges and responses within the industry, particularly regarding data breaches, regulatory pressures, and technological advancements. These incidents underscore the evolving threat landscape and the need for robust security measures.

Nvidia Cloud Gaming Partner Suffers Data Breach

Nvidia has confirmed a data breach affecting users of its GeForce NOW service, specifically through GFN.am, its regional partner in Armenia. The breach occurred between March 20 and 26, exposing personal information such as full names, email addresses, phone numbers, dates of birth, and usernames. Notably, no passwords were compromised, and users who registered after March 9 remain unaffected. A threat actor, operating under the alias ShinyHunters, claimed responsibility on a hacker forum, offering the full database for $100,000 in cryptocurrency before the post was removed. This incident highlights the vulnerabilities associated with third-party partnerships and the importance of securing user data across all platforms.

FCC Extends Update Window for Foreign Routers

In a significant policy shift, the Federal Communications Commission (FCC) has extended the update window for foreign-made routers and drones listed as national security risks. These devices will now be permitted to receive security patches and firmware updates until at least January 1, 2029, an extension from the previous March 2027 cutoff. This decision reflects ongoing concerns about the security implications of foreign technology in critical infrastructure and the need for continued support to mitigate potential vulnerabilities.

OpenAI Engages EU Regulators on Cyber AI

OpenAI is in discussions with the European Commission to provide access to a cyber-focused variant of its GPT-5.5 model, which is designed to identify and exploit software vulnerabilities. This initiative follows challenges faced by EU cybersecurity officials in accessing a similar model from Anthropic, which has been restricted to a select group of organizations. The European Union Agency for Cybersecurity (ENISA) has confirmed OpenAI’s outreach, viewing this as a step toward monitoring AI deployment and addressing associated security risks. This engagement underscores the growing intersection of artificial intelligence and cybersecurity, as regulators seek to understand and manage the implications of advanced technologies.

Developers Targeted by Malicious Installer Campaign

A recent report from Ontinue has revealed an active infostealer campaign targeting developers through fake Claude Code installation pages. These pages, promoted via sponsored search results, trick users into executing malicious PowerShell commands. The malware exploits Chrome’s App-Bound Encryption to extract sensitive data, including cookies, saved passwords, and payment information from various Chromium-based browsers. This incident highlights the ongoing threat of social engineering attacks and the need for developers to remain vigilant against such tactics.

Seedworm Targets South Korean Electronics Manufacturer

The Iranian-linked group Seedworm, also known as MuddyWater, has reportedly breached a major South Korean electronics manufacturer as part of a broader campaign affecting multiple organizations across four continents. The attackers utilized DLL sideloading techniques via legitimately signed binaries to deploy malicious payloads. This incident illustrates the global reach of cyber threats and the necessity for organizations to implement comprehensive security measures against sophisticated attack methods.

Android 17 Introduces Enhanced Security Features

Google’s Android 17 update has introduced a range of security enhancements, including verified financial calls that automatically drop spoofed calls impersonating banks. The update also expands Live Threat Detection capabilities, flagging suspicious behaviors in real time. Additionally, biometric authentication can now be required to unlock devices marked as lost, and theft protections are being rolled out globally. These advancements reflect the ongoing commitment to improving user security in mobile technology, particularly in response to rising threats.

Big Tech Pushes Back on Canada’s Encryption Bill

Apple and Meta have voiced strong opposition to Canada’s Bill C-22, a lawful-access bill that they argue could compel tech companies to implement encryption backdoors or government spyware. Meta cited the Salt Typhoon espionage campaign as evidence that authorized backdoors can be exploited. While Public Safety Canada maintains that the bill does not mandate systemic vulnerabilities, both companies express concern over the potential for broad interpretation of the bill’s powers once enacted. This situation underscores the tension between regulatory measures and the imperative for user privacy and security.

Cisco Releases Open-Source AI Security Spec

Cisco has unveiled the Foundry Security Spec, an open-source specification aimed at developing agentic security evaluation systems that leverage advanced AI models to identify and validate vulnerabilities. By releasing this design, which includes eight core agent roles and 130 functional requirements, Cisco aims to empower security teams to adapt the framework to their specific environments. This initiative represents a significant step toward enhancing collaborative security efforts within the industry.

Audi’s Connected Car Platform Exposes Owner Data

A security researcher has identified vulnerabilities in Audi’s myAudi connected car platform, allowing unauthorized users to access sensitive information by knowing a vehicle’s VIN. Exposed data includes the embedded SIM’s IMEI and ICCID identifiers, as well as the GPS location of the primary owner. While CARIAD, the VW Group’s software arm, has patched one issue, other vulnerabilities remain under evaluation. This incident highlights the critical need for robust security measures in connected vehicle technologies.

FBI Issues Warning Following ShinyHunters Attack on Canvas

Following an attack by ShinyHunters on Instructure’s Canvas system, the FBI has issued a warning regarding potential extortion and spearphishing threats to affected students and faculty. The group is known for large-scale data theft and aggressive tactics to coerce victims into compliance. The U.S. government has requested clarification from Instructure after the company acknowledged reaching an agreement with the hackers. This situation emphasizes the ongoing risks associated with educational institutions and the importance of safeguarding sensitive data.

For further insights into the latest cybersecurity developments, threat intelligence, and breaking updates from across the Middle East.

Source: www.securityweek.com

spot_img

Related articles

Recent articles

Tidal Wave of Child Exploitation: Investigating the Surge of Online Abuse

Tidal Wave of Child Exploitation: Investigating the Surge of Online Abuse The alarming rise in online child exploitation has become a pressing concern for law...

West African Development Bank (BOAD) and International Finance Corporation (IFC) Sign Landmark EUR 600 Million Reciprocal Financing Facilities to Strengthen Local Currency Financing in...

West African Development Bank (BOAD) and International Finance Corporation (IFC) Sign Landmark EUR 600 Million Reciprocal Financing Facilities to Strengthen Local Currency Financing in...

Turla Transforms Kazuar Backdoor into Modular P2P Botnet for Enhanced Stealth and Access

Turla Transforms Kazuar Backdoor into Modular P2P Botnet for Enhanced Stealth and Access The Russian state-sponsored hacking group Turla has significantly upgraded its Kazuar backdoor,...

OpenAI Strengthens Security Posture Following Limited TanStack npm Supply Chain Attack

OpenAI Strengthens Security Posture Following Limited TanStack npm Supply Chain Attack OpenAI has recently revealed its response to the TanStack npm supply chain attack, confirming...