The week in one line
Education technology and cloud infrastructure faced unprecedented attacks during critical academic periods.
What happened
Attackers exploited trust relationships and AI tools to compromise critical systems at scale. Multiple supply chain compromises targeted popular software distribution channels.
- ShinyHunters breached Canvas LMS affecting 9,000+ schools and 275 million users during finals season
- Chinese state actors exploited Palo Alto Networks firewall zero-day for nearly a month
- Polish water treatment facilities compromised by Russian APT groups with operational system access
- PCPJack malware waged turf war against TeamPCP while stealing cloud credentials across AWS, Kubernetes
- Multiple AI coding tools (Claude, Gemini CLI, Cursor) found vulnerable to supply chain injection
Why it matters for defenders and leaders
Educational institutions face disruption during critical periods with limited incident response capacity. Nation-state actors are weaponizing AI tools to accelerate operational technology targeting.
- Critical infrastructure attacks now leverage AI for reconnaissance and targeting guidance
- Supply chain compromises increasingly target AI and developer toolchains with trusted distribution channels
- Educational technology represents high-value, low-security targets affecting millions simultaneously
- Cloud credential theft operations compete aggressively, expanding attack surface through malware consolidation
What to do this week
- Patch CVE-2026-0300 (PAN-OS) and CVE-2026-6973 (Ivanti EPMM) immediately if affected
- Audit AI coding tool permissions and restrict execution on untrusted repositories
- Review Canvas LMS access logs and rotate credentials for affected educational institutions
- Monitor cloud environments for PCPJack indicators and competing malware removal activity
- Implement additional authentication layers for critical infrastructure and educational technology platforms