Canva AI 2.0 Launches With Agent-Like Features and Design Memory Upgrade

Canva introduces Canva AI 2.0 with new conversational and agentic  capabilities

The visual design platform Canva has officially unveiled a major upgrade to its artificial intelligence system with the launch of Canva AI 2.0. Announced at the Canva Create 2026 event in Hollywood Park, Los Angeles, the new version marks a significant step forward in how users interact with design tools through AI-powered assistance.

Unlike earlier versions, Canva AI 2.0 introduces a more advanced “agentic” system capable of understanding layered design elements and executing complex creative tasks through simple conversational prompts. This means users can now describe what they want, and the AI can handle multi-step design processes with far less manual input.

One of the standout additions is its ability to manage multi-channel campaign creation, allowing users to generate coordinated designs across different formats and platforms. The system also introduces memory capabilities, enabling it to remember user preferences and previous design choices to deliver more personalized results over time.

Beyond design generation, the upgraded suite includes features such as web research integration and task scheduling, expanding its role beyond a traditional creative tool into a more versatile productivity assistant. These enhancements are aimed at streamlining workflows for both individual creators and professional teams.

According to Canva, the rollout of Canva AI 2.0 will begin in phases over the coming weeks, eventually becoming available to users globally. The update reflects the company’s broader push toward making design more intuitive, automated, and accessible through artificial intelligence.

Apple Tap-to-Pay Security Flaw Shown in Video: Locked iPhone Used in $10K Demo

Video shows how to steal $10,000 from locked iPhone in controlled setting -  9to5Mac

A new security demonstration has raised concerns about Apple’s payment ecosystem after a YouTuber showcased a potential vulnerability affecting tap-to-pay functionality on iPhones. The issue reportedly allows a locked device to be manipulated in a way that simulates a legitimate payment interaction, without requiring the phone to be unlocked or directly authorized by the user.

Apple has long promoted its ecosystem as highly secure, particularly when it comes to features like NFC-based payments and Express Transit Mode. However, the demonstration suggests that under specific conditions, an attacker could potentially exploit a “man-in-the-middle” style setup to trick an iPhone into processing a payment as if it were interacting with a real point-of-sale terminal.

In the video, the creator—working alongside cybersecurity researchers—shows how specialized hardware can intercept and relay NFC signals. The setup reportedly uses a device connected to a computer to mimic a payment terminal, effectively convincing the iPhone that a legitimate transaction is taking place. The demonstration includes a test scenario involving a locked device, raising questions about how such interactions are validated.

The exploit, according to the video, is based on a concept that has been known in cybersecurity circles for several years, though it has now been presented in a more practical, real-world context. It highlights how NFC-based systems, while convenient, can still be vulnerable to relay attacks if security layers are bypassed or misinterpreted.

While there is no indication of widespread real-world abuse, the demonstration has sparked renewed discussion about mobile payment security and the importance of layered protections. It also underscores the ongoing challenge for companies like Apple to balance convenience features such as tap-to-pay with evolving security threats in mobile ecosystems.

US warns of escalating Iranian cyberattacks on infrastructure

U.S. authorities have warned that Iranian-backed hacking campaigns targeting critical infrastructure have intensified following the escalation of regional hostilities.

According to a joint advisory issued by agencies including the FBI, National Security Agency and Cybersecurity and Infrastructure Security Agency, attackers are focusing on industrial control systems widely used across essential sectors.

Targets and Methods

The hackers are primarily exploiting:

  • Programmable Logic Controllers (PLCs)
  • SCADA systems (Supervisory Control and Data Acquisition)

These systems are critical for operating infrastructure such as:

  • Energy grids
  • Water and wastewater facilities
  • Government service systems

Attack techniques include:

  • Manipulating system display data
  • Extracting sensitive operational configurations
  • Interfering with real-time control processes

In several cases, the activity has already resulted in operational disruption and financial losses.

Strategic Intent

U.S. officials assess that the campaigns aim to create “disruptive effects” within the United States, signaling a shift from espionage toward potential sabotage.

The warning aligns with broader geopolitical tensions involving Iran and the United States, with threats extending to infrastructure targets both domestically and across the Gulf region.

Agencies Involved

The advisory was jointly issued by multiple agencies, including:

  • Federal Bureau of Investigation
  • National Security Agency
  • Cybersecurity and Infrastructure Security Agency
  • Environmental Protection Agency
  • Department of Energy
  • U.S. Cyber Command’s Cyber National Mission Force

Risk Implications

The targeting of industrial control systems is particularly concerning because:

  • Many are internet-exposed with weak security configurations
  • They often run legacy software with limited patching
  • Disruption can have physical-world consequences, not just digital impact

Outlook

The escalation indicates a broader trend:

  • Cyber operations are increasingly integrated into geopolitical conflict
  • Critical infrastructure is becoming a primary attack surface
  • Defensive readiness for industrial systems is now a national security priority

Organizations operating ICS/SCADA environments are likely to face heightened pressure to:

  • Harden network exposure
  • Implement real-time monitoring
  • Segment operational technology (OT) from IT systems