What Is the Instructure Canvas Breach? Impact, Risks, and What Institutions Should Do
Summary In May 2026, SHADOW-AETHER-015 exposed data from 8,809 Canvas customers across 50 countries in what appears to be a...
Summary In May 2026, SHADOW-AETHER-015 exposed data from 8,809 Canvas customers across 50 countries in what appears to be a...
Insider Betting on Polymarket Insider trading is rife on Polymarket: Analysis by the Anti-Corruption Data Collective, a non-profit research and...
An ongoing data extortion attack targeting the widely-used education technology platform Canvas disrupted classes and coursework at school districts and...
Ravie LakshmananMay 06, 2026Android / Data Security Google has announced expanded Binary Transparency for Android as a way to safeguard...
A 21-year-old man suspected of conducting approximately 100 data breaches since late 2025 - including a hack of the French...
As API and AI adoption grows across the Middle East, so do the expectations around how data is handled. For...
Co-Authored by Luiz Parente Your data might be safe today. But that doesn’t mean it’s safe forever. A growing number of sophisticated actors are...
The post How a Long-Lived API Credential Let an AI Agent Delete Production Data appeared first on Aembit. *** This...
The threat group ShinyHunters is claiming responsibility for a data breach of giant home security company ADT last week that...
Key Takeaways Reporting cybersecurity to the board fails when technical data isn’t translated into business impact Boards focus on revenue,...
Every secure API draws a line between code and data. HTTP separates headers from bodies. SQL has prepared statements. Even...
For today’s cybersecurity professionals, the biggest problem isn’t a lack of data – they have plenty of it. They just...
There is an old saw in privacy and data breach litigation: Everyone gets paid—except, often, the victims. Plaintiffs’ lawyers receive...
Ravie LakshmananApr 20, 2026Cloud Security / Data Breach Web infrastructure provider Vercel has disclosed a security breach that allows bad...
The post Cryptographically Agile Policy Enforcement for Contextual Data Access appeared first on Read the Gopher Security's Quantum Safety Blog....