[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fB8MopkG8QT6OMjENxUxeWCXiJbY85tg-MDmi2JIFsB8":3},{"article":4,"iocs":50},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":30,"category":31,"article_tags":34},"654cf0fb-63da-4dae-862b-eb16e56de8ee","Instructure Breach Exposes Schools' Vendor Dependence","instructure-breach-exposes-schools-vendor-dependence-91b5b7","ShinyHunters' attack on Instructure, which owns the widely used Canvas learning management system (LMS), carries big questions about the trust educational institutions put into their vendors.","ShinyHunters has breached Instructure, the company behind Canvas, a widely adopted learning management system used by educational institutions globally. The attack highlights the critical security risks schools face when relying on third-party vendors and their supply chain vulnerabilities. This incident raises questions about vendor security practices and the concentration of trust in a single platform serving millions of students and educators.","ShinyHunters breaches Instructure\u002FCanvas LMS, exposing schools' vendor dependency risks.",null,"https:\u002F\u002Fwww.darkreading.com\u002Fcyberattacks-data-breaches\u002Finstructure-breach-exposes-schools-vendor-dependence","https:\u002F\u002Feu-images.contentstack.com\u002Fv3\u002Fassets\u002Fblt6d90778a997de1cd\u002Fbltc313eec07f19bb91\u002F69fb990fce7a03313d4341a4\u002FInstructure_Timon_Schneider_Alamy.jpg?width=1280&auto=webp&quality=80&disable=upscale","2026-05-06T21:02:57+00:00","2026-05-06T22:00:21.065288+00:00",7,[18,21,24,27],{"name":19,"type":20},"ShinyHunters","threat_actor",{"name":22,"type":23},"Instructure","vendor",{"name":25,"type":26},"Canvas","product",{"name":28,"type":29},"Learning Management System (LMS)","technology","2e06f76c-d5b9-4f54-9eef-4d3447b10730",{"id":30,"icon":11,"name":32,"slug":33},"Breaches","breaches",[35,40,45],{"category":36},{"id":37,"icon":11,"name":38,"slug":39},"26b0b636-0e31-4db1-bffb-61bdf9f20a58","Supply Chain","supply-chain",{"category":41},{"id":42,"icon":11,"name":43,"slug":44},"614132b8-5837-4952-b8b5-c6c9a32a1d85","Privacy","privacy",{"category":46},{"id":47,"icon":11,"name":48,"slug":49},"e7b231c8-5f79-4465-8d38-1ef13aea5a14","Threat Intelligence","threat-intelligence",[]]