<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[If anyone is bored this weekend - and wants to help the edu sector out in the wake of the Canvas LMS attacks - take a gander at the recently implemented and forthcoming security patches in Canvas LMS and see what you might glean.]]></title><description><![CDATA[<p>If anyone is bored this weekend - and wants to help the edu sector out in the wake of the Canvas LMS attacks - take a gander at the recently implemented and forthcoming security patches in Canvas LMS and see what you might glean. Instructure - the company that was attacked - has provided scant technical details on how initial access and exfil happened - and as a result customers (schools and universities) are left unsure as to how to trust the software or what mitigations to put in place. </p><p>Instructure has said the attack was "carried out...by exploiting an issue related to our Free-For-Teacher accounts" <a href="https://www.instructure.com/incident_update" rel="nofollow noopener"><span>https://www.</span><span>instructure.com/incident_update</span><span></span></a></p><p>Precautionary UX changes made by Instructure in response <a href="https://community.instructure.com/en/discussion/666044/incident-change-log-for-may-2026" rel="nofollow noopener"><span>https://</span><span>community.instructure.com/en/d</span><span>iscussion/666044/incident-change-log-for-may-2026</span></a></p><p>Instructure Enforcements, Deprecations, and Breaking Changes (which contain some upcoming security related changes): <a href="https://community.instructure.com/en/kb/articles/664261-instructure-enforcements-deprecations-and-breaking-changes" rel="nofollow noopener"><span>https://</span><span>community.instructure.com/en/k</span><span>b/articles/664261-instructure-enforcements-deprecations-and-breaking-changes</span></a></p><p>May be other threads to pull; this is being actively worked on by many.</p><p>Thank you!</p><p><a href="https://infosec.exchange/tags/edtech" rel="tag">#<span>edtech</span></a> <a href="https://infosec.exchange/tags/Instructure" rel="tag">#<span>Instructure</span></a> <a href="https://infosec.exchange/tags/Canvas" rel="tag">#<span>Canvas</span></a> cc/ <span><a href="/user/funnymonkey%40freeradical.zone">@<span>funnymonkey</span></a></span> <span><a href="/user/pogowasright%40infosec.exchange">@<span>PogoWasRight</span></a></span></p>]]></description><link>https://board.circlewithadot.net/topic/a86847c5-e991-41b6-9f04-84b93d2e2cde/if-anyone-is-bored-this-weekend-and-wants-to-help-the-edu-sector-out-in-the-wake-of-the-canvas-lms-attacks-take-a-gander-at-the-recently-implemented-and-forthcoming-security-patches-in-canvas-lms-and-see-what-you-might-glean.</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 02:34:13 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/a86847c5-e991-41b6-9f04-84b93d2e2cde.rss" rel="self" type="application/rss+xml"/><pubDate>Sat, 09 May 2026 17:16:04 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to If anyone is bored this weekend - and wants to help the edu sector out in the wake of the Canvas LMS attacks - take a gander at the recently implemented and forthcoming security patches in Canvas LMS and see what you might glean. on Sat, 09 May 2026 19:47:18 GMT]]></title><description><![CDATA[<p><span><a href="/user/knapjack%40social.vivaldi.net">@<span>knapjack</span></a></span> While some have claimed that the Canvas login page was 'hacked' - including most of the intial media reports - I suspect it was the compromise of a built-in broadcast messaging feature. (Though, I suppose it could be both, or something else all together.)</p><p>Reporter Joe Tidy (BBC) describes a report of how the delivery of Friday's exortion demand was experienced by active users: </p><p></p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://www.linkedin.com/posts/joe-tidy-1932764_its-really-hard-to-bring-cyber-attacks-to-share-7458959314469322754-yGR4?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAAZPKoBafm7-InJHSg6yNJntK99II1XwPk" title="Cyber Attack Disrupts Student Exam | Joe Tidy posted on the topic | LinkedIn">
<img src="https://media.licdn.com/dms/image/v2/D4E22AQErhRWXZBiZuQ/feedshare-shrink_800/B4EZ4OL.P3JsAc-/0/1778354480685?e=2147483647&amp;v=beta&amp;t=G2m8jeVL4dC7-l4R02TeTuWszOFqijwGNvsF1coyUIA" class="card-img-top not-responsive" style="max-height:15rem" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a href="https://www.linkedin.com/posts/joe-tidy-1932764_its-really-hard-to-bring-cyber-attacks-to-share-7458959314469322754-yGR4?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAAZPKoBafm7-InJHSg6yNJntK99II1XwPk">
Cyber Attack Disrupts Student Exam | Joe Tidy posted on the topic | LinkedIn
</a>
</h5>
<p class="card-text line-clamp-3">It's really hard to bring cyber attacks to life for the average reader. As my mum always helpfully reminds me - [in a Dudley accent] "cyber is bloody boring!". But I spoke to a student who's exam was literally interupted by the Canvas hack and it was one of those rare visual incidents that makes you wonder at the power of these cyber criminals. Oh and I asked Shiny Hunters if they cared about the impact and disruption they were having on people like Aubrey. "We don't have a comment about that", was the answer. https://lnkd.in/e76nRswq</p>
</div>
<a href="https://www.linkedin.com/posts/joe-tidy-1932764_its-really-hard-to-bring-cyber-attacks-to-share-7458959314469322754-yGR4?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAAZPKoBafm7-InJHSg6yNJntK99II1XwPk" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://static.licdn.com/aero-v1/sc/h/al2o9zrvru7aqj8e1x2rzsrca" alt="favicon" class="not-responsive overflow-hiddden" style="max-width:21px;max-height:21px" />



<p class="d-inline-block text-truncate mb-0">LinkedIn <span class="text-secondary">(www.linkedin.com)</span></p>
</a>
</div><p></p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/douglevin/statuses/116546341319842289</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/douglevin/statuses/116546341319842289</guid><dc:creator><![CDATA[douglevin@infosec.exchange]]></dc:creator><pubDate>Sat, 09 May 2026 19:47:18 GMT</pubDate></item><item><title><![CDATA[Reply to If anyone is bored this weekend - and wants to help the edu sector out in the wake of the Canvas LMS attacks - take a gander at the recently implemented and forthcoming security patches in Canvas LMS and see what you might glean. on Sat, 09 May 2026 19:04:10 GMT]]></title><description><![CDATA[<p>Thanks for your insights.</p><p><span><a href="/user/knapjack%40social.vivaldi.net">@<span>knapjack</span></a></span> re: defacing see: <a href="https://news.ycombinator.com/item?id=48057532" rel="nofollow noopener"><span>https://</span><span>news.ycombinator.com/item?id=4</span><span>8057532</span></a> (low confidence, but could be legit)</p><p>Many rumors of info stealers on login page, but near as I can tell it all goes back to this claim: <a href="https://old.reddit.com/r/sysadmin/comments/1t6m7e0/canvas_instructure_lms_seems_to_have_been_hit_by/okijzkm/" rel="nofollow noopener"><span>https://</span><span>old.reddit.com/r/sysadmin/comm</span><span>ents/1t6m7e0/canvas_instructure_lms_seems_to_have_been_hit_by/okijzkm/</span></a> (which also is low confidence)</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/douglevin/statuses/116546171729371879</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/douglevin/statuses/116546171729371879</guid><dc:creator><![CDATA[douglevin@infosec.exchange]]></dc:creator><pubDate>Sat, 09 May 2026 19:04:10 GMT</pubDate></item><item><title><![CDATA[Reply to If anyone is bored this weekend - and wants to help the edu sector out in the wake of the Canvas LMS attacks - take a gander at the recently implemented and forthcoming security patches in Canvas LMS and see what you might glean. on Sat, 09 May 2026 18:12:38 GMT]]></title><description><![CDATA[<p><span><a href="/user/douglevin%40infosec.exchange">@<span>douglevin</span></a></span> I have my theories. None of them good. Most involve crappy API key handling and OWASP Top 10 vulnerabilities in the front end for the exfil, but it has to be more than that for the defacing of the website. I have trouble letting go of them having access to the CI/CD pipeline to pull that off, which smells of something much different than what I can envision from their public info dumps.</p>]]></description><link>https://board.circlewithadot.net/post/https://social.vivaldi.net/ap/users/116387395794911208/statuses/116545969101727895</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://social.vivaldi.net/ap/users/116387395794911208/statuses/116545969101727895</guid><dc:creator><![CDATA[knapjack@social.vivaldi.net]]></dc:creator><pubDate>Sat, 09 May 2026 18:12:38 GMT</pubDate></item></channel></rss>