Instructure, the developer of the Canvas learning platform, has reported a cybersecurity incident that has prompted an investigation into its potential impact. While details about the nature of the incident are still emerging, the company is assessing how it may affect users and systems. This incident is particularly concerning given Canvas's widespread use in educational institutions, where sensitive student and faculty data could be at risk. As the investigation continues, users are advised to stay alert for any updates and potential security measures that may be necessary to protect their information. The situation underscores the ongoing challenges that educational technology companies face in safeguarding their platforms against cyber threats.
Latest Cybersecurity Threats
Real-time threat intelligence from trusted sources
SCM feed for Latest
A new software supply chain attack has been linked to a GitHub account named 'BufferZoneCorp.' This campaign involved malicious Ruby gems and Go modules that were disguised as legitimate libraries. Attackers used these sleeper packages to steal user credentials and tamper with continuous integration (CI) systems. Developers and organizations using Ruby and Go programming languages should be particularly vigilant, as this could compromise their software development processes. It's crucial for teams to verify the sources of their libraries and monitor for any unusual activity to prevent potential breaches.
A DDoS attack has disrupted services for Ubuntu and Canonical, with the hacktivist group known as The Islamic Cyber Resistance in Iraq 313 Team claiming responsibility. They reportedly employed a DDoS-for-hire service named Beamed to carry out the attack. This incident highlights the vulnerabilities of major tech platforms to such attacks, which can lead to significant service outages and impact users relying on these systems. The ongoing nature of the attack suggests that it could continue to affect services for an indefinite period, raising concerns about the security and resilience of online infrastructure. Users and organizations relying on Ubuntu and Canonical services should be aware of potential disruptions and consider contingency plans.
A database intended to support a new Medicare directory was accidentally left open to the public, exposing sensitive information, including Social Security numbers, of numerous healthcare providers. This database was part of the Centers for Medicare & Medicaid Services' (CMS) efforts to modernize Medicare. The exposure raises significant concerns about privacy and the potential for identity theft among the affected providers. With healthcare data being a prime target for cybercriminals, this incident underscores the need for stricter security measures when handling sensitive information. Providers are now at risk of fraud and misuse of their personal information due to this oversight.
SCM feed for Latest
Anthropic has introduced Claude Security in public beta, a new tool designed to help developers identify vulnerabilities within their code. Unlike traditional methods that rely on known attack patterns, Claude Security uses the Opus 4.7 model to scan entire codebases, generate verified patches, and trace data flows between components. This approach could significantly improve the security of software by providing deeper insights into potential weaknesses. As software development continues to grow, tools like this are increasingly important for companies looking to safeguard their applications against emerging threats. The introduction of such tools may encourage more developers to prioritize security in their coding practices.
SCM feed for Latest
In response to increasing cybersecurity threats targeting operational technology (OT) networks, the Cybersecurity and Infrastructure Security Agency (CISA) and other federal agencies have released new guidelines recommending a zero trust approach for these systems. As industrial systems become more interconnected, the risks of cyberattacks grow, prompting the need for stronger security measures. The guidance aims to help organizations better protect their OT environments by adopting zero trust principles, which focus on verifying all users and devices before granting access to sensitive systems. This is particularly important as the reliance on digital technologies in industrial sectors continues to expand. Implementing these practices is crucial for safeguarding critical infrastructure against evolving cyber threats.
SCM feed for Latest
Recent reports have identified vulnerabilities in the EnOcean SmartServer IoT platform that could allow attackers to remotely compromise smart buildings, data centers, and factories. The issues are tied to a security bypass flaw (CVE-2026-22885) and a remote code execution vulnerability (CVE-2026-20761). These vulnerabilities affect instances of the EnOcean SmartServer that are exposed to the internet, making them susceptible to remote exploitation. This situation raises significant concerns for organizations relying on this technology, as it could lead to unauthorized access and control over critical infrastructure. Companies using EnOcean SmartServer should take immediate action to secure their systems against potential attacks.
The article discusses several cybersecurity topics, including a denial-of-service (DOS) attack that impacts various services. Researchers have noted vulnerabilities in popular platforms like Outlook and cPanel, which could potentially expose user data or disrupt service. Additionally, there are mentions of security concerns related to programming languages such as Ruby and Go, which may affect developers using those technologies. The piece emphasizes the need for companies to stay vigilant and update their systems to prevent exploitation. This is significant as it affects not only individual users but also businesses relying on these platforms for their operations.
North Korean hackers are increasingly targeting cryptocurrency, with reports indicating that 76% of all stolen crypto in 2026 has ties to the country. These attacks have become so frequent that they are occurring on a weekly basis, raising concerns among security experts. Researchers suggest that artificial intelligence may be playing a role in these sophisticated heists, potentially enhancing the attackers' capabilities. This trend poses significant risks not only to individual investors but also to the broader cryptocurrency market, which is already vulnerable to theft and fraud. As these incidents escalate, it becomes crucial for users and companies to strengthen their security measures to protect against such attacks.
SCM feed for Latest
SonicWall has issued firmware updates to address three vulnerabilities that could be exploited by attackers, particularly ransomware groups. These flaws affect certain models of SonicWall firewalls, and experts are warning that unpatched devices may quickly become targets for exploitation. Users of SonicWall products are urged to apply the updates as soon as possible to protect their systems. The swift response from SonicWall indicates the seriousness of these vulnerabilities and the potential risks associated with leaving them unaddressed. Organizations relying on SonicWall firewalls should prioritize these updates to avoid falling victim to cyberattacks.
A Vietnamese-linked phishing campaign, dubbed AccountDumpling, has been uncovered, targeting Facebook users. This operation employs Google AppSheet as a tool to send phishing emails aimed at stealing Facebook account credentials. Researchers estimate that around 30,000 accounts have been compromised, with the attackers selling the stolen information through an underground marketplace. This incident raises concerns about the effectiveness of current phishing defenses, as even reputable platforms like Google can be misused for malicious purposes. Users are advised to remain vigilant and employ strong security measures to protect their accounts.
SCM feed for Latest
The Federal Communications Commission (FCC) has taken steps to combat robocalls and enhance cybersecurity by approving new rules aimed at telecommunications companies. These rules require companies to implement stricter identity verification processes for customers before enabling service. This move is part of a broader effort to reduce fraudulent calls and protect consumers from scams. By tightening the 'Know Your Customer' requirements, the FCC aims to hold service providers accountable for verifying the identities of their clients, which could ultimately help to reduce the number of robocalls that plague many users. This initiative affects all major telecom companies and emphasizes the need for better security practices in the industry.
Hackread – Cybersecurity News, Data Breaches, AI and More
Hackers are exploiting poorly configured Jenkins servers to launch a distributed denial-of-service (DDoS) attack against gaming servers, particularly targeting infrastructure associated with Valve Corporation. This attack leverages the Jenkins automation server, which is often used for continuous integration and deployment. Misconfigurations in these servers make it easier for attackers to gain unauthorized access and deploy their botnets. The implications are significant for gamers and the gaming industry, as DDoS attacks can disrupt services and lead to extended downtimes. Companies operating gaming platforms need to ensure their Jenkins servers are properly secured to mitigate the risk of such attacks in the future.
SCM feed for Latest
The House of Representatives has passed a bill to extend Section 702 of the Foreign Intelligence Surveillance Act for an additional three years. This section allows the government to collect foreign intelligence data, which includes surveillance of non-U.S. citizens outside the country. While the House has shown support for the extension, the Senate’s stance remains uncertain, raising questions about the future of this surveillance program. The implications of this legislation are significant, as it affects privacy rights and government oversight of surveillance practices. As the debate continues, stakeholders from various sectors, including civil rights organizations and tech companies, are likely to voice their concerns over the balance between national security and individual privacy.
SCM feed for Latest
According to Infosecurity Magazine, nearly a quarter of healthcare organizations in the U.S., UK, and Germany have experienced cyberattacks targeting medical devices in the past year. These attacks can disrupt critical healthcare services, putting patient safety at risk. The rise in incidents highlights vulnerabilities in medical devices that may not be adequately secured against cyber threats. As healthcare increasingly relies on connected technologies, the need for robust security measures becomes more pressing. Organizations must prioritize protecting their medical devices to ensure the safety and integrity of patient care.