The company that operates online learning system Canvas said it struck a deal with hackers to delete the data they pilfered in a cyberattack that created chaos for students, many of them in the middle of finals.
Hi, what are you looking for?
The company that operates online learning system Canvas said it struck a deal with hackers to delete the data they pilfered in a cyberattack that created chaos for students, many of them in the middle of finals.
The company took systems offline globally after hackers exfiltrated data and deployed file-encrypting ransomware.
The tech giant has also ported the patch for a recent deleted chats recovery issue to older versions of iOS.
The flaws could allow attackers to inject malicious code, leading to information disclosure and code execution.
Curl’s lead developer says Mythos claims are marketing, but many in the industry believe the results stem from Curl’s robust security.
Many AI-first enterprises have already embraced sovereign architectures for general AI initiatives; cybersecurity—and the SOC—should be next.
Over 400 malicious versions of 170 packages were published as part of the new Mini Shai-Hulud campaign.
Team8, Index Ventures, Picture Capital, Elad Gil, Cerca Partners, and Tesonet invested in Frame Security.
Rather than scanning code alone, Build Application Firewalls inspect runtime behavior inside the software build pipeline.
The zero-day was designed to bypass 2FA and it was developed by a prominent cybercrime group.
Using a vulnerability in the portal, hackers accessed names, addresses, email addresses, and phone numbers.
The company topped revenue and earnings forecasts for the first quarter of 2026, but its shares plunged more than 20%.
The incident occurred on April 20 and did not affect customer data in the company’s production and staging environments.
A malicious version of the plugin was published to the Jenkins Marketplace late last week.
Tens of thousands of students studying for final exams around the world have regained access to a key online learning system after a cyberattack had earlier knocked it offline.
Also called Copy Fail 2 and tracked as CVE-2026-43284 and CVE-2026-43500, the exploit was disclosed before a patch was released.