Sr. Content Developer at Microsoft, working remotely in PA, TechBash conference organizer, former Microsoft MVP, Husband, Dad and Geek.
153332 stories
·
33 followers

The Canvas Hack Is a New Kind of Ransomware Debacle

1 Share
Wired describes the recent Canvas breach as an unusually disruptive ransomware-style extortion incident because one attack on Instructure's learning platform temporarily paralyzed thousands of schools during finals and end-of-year assignments. The hackers using the "ShinyHunters" name claim more than 8,800 schools were affected, while Instructure says exposed data included names, email addresses, student ID numbers, and platform messages. From the report: Higher education has long been a target of ransomware gangs and data extortion attacks. But never before, perhaps, has a cyberattack against a single software platform so thoroughly disrupted the daily operations of thousands of schools across the United States. The widely used digital learning platform Canvas was put into "maintenance mode" on Thursday after its maker, the education tech giant Instructure, suffered a data breach and faced an extortion attempt by attackers using the recognizable moniker "ShinyHunters." Though the hackers have been advertising the breach and attempting to extract a ransom payment from Instructure since May 1, the situation took on additional immediacy for regular people across the US and beyond on Thursday because the Canvas downtime caused chaos at schools, including those in the midst of finals and end-of-year assignments. Universities like Harvard, Columbia, Rutgers, and Georgetown sent alerts to students about the situation in recent days; other institutions, including school districts in at least a dozen states, also appear to have been affected. In a list published by the hackers behind the attack on their ransom-focused dark web site, they claim the breach affected more than 8,800 schools. The exact scale and reach of the breach is currently unclear, though. And the fact that Canvas was down throughout Thursday afternoon and evening further complicated the picture. In a running incident update log that began on May 1, Steve Proud, Instructure's chief information security officer, said that the company had "recently experienced a cybersecurity incident perpetrated by a criminal threat actor." He added on May 2 that "the information involved" for "users at affected institutions" included names, email addresses, student ID numbers, and messages exchanged by users on the platform. The situation was ultimately marked as "Resolved" on Wednesday, with Proud writing that "Canvas is fully operational, and we are not seeing any ongoing unauthorized activity." At midday on Thursday, though, the Instructure status page registered an "issue" where "some users are having difficulties logging into Student ePortfolios." Within a few hours, the company had added another status update: "Instructure has placed Canvas, Canvas Beta and Canvas Test in maintenance mode." Late Thursday evening, the company said that Canvas was available again "for most users." TechCrunch reported on Thursday that the hackers launched a secondary wave of attacks, defacing some schools' Canvas portals by injecting an HTML file to display their own message on the schools' Canvas login pages. According to The Harvard Crimson, attackers modified the Harvard Canvas login page to show a message that included a list of schools that the hackers claim were impacted by the breach. The message from attackers "urged schools included on the affected list to consult with a cyber advisory firm and contact the group privately to negotiate a settlement before the end of the day on May 12 -- or else risk their data being leaked," The Crimson reported. "It is unclear what information tied to Harvard affiliates was included in the alleged breach."

Read more of this story at Slashdot.

Read the whole story
alvinashcraft
49 minutes ago
reply
Pennsylvania, USA
Share this story
Delete

AI giveth and AI taketh CPU

1 Share
Recorded on the floor of HumanX, Ryan is joined by AMD CTO Mark Papermaster to discuss AMD’s silicon strategy for AI borne of their long history of heterogeneous CPU/GPU computing, how chipmakers are dealing the wide range of AI workloads from training to inference, and the paradox of agents both eating up all the compute and helping AMD accelerate chip innovation.
Read the whole story
alvinashcraft
49 minutes ago
reply
Pennsylvania, USA
Share this story
Delete

Episode 571: The Enterprise Dunbar number

1 Share

This week, we discuss AI labs driving cloud revenue, hyperscalers laying off instead of building, and kids defeating age verification. Plus, Brandon has too many thoughts on Workday.

Watch the YouTube Live Recording of Episode 571

Runner-up Titles

  • The world is just paper.
  • TODO debris pile
  • Fancy countries you live in
  • Enron Conspiracy Shredder.
  • Cote’s mom’s gonna love this
  • Brandon works out his Workday trauma.
  • Cash money, hamburger, hamburger bang bang
  • ChatGPT PS Edition
  • Forward Deployed Engineer for Workday
  • It’ll probably work, that’s the future

Rundown

Relevant to your Interests

Sponsors

Nonsense

Listener Feedback

Conferences

SDT News & Community

Recommendations

Sponsored By:





Download audio: https://aphid.fireside.fm/d/1437767933/9b74150b-3553-49dc-8332-f89bbbba9f92/48a76708-bd6e-4058-b2dd-c3f9d5e6bcfc.mp3
Read the whole story
alvinashcraft
50 minutes ago
reply
Pennsylvania, USA
Share this story
Delete

Episode 63: Cutting Through the Noise: How Jobs to Be Done Reveals Real Customer Demand

1 Share

In this episode, we sit down with Beth McHugh, Product Leader and Innovation Strategist at Tillta Consulting, to explore the powerful framework known as Jobs to Be Done—and how it helps teams cut through the noise to identify real customer demand. In our conversation, Beth explains why even companies with thousands of customers can still misunderstand what those customers truly need—and how Jobs to Be Done helps teams move beyond surface-level feedback to uncover the real “progress” customers are trying to make.





Download audio: https://anchor.fm/s/44cc6cdc/podcast/play/117918600/https%3A%2F%2Fd3ctxlq1ktw2nl.cloudfront.net%2Fstaging%2F2026-3-3%2F84ea7e03-b4bf-55a3-f5ca-79463f12dd43.mp3
Read the whole story
alvinashcraft
50 minutes ago
reply
Pennsylvania, USA
Share this story
Delete

Azure MCP and Azure Skills

1 Share
From: Microsoft Azure Developers
Duration: 19:00
Views: 139

Explore Azure MCP Server and Azure Skills working together to extend AI capabilities across Azure services.

In this video, we walk through the developer experience in VS Code, showing how to configure, run, and interact with Azure Skills seamlessly.

🌮 Chapter Markers:
00:00:00 – Introduction
00:50:00 – What's Azure MCP
01:58:00 – Install Azure MCP
05:43:00 – VS Code User Experience
08:49:00 – VS Code Demo
14:25:00 – Azure Skills
18:36:00 – Wrap Up / Outro

🌮 Resources:
Learn Docs: https://aka.ms/azmcp/docs
Azure Product page: https://aka.ms/azmcp
Azure Skills: https://aka.ms/azure-skills

🌮 Follow us on social:
Azure SDK Blog | https://aka.ms/azsdk/blog
Azure SDK on X | @AzureSDK – https://x.com/azuresdk
Scott Hanselman | @SHanselman – https://x.com/SHanselman
Azure Friday | @AzureFriday – https://x.com/AzureFriday

Follow us on social:
Blog - https://aka.ms/azuredevelopers/blog
Twitter - https://aka.ms/azuredevelopers/twitter
LinkedIn - https://aka.ms/azuredevelopers/linkedin
Twitch - https://aka.ms/azuredevelopers/twitch

#azuredeveloper #azure

Read the whole story
alvinashcraft
50 minutes ago
reply
Pennsylvania, USA
Share this story
Delete

Aspire 13.3 - Maddy's Top 5 Features

1 Share
From: aspiredotdev
Duration: 9:55
Views: 658

Aspire 13.3 shipped and it's packed with new features! In this video, Maddy Montaquila, Aspire PM, shows you her top 5 (ish) favorite features in this release.

📃 Aspire 13.3 Blog: https://devblogs.microsoft.com/aspire/whats-new-aspire-13-3/
💫 Full 13.3 What's New: https://aspire.dev/whats-new/aspire-13-3/

In this video:
1:22 - NextJS integration (https://aspire.dev/integrations/frameworks/javascript/#add-nextjs-application and new JavaScript publishing methods (https://aspire.dev/deployment/javascript-apps/)
2:34 - Browser logs integration (https://aspire.dev/whats-new/aspire-13-3/#-browser-logs-and-screenshots)
4:23 - Command results (https://aspire.dev/whats-new/aspire-13-3/#resource-commands-return-structured-results)
6:06 - Kubernetes deployment support (https://aspire.dev/deployment/kubernetes/kubernetes/)
8:26 - Aspireify agent skill (https://aspire.dev/reference/cli/commands/aspire-init/)

✏️ Learn more about Aspire: https://aspire.dev
💬 Join us on Discord: https://aka.ms/aspire-discord
💙 Follow us on BlueSky: https://bsky.app/profile/aspire.dev
🩷 Follow us on X (Twitter): https://x.com/aspiredotdev
📺 Streaming on YouTube and Twitch - https://youtube.com/@aspiredotdev and https://twitch.tv/aspiredotdev

Read the whole story
alvinashcraft
50 minutes ago
reply
Pennsylvania, USA
Share this story
Delete
Next Page of Stories