/

Shinyhunters x Canvas Breach

Shinyhunters x Canvas Breach

Shinyhunters x Canvas Breach

Last updated

What you’ll learn

  • How the ShinyHunters x Canvas breach unfolded—and why vendor-managed infrastructure can bypass campus security controls

  • What data was exposed (beyond “big numbers”) and how attackers use it to run highly targeted, credible social engineering in higher ed

  • Why knowledge-based verification (KBV) and traditional help-desk account recovery break down at scale after an enrollment/PII leak

  • How centralized identity “honeypots” create systemic risk, and what a more resilient identity architecture looks like

  • The foundational controls that reduce blast radius after vendor compromise: phishing-resistant passkeys, verified identity for recovery, and stronger identity proofing to stop fraud at enrollment

Get started

Contact us

Get started

Contact us

Get started

Contact us

Transform how you verify and authenticate

Secure onboarding, eliminate passwords, and stop fraud on one platform. Schedule a demo and see it in action.

Transform how you verify and authenticate

Secure onboarding, eliminate passwords, and stop fraud on one platform. Schedule a demo and see it in action.

Transform how you verify and authenticate

Secure onboarding, eliminate passwords, and stop fraud on one platform. Schedule a demo and see it in action.