The EdTech Supply Chain Collapse: Inside the PowerSchool and Canvas Breaches
The 18-month EdTech supply chain collapse exposed hundreds of millions of student records, revealing how massive vendor consolidation has transformed individual educational platforms into catastrophic single points of failure for the entire education sector
🎧 Listen to this Episode
Show Notes
Between 2024 and 2026, the educational technology sector suffered a catastrophic supply chain collapse as hackers compromised roughly 350 million records through major platforms like PowerSchool and Canvas. By exploiting weak trust boundaries in shared multi-tenant architectures, threat actors such as the ShinyHunters group moved beyond targeting individual schools to attacking the centralized vendors that thousands of institutions rely on. As a result, schools are left bearing the intense legal and regulatory burdens of notifying their communities, while criminals weaponize both structured identity data and private behavioral context for long-term fraud and extortion.
https://breached.company/san-diego-community-college-district-cyberattack-2026
https://breached.company/instructure-canvas-shinyhunters-275-million-students-breach-2026
Sponsors:
Share this episode
Enjoying CISO Insights?
Subscribe to get new episodes delivered directly to your podcast app.
Related Episodes
The 2026 Cyber Insurance Shift: AI, Exclusions, and the Resilience Mandate
A comprehensive guide to understanding how artificial intelligence, new data privacy regulations, and evolving cyber threats are fundamentally changing what it takes to secure and maintain cyber insur...
▶️ Listen Now
Dismantling the FIMI House of Cards: The Fight for Information Integrity
This episode explores how the European Union is deploying a proactive deterrence strategy to dismantle the AI-enhanced information manipulation supply chains orchestrated by state threat actors...
▶️ Listen Now
Beyond the Perimeter: Inside the Cloud Threat Landscape
This episode provides a comprehensive overview of evolving cloud threats, highlighting how adversaries weaponize legitimate cloud tools, identities, and artificial intelligence services to compromise ...
▶️ Listen Now