SACRAMENTO, CA – On December 28, 2024, PowerSchool, a prominent provider of educational technology services to over 60 million K-12 students worldwide, identified a cybersecurity incident involving unauthorized access to its Student Information System (SIS) through the PowerSource customer support portal.
The breach, which occurred between December 19 and December 24, 2024, allowed threat actors to exfiltrate sensitive data, including names, addresses, dates of birth, limited medical information, and, in certain cases, Social Security numbers (SSNs) of students and educators.
Upon discovery, PowerSchool promptly engaged cybersecurity experts and notified law enforcement agencies to investigate the incident. The company has since implemented enhanced security measures to prevent future occurrences and is offering two years of complimentary identity protection services to all affected individuals, including credit monitoring for adult students and educators.
While PowerSchool has stated that the incident is contained and does not anticipate the compromised data being shared or made public, the full scope of the breach is still under investigation. Educational institutions utilizing PowerSchool’s SIS are advised to inform their communities and encourage vigilance in monitoring personal accounts for any unusual activity.
The post 50 Million Potentially Compromised In PowerSchool Data Breach first appeared on Strategic Revenue – Domain and Internet News.
Warning: This review contains full spoilers for The Pitt Season 2, Episode 8!One of the…
A newly uncovered phishing campaign is delivering Agent Tesla, one of the most widely used…
The Trump Administration’s purchase of two vacant warehouses in two rural Pennsylvania townships illustrates where…
Netflix has announced that it has declined to raise its offer for Warner Bros. Discovery,…
The Federal Emergency Management Agency building in Washington, D.C., on Nov. 25, 2024. (Photo by…
Less than 24 hours before the deadline in an ultimatum issued by the Pentagon, Anthropic…
This website uses cookies.