wp-plugin-hostgator
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114ol-scrapes
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114Source:https:\/\/techcrunch.com\/2023\/05\/12\/brightly-schooldude-data-breach\/<\/a><\/br> Software maker Brightly has confirmed that hackers stole close to three million SchoolDude user accounts in an April data breach.<\/p>\n SchoolDude is a cloud-based work order management system, used primarily by schools and universities, to submit and track maintenance orders. Its users are school employees, like principals, executives and maintenance workers, as well as students and other staff submitting repair requests.<\/p>\n In a data breach notice<\/a> filed with the Maine attorney general\u2019s office, Brightly said it was notifying both past and present customers that the hackers took their names, email addresses, account passwords and phone numbers, if added to the account. The data also includes the names of school districts.<\/p>\n Brightly said it reset customer passwords, a common practice when user logins are exposed. The company warned users to change passwords on other online accounts that use the same credentials as they used on SchoolDude. This refers to credential stuffing<\/a>, where hackers use passwords from previous data breaches to break into other user accounts with the same passwords. One sysadmin on Reddit, who received the data breach notice, says the stolen passwords were not encrypted<\/a>.<\/p>\n When reached for comment, spokesperson Annie Satow did not dispute that the stolen SchoolDude passwords were unencrypted, but declined to comment beyond the company\u2019s data breach notice. Brightly also declined to say how the breach occurred, or say who \u2014 if anyone \u2014 was responsible for overseeing cybersecurity at the company at the time of the breach.<\/p>\n Brightly said in its notice that it discovered the breach on April 28, more than a week after the mass data theft.<\/p>\n Siemens bought Brightly, previously known as Dude Solutions, in 2022 from private equity owner Clearlake Capital in a $1.6 billion deal. At the time, Brightly said it had 12,000 enterprise customers, mainly across the U.K., Canada, Australia, and the United States.<\/p>\n<\/p><\/div>\n <\/br><\/br><\/br><\/p>\n
\nBrightly says SchoolDude data breach spilled 3 million user accounts<\/br>
\n2023-05-12 21:48:02<\/br><\/p>\n