DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Cincinnati State data breach possibly exposed Social Security numbers, other information

Posted on December 25, 2022 by Dissent

Quinlan Bentley reports:

Cincinnati State Technical Community College says a cybersecurity breach potentially exposed personal information stored on its network.

The Clifton-based college detected unauthorized access to the network on Nov. 2 and an investigation was launched in consultation with outside cybersecurity professionals, according to a notice posted to Cincinnati State’s website on Friday.

Read more at Cincinnati.com.

Note that this was a Vice Society attack and Vice dumped the data.  Disturbingly, the college’s notice makes no mention of the fact that the data were actually dumped and made freely available. Did they tell those affected that, or did they just claim they were notifying them “out of an abundance of caution?”  When are regulators going to require more transparency so that victims are informed that their data has been leaked publicly?


Related:

  • Hacker with ‘political agenda’ stole data from Columbia, university says
  • Ex-student charged with wave of cyber attacks on Sydney uni
  • Potential Cyberattack Scrambles Columbia University Computer Systems
  • Breaches have consequences (sometimes) (1)
  • Dublin ETB fined €125,000 for data protection breaches
  • Moreno Valley, Calif., Schools Report Data Breach
Category: Education Sector

Post navigation

← Queensland University of Technology shuts IT systems after being hit by ransomware attack by Royal Team
Vanuatu ransomware attack claimed by RansomHouse →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app
  • Au: Qantas hackers gave airline 72-hour deadline
  • Honeywell vulnerability exposes building systems to cyber attacks
  • Recent public service announcements of note — parents should take special note of these
  • Au: Junior doctor faces fresh toilet spying charges as probe widens to other major hospitals
  • Average Brit hit by five data breaches since 2004

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard
  • Trump Administration Issues AI Action Plan and Series of AI Executive Orders
  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure
  • Idaho agrees not to prosecute doctors for out-of-state abortion referrals

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.