Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsUStrive Security Lapse Exposed Personal Data of Its Users, Including Children
UStrive Security Lapse Exposed Personal Data of Its Users, Including Children
Cybersecurity

UStrive Security Lapse Exposed Personal Data of Its Users, Including Children

•January 20, 2026
0
TechCrunch (Cybersecurity)
TechCrunch (Cybersecurity)•Jan 20, 2026

Companies Mentioned

Amazon

Amazon

AMZN

Why It Matters

Exposing minors' personal information raises serious privacy and compliance risks, potentially triggering regulatory penalties and eroding trust in ed‑tech services.

Key Takeaways

  • •GraphQL endpoint misconfiguration exposed user data
  • •Data of 238,000 users, including children, leaked
  • •UStrive claims breach remediated but no user notice
  • •Litigation with former engineer limits response
  • •Potential compliance issues under COPPA and GDPR

Pulse Analysis

UStrive, formerly Strive for College, operates a large‑scale online mentorship network that connects high‑school and college students with volunteer mentors. The platform’s growth—over 1.1 million students opting in—makes it a valuable repository of personally identifiable information (PII). In the education technology sector, safeguarding such data is paramount, as schools and parents increasingly rely on digital tools for learning and guidance. The breach underscores how even well‑intentioned nonprofits can become attractive targets when they adopt modern APIs without rigorous security reviews.

The technical root cause was a misconfigured GraphQL endpoint hosted on Amazon Web Services. By simply inspecting network traffic while logged in, an attacker could query the endpoint and retrieve full user profiles, including sensitive details like gender and date of birth. Over 238,000 records were exposed, many belonging to minors, triggering concerns under the Children’s Online Privacy Protection Act (COPPA) and the EU’s GDPR. Such exposure not only jeopardizes individual privacy but also opens the organization to class‑action lawsuits, regulatory fines, and reputational damage.

UStrive’s response—prompt remediation but limited communication—highlights a broader industry challenge: balancing rapid incident response with legal constraints. Ongoing litigation with a former software engineer appears to restrict the nonprofit’s ability to conduct a thorough forensic analysis or public disclosure. Experts advise that ed‑tech firms implement regular security audits, adopt least‑privilege API designs, and establish clear breach‑notification policies. By learning from UStrive’s lapse, similar platforms can reinforce their security posture, protect vulnerable users, and maintain stakeholder confidence.

UStrive security lapse exposed personal data of its users, including children

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...