Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireCybersecurity NewsEducation:University

LectureNotes Learning App breach affects over 2 million users

By Security Staff
Computer screen with coding in colored text

Image via Unsplash

February 13, 2024

A data breach of LectureNotes Learning App has affected over 2 million users. The leaked data totals 2,165,139 records and includes the personal information of its users, such as username, first and last names, session tokens, phone numbers, emails, passwords, IP addresses, user-agents and administrator authorization IDs. 

Security leaders share their thoughts on this breach and how organizations can protect the sensitive information of their users.

Jason Soroko, Senior Vice President of Product at Sectigo:

“This is a serious breach that unfortunately included credentials as well as PII information. Attackers are always on the lookout to gain password credentials because they will attempt to use them for 'password stuffing' attacks in other systems that you may be logging into. The lesson learned here is to ensure that you never use the same password twice, in order to avoid being a victim of a password stuffing attack.  

The most serious issue with this attack is the leaking of session tokens, which can be used by attackers to gain access to the system as you without even having to log in with your credentials. Session tokens are used in many web-based applications in order to be able to have a seamless experience while browsing through the site, as well as potentially for single sign on capabilities to other related web applications. This is most likely due to a configuration error in the database that was used by the victim learning platform. The lesson learned here is that best practices for configuring this can be a challenge because of the complexity level, so be sure to have a skilled practitioner configure your system or consider having a penetration tester evaluate your platform.” 

Patrick Tiquet, Vice President, Security & Architecture at Keeper Security: 

“The severity of this data breach is significantly heightened because of the personal details and critical administrator credentials that were part of the compromised data. All organizations have an inherent obligation to protect their users and their users’ data. When a company is a custodian of personal information, it requires a much higher bar for security and monitoring than other types of organizations. Companies should be regularly auditing their data inventory to not only ensure compliance, but to also make sure that they are only retaining the sensitive data that is required. 

The immediate concern is the potential exploitation of this exposed data, which could lead to various malicious activities such as identity theft, phishing attacks and unauthorized access to user accounts. Current and former users of LectureNotes should assume they’ve already been breached and act accordingly. Proactive steps individuals can take include changing login information for their account with LectureNotes, getting a dark web monitoring service, monitoring or freezing their credit and practicing good cyber hygiene. By using strong and unique passwords for every account, enabling MFA everywhere possible, updating software and always thinking before you click, individuals can greatly increase their personal cybersecurity.

It is very serious any time a database is left exposed to unauthorized access. Special care should be taken to protect databases, and the treasure trove of information they contain, that make them such high priority targets to attackers. Typically there are few scenarios in modern system architectures that necessitate making a database available over the general internet by a routable IP address. When it is necessary, there are steps that can be taken to mitigate the risks involved.

  1. Ensure access to the database is tightly controlled, preferably by implementing a zero-trust network architecture.
  2. Employ a zero-trust access model to databases, and ensure that users or applications only have access to the data necessary to perform their function. 
  3. Database activity and network traffic should be monitored by a SIEM solution to alert when there is anomalous activity.” 


KEYWORDS: application security data breach personal information protection

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

Executive Protection

Beyond the Bodyguard: Why Executive Protection Requires a New Playbook

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

May 12, 2026

Managing Large Scale Events in 2026: Security, Travel and Threat Intelligence

As the Americas prepare to host the world’s biggest football tournament in 2026, security, resilience, and travel risk leaders face a fast-moving threat environment that extends well beyond the stadiums. Learn the risks and readiness considerations that matter most.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • MobiFriends Data Breach Affects 3.68 Million Users

    See More
  • cybersecurity

    Indian e-Payments App Exposes More Than 7 Million Users in Massive Data Breach

    See More
  • fraud

    Data Breach Report: Popular Digital Wallet App Key Ring Exposes 14 Million Users

    See More

Related Products

See More Products
  • Security of Information and Communication Networks

  • into to sec.jpg

    Introduction to Security, 10th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing