Comparison Overview

Beverly Hills Unified School District

VS

Kenosha Unified School District

Beverly Hills Unified School District

624 N Rexford Dr, None, Beverly Hills, California, US, 90210
Last Update: 2025-07-27 (UTC)
Between 750 and 799

Beverly Hills Unified School District (BHUSD) Proudly serving the Beverly Hills community, BHUSD is committed to Educational Excellence. Through rigorous academics, arts, and athletics, we empower students to thrive with integrity in a complex, changing world.

NAICS: 61
NAICS Definition: Educational Services
Employees: 2
Subsidiaries: 0
12-month incidents
0
Known data breaches
1
Attack type number
1

Kenosha Unified School District

3600 52nd Street, Kenosha, Wisconsin, 53144, US
Last Update: 2025-03-05 (UTC)
Between 700 and 749

KUSD believes all students will have an equal opportunity to prepare for college and/or careers with the support of highly qualified educators in a learning environment that is resource rich, safe, and welcoming. The Kenosha Unified School District was created in 1967. The District includes the City of Kenosha, Village of Pleasant Prairie, and Town and Village of Somers. While it is called the Kenosha Unified School District, it is actually a common school district and holds an annual meeting of electors.

NAICS: 61
NAICS Definition: Educational Services
Employees: 1,443
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/bhusd.jpeg
Beverly Hills Unified School District
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/kenosha-unified-school-district.jpeg
Kenosha Unified School District
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Beverly Hills Unified School District
100%
Compliance Rate
0/4 Standards Verified
Kenosha Unified School District
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Education Industry Average (This Year)

No incidents recorded for Beverly Hills Unified School District in 2025.

Incidents vs Education Industry Average (This Year)

No incidents recorded for Kenosha Unified School District in 2025.

Incident History — Beverly Hills Unified School District (X = Date, Y = Severity)

Beverly Hills Unified School District cyber incidents detection timeline including parent company and subsidiaries

Incident History — Kenosha Unified School District (X = Date, Y = Severity)

Kenosha Unified School District cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/bhusd.jpeg
Beverly Hills Unified School District
Incidents

Date Detected: 11/2019
Type:Breach
Attack Vector: Unauthorized Access
Blog: Blog
https://images.rankiteo.com/companyimages/kenosha-unified-school-district.jpeg
Kenosha Unified School District
Incidents

Date Detected: 11/2022
Type:Ransomware
Motivation: Financial
Blog: Blog

FAQ

Beverly Hills Unified School District company demonstrates a stronger AI Cybersecurity Score compared to Kenosha Unified School District company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Beverly Hills Unified School District and Kenosha Unified School District have experienced a similar number of publicly disclosed cyber incidents.

In the current year, Kenosha Unified School District company and Beverly Hills Unified School District company have not reported any cyber incidents.

Kenosha Unified School District company has confirmed experiencing a ransomware attack, while Beverly Hills Unified School District company has not reported such incidents publicly.

Beverly Hills Unified School District company has disclosed at least one data breach, while the other Kenosha Unified School District company has not reported such incidents publicly.

Neither Kenosha Unified School District company nor Beverly Hills Unified School District company has reported experiencing targeted cyberattacks publicly.

Neither Beverly Hills Unified School District company nor Kenosha Unified School District company has reported experiencing or disclosing vulnerabilities publicly.

Neither Beverly Hills Unified School District nor Kenosha Unified School District holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Beverly Hills Unified School District company nor Kenosha Unified School District company has publicly disclosed detailed information about the number of their subsidiaries.

Kenosha Unified School District company employs more people globally than Beverly Hills Unified School District company, reflecting its scale as a Education.

Neither Beverly Hills Unified School District nor Kenosha Unified School District holds SOC 2 Type 1 certification.

Neither Beverly Hills Unified School District nor Kenosha Unified School District holds SOC 2 Type 2 certification.

Neither Beverly Hills Unified School District nor Kenosha Unified School District holds ISO 27001 certification.

Neither Beverly Hills Unified School District nor Kenosha Unified School District holds PCI DSS certification.

Neither Beverly Hills Unified School District nor Kenosha Unified School District holds HIPAA certification.

Neither Beverly Hills Unified School District nor Kenosha Unified School District holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Cursor is a code editor built for programming with AI. In versions 1.7.44 and below, various NTFS path quirks allow a prompt injection attacker to circumvent sensitive file protections and overwrite files which Cursor requires human approval to overwrite. Modification of some of the protected files can lead to RCE. Must be chained with a prompt injection or malicious model attach. Only affects systems supporting NTFS. This issue is fixed in version 2.0.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Description

Cursor is a code editor built for programming with AI. In versions 1.7.52 and below, manipulating internal settings may lead to RCE. Cursor detects path manipulation via forward slashes (./.cursor/./././././mcp.json etc.), and requires human approval to complete the operation. However, the same kind of manipulation using backslashes was not correctly detected, allowing an attacker who had already achieved prompt injection or some other level of control to overwrite sensitive editor files without approval on Windows machines. This issue is fixed in version 2.0.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Description

Cursor is a code editor built for programming with AI. In versions 1.7.28 and below, an input validation flaw in Cursor's MCP server installation enables specially crafted deep-links to bypass the standard security warnings and conceal executed commands from users if they choose to accept the server. If an attacker is able to convince a victim to navigate to a malicious deeplink, the victim will not see the correct speedbump modal, and if they choose to accept, will execute commands specified by the attackers deeplink.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Description

LinkAce is a self-hosted archive to collect website links. In versions 2.3.1 and below, the social media sharing functionality contains a Stored Cross-Site Scripting (XSS) vulnerability that allows any authenticated user to inject arbitrary JavaScript by creating a link with malicious HTML in the title field. When a user views the link details page and the shareable links are rendered, the malicious JavaScript executes in their browser. This vulnerability affects multiple sharing services and can be exploited to steal session cookies, perform actions on behalf of users, or deliver malware. This issue is fixed in version 2.4.0.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

CVE-2025-59596 is a denial-of-service vulnerability in Secure Access Windows client versions 12.0 to 14.10 that is addressed in version 14.12. If a local networking policy is active, attackers on an adjacent network may be able to send a crafted packet and cause the client system to crash.

Risk Information
cvss4
Base: 6.0
Severity: LOW
CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X