Company Details
mesevergreen
2
90
6113
evergreen.edu
0
MES_2738040
In-progress


MES at The Evergreen State College Company CyberSecurity Posture
evergreen.eduThe Evergreen State College has been a leader in environmental studies for more than 50 years. MES is a master of environmental studies graduate program at Evergreen. Our students and graduates are innovative thinkers who approach environmental challenges with eagerness and ambition. Because the best environmental solutions come from a variety of perspectives, we accept all majors. Our students, who come from across the U.S. and abroad, represent a wide range of ages, cultures, and expertise. We’re located at the south end of the Salish Sea (Puget Sound) in Olympia, Washington, close to mountains, rivers, wetlands, forests, and shorelines. It’s the ideal location for studying and enjoying the natural environment. This page is a tool for sharing jobs, internships, events, and connecting with other members of the MES community. Have something you want to share with the MES community? Send an email to the Program Assistant, Trudy Rubick, at [email protected].
Company Details
mesevergreen
2
90
6113
evergreen.edu
0
MES_2738040
In-progress
Between 650 and 699

MESC Global Score (TPRM)XXXX

Description: The Evergreen State College, a public liberal arts institution in Olympia, Washington, experienced a data breach between May 21, 2025, and June 10, 2025, due to unauthorized access to a legacy file share system containing sensitive student records. The breach exposed personally identifiable information (PII) of 7,727 Washington residents, including names, Social Security numbers, full dates of birth, and student ID numbers. The college confirmed the incident on October 1, 2025, and issued notification letters to affected individuals on October 17, 2025, while also reporting the breach to the Washington Attorney General. The compromised data poses significant risks of identity theft, financial fraud, and long-term reputational harm to victims. Evergreen offered 12 months of free credit monitoring (Experian IdentityWorks) to mitigate risks, but the exposure of SSNs and full birth dates heightens vulnerabilities for affected students. Legal firms, including Shamis & Gentile P.A., are investigating potential class-action lawsuits for compensation, citing negligence in securing legacy systems and delayed disclosure. The breach underscores systemic vulnerabilities in educational institutions’ cybersecurity practices, particularly in protecting highly sensitive student data from unauthorized access.


No incidents recorded for MES at The Evergreen State College in 2026.
No incidents recorded for MES at The Evergreen State College in 2026.
No incidents recorded for MES at The Evergreen State College in 2026.
MESC cyber incidents detection timeline including parent company and subsidiaries

The Evergreen State College has been a leader in environmental studies for more than 50 years. MES is a master of environmental studies graduate program at Evergreen. Our students and graduates are innovative thinkers who approach environmental challenges with eagerness and ambition. Because the best environmental solutions come from a variety of perspectives, we accept all majors. Our students, who come from across the U.S. and abroad, represent a wide range of ages, cultures, and expertise. We’re located at the south end of the Salish Sea (Puget Sound) in Olympia, Washington, close to mountains, rivers, wetlands, forests, and shorelines. It’s the ideal location for studying and enjoying the natural environment. This page is a tool for sharing jobs, internships, events, and connecting with other members of the MES community. Have something you want to share with the MES community? Send an email to the Program Assistant, Trudy Rubick, at [email protected].


One of the largest universities in the United States, The Ohio State University is a leading research university and the model for Ohio's public higher education institutes. Founded in 1870 as a land-grant university, it consistently ranks as one of the top public universities in the United States.

Alma Mater Studiorum - Università di Bologna operates on the principle that every individual carries within themselves a unique and unrepeatable potential. Active listening and dialogue guide the work of the University of Bologna, which promotes, in all its activities, inclusion, equity, and dive

ASU has developed a new model for the American research university, creating an institution committed to excellence, access and impact — the New American University. Nationally and internationally acclaimed, ASU ranks among the very best in nearly every critical measurement of student success, out

Carnegie Mellon University founder Andrew Carnegie said: "My heart is in the work." No statement better captures the passion and drive of our people to make a real difference. At Carnegie Mellon, we're not afraid of the work. Our educational environment creates problem solvers, drivers of

Galileo Global Education, world leader in independent higher education with 210,000 students, 61 schools and 106 campuses in 18 countries, placed employability and innovation at the heart of its strategy for 15 years. Galileo Global Education's mission is to enable everyone, regardless of their star

Founded in 1927, the University of Houston is the leading public research university in the vibrant international city of Houston. Each year, we educate more than 47,000 students in more than 250 undergraduate and graduate academic programs, on campus and online. UH awards over 10,000 degrees annual

We are Mizzou! Our distinct mission, as Missouri's only state-supported member of the Association of American Universities, is to provide all Missourians the benefits of a world-class research university. We are stewards and builders of a priceless state resource, a unique physical infrastructure an

Founded in 1888, Pontificia Universidad Católica de Chile is currently one of the leading higher education institutions in Latin America. Approximately 22,000 students are enrolled in graduate and undergraduate programs, which encompass a wide range of disciplines and professional schools. Its fa

The California State University is the largest system of four-year higher education in the country, with 22 campuses, 56,000 faculty and staff and more than 450,000 students. Created in 1960, the mission of the CSU is to provide high-quality, affordable education to meet the ever-changing needs of
.png)
Punjab Governor and UT Administrator Gulab Chand Kataria on Saturday stressed the need to create a dedicated and trained team to strengthen...
Berlin promises to take down bad cyber actors and a new report prompts questions of whether police should carry Tasers to keep them from...
Disappearing topsoil is a big problem for land and bottom line. Expert advice for picking the best bull genetics. Keeping cattle right where...
Introduction. Many security leaders didn't authorize AI expansion. It happened around them. Someone plugged in a copilot in a SaaS tool or...
It's been a busy time for New Zealand's National Cyber Security Centre as it takes an unprecedentedly proactive posture to cyber threats.
Data deletion is a great way to reduce your digital footprint and lower the risk of cybercrime – here's a guide to deleting your data...
This post is also available in: עברית (Hebrew). Organizations are increasingly expected to share data across corporate boundaries, yet cybersecurity risks...
When cybercriminals are designing ways to deliver malware, hiding payloads within files remains one of the most common and, for them,...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of MES at The Evergreen State College is https://www.evergreen.edu/mes.
According to Rankiteo, MES at The Evergreen State College’s AI-generated cybersecurity score is 683, reflecting their Weak security posture.
According to Rankiteo, MES at The Evergreen State College currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, MES at The Evergreen State College has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, MES at The Evergreen State College is not certified under SOC 2 Type 1.
According to Rankiteo, MES at The Evergreen State College does not hold a SOC 2 Type 2 certification.
According to Rankiteo, MES at The Evergreen State College is not listed as GDPR compliant.
According to Rankiteo, MES at The Evergreen State College does not currently maintain PCI DSS compliance.
According to Rankiteo, MES at The Evergreen State College is not compliant with HIPAA regulations.
According to Rankiteo,MES at The Evergreen State College is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
MES at The Evergreen State College operates primarily in the Higher Education industry.
MES at The Evergreen State College employs approximately 2 people worldwide.
MES at The Evergreen State College presently has no subsidiaries across any sectors.
MES at The Evergreen State College’s official LinkedIn profile has approximately 90 followers.
MES at The Evergreen State College is classified under the NAICS code 6113, which corresponds to Colleges, Universities, and Professional Schools.
No, MES at The Evergreen State College does not have a profile on Crunchbase.
Yes, MES at The Evergreen State College maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/mesevergreen.
As of January 25, 2026, Rankiteo reports that MES at The Evergreen State College has experienced 1 cybersecurity incidents.
MES at The Evergreen State College has an estimated 15,203 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with yes (notification letters sent, credit monitoring offered), and remediation measures with offered 12 months of free experian identityworks credit monitoring and identity protection services, and communication strategy with notification letters mailed to affected individuals (2025-10-17); disclosure to washington attorney general (2025-10-17)..
Title: The Evergreen State College Data Breach (2025)
Description: The Evergreen State College experienced a data breach between May 21, 2025, and June 10, 2025, involving unauthorized access to a legacy file share system containing sensitive student information. The breach exposed personally identifiable information (PII) of several thousand students, including names, Social Security numbers, full dates of birth, and student ID numbers. Notification letters were mailed to affected individuals on October 17, 2025, and the incident was disclosed to the Washington Attorney General on the same date, reporting 7,727 Washington residents affected.
Date Detected: 2025-06-10
Date Publicly Disclosed: 2025-10-17
Type: Data Breach
Attack Vector: Unauthorized access to legacy file share system
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Legacy file share system.

Data Compromised: Name, Social security number, Full date of birth, Student id number
Systems Affected: Legacy file share system
Brand Reputation Impact: Potential reputational damage due to exposure of sensitive student data
Legal Liabilities: Potential lawsuits and compensation claims for affected individuals
Identity Theft Risk: High (due to exposure of SSNs, full dates of birth, and student IDs)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personally Identifiable Information (Pii), Student Records and .

Entity Name: The Evergreen State College
Entity Type: Public Liberal Arts College
Industry: Education
Location: Olympia, Washington, USA
Customers Affected: 7,727 (Washington residents); several thousand (total students)

Incident Response Plan Activated: Yes (notification letters sent, credit monitoring offered)
Remediation Measures: Offered 12 months of free Experian IdentityWorks credit monitoring and identity protection services
Communication Strategy: Notification letters mailed to affected individuals (2025-10-17); disclosure to Washington Attorney General (2025-10-17)
Incident Response Plan: The company's incident response plan is described as Yes (notification letters sent, credit monitoring offered).

Type of Data Compromised: Personally identifiable information (pii), Student records
Number of Records Exposed: 7,727 (Washington residents); several thousand (total)
Sensitivity of Data: High (includes SSNs, full dates of birth, student IDs)
Data Exfiltration: Likely (unauthorized access to files)
Personally Identifiable Information: NameSocial Security numberFull date of birthStudent ID number
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Offered 12 months of free Experian IdentityWorks credit monitoring and identity protection services, .

Legal Actions: Potential lawsuits by affected individuals (investigation ongoing by Shamis & Gentile P.A.)
Regulatory Notifications: Washington Attorney General (disclosed 2025-10-17)
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Potential lawsuits by affected individuals (investigation ongoing by Shamis & Gentile P.A.).

Recommendations: Enroll in free credit monitoring (Experian IdentityWorks) offered by the college., Monitor financial statements for suspicious activity., Place a fraud alert on credit reports., Request free annual credit reports from major bureaus., Seek legal counsel if affected.Enroll in free credit monitoring (Experian IdentityWorks) offered by the college., Monitor financial statements for suspicious activity., Place a fraud alert on credit reports., Request free annual credit reports from major bureaus., Seek legal counsel if affected.Enroll in free credit monitoring (Experian IdentityWorks) offered by the college., Monitor financial statements for suspicious activity., Place a fraud alert on credit reports., Request free annual credit reports from major bureaus., Seek legal counsel if affected.Enroll in free credit monitoring (Experian IdentityWorks) offered by the college., Monitor financial statements for suspicious activity., Place a fraud alert on credit reports., Request free annual credit reports from major bureaus., Seek legal counsel if affected.Enroll in free credit monitoring (Experian IdentityWorks) offered by the college., Monitor financial statements for suspicious activity., Place a fraud alert on credit reports., Request free annual credit reports from major bureaus., Seek legal counsel if affected.

Source: Shamis & Gentile P.A. Investigation Notice

Source: The Evergreen State College Notification Letters
Date Accessed: 2025-10-17

Source: Washington Attorney General Disclosure
Date Accessed: 2025-10-17
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Shamis & Gentile P.A. Investigation Notice, and Source: The Evergreen State College Notification LettersDate Accessed: 2025-10-17, and Source: Washington Attorney General DisclosureDate Accessed: 2025-10-17.

Investigation Status: Ongoing (legal investigation by Shamis & Gentile P.A.; college response active)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notification letters mailed to affected individuals (2025-10-17); disclosure to Washington Attorney General (2025-10-17).

Stakeholder Advisories: Notification Letters To Affected Individuals; Disclosure To Washington Attorney General.
Customer Advisories: Enroll in free credit monitoring (Experian IdentityWorks).Monitor accounts for suspicious activity.Consider fraud alerts and credit freezes.Seek legal assistance if needed.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Notification Letters To Affected Individuals; Disclosure To Washington Attorney General, Enroll In Free Credit Monitoring (Experian Identityworks)., Monitor Accounts For Suspicious Activity., Consider Fraud Alerts And Credit Freezes., Seek Legal Assistance If Needed. and .

Entry Point: Legacy file share system
High Value Targets: Student Pii (Ssns, Dates Of Birth, Student Ids),
Data Sold on Dark Web: Student Pii (Ssns, Dates Of Birth, Student Ids),

Root Causes: Unauthorized Access To Legacy File Share System; Potential Lack Of Modern Security Controls,
Corrective Actions: Offered Credit Monitoring To Affected Individuals; Likely Reviewing Legacy System Security,
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Offered Credit Monitoring To Affected Individuals; Likely Reviewing Legacy System Security, .
Most Recent Incident Detected: The most recent incident detected was on 2025-06-10.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-10-17.
Most Significant Data Compromised: The most significant data compromised in an incident were Name, Social Security number, Full date of birth, Student ID number and .
Most Significant System Affected: The most significant system affected in an incident was Legacy file share system.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Full date of birth, Name, Social Security number and Student ID number.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 7.7K.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Potential lawsuits by affected individuals (investigation ongoing by Shamis & Gentile P.A.).
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Seek legal counsel if affected., Place a fraud alert on credit reports., Enroll in free credit monitoring (Experian IdentityWorks) offered by the college., Monitor financial statements for suspicious activity. and Request free annual credit reports from major bureaus..
Most Recent Source: The most recent source of information about an incident are Shamis & Gentile P.A. Investigation Notice, Washington Attorney General Disclosure and The Evergreen State College Notification Letters.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (legal investigation by Shamis & Gentile P.A.; college response active).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Notification letters to affected individuals; disclosure to Washington Attorney General, .
Most Recent Customer Advisory: The most recent customer advisory issued was an Enroll in free credit monitoring (Experian IdentityWorks).Monitor accounts for suspicious activity.Consider fraud alerts and credit freezes.Seek legal assistance if needed.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Legacy file share system.
.png)
Typemill is a flat-file, Markdown-based CMS designed for informational documentation websites. A reflected Cross-Site Scripting (XSS) exists in the login error view template `login.twig` of versions 2.19.1 and below. The `username` value can be echoed back without proper contextual encoding when authentication fails. An attacker can execute script in the login page context. This issue has been fixed in version 2.19.2.
A DOM-based Cross-Site Scripting (XSS) vulnerability exists in the DomainCheckerApp class within domain/script.js of Sourcecodester Domain Availability Checker v1.0. The vulnerability occurs because the application improperly handles user-supplied data in the createResultElement method by using the unsafe innerHTML property to render domain search results.
A Remote Code Execution (RCE) vulnerability exists in Sourcecodester Modern Image Gallery App v1.0 within the gallery/upload.php component. The application fails to properly validate uploaded file contents. Additionally, the application preserves the user-supplied file extension during the save process. This allows an unauthenticated attacker to upload arbitrary PHP code by spoofing the MIME type as an image, leading to full system compromise.
A UNIX symbolic link following issue in the jailer component in Firecracker version v1.13.1 and earlier and 1.14.0 on Linux may allow a local host user with write access to the pre-created jailer directories to overwrite arbitrary host files via a symlink attack during the initialization copy at jailer startup, if the jailer is executed with root privileges. To mitigate this issue, users should upgrade to version v1.13.2 or 1.14.1 or above.
An information disclosure vulnerability exists in the /srvs/membersrv/getCashiers endpoint of the Aptsys gemscms backend platform thru 2025-05-28. This unauthenticated endpoint returns a list of cashier accounts, including names, email addresses, usernames, and passwords hashed using MD5. As MD5 is a broken cryptographic function, the hashes can be easily reversed using public tools, exposing user credentials in plaintext. This allows remote attackers to perform unauthorized logins and potentially gain access to sensitive POS operations or backend functions.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.