Company Details
acram-digital
13
0
51126
acram.eu
0
ACR_7240974
In-progress

Acram Digital Company CyberSecurity Posture
acram.euAcram Digital Studio is a Poland-based indie game developer. We specialize in creating turn-based games and top-notch digital ports of board games. Additionally, we offer a range of outsourcing services to external developers and partners. Our outsourcing capabilities encompass Full-Cycle Game Development, Co-Development, Game UI/UX Design, Nintendo Switch Porting, and Art-Outsourcing, which includes 2D, 3D, Animation, and Social Media services. To date, our team has fully developed 7 games using the Unity Engine. These games are available on multiple platforms, including iOS, Android, PC (Steam, GOG), Nintendo Switch, and Xbox—all featuring cross-platform multiplayer. We have also undertaken commissioned projects for our clients and partners. We are committed to continuous improvement, aiming to provide remarkable experiences through our products. Our mission is to deliver the finest turn-based games and meet the needs of our clients and partners with professional services. Interested in collaborating? Feel free to leave us a message at: contact(at)acram.eu
Company Details
acram-digital
13
0
51126
acram.eu
0
ACR_7240974
In-progress
Between 800 and 849

Acram Digital Global Score (TPRM)XXXX

Description: **Critical Zero-Day Vulnerability in Gogs Exploited for Remote Code Execution** A severe, unpatched zero-day vulnerability in **Gogs**, a widely used self-hosted Git service, has been actively exploited in the wild, leading to remote code execution (RCE) on exposed instances. Security researchers uncovered the flaw during routine scans of internet-facing Gogs servers, revealing that attackers have already compromised hundreds of systems across diverse infrastructures. The vulnerability stems from **improper input validation** in Gogs’ codebase, allowing threat actors to send malicious payloads and execute arbitrary commands on vulnerable servers. While the flaw has not yet been assigned a **CVE identifier**, its exploitation has resulted in unauthorized access, potential data breaches, and full server takeovers. The impact is particularly concerning given Gogs’ adoption in numerous development and enterprise environments. With no official patch available, security experts urge administrators to **restrict access** to Gogs instances by placing them behind firewalls, deploying **web application firewalls (WAFs)** to block exploitation attempts, and monitoring logs for suspicious activity. Regular system audits are also recommended to detect signs of compromise. The incident underscores the risks of self-hosted services, especially when updates and security patches lag behind emerging threats. As the situation evolves, users await further guidance from the **Gogs development team** on a permanent fix. The cybersecurity community continues to track the vulnerability’s exploitation and potential long-term consequences.


Acram Digital has 12.36% more incidents than the average of same-industry companies with at least one recorded incident.
Acram Digital has 28.21% more incidents than the average of all companies with at least one recorded incident.
Acram Digital reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 1 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
Acram Digital cyber incidents detection timeline including parent company and subsidiaries

Acram Digital Studio is a Poland-based indie game developer. We specialize in creating turn-based games and top-notch digital ports of board games. Additionally, we offer a range of outsourcing services to external developers and partners. Our outsourcing capabilities encompass Full-Cycle Game Development, Co-Development, Game UI/UX Design, Nintendo Switch Porting, and Art-Outsourcing, which includes 2D, 3D, Animation, and Social Media services. To date, our team has fully developed 7 games using the Unity Engine. These games are available on multiple platforms, including iOS, Android, PC (Steam, GOG), Nintendo Switch, and Xbox—all featuring cross-platform multiplayer. We have also undertaken commissioned projects for our clients and partners. We are committed to continuous improvement, aiming to provide remarkable experiences through our products. Our mission is to deliver the finest turn-based games and meet the needs of our clients and partners with professional services. Interested in collaborating? Feel free to leave us a message at: contact(at)acram.eu


🎮🎬 We help make video games, films, and fan favourites you’ve probably played, watched, or heard. We work behind the scenes with game developers, publishers, and entertainment companies to bring their ideas to life and keep them running smoothly. From game development and art production to audio se

Ubisoft is a global leader in gaming with teams across the world crafting original and memorable gaming experiences featuring brands such as Assassin’s Creed®, Brawlhalla®, For Honor®, Far Cry®, Tom Clancy’s Ghost Recon®, Just Dance®, Rabbids®, Tom Clancy’s Rainbow Six®, The Crew® and Tom Clancy’s T

Founded in 1991, Epic Games is a leading interactive entertainment company and provider of 3D engine technology. Epic operates Fortnite, one of the world’s largest games with over 350 million accounts and 2.5 billion friend connections. Epic also develops Unreal Engine, which powers the world’s lead
.png)
Palo Alto Networks released its latest report titled 6 Predictions for the AI Economy: The New Rules of Cyber Security by 2026,...
The IDEA District is a major development to the west of Marshall's campus, meant to bring more opportunities and innovation for students and...
State, Local, Tribal, and Territorial (SLTT) governments operate the systems that keep American society functioning: 911 dispatch centers,...
Choosing to supplement your cybersecurity insurance with key internal controls and strategic business practices can significantly enhance...
As digitalization accelerates and cyberattacks grow increasingly complex and sophisticated, NEC's cybersecurity business has reached a...
Cloud software maker ServiceNow Inc. is reportedly in advanced discussions to acquire cybersecurity company Armis Inc. for as much as $7...
The 2025 ISC2 Cybersecurity Workforce Study finds that skills shortages now pose a greater risk to security effectiveness than staffing levels,...
Rochester Regional Health has received $15 million in New York state funding to strengthen cybersecurity systems and protect patient data...
Etay Mayor shares his journey, insights, and advice on breaking into the diverse and ever-evolving field of cybersecurity.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Acram Digital is https://www.acram.eu.
According to Rankiteo, Acram Digital’s AI-generated cybersecurity score is 802, reflecting their Good security posture.
According to Rankiteo, Acram Digital currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Acram Digital is not certified under SOC 2 Type 1.
According to Rankiteo, Acram Digital does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Acram Digital is not listed as GDPR compliant.
According to Rankiteo, Acram Digital does not currently maintain PCI DSS compliance.
According to Rankiteo, Acram Digital is not compliant with HIPAA regulations.
According to Rankiteo,Acram Digital is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Acram Digital operates primarily in the Computer Games industry.
Acram Digital employs approximately 13 people worldwide.
Acram Digital presently has no subsidiaries across any sectors.
Acram Digital’s official LinkedIn profile has approximately 0 followers.
Acram Digital is classified under the NAICS code 51126, which corresponds to Software Publishers.
No, Acram Digital does not have a profile on Crunchbase.
Yes, Acram Digital maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/acram-digital.
As of December 16, 2025, Rankiteo reports that Acram Digital has experienced 1 cybersecurity incidents.
Acram Digital has an estimated 1,993 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with restrict access to gogs instances by deploying them behind a firewall, containment measures with regularly audit systems for unusual activity or compromises, containment measures with implement web application firewalls (wafs) to detect and block attempts to exploit the vulnerability, containment measures with monitor logs for any signs of exploitation attempts, and enhanced monitoring with monitor logs for any signs of exploitation attempts..
Title: Critical Zero-Day Vulnerability in Gogs Leading to Remote Code Execution
Description: A critical zero-day vulnerability in Gogs, a popular self-hosted Git service, has been actively exploited by attackers, leading to remote code execution on internet-facing Gogs instances and resulting in the compromise of numerous servers.
Type: Zero-Day Exploitation
Attack Vector: Remote Code Execution
Vulnerability Exploited: Improper input validation in Gogs codebase
Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

Data Compromised: Sensitive data
Systems Affected: Hundreds of internet-facing servers
Operational Impact: Unauthorized access to servers
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Sensitive data.

Entity Name: Gogs users
Entity Type: Self-hosted Git service
Industry: Software Development

Containment Measures: Restrict access to Gogs instances by deploying them behind a firewallRegularly audit systems for unusual activity or compromisesImplement web application firewalls (WAFs) to detect and block attempts to exploit the vulnerabilityMonitor logs for any signs of exploitation attempts
Enhanced Monitoring: Monitor logs for any signs of exploitation attempts

Type of Data Compromised: Sensitive data
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by restrict access to gogs instances by deploying them behind a firewall, regularly audit systems for unusual activity or compromises, implement web application firewalls (wafs) to detect and block attempts to exploit the vulnerability, monitor logs for any signs of exploitation attempts and .

Lessons Learned: The exploitation of this zero-day highlights the ongoing challenges faced by organizations relying on self-hosted services. Maintaining regular updates and security patches for software is crucial in thwarting such attacks.

Recommendations: Restrict access to Gogs instances by deploying them behind a firewall, Regularly audit systems for unusual activity or compromises, Implement web application firewalls (WAFs) to detect and block attempts to exploit the vulnerability, Monitor logs for any signs of exploitation attempts, Collaborate with the cybersecurity community to facilitate faster identification and resolution of vulnerabilities in open-source projectsRestrict access to Gogs instances by deploying them behind a firewall, Regularly audit systems for unusual activity or compromises, Implement web application firewalls (WAFs) to detect and block attempts to exploit the vulnerability, Monitor logs for any signs of exploitation attempts, Collaborate with the cybersecurity community to facilitate faster identification and resolution of vulnerabilities in open-source projectsRestrict access to Gogs instances by deploying them behind a firewall, Regularly audit systems for unusual activity or compromises, Implement web application firewalls (WAFs) to detect and block attempts to exploit the vulnerability, Monitor logs for any signs of exploitation attempts, Collaborate with the cybersecurity community to facilitate faster identification and resolution of vulnerabilities in open-source projectsRestrict access to Gogs instances by deploying them behind a firewall, Regularly audit systems for unusual activity or compromises, Implement web application firewalls (WAFs) to detect and block attempts to exploit the vulnerability, Monitor logs for any signs of exploitation attempts, Collaborate with the cybersecurity community to facilitate faster identification and resolution of vulnerabilities in open-source projectsRestrict access to Gogs instances by deploying them behind a firewall, Regularly audit systems for unusual activity or compromises, Implement web application firewalls (WAFs) to detect and block attempts to exploit the vulnerability, Monitor logs for any signs of exploitation attempts, Collaborate with the cybersecurity community to facilitate faster identification and resolution of vulnerabilities in open-source projects
Key Lessons Learned: The key lessons learned from past incidents are The exploitation of this zero-day highlights the ongoing challenges faced by organizations relying on self-hosted services. Maintaining regular updates and security patches for software is crucial in thwarting such attacks.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Restrict access to Gogs instances by deploying them behind a firewall, Regularly audit systems for unusual activity or compromises, Implement web application firewalls (WAFs) to detect and block attempts to exploit the vulnerability, Monitor logs for any signs of exploitation attempts and Collaborate with the cybersecurity community to facilitate faster identification and resolution of vulnerabilities in open-source projects.

Root Causes: Improper input validation in Gogs codebase
Corrective Actions: Awaiting patch from Gogs development team
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Monitor logs for any signs of exploitation attempts.
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Awaiting patch from Gogs development team.
Most Significant Data Compromised: The most significant data compromised in an incident was Sensitive data.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Restrict access to Gogs instances by deploying them behind a firewallRegularly audit systems for unusual activity or compromisesImplement web application firewalls (WAFs) to detect and block attempts to exploit the vulnerabilityMonitor logs for any signs of exploitation attempts.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Sensitive data.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was The exploitation of this zero-day highlights the ongoing challenges faced by organizations relying on self-hosted services. Maintaining regular updates and security patches for software is crucial in thwarting such attacks.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Restrict access to Gogs instances by deploying them behind a firewall, Regularly audit systems for unusual activity or compromises, Implement web application firewalls (WAFs) to detect and block attempts to exploit the vulnerability, Monitor logs for any signs of exploitation attempts and Collaborate with the cybersecurity community to facilitate faster identification and resolution of vulnerabilities in open-source projects.
.png)
NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.
uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.
A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."
MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.
A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.