ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Our mission is to help every child to develop a love for being active by unlocking potential and creating positive habits for life. We offer coached sports sessions to schools, an apprenticeship programme and help teachers to become more confident in delivering physical education lessons to children. To find out about what else we do visit our website: http://activefusion.org.uk/

Active Fusion A.I CyberSecurity Scoring

Active Fusion

Company Details

Linkedin ID:

active-fusion

Employees number:

36

Number of followers:

1,288

NAICS:

561499

Industry Type:

Fundraising

Homepage:

activefusion.org.uk

IP Addresses:

0

Company ID:

ACT_3292892

Scan Status:

In-progress

AI scoreActive Fusion Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/active-fusion.jpeg
Active Fusion Fundraising
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreActive Fusion Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/active-fusion.jpeg
Active Fusion Fundraising
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Active Fusion Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

Active Fusion Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Active Fusion

Incidents vs Fundraising Industry Average (This Year)

No incidents recorded for Active Fusion in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Active Fusion in 2025.

Incident Types Active Fusion vs Fundraising Industry Avg (This Year)

No incidents recorded for Active Fusion in 2025.

Incident History — Active Fusion (X = Date, Y = Severity)

Active Fusion cyber incidents detection timeline including parent company and subsidiaries

Active Fusion Company Subsidiaries

SubsidiaryImage

Our mission is to help every child to develop a love for being active by unlocking potential and creating positive habits for life. We offer coached sports sessions to schools, an apprenticeship programme and help teachers to become more confident in delivering physical education lessons to children. To find out about what else we do visit our website: http://activefusion.org.uk/

Loading...
similarCompanies

Active Fusion Similar Companies

The Martyn Crook Foundation

The Foundation is established to honour Martyn's life and achievements, and perpetuate his work in South Australia, and beyond, for the benefit of Football and in so doing the objectives of the Foundation include: - To enable all to participate fully in all aspects of football in South Australia

Variety - the Children's Charity of Alberta

Variety – the Children’s Charity of Alberta supports children who are facing physical, developmental, emotional or learning challenges, through education, advocacy, and community outreach. Through collaboration with other service delivery organizations we are creating supportive, ability diverse co

World Vision UBC

Our aim is to raise awareness and funds to improve the lives of the impoverished through World Vision Canada's initiatives, and to support our four sponsor children from Sri Lanka, Jerusalem, and Burundi. World Vision UBC is a Vancouver-based AMS club made up of dedicated, proactive, and compassiona

Presbyterian Healthcare Foundation

Founded in 1968 as one of the first 100 hospital foundations in the country, Presbyterian Healthcare Foundation is dedicated to maximizing support to ensure Presbyterian Healthcare Services continues its long legacy of providing quality, efficient, and affordable care for individuals and families ac

Horizons Stewardship

Horizons Stewardship equips churches and faith-based nonprofits to grow disciples and fund ministry. Our purpose is to grow cultures of generosity through annual, capital, special, and planned giving development efforts. NEXT LEVEL GENEROSITY- A Proven Process that Yields Double-Digit Results Hor

Grants Plus

Founded in 2007, Grants Plus is the most trusted and experienced professional grant seeking firm in the country. We've partnered with experienced nonprofit leaders to secure over $350 million in grant funding from private, corporate, and government funders. Our team of professional grant writers an

newsone

Active Fusion CyberSecurity News

November 24, 2025 11:07 AM
CISA Urges Patch of Actively Exploited Flaw in Oracle Identity Manager

The US cybersecurity agency has added the critical flaw to its Known Exploited Vulnerabilities list.

November 22, 2025 08:00 AM
CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw impacting Oracle Identity Manager...

July 20, 2025 07:00 AM
Weekly Cybersecurity Newsletter: Chrome 0-Day, VMware Flaws Patched, Fortiweb Hack, Teams Abuse, and More

It's been a busy seven days for security alerts. Google is addressing another actively exploited zero-day in Chrome, and VMware has rolled...

March 22, 2025 07:00 AM
VMware Vulnerabilities Exploited Actively to Bypass Security Controls & Deploy Ransomware

A surge of ransomware attacks leveraging critical VMware virtualization vulnerabilities has triggered global alerts.

March 06, 2025 08:00 AM
37K+ VMware ESXi instances vulnerable to critical zero-day

Some customers have been unable to download the patches for three VMware zero-day vulnerabilities due to an issue with the Broadcom Support...

March 05, 2025 08:00 AM
Broadcom urges customers to patch 3 zero-day VMware flaws

Cyberattackers with administrative access are actively exploiting vulnerabilities in ESXi, Workstation and Fusion products.

March 05, 2025 08:00 AM
Broadcom urges VMware customers to patch ‘emergency’ zero-day bugs under active exploitation

US technology giant Broadcom is warning that a trio of VMware vulnerabilities are being actively exploited by malicious hackers to compromise the networks of...

March 05, 2025 08:00 AM
CISA Warns of Actively Exploited VMware Vulnerabilities, Urges Immediate Patching

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent alert on March 4, 2025, adding three critical VMware...

March 04, 2025 08:00 AM
VMware Security Flaws Exploited in the Wild—Broadcom Releases Urgent Patches

Broadcom has released security updates to address three actively exploited security flaws in VMware ESXi, Workstation, and Fusion products.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Active Fusion CyberSecurity History Information

Official Website of Active Fusion

The official website of Active Fusion is http://www.activefusion.org.uk.

Active Fusion’s AI-Generated Cybersecurity Score

According to Rankiteo, Active Fusion’s AI-generated cybersecurity score is 757, reflecting their Fair security posture.

How many security badges does Active Fusion’ have ?

According to Rankiteo, Active Fusion currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Active Fusion have SOC 2 Type 1 certification ?

According to Rankiteo, Active Fusion is not certified under SOC 2 Type 1.

Does Active Fusion have SOC 2 Type 2 certification ?

According to Rankiteo, Active Fusion does not hold a SOC 2 Type 2 certification.

Does Active Fusion comply with GDPR ?

According to Rankiteo, Active Fusion is not listed as GDPR compliant.

Does Active Fusion have PCI DSS certification ?

According to Rankiteo, Active Fusion does not currently maintain PCI DSS compliance.

Does Active Fusion comply with HIPAA ?

According to Rankiteo, Active Fusion is not compliant with HIPAA regulations.

Does Active Fusion have ISO 27001 certification ?

According to Rankiteo,Active Fusion is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Active Fusion

Active Fusion operates primarily in the Fundraising industry.

Number of Employees at Active Fusion

Active Fusion employs approximately 36 people worldwide.

Subsidiaries Owned by Active Fusion

Active Fusion presently has no subsidiaries across any sectors.

Active Fusion’s LinkedIn Followers

Active Fusion’s official LinkedIn profile has approximately 1,288 followers.

NAICS Classification of Active Fusion

Active Fusion is classified under the NAICS code 561499, which corresponds to All Other Business Support Services.

Active Fusion’s Presence on Crunchbase

No, Active Fusion does not have a profile on Crunchbase.

Active Fusion’s Presence on LinkedIn

Yes, Active Fusion maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/active-fusion.

Cybersecurity Incidents Involving Active Fusion

As of December 21, 2025, Rankiteo reports that Active Fusion has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

Active Fusion has an estimated 1,146 peer or competitor companies worldwide.

Active Fusion CyberSecurity History Information

How many cyber incidents has Active Fusion faced ?

Total Incidents: According to Rankiteo, Active Fusion has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at Active Fusion ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

Versa SASE Client for Windows versions released between 7.8.7 and 7.9.4 contain a local privilege escalation vulnerability in the audit log export functionality. The client communicates user-controlled file paths to a privileged service, which performs file system operations without impersonating the requesting user. Due to improper privilege handling and a time-of-check time-of-use race condition combined with symbolic link and mount point manipulation, a local authenticated attacker can coerce the service into deleting arbitrary directories with SYSTEM privileges. This can be exploited to delete protected system folders such as C:\\Config.msi and subsequently achieve execution as NT AUTHORITY\\SYSTEM via MSI rollback techniques.

Risk Information
cvss4
Base: 8.5
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

The WP JobHunt plugin for WordPress, used by the JobCareer theme, is vulnerable to unauthorized modification of data due to a missing capability check on the 'cs_update_application_status_callback' function in all versions up to, and including, 7.7. This makes it possible for authenticated attackers, with Candidate-level access and above, to inject cross-site scripting into the 'status' parameter of applied jobs for any user.

Risk Information
cvss3
Base: 7.6
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
Description

The WP JobHunt plugin for WordPress, used by the JobCareer theme, is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 7.7 via the 'cs_update_application_status_callback' due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Candidate-level access and above, to send a site-generated email with injected HTML to any user.

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Description

The FiboSearch – Ajax Search for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `thegem_te_search` shortcode in all versions up to, and including, 1.32.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This vulnerability requires TheGem theme (premium) to be installed with Header Builder mode enabled, and the FiboSearch "Replace search bars" option enabled for TheGem integration.

Risk Information
cvss3
Base: 5.4
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Description

The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.11.0 via the ajax_get_members function. This is due to the use of a predictable low-entropy token (5 hex characters derived from md5 of post ID) to identify member directories and insufficient authorization checks on the unauthenticated AJAX endpoint. This makes it possible for unauthenticated attackers to extract sensitive data including usernames, display names, user roles (including administrator accounts), profile URLs, and user IDs by enumerating predictable directory_id values or brute-forcing the small 16^5 token space.

Risk Information
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=active-fusion' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge