Company Details
addiction-treatment-services-inc.
100
256
62133
addictiontreatmentservices.org
0
ADD_1932384
In-progress


Addiction Treatment Services Company CyberSecurity Posture
addictiontreatmentservices.orgFor more than 40 years, Addiction Treatment Services has extended compassion and care to our neighbors with substance dependencies so they can maintain a healthy, recovery lifestyle. We’ve always believed that if we can promote hope — and meet every person with the dignity and respect they deserve — we can build a stronger community, one recovery at a time. Today, in the midst of the country’s opioid epidemic, our mission has never been more vital. We’re feeling the effects of addiction much closer to home and, with that, comes opportunities for understanding and empathy. We’ll never stop sharing addiction education and working with our community partners to reduce the stigma associated with substance use disorder and its struggles. Looking ahead, we’ve got ambitious plans for the future. With a bold strategic plan, we’ve got our sights set on becoming the region’s leader in treatment and recovery.
Company Details
addiction-treatment-services-inc.
100
256
62133
addictiontreatmentservices.org
0
ADD_1932384
In-progress
Between 750 and 799

ATS Global Score (TPRM)XXXX



No incidents recorded for Addiction Treatment Services in 2026.
No incidents recorded for Addiction Treatment Services in 2026.
No incidents recorded for Addiction Treatment Services in 2026.
ATS cyber incidents detection timeline including parent company and subsidiaries

For more than 40 years, Addiction Treatment Services has extended compassion and care to our neighbors with substance dependencies so they can maintain a healthy, recovery lifestyle. We’ve always believed that if we can promote hope — and meet every person with the dignity and respect they deserve — we can build a stronger community, one recovery at a time. Today, in the midst of the country’s opioid epidemic, our mission has never been more vital. We’re feeling the effects of addiction much closer to home and, with that, comes opportunities for understanding and empathy. We’ll never stop sharing addiction education and working with our community partners to reduce the stigma associated with substance use disorder and its struggles. Looking ahead, we’ve got ambitious plans for the future. With a bold strategic plan, we’ve got our sights set on becoming the region’s leader in treatment and recovery.


ProtoCall Services, Inc. is the nation’s leading third-party provider of specialty clinical call-center services and digital tools to the behavioral health field. Formally established in 1992, ProtoCall’s customers include community behavioral health providers, employee assistance programs, univer
Want to support your ADHD and autistic team but don’t know where to start? Struggling to understand what practical changes would actually make a difference for neurodivergent staff? Overwhelmed by all the advice on neurodiversity, but need simple, actionable steps? Worried about making mistakes o

Goochland Powhatan Community Services provides services for mental health, developmental disabilities, and substance use disorders to the citizens of Goochland and Powhatan Counties. Our Mission is to promote and enhance the quality of life through innovative, comprehensive services to all residen

We offer Ketamine-Assisted Psychotherapy for individuals seeking healthier and more satisfying lives. Ketamine-Assisted Psychotherapy, a cutting-edge treatment, has been shown to be an effective treatment for depression, anxiety, obsessive-compulsive disorders, trauma/PTSD, addictions, chronic pain

Helping to Strengthen Our Community The Strong Minds multi-disciplinary team are here to help our community to build strong mental health, develop skills, and learn in a positive and supported environment. We do this by working individually with children, adolescents, and adults, as well as providi

Our vision is to significantly and positively impact the mental health and well-being of the Central Texas community. Our mission is to provide affordable, accessible, high quality mental health services to all Central Texans who desire them and to provide an unparalleled training environment for

With two luxury locations in Beverly Hills, Bridges to Recovery specializes in the treatment of mental health issues such as depression, bipolar disorder, anxiety, and trauma disorders. We also offer resources for patients to explore various ways to accomplish difficult developmental transitions, es

At Kyo, we exist to help create a life that’s more fulfilling for our clients, for ourselves, and for each other. We thrive on big, extraordinary challenges where super ideas originate, and believe that scientific discovery needs empathy in order to be effective and influential. We are for the dri

I operate a private practice in San Francisco and Marin, specializing in the treatment of anxiety disorders and stress-related issues. I provide individual and group therapy for OCD, generalized anxiety, panic, social anxiety, agoraphobia, health anxiety, and depression. I use Cognitive-Behavioral T
.png)
Doha, January 20 (QNA) - The Fourth National Human Rights Forum, organized by the National Human Rights Committee (NHRC) in partnership with...
C2A and Deloitte are enabling Taiwanese companies to automate cybersecurity, prove compliance, and compete globally with confidence across...
SPRINGDALE, AR, UNITED STATES, January 8, 2026 /EINPresswire.com/ — TW Arkansas Detox has released an operational update regarding the continued provision...
Altek Business Systems Strengthens Cybersecurity for Local Businesses Across Eastern Pennsylvania and Southern New Jersey. TELFORD, PA, UNITED STATES,...
Mission Viejo, California – Christopher Care Center, a premier provider of detox and residential addiction treatment, is pleased to announce its new range...
The HIPAA Journal has compiled healthcare data breach statistics from October 2009, when the Department of Health and Human Services (HHS)...
HIPAA updates and changes happen more frequently than many people are aware of because of the nature of the update or their minor impact on...
Our sober living and outpatient programs give people the structure, support, and flexibility they need to build real recovery while staying...
SIMI VALLEY, CA – December 23, 2025 – PRESSADVANTAGE –. All In Solutions Detox, a CARF-accredited addiction treatment center, highlights the critical role...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Addiction Treatment Services is http://addictiontreatmentservices.org.
According to Rankiteo, Addiction Treatment Services’s AI-generated cybersecurity score is 757, reflecting their Fair security posture.
According to Rankiteo, Addiction Treatment Services currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Addiction Treatment Services has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Addiction Treatment Services is not certified under SOC 2 Type 1.
According to Rankiteo, Addiction Treatment Services does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Addiction Treatment Services is not listed as GDPR compliant.
According to Rankiteo, Addiction Treatment Services does not currently maintain PCI DSS compliance.
According to Rankiteo, Addiction Treatment Services is not compliant with HIPAA regulations.
According to Rankiteo,Addiction Treatment Services is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Addiction Treatment Services operates primarily in the Mental Health Care industry.
Addiction Treatment Services employs approximately 100 people worldwide.
Addiction Treatment Services presently has no subsidiaries across any sectors.
Addiction Treatment Services’s official LinkedIn profile has approximately 256 followers.
Addiction Treatment Services is classified under the NAICS code 62133, which corresponds to Offices of Mental Health Practitioners (except Physicians).
No, Addiction Treatment Services does not have a profile on Crunchbase.
Yes, Addiction Treatment Services maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/addiction-treatment-services-inc..
As of January 22, 2026, Rankiteo reports that Addiction Treatment Services has not experienced any cybersecurity incidents.
Addiction Treatment Services has an estimated 5,280 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Addiction Treatment Services has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g., execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.