Company Details
air-force-space-command
10,001
14,486
928
af.mil
0
AIR_7653091
In-progress

Air Force Space Command Company CyberSecurity Posture
af.milAir Force Space Command, activated Sept. 1, 1982, is a major command with headquarters at Peterson Air Force Base, Colo. AFSPC provides military focused space and cyberspace capabilities with a global perspective to the joint warfighting team. People More than 40,000 professionals assigned to 134 locations worldwide. Organization Fourteenth Air Force is located at Vandenberg AFB, Calif., and provides space capabilities for the joint fight through the operational missions of spacelift; position, navigation and timing; satellite communications; missile warning and space control. Twenty-fourth Air Force is located at Joint Base San Antonio - Lackland, Texas, and its mission is to provide combatant commanders with trained and ready cyber forces which plan and conduct cyberspace operations. The command extends, operates, maintains and defends its assigned portions of the Department of Defense network to provide capabilities in, through and from cyberspace. The Space and Missile Systems Center at Los Angeles AFB, Calif., designs and acquires all Air Force and most Department of Defense space systems. It oversees launches, completes on-orbit checkouts and then turns systems over to user agencies. It supports the Program Executive Office for Space on the Global Positioning, Defense Satellite Communications and MILSTAR systems. SMC also supports the Evolved Expendable Launch Vehicle, Defense Meteorological Satellite and Defense Support programs and the Space-Based Infrared System. AFSPC major installations include: Schriever, Peterson and Buckley Air Force Bases in Colorado; Los Angeles and Vandenberg Air Force Bases in California; and Patrick AFB in Florida. Major AFSPC units also reside on bases managed by other commands in New Mexico, Texas, Illinois, Virginia and Georgia. AFSPC manages many smaller installations and geographically separated units in North Dakota, Alaska, Hawaii and across the globe.
Company Details
air-force-space-command
10,001
14,486
928
af.mil
0
AIR_7653091
In-progress
Between 750 and 799

AFSC Global Score (TPRM)XXXX



No incidents recorded for Air Force Space Command in 2025.
No incidents recorded for Air Force Space Command in 2025.
No incidents recorded for Air Force Space Command in 2025.
AFSC cyber incidents detection timeline including parent company and subsidiaries

Air Force Space Command, activated Sept. 1, 1982, is a major command with headquarters at Peterson Air Force Base, Colo. AFSPC provides military focused space and cyberspace capabilities with a global perspective to the joint warfighting team. People More than 40,000 professionals assigned to 134 locations worldwide. Organization Fourteenth Air Force is located at Vandenberg AFB, Calif., and provides space capabilities for the joint fight through the operational missions of spacelift; position, navigation and timing; satellite communications; missile warning and space control. Twenty-fourth Air Force is located at Joint Base San Antonio - Lackland, Texas, and its mission is to provide combatant commanders with trained and ready cyber forces which plan and conduct cyberspace operations. The command extends, operates, maintains and defends its assigned portions of the Department of Defense network to provide capabilities in, through and from cyberspace. The Space and Missile Systems Center at Los Angeles AFB, Calif., designs and acquires all Air Force and most Department of Defense space systems. It oversees launches, completes on-orbit checkouts and then turns systems over to user agencies. It supports the Program Executive Office for Space on the Global Positioning, Defense Satellite Communications and MILSTAR systems. SMC also supports the Evolved Expendable Launch Vehicle, Defense Meteorological Satellite and Defense Support programs and the Space-Based Infrared System. AFSPC major installations include: Schriever, Peterson and Buckley Air Force Bases in Colorado; Los Angeles and Vandenberg Air Force Bases in California; and Patrick AFB in Florida. Major AFSPC units also reside on bases managed by other commands in New Mexico, Texas, Illinois, Virginia and Georgia. AFSPC manages many smaller installations and geographically separated units in North Dakota, Alaska, Hawaii and across the globe.


Saudi Arabian National Guard المهمة الأساسية للحرس الوطني هي : الحفاظ على الأمن، والاستقرار الداخلي للوطن، والدفاع عن مقدّساته ومكتسباته الحضارية . ومن مـهامه الأخرى ما يلي: •حماية المنشآت الحيوية، والإستراتيجية التي يُكَلَّف بها. • المشاركة في

Welcome to the official U.S. Army LinkedIn page. The U.S. Army’s mission is to fight and win our Nation’s wars by providing prompt, sustained land dominance across the full range of military operations and spectrum of conflict in support of combatant commanders. If you're looking for news about t

The mission of the Department of War is to provide military forces necessary to protect the security of our country. The U.S. military defends the homeland, deters adversaries, and builds security around the world by projecting U.S. influence and working with allies and partners. In case deterrence

The United States is a maritime nation, and the U.S. Navy protects America at sea. Alongside our allies and partners, we defend freedom, preserve economic prosperity, and keep the seas open and free. Our nation is engaged in long-term competition. To defend American interests around the globe, the U

Joining the British Army, you’ll get much more from life than you ever would with a civilian career – you’ll have the opportunity to do something that really matters, with a team that are like family to you. The sense of belonging in the Army is next level: when you’ve trained with each other and ov

MISSION Throughout all 50 states and around the world, the Navy Reserve force delivers real-world capabilities and expertise to support the Navy mission — building a more lethal, warfighting culture focused on great power competition. VISION The Navy Reserve provides essential naval warfighting cap

The Air Force Reserve is an integral component of our Nation's air defense and military support network. Reservists bring knowledge, skills and expertise from their civilian experiences to support critical missions and training around the globe, while working alongside their Active Duty Air Force me

The Swedish Armed Forces is one of the biggest authorities in Sweden and is headed by a Supreme Commander. The deputy leader of the authority is the Director General. As the only authority permitted to engage in armed combat, the Swedish Armed Forces are Sweden’s ultimate security policy resource

The Army Act was enacted in parliament on the 10th of October 1949 which is recognized as the day, the Ceylon Army was raised. The Army was to be comprised of a Regular and a Volunteer force. In May 1972, when Ceylon became the Republic of Sri Lanka, all Army units were renamed accordingly Regime
.png)
A small satellite named Deloitte-1 is hunting for hackers in orbit. Launched in March, it's the first of nine spacecraft the consulting firm...
The lawsuit also names Defense Secretary Pete Hegseth, the Department of the Air Force and Air Force Secretary Troy Meink as plaintiffs.
SPACE SYSTEMS COMMAND -- Peterson Space Force Base, Colorado Springs, Colo. & Los Angeles Air Force Base, El Segundo, Calif.
The CSIS Commission on U.S. Cyber Force Generation will convene leading experts to examine how the United States can best build a dedicated...
U.S. Space Force contractors are building an AI-powered tool to detect cyberattacks on satellites by monitoring their behavior and...
Ms. Charleen Laughlin, a member of the Senior Executive Service, is the Deputy Chief of Space Operations (DCSO) for Cyber and Data (SF/S6) at United States...
The Army has blocked the Air Force generative AI chatbot, NIPRGPT, from its networks, citing cybersecurity and data governance.
This paper proposes a three-tiered framework – based on mitigation, adaptation and resilience – for strengthening NATO's space cybersecurity approach.
At last week's Space Force's Space Systems Command Cyber Expo 2025, Director for Cyber Warfare John Garstka warned in his keynote address...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Air Force Space Command is http://www.afspc.af.mil.
According to Rankiteo, Air Force Space Command’s AI-generated cybersecurity score is 755, reflecting their Fair security posture.
According to Rankiteo, Air Force Space Command currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Air Force Space Command is not certified under SOC 2 Type 1.
According to Rankiteo, Air Force Space Command does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Air Force Space Command is not listed as GDPR compliant.
According to Rankiteo, Air Force Space Command does not currently maintain PCI DSS compliance.
According to Rankiteo, Air Force Space Command is not compliant with HIPAA regulations.
According to Rankiteo,Air Force Space Command is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Air Force Space Command operates primarily in the Armed Forces industry.
Air Force Space Command employs approximately 10,001 people worldwide.
Air Force Space Command presently has no subsidiaries across any sectors.
Air Force Space Command’s official LinkedIn profile has approximately 14,486 followers.
No, Air Force Space Command does not have a profile on Crunchbase.
Yes, Air Force Space Command maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/air-force-space-command.
As of November 28, 2025, Rankiteo reports that Air Force Space Command has not experienced any cybersecurity incidents.
Air Force Space Command has an estimated 779 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Air Force Space Command has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.