Company Details
american-red-cross
33,018
634,703
8135
redcross.org
0
AME_1009635
In-progress

American Red Cross Company CyberSecurity Posture
redcross.orgThe American Red Cross prevents and alleviates human suffering in the face of emergencies by mobilizing the power of volunteers and the generosity of donors. Each day, thousands of people – people just like you – provide compassionate care to those in need. Our network of generous donors, volunteers and employees share a mission of preventing and relieving suffering, here at home and around the world. We roll up our sleeves and donate time, money and blood. We learn or teach life-saving skills so our communities can be better prepared when the need arises. We do this every day because the Red Cross is needed - every day.
Company Details
american-red-cross
33,018
634,703
8135
redcross.org
0
AME_1009635
In-progress
Between 750 and 799

ARC Global Score (TPRM)XXXX

Description: A Switzerland-based IT company that stores and manages the data related to the International Committee of the Red Cross was attacked by hackers. The malware attack exposed information of over 500,000 people to hackers. The data accessed and stolen from the database includes 60 of Red Cross and Red Crescent National Societies.


No incidents recorded for American Red Cross in 2025.
No incidents recorded for American Red Cross in 2025.
No incidents recorded for American Red Cross in 2025.
ARC cyber incidents detection timeline including parent company and subsidiaries

The American Red Cross prevents and alleviates human suffering in the face of emergencies by mobilizing the power of volunteers and the generosity of donors. Each day, thousands of people – people just like you – provide compassionate care to those in need. Our network of generous donors, volunteers and employees share a mission of preventing and relieving suffering, here at home and around the world. We roll up our sleeves and donate time, money and blood. We learn or teach life-saving skills so our communities can be better prepared when the need arises. We do this every day because the Red Cross is needed - every day.


Colsubsidio es una organización privada sin ánimo de lucro, que pertenece al Sistema de Protección y Seguridad Social, su evolución ha estado marcada tanto por el reconocimiento de las personas como seres integrales con necesidades dinámicas, múltiples e interdependientes, como por las transformacio
Goodwill Industries is all about people working. We are North America’s leading nonprofit provider of education, training, and career services for people with disadvantages, such as welfare dependency, homelessness, and lack of education or work experience, as well as those with physical, mental an

AIESEC develops leadership among youth aged 18 to 30 and contributes to strengthening the global employability market by providing an end-to-end international talent recruitment solution for Enterprises, NGOs, and Start-ups. AIESEC is the world's largest youth-run organization developing the leader
The Salvation Army is the nation's largest direct provider of social services. Annually, we help millions overcome poverty, addiction, and spiritual and economic hardships by preaching the gospel of Jesus Christ and meeting human needs in His name without discrimination in nearly every zip code.

Casa de la Familia (CDLF) is a 501(c)(3) non-profit organization founded in 1996 by Clinical Psychologist Dr. Ana Nogales whose vision was to create an organization dedicated to ensuring long-lasting mental health success of children, youth, and families in response to psychological trauma. We prov

Médecins Sans Frontières (MSF) is an international, independent, medical humanitarian organisation working to provide medical assistance to people affected by conflict, epidemics, disasters, or exclusion from healthcare. Since our founding in 1971, we’ve grown to a global movement delivering human
The International Rescue Committee responds to the world’s worst humanitarian crises and help people to survive, recover, and gain control of their future. Founded in 1933 at the request of Albert Einstein, the IRC offers lifesaving care and life-changing assistance to refugees and displaced peopl

UNICEF works in some of the world’s toughest places, to reach the world’s most disadvantaged children. To save their lives. To defend their rights. To help them fulfill their potential. Across 190 countries and territories, we work for every child, everywhere, every day, to build a better world fo

YMCA of the USA is the national resource office for the nation's YMCAs. Located in Chicago, IL, YMCA of the USA exists to serve YMCAs. To address the specific needs of communities, each YMCA is an independent organization, autonomous and separate from YMCA of the USA. They are required by the nation
.png)
The American Red Cross Central & Southern Ohio Region has a new interim leader. Emily Fortman, a veteran of humanitarian and disaster...
The district became aware of the incident on Sunday and closed all schools and offices from Monday to Wednesday after the incident was said...
Security Risk Advisors (SRA), vendor of cybersecurity and services, announced the appointment of Suzanne Hall as CISO in Residence.
Hackers working for Russian intelligence attacked an American engineering company this fall, seemingly because that firm had worked for a...
The Department of Homeland Security's Office of the Chief Information Officer (OCIO) has been awarded U.S. Patent No.
These Top 100 cybersecurity leaders in the U.S. are not only tackling today's threats but also anticipating the challenges of tomorrow.
Middle East News: Israel's military confirmed that three bodies handed over from Gaza via the Red Cross were not among the deceased hostages...
National Cyber Director Sean Cairncross provided homeland security stakeholders with a preview of the Trump administration's forthcoming...
Key Report Takeaways: First major reversal: Only 35% of Cyberspace Solarium Commission recommendations are now fully implemented, down from...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of American Red Cross is http://www.redcross.org.
According to Rankiteo, American Red Cross’s AI-generated cybersecurity score is 760, reflecting their Fair security posture.
According to Rankiteo, American Red Cross currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, American Red Cross is not certified under SOC 2 Type 1.
According to Rankiteo, American Red Cross does not hold a SOC 2 Type 2 certification.
According to Rankiteo, American Red Cross is not listed as GDPR compliant.
According to Rankiteo, American Red Cross does not currently maintain PCI DSS compliance.
According to Rankiteo, American Red Cross is not compliant with HIPAA regulations.
According to Rankiteo,American Red Cross is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
American Red Cross operates primarily in the Non-profit Organizations industry.
American Red Cross employs approximately 33,018 people worldwide.
American Red Cross presently has no subsidiaries across any sectors.
American Red Cross’s official LinkedIn profile has approximately 634,703 followers.
American Red Cross is classified under the NAICS code 8135, which corresponds to Others.
Yes, American Red Cross has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/american-red-cross.
Yes, American Red Cross maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/american-red-cross.
As of December 12, 2025, Rankiteo reports that American Red Cross has experienced 1 cybersecurity incidents.
American Red Cross has an estimated 20,977 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.
Title: Data Breach at Switzerland-based IT Company Managing Red Cross Data
Description: A Switzerland-based IT company that stores and manages the data related to the International Committee of the Red Cross was attacked by hackers. The malware attack exposed information of over 500,000 people to hackers. The data accessed and stolen from the database includes 60 of Red Cross and Red Crescent National Societies.
Type: Data Breach
Attack Vector: Malware
Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Data Compromised: Personal information of over 500,000 people, Data from 60 red cross and red crescent national societies
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information, Organizational Data and .

Entity Name: Switzerland-based IT Company
Entity Type: IT Services
Industry: Information Technology
Location: Switzerland

Entity Name: International Committee of the Red Cross
Entity Type: Non-profit Organization
Industry: Humanitarian Aid

Type of Data Compromised: Personal information, Organizational data
Number of Records Exposed: Over 500,000
Most Significant Data Compromised: The most significant data compromised in an incident were Personal information of over 500,000 people, Data from 60 Red Cross and Red Crescent National Societies and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Personal information of over 500,000 people and Data from 60 Red Cross and Red Crescent National Societies.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 500.0K.
.png)
LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, there is no handler for JSON parsing errors; SyntaxError from express.json() includes user input in the error message, which gets reflected in responses. User input (including HTML/JavaScript) can be exposed in error responses, creating an XSS risk if Content-Type isn't strictly enforced. This issue does not have a fix at the time of publication.
LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, when creating prompts, JSON requests are sent to define and modify the prompts via PATCH endpoint for prompt groups (/api/prompts/groups/:groupId). However, the request bodies are not sufficiently validated for proper input, enabling users to modify prompts in a way that was not intended as part of the front end system. The patchPromptGroup function passes req.body directly to updatePromptGroup() without filtering sensitive fields. This issue is fixed in version 0.8.1.
LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, when a user posts a question, the iconURL parameter of the POST request can be modified by an attacker. The malicious code is then stored in the chat which can then be shared to other users. When sharing chats with a potentially malicious “tracker”, resources loaded can lead to loss of privacy for users who view the chat link that is sent to them. This issue is fixed in version 0.8.1.
MaxKB is an open-source AI assistant for enterprise. Versions 2.3.1 and below have improper file permissions which allow attackers to overwrite the built-in dynamic linker and other critical files, potentially resulting in privilege escalation. This issue is fixed in version 2.4.0.
MaxKB is an open-source AI assistant for enterprise. In versions 2.3.1 and below, the tool module allows an attacker to escape the sandbox environment and escalate privileges under certain concurrent conditions. This issue is fixed in version 2.4.0.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.