Company Details
americanhorseproject
1
14
921
americanhorseproject.org
0
AME_1034509
In-progress

American Horse Project Company CyberSecurity Posture
americanhorseproject.orgHundreds of thousands of American horses are in crisis and millions of people around the world who consume equine meat risk being exposed to toxic substances that have infiltrated the human food chain. The American Horse Project is a registered 501(c)3 and was founded to provide an innovative, comprehensive, and solutions-based approach to the protection of American horses, donkeys, mules, and burros (equines) within U.S. borders. Through the latest technological innovations and digital media strategies, we are determined to drive awareness that equine meat is toxic for human consumption and end the inhumane treatment and slaughter of America’s equine population.
Company Details
americanhorseproject
1
14
921
americanhorseproject.org
0
AME_1034509
In-progress
Between 700 and 749

AHP Global Score (TPRM)XXXX



No incidents recorded for American Horse Project in 2025.
No incidents recorded for American Horse Project in 2025.
No incidents recorded for American Horse Project in 2025.
AHP cyber incidents detection timeline including parent company and subsidiaries

Hundreds of thousands of American horses are in crisis and millions of people around the world who consume equine meat risk being exposed to toxic substances that have infiltrated the human food chain. The American Horse Project is a registered 501(c)3 and was founded to provide an innovative, comprehensive, and solutions-based approach to the protection of American horses, donkeys, mules, and burros (equines) within U.S. borders. Through the latest technological innovations and digital media strategies, we are determined to drive awareness that equine meat is toxic for human consumption and end the inhumane treatment and slaughter of America’s equine population.


Health happens where we live, learn, work, and play. Lane County’s Prevention staff looks at what is healthy; then works to promote changes that will improve our health, both mentally and physically. We define Prevention as the active process of improving health and well-being of people by reducing

Since 1989, the Housing and Community Development Network of New Jersey has worked to improve the environment for the work of community development corporations (CDCs), and to strengthen their capacity to create housing and revitalize distressed neighborhoods throughout New Jersey. The Network is a

Econsult Solutions Inc. provides businesses and public policy makers with economic consulting services in urban economics, real estate economics, transportation, public infrastructure, development, public policy and finance, community and neighborhood development, planning, as well as expert witness

LSPC organizes communities impacted by the criminal justice system and advocates to release incarcerated people, to restore human and civil rights and to reunify families and communities. We build public awareness of structural racism in policing, the courts and prison system and we advance racial a

We need thoughtful policies and programs to adapt to how climate change is reshaping our world and mitigate its worst impacts. But that’s not enough. We must ensure that the solutions address inequality and create career opportunities for those who will be most impacted by the coming challenges. Eve

Public policy and business consultancy based in DC focused on international affairs. Formerly DC Asia Advisory, LLC. Ours is a small consulting practice, established in 2006, led by two former administration officials, focused on providing independent political analysis and advisory services.
.png)
When China's massive Belt and Road Initiative (BRI) launched in 2013, I was a great admirer. On paper, it was—and remains—the most ambitious...
A Project 2025 proposal appears to call for a culling of Western horse populations; 'How do you quantify the value of nature?'
The Greek legend of the Trojan horse is a tale of deception, a story children everywhere learn as youngsters. Yet America seems to have...
Probe report cites cyber spy arm of US National Security Agency as source of extensive data-stealing attack on networks across China.
Countries can defend against individual hackers by sending them a 'horse head' message.
She had joined Project Raven, a clandestine team that included more than a dozen former U.S. intelligence operatives recruited to help the...
President Obama secretly ordered increasingly sophisticated attacks on the computer systems that run Iran's main nuclear enrichment facilities.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of American Horse Project is http://americanhorseproject.org.
According to Rankiteo, American Horse Project’s AI-generated cybersecurity score is 746, reflecting their Moderate security posture.
According to Rankiteo, American Horse Project currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, American Horse Project is not certified under SOC 2 Type 1.
According to Rankiteo, American Horse Project does not hold a SOC 2 Type 2 certification.
According to Rankiteo, American Horse Project is not listed as GDPR compliant.
According to Rankiteo, American Horse Project does not currently maintain PCI DSS compliance.
According to Rankiteo, American Horse Project is not compliant with HIPAA regulations.
According to Rankiteo,American Horse Project is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
American Horse Project operates primarily in the Public Policy Offices industry.
American Horse Project employs approximately 1 people worldwide.
American Horse Project presently has no subsidiaries across any sectors.
American Horse Project’s official LinkedIn profile has approximately 14 followers.
No, American Horse Project does not have a profile on Crunchbase.
Yes, American Horse Project maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/americanhorseproject.
As of November 28, 2025, Rankiteo reports that American Horse Project has not experienced any cybersecurity incidents.
American Horse Project has an estimated 1,023 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, American Horse Project has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.