Company Details
atlantic-council-geotech-center
15
1,099
54172
atlanticcouncil.org
18
ATL_6958781
Completed

Atlantic Council GeoTech Center Company CyberSecurity Posture
atlanticcouncil.orgChampioning positive paths forward that nations, economies, and societies can pursue to ensure new technologies and data empower people, prosperity, and peace. #GoodTechChoices
Company Details
atlantic-council-geotech-center
15
1,099
54172
atlanticcouncil.org
18
ATL_6958781
Completed
Between 700 and 749

ACGC Global Score (TPRM)XXXX

Description: The Intellexa Consortium, notorious for its Predator spyware, faced US sanctions for targeting Americans, including government officials, journalists, and policy experts. With robust data-stealing and surveillance capabilities, Predator can compromise devices through sophisticated zero-click attacks. Despite sanctions causing operational decline, Recorded Future reports a resurgence leveraging new infrastructure, making tracking challenging. Increase in stealth and complexity signifies a continued threat to high-profile individuals globally, raising privacy, security, and ethical concerns. The renewed use of Predator could lead to significant repercussions for victims, compromising personal, financial, and strategic information.


No incidents recorded for Atlantic Council GeoTech Center in 2025.
No incidents recorded for Atlantic Council GeoTech Center in 2025.
No incidents recorded for Atlantic Council GeoTech Center in 2025.
ACGC cyber incidents detection timeline including parent company and subsidiaries

Championing positive paths forward that nations, economies, and societies can pursue to ensure new technologies and data empower people, prosperity, and peace. #GoodTechChoices


thinkspace is a community of passionate entrepreneurs, tech startups, and small businesses with a natural affinity for inspiration and innovation. thinkspace provides: • private offices in both Seattle and Redmond • shared coworking space in Seattle • virtual office service in Seattle and Redm

The Opportunity Institute is a nonprofit organization that promotes social mobility and equity by improving outcomes from early childhood through early career. We focus on education, which plays a critical role in opening opportunities, and the related social policies that make true opportunity poss

The Center for the Study of Global Economic Futures (CSGEF) was established in Dubai, UAE in 2021, is a multidisciplinary policy research organization to scrutinize the socioeconomic and systemic forces that bear upon the future of the worldwide financial system. The aim is to offer an extraordinary

WIRED Live brings to life the compelling stories of innovation changing the way we live, as covered in WIRED magazine. The one-day conference is designed for curious minds looking to discover the future and to meet those who are driving change and layers compelling storytelling with visual stimulati

The Paul Douglas Institute is a nonpartisan student-run public policy think tank. Founded and based at the University of Chicago, we empower students to independently influence public policy. We produce evidence-driven social science research that is rigorous, practical, and innovative. To ensure o

'You're building the future. Please build the one you want to live in." – A CLEAN WORLD with CLEAN ENERGY... Throughout the last 14 years Mission Energy Foundation have delivered successful platforms of knowledge dissemination on various subjects like Gasification, Waste-to-Energy, Fly Ash Utilizat
.png)
On October 10-11, 2025, the Cyber Statecraft Initiative and Columbia University's School of International and Public Affairs and Digital and...
When cyberattacks and missile strikes converge on the same targets, infrastructure resilience becomes more than a technical mandate;...
The ongoing Russian invasion of Ukraine is among the most technologically advanced wars the world has ever seen.
Experts explore the different pathways from the armed services to a career in tech and cybersecurity.
On March 13–14, 2025, the Atlantic Council's Cyber Statecraft Initiative hosted its flagship Cyber 9/12 Strategy Challenge in Washington,...
This report proposes a legislative safe harbor framework that would incentivize technology companies to engage in spyware accountability.
On September 28, Switzerland will vote in a national referendum on the introduction of a state-recognized electronic proof of identification...
Underpinning AI technologies is a complex supply chain—organizations, people, activities, information, and resources that enable AI research...
On Tuesday, September 9, at 8:30 a.m. ET, the Atlantic Council's Cyber Statecraft Initiative and the University of Cape Town Cybersecurity Capacity Center...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Atlantic Council GeoTech Center is https://www.atlanticcouncil.org/programs/geotech-center/.
According to Rankiteo, Atlantic Council GeoTech Center’s AI-generated cybersecurity score is 739, reflecting their Moderate security posture.
According to Rankiteo, Atlantic Council GeoTech Center currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Atlantic Council GeoTech Center is not certified under SOC 2 Type 1.
According to Rankiteo, Atlantic Council GeoTech Center does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Atlantic Council GeoTech Center is not listed as GDPR compliant.
According to Rankiteo, Atlantic Council GeoTech Center does not currently maintain PCI DSS compliance.
According to Rankiteo, Atlantic Council GeoTech Center is not compliant with HIPAA regulations.
According to Rankiteo,Atlantic Council GeoTech Center is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Atlantic Council GeoTech Center operates primarily in the Think Tanks industry.
Atlantic Council GeoTech Center employs approximately 15 people worldwide.
Atlantic Council GeoTech Center presently has no subsidiaries across any sectors.
Atlantic Council GeoTech Center’s official LinkedIn profile has approximately 1,099 followers.
Atlantic Council GeoTech Center is classified under the NAICS code 54172, which corresponds to Research and Development in the Social Sciences and Humanities.
No, Atlantic Council GeoTech Center does not have a profile on Crunchbase.
Yes, Atlantic Council GeoTech Center maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/atlantic-council-geotech-center.
As of December 18, 2025, Rankiteo reports that Atlantic Council GeoTech Center has experienced 1 cybersecurity incidents.
Atlantic Council GeoTech Center has an estimated 867 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.
Title: Intellexa Consortium Predator Spyware Incident
Description: The Intellexa Consortium faced US sanctions for targeting Americans, including government officials, journalists, and policy experts, with their Predator spyware. Predator spyware has robust data-stealing and surveillance capabilities, compromising devices through sophisticated zero-click attacks. Despite operational decline due to sanctions, there has been a resurgence leveraging new infrastructure, making tracking challenging. The increase in stealth and complexity signifies a continued threat to high-profile individuals globally, raising privacy, security, and ethical concerns. The renewed use of Predator could lead to significant repercussions for victims, compromising personal, financial, and strategic information.
Type: Spyware
Attack Vector: Zero-click attacks
Threat Actor: Intellexa Consortium
Motivation: SurveillanceData-stealing
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Data Compromised: Personal information, Financial information, Strategic information
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information, Financial Information, Strategic Information and .

Entity Name: Intellexa Consortium
Entity Type: Organization
Industry: Cybersecurity

Type of Data Compromised: Personal information, Financial information, Strategic information

Regulations Violated: US sanctions,

Source: Recorded Future
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Recorded Future.

High Value Targets: Government Officials, Journalists, Policy Experts,
Data Sold on Dark Web: Government Officials, Journalists, Policy Experts,
Last Attacking Group: The attacking group in the last incident was an Intellexa Consortium.
Most Significant Data Compromised: The most significant data compromised in an incident were Personal information, Financial information, Strategic information and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Personal information, Financial information and Strategic information.
Most Recent Source: The most recent source of information about an incident is Recorded Future.
.png)
Zerobyte is a backup automation tool Zerobyte versions prior to 0.18.5 and 0.19.0 contain an authentication bypass vulnerability where authentication middleware is not properly applied to API endpoints. This results in certain API endpoints being accessible without valid session credentials. This is dangerous for those who have exposed Zerobyte to be used outside of their internal network. A fix has been applied in both version 0.19.0 and 0.18.5. If immediate upgrade is not possible, restrict network access to the Zerobyte instance to trusted networks only using firewall rules or network segmentation. This is only a temporary mitigation; upgrading is strongly recommended.
Open Source Point of Sale (opensourcepos) is a web based point of sale application written in PHP using CodeIgniter framework. Starting in version 3.4.0 and prior to version 3.4.2, a Cross-Site Request Forgery (CSRF) vulnerability exists in the application's filter configuration. The CSRF protection mechanism was **explicitly disabled**, allowing the application to process state-changing requests (POST) without verifying a valid CSRF token. An unauthenticated remote attacker can exploit this by hosting a malicious web page. If a logged-in administrator visits this page, their browser is forced to send unauthorized requests to the application. A successful exploit allows the attacker to silently create a new Administrator account with full privileges, leading to a complete takeover of the system and loss of confidentiality, integrity, and availability. The vulnerability has been patched in version 3.4.2. The fix re-enables the CSRF filter in `app/Config/Filters.php` and resolves associated AJAX race conditions by adjusting token regeneration settings. As a workaround, administrators can manually re-enable the CSRF filter in `app/Config/Filters.php` by uncommenting the protection line. However, this is not recommended without applying the full patch, as it may cause functionality breakage in the Sales module due to token synchronization issues.
Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Model Context Protocol (MCP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious MCP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered automatically without any user interaction besides opening the project in the IDE. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.
Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Language Server Protocol (LSP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious LSP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered when a user opens project file for which there is an LSP entry. A concerted effort by an attacker to seed a project settings file (`./zed/settings.json`) with malicious language server configurations could result in arbitrary code execution with the user's privileges if the user opens the project in Zed without reviewing the contents. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.
Storybook is a frontend workshop for building user interface components and pages in isolation. A vulnerability present starting in versions 7.0.0 and prior to versions 7.6.21, 8.6.15, 9.1.17, and 10.1.10 relates to Storybook’s handling of environment variables defined in a `.env` file, which could, in specific circumstances, lead to those variables being unexpectedly bundled into the artifacts created by the `storybook build` command. When a built Storybook is published to the web, the bundle’s source is viewable, thus potentially exposing those variables to anyone with access. For a project to potentially be vulnerable to this issue, it must build the Storybook (i.e. run `storybook build` directly or indirectly) in a directory that contains a `.env` file (including variants like `.env.local`) and publish the built Storybook to the web. Storybooks built without a `.env` file at build time are not affected, including common CI-based builds where secrets are provided via platform environment variables rather than `.env` files. Storybook runtime environments (i.e. `storybook dev`) are not affected. Deployed applications that share a repo with your Storybook are not affected. Users should upgrade their Storybook—on both their local machines and CI environment—to version .6.21, 8.6.15, 9.1.17, or 10.1.10 as soon as possible. Maintainers additionally recommend that users audit for any sensitive secrets provided via `.env` files and rotate those keys. Some projects may have been relying on the undocumented behavior at the heart of this issue and will need to change how they reference environment variables after this update. If a project can no longer read necessary environmental variable values, either prefix the variables with `STORYBOOK_` or use the `env` property in Storybook’s configuration to manually specify values. In either case, do not include sensitive secrets as they will be included in the built bundle.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.