Company Details
atma
1
0
None
http://atmati.com.br
0
ATM_4349560
In-progress

Atma Company CyberSecurity Posture
http://atmati.com.brAtma é uma empresa criada para oferecer soluções de tecnologia, com profissionais altamente qualificados, oferecemos qualidade reconhecida em serviços e consultoria de informática. Nosso objetivo é trabalhar como agente de melhorias com foco na gestão de TI, utilizando toda a infra-estrutura e tecnologia disponível no cliente com inovação. Show more Show less
Company Details
atma
1
0
None
http://atmati.com.br
0
ATM_4349560
In-progress
Between 750 and 799

Atma Global Score (TPRM)XXXX



No incidents recorded for Atma in 2025.
No incidents recorded for Atma in 2025.
No incidents recorded for Atma in 2025.
Atma cyber incidents detection timeline including parent company and subsidiaries

Atma é uma empresa criada para oferecer soluções de tecnologia, com profissionais altamente qualificados, oferecemos qualidade reconhecida em serviços e consultoria de informática. Nosso objetivo é trabalhar como agente de melhorias com foco na gestão de TI, utilizando toda a infra-estrutura e tecnologia disponível no cliente com inovação. Show more Show less


We are a professional networking site for the cannabis industry. We are providing a website and mobile app that are in a safe, encrypted environment where “all things cannabis” can be shared, discovered and connected. Dispensaries can communicate with vendors, cultivators, post jobs, gain exposu

Today’s smart business wants a technology partner to be an extension of its own company… a partner that thinks like it thinks and acts like it acts. Today’s smart business needs a technology partner to do whatever it takes to keep business moving. At Invision, we have very smart clients. That’s

Distinctive Voice and Data (DVD)- Bingham Communications, Inc is a leader in the IT arena servicing municipalities, school districts, institutions, and commercial businesses in the tri-state area. Areas of expertise include access control, IP security cameras, structured cabling and fiber, paging,

Micas Networks is a startup open networking data center switching company, driving accelerated data delivery to support the datacenter infrastructure landscape. With a customer-centric approach and strategic partnerships, we offer high-performance, energy-efficient solutions, tailored to meet data c

Global Data Systems (GDS) has been providing IT Services for small- and mid-sized organizations in the Healthcare, State & Local Government, & Financial markets since 1991. As a leader in providing Managed Services, GDS has continually evolved its services to meet the demands of its growing client b

4MS specialise in networking, cyber-security and telecoms technical services. 4MS provide consultancy, design, procurement, installation, optimisation, support and managed services for communications infrastructure in corporate and industrial locations around the world. Delivering the most approp
.png)
Discover the importance of soil health for sustainable agriculture and environmental conservation as experts emphasize soil testing for...
News News: The Ministry of Education has officially released the NIRF Rankings 2025, with Hindu College securing the top spot among India's...
Varanasi: Nine persons, including the priest and children, were injured when a fire broke out during the special Shringar of the deity at...
Organised under the 'Glance for Good' initiative, this cybersecurity skilling workshop aimed at promoting digital literacy and safe internet...
India Business News: CHENNAI: The 26% import tariff imposed on Indian rubber goods entering the US market will put Indian exports at a...
The staff of the Pernem zonal agriculture office and ATMA-North Goa stepped into their acting shoes for a short film titled, 'Maati Boltali, Tevach Sheti...
Monash University, Indonesia and Universitas Katolik Indonesia (Unika) Atma Jaya signed a Memorandum of Understanding (MoU) on October 4,...
TechnoBind has announced its outstanding growth for H1 FY24, marking an 84% increase in overall revenue compared to H1 FY23.
On January 15, 2024, the Rashtriya Raksha University (RRU), Gandhinagar, Gujarat, witnessed a momentous event as it hosted the esteemed presence of Hon'ble...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Atma is http://atmati.com.br.
According to Rankiteo, Atma’s AI-generated cybersecurity score is 784, reflecting their Fair security posture.
According to Rankiteo, Atma currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Atma is not certified under SOC 2 Type 1.
According to Rankiteo, Atma does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Atma is not listed as GDPR compliant.
According to Rankiteo, Atma does not currently maintain PCI DSS compliance.
According to Rankiteo, Atma is not compliant with HIPAA regulations.
According to Rankiteo,Atma is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Atma operates primarily in the Computer Networking Products industry.
Atma employs approximately 1 people worldwide.
Atma presently has no subsidiaries across any sectors.
Atma’s official LinkedIn profile has approximately 0 followers.
No, Atma does not have a profile on Crunchbase.
Yes, Atma maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/atma.
As of November 28, 2025, Rankiteo reports that Atma has not experienced any cybersecurity incidents.
Atma has an estimated 949 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Atma has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.