Company Details
bannock-county-shop
233
397
92
bannockcounty.us
0
BAN_2542844
In-progress

Bannock County Company CyberSecurity Posture
bannockcounty.usBannock County, State of Idaho.
Company Details
bannock-county-shop
233
397
92
bannockcounty.us
0
BAN_2542844
In-progress
Between 700 and 749

Bannock County Global Score (TPRM)XXXX

Description: the computer networks of Bannock County were accessed by an unknown actor in June 2020 which potentially impacted some of the data of its residents. The compromised data included name, Social Security number, driver’s license or state identification card number, and financial account information. Bannock County along with a cyber-security firm investigated the incident to know the extent of the incident.


No incidents recorded for Bannock County in 2025.
No incidents recorded for Bannock County in 2025.
No incidents recorded for Bannock County in 2025.
Bannock County cyber incidents detection timeline including parent company and subsidiaries

Bannock County, State of Idaho.

Official LinkedIn page for the state of Oregon. Oregon is a state in the Pacific Northwest region of the United States. It is located on the Pacific coast, with Washington to the north, California to the south, Nevada on the southeast and Idaho to the east. The Columbia and Snake rivers delineate mu

Tallinn is the capital of Estonia. The mission of the city organization is to make Tallinn the best place to live for the people staying here, the desired destination for people arriving here, and a good place of departure for people who start here. For this purpose, the management of Tallinn as a

With a workforce of 30,000 people, and opportunities in 1,000 different job categories, the City of Philadelphia is one of the largest employers in Southeastern Pennsylvania. As an employer, we operate through the guiding principles of service, integrity, respect, accountability, collaboration, dive

El Consejo Nacional de Investigaciones Científicas y Técnicas (CONICET) es el principal organismo dedicado a la promoción de la ciencia y la tecnología en la Argentina. Su actividad se desarrolla en cuatro grandes áreas: • Ciencias agrarias, ingeniería y de materiales • Ciencias biológicas y de la s

Social Security provides financial protection for our nation’s people, supporting more than 64 million individuals and families. With retirement, disability, and survivors benefits, Social Security is one of the most successful anti-poverty programs in our nation's history. We are there throughout

The United States Department of Agriculture is the United States federal executive department responsible for developing and executing U.S. federal government policy on farming, agriculture, and food. It aims to meet the needs of farmers and ranchers, promote agricultural trade and production, work

OVERVIEW Framingham was incorporated as a town on June 25, 1700. Chapter 143 of the Acts of 1949 established the Town of Framingham Representative Town Government by Limited Town Meetings. The Citizens of Framingham adopted the Home Rule Charter for the City of Framingham at an election held on Ap

France Travail est un acteur majeur du marché de l’emploi en France où il s’investit pour faciliter le retour à l’emploi des demandeurs d’emploi et offrir aux entreprises des réponses adaptées à leurs besoins de recrutement. Les 55 000 collaborateurs de France Travail œuvrent au quotidien pour êtr

Der Arbeitgeber Niedersachsen vereint über 2000 Dienststellen mit einem gemeinsamen Ziel: Wir gestalten das Leben in Niedersachsen verantwortungsvoll und zukunftsorientiert. Als der größte Arbeitgeber im Land Niedersachsen bieten wir sichere Arbeitsplätze, sinnstiftende Aufgaben und vielfältige Ei
.png)
(The Center Square) – Colorado residents lost a record high $24 million to personal data scams in 2024, according to a data forensics firm.
Japanese beer giant Asahi said on Thursday it had not received any specific demand from the hackers behind a "sophisticated and cunning"...
Japanese beer giant Asahi said Thursday it has delayed the release of full-year financial results due to a major ongoing cyberattack that...
The US Department of Energy (DOE) recently transferred through the Bureau of Indian Affairs (BIA) an Idaho National Laboratory-operated brush fire truck.
The FBI has opened its data center in Pocatello, Idaho, two years after DCD first reported on the facility. Known as 'Grey Wolf,' the...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Bannock County is http://www.bannockcounty.us.
According to Rankiteo, Bannock County’s AI-generated cybersecurity score is 744, reflecting their Moderate security posture.
According to Rankiteo, Bannock County currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Bannock County is not certified under SOC 2 Type 1.
According to Rankiteo, Bannock County does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Bannock County is not listed as GDPR compliant.
According to Rankiteo, Bannock County does not currently maintain PCI DSS compliance.
According to Rankiteo, Bannock County is not compliant with HIPAA regulations.
According to Rankiteo,Bannock County is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Bannock County operates primarily in the Government Administration industry.
Bannock County employs approximately 233 people worldwide.
Bannock County presently has no subsidiaries across any sectors.
Bannock County’s official LinkedIn profile has approximately 397 followers.
Bannock County is classified under the NAICS code 92, which corresponds to Public Administration.
No, Bannock County does not have a profile on Crunchbase.
Yes, Bannock County maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/bannock-county-shop.
As of December 03, 2025, Rankiteo reports that Bannock County has experienced 1 cybersecurity incidents.
Bannock County has an estimated 11,271 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with cyber-security firm..
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Name, Social security number, Driver’s license or state identification card number, Financial account information
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Name, Social Security Number, Driver’S License Or State Identification Card Number, Financial Account Information and .

Entity Name: Bannock County
Entity Type: Government
Industry: Public Sector
Location: Bannock County

Third Party Assistance: Cyber-security firm
Third-Party Assistance: The company involves third-party assistance in incident response through Cyber-security firm.

Type of Data Compromised: Name, Social security number, Driver’s license or state identification card number, Financial account information

Investigation Status: Ongoing with a cyber-security firm
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Cyber-security firm.
Last Attacking Group: The attacking group in the last incident was an Unknown.
Most Recent Incident Detected: The most recent incident detected was on June 2020.
Most Significant Data Compromised: The most significant data compromised in an incident were name, Social Security number, driver’s license or state identification card number, financial account information and .
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Cyber-security firm.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were driver’s license or state identification card number, name, Social Security number and financial account information.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing with a cyber-security firm.
.png)
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-9 and 6.9.13-34, there is a vulnerability in ImageMagick’s Magick++ layer that manifests when Options::fontFamily is invoked with an empty string. Clearing a font family calls RelinquishMagickMemory on _drawInfo->font, freeing the font string but leaving _drawInfo->font pointing to freed memory while _drawInfo->family is set to that (now-invalid) pointer. Any later cleanup or reuse of _drawInfo->font re-frees or dereferences dangling memory. DestroyDrawInfo and other setters (Options::font, Image::font) assume _drawInfo->font remains valid, so destruction or subsequent updates trigger crashes or heap corruption. This vulnerability is fixed in 7.1.2-9 and 6.9.13-34.
FeehiCMS version 2.1.1 has a Remote Code Execution via Unrestricted File Upload in Ad Management. FeehiCMS version 2.1.1 allows authenticated remote attackers to upload files that the server later executes (or stores in an executable location) without sufficient validation, sanitization, or execution restrictions. An authenticated remote attacker can upload a crafted PHP file and cause the application or web server to execute it, resulting in remote code execution (RCE).
PHPGurukul Billing System 1.0 is vulnerable to SQL Injection in the admin/index.php endpoint. Specifically, the username parameter accepts unvalidated user input, which is then concatenated directly into a backend SQL query.
NMIS/BioDose software V22.02 and previous versions contain executable binaries with plain text hard-coded passwords. These hard-coded passwords could allow unauthorized access to both the application and database.
NMIS/BioDose V22.02 and previous versions' installation directory paths by default have insecure file permissions, which in certain deployment scenarios can enable users on client workstations to modify the program executables and libraries.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.