Company Details
blue-origin
11,029
598,906
3364
blueorigin.com
0
BLU_2457523
In-progress

Blue Origin Company CyberSecurity Posture
blueorigin.comWe are building a road to space for the benefit of Earth, humanity’s blue origin. Our team is focused on radically reducing the cost of access to space and harnessing its vast resources while mobilizing future generations to realize this mission. Blue Origin builds reusable rocket engines, launch vehicles, in-space systems, and lunar landers. Discover more at BlueOrigin.com. *We hope you engage with us and our community. However, we reserve the right to remove derogatory or off-topic comments from our social media accounts. Thank you for understanding.*
Company Details
blue-origin
11,029
598,906
3364
blueorigin.com
0
BLU_2457523
In-progress
Between 750 and 799

Blue Origin Global Score (TPRM)XXXX



No incidents recorded for Blue Origin in 2025.
No incidents recorded for Blue Origin in 2025.
No incidents recorded for Blue Origin in 2025.
Blue Origin cyber incidents detection timeline including parent company and subsidiaries

We are building a road to space for the benefit of Earth, humanity’s blue origin. Our team is focused on radically reducing the cost of access to space and harnessing its vast resources while mobilizing future generations to realize this mission. Blue Origin builds reusable rocket engines, launch vehicles, in-space systems, and lunar landers. Discover more at BlueOrigin.com. *We hope you engage with us and our community. However, we reserve the right to remove derogatory or off-topic comments from our social media accounts. Thank you for understanding.*


SpaceX designs, manufactures and launches the world’s most advanced rockets and spacecraft. The company was founded in 2002 by Elon Musk to revolutionize space transportation, with the ultimate goal of making life multiplanetary. SpaceX has gained worldwide attention for a series of historic mil

Bombardier is a global leader in aviation, focused on designing, manufacturing, and servicing the world's most exceptional business jets. Bombardier’s Challenger and Global aircraft families are renowned for their cutting-edge innovation, cabin design, performance, and reliability. Bombardier has a

A global aerospace company headquartered in Brazil, Embraer has businesses in Commercial and Executive Aviation, Defense & Security, and Agricultural Aviation. The company designs, develops, manufactures and markets aircraft and systems, providing Services and Support to customer after-sales. Sinc
Pratt & Whitney, an RTX business, is a global leader in propulsion systems, powering the most advanced aircraft in the world, and we are shaping the future of aviation. Our engines help connect people, grow economies and defend freedom. Our customers depend on us to get where they’re going and back

B/E Aerospace is now part of Rockwell Collins. With the acquisition of B/E Aerospace in April 2017, Rockwell Collins is now a world leader in designing, developing and manufacturing cabin interior products and services that deliver innovation, reliability and efficiency. Our broad range of offeri

For more than 60 years, NASA has been breaking barriers to achieve the seemingly impossible—from walking on the Moon to pushing the boundaries of human spaceflight farther than ever before. We work in space and around the world in laboratories and wind tunnels, on airfields and in control rooms to e

At CAE, we equip people in critical roles with the expertise and solutions to create a safer world. As a technology company, we digitalize the physical world, deploying simulation training and critical operations support solutions. Above all else, we empower pilots, airlines, defence and security fo

Airbus pioneers sustainable aerospace for a safe and united world. The Company constantly innovates to provide efficient and technologically-advanced solutions in aerospace, defence, and connected services. In commercial aircraft, Airbus designs and manufactures modern and fuel-efficient airliners
Textron Inc. is a multi-industry company that leverages its global network of aircraft, defense, industrial and finance businesses to provide customers with innovative solutions and services. Textron is known around the world for its powerful brands such as Bell, Cessna, Beechcraft, Pipistrel, Jacob
.png)
Successful launches are helping Jeff Bezos' company set up missions to ferry cargo and, eventually, astronauts to the lunar surface.
Blue Origin will integrate an optical payload from Optimum Technologies on the first operational Blue Ring mission, set to launch in 2026.
Jeff Bezos' space company Blue Origin said on Thursday it will build a bigger, more powerful variant of its New Glenn rocket, drawing early...
Tech News News: Blue Origin has achieved a major feat by successfully landing its colossal New Glenn rocket booster at sea,...
Blue Origin achieved a major milestone Thursday as its New Glenn rocket soared from Cape Canaveral Space Force Station and successfully...
Blue Origin's New Glenn Rocket Gearing Up for Mars Satellite Launch. Blue Origin's New Glenn rocket, tasked with launching two satellites to...
The giant New Glenn rocket from billionaire Jeff Bezos' space company Blue Origin launched from Florida on its debut mission for paying...
Blue Origin's New Shepard completes its NS-36 flight, carrying six crew members and marking another milestone for the suborbital program.
NASA's VIPER lunar rover could be delivered to the moon by Blue Origin, Jeff Bezos' aerospace company. The US space agency has awarded the...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Blue Origin is https://www.blueorigin.com/.
According to Rankiteo, Blue Origin’s AI-generated cybersecurity score is 780, reflecting their Fair security posture.
According to Rankiteo, Blue Origin currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Blue Origin is not certified under SOC 2 Type 1.
According to Rankiteo, Blue Origin does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Blue Origin is not listed as GDPR compliant.
According to Rankiteo, Blue Origin does not currently maintain PCI DSS compliance.
According to Rankiteo, Blue Origin is not compliant with HIPAA regulations.
According to Rankiteo,Blue Origin is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Blue Origin operates primarily in the Aviation and Aerospace Component Manufacturing industry.
Blue Origin employs approximately 11,029 people worldwide.
Blue Origin presently has no subsidiaries across any sectors.
Blue Origin’s official LinkedIn profile has approximately 598,906 followers.
Blue Origin is classified under the NAICS code 3364, which corresponds to Aerospace Product and Parts Manufacturing.
Yes, Blue Origin has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/blue-origin.
Yes, Blue Origin maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/blue-origin.
As of December 10, 2025, Rankiteo reports that Blue Origin has not experienced any cybersecurity incidents.
Blue Origin has an estimated 2,675 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Blue Origin has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. Versions 3.5.4 and below contain a Stored Cross-Site Scripting (XSS) vulnerability in the /WeGIA/html/geral/configurar_senhas.php endpoint. The application does not sanitize user-controlled data before rendering it inside the employee selection dropdown. The application retrieves employee names from the database and injects them directly into HTML <option> elements without proper escaping. This issue is fixed in version 3.5.5.
ZITADEL is an open-source identity infrastructure tool. Versions 4.0.0-rc.1 through 4.7.0 are vulnerable to DOM-Based XSS through the Zitadel V2 logout endpoint. The /logout endpoint insecurely routes to a value that is supplied in the post_logout_redirect GET parameter. As a result, unauthenticated remote attacker can execute malicious JS code on Zitadel users’ browsers. To carry out an attack, multiple user sessions need to be active in the same browser, however, account takeover is mitigated when using Multi-Factor Authentication (MFA) or Passwordless authentication. This issue is fixed in version 4.7.1.
ZITADEL is an open-source identity infrastructure tool. Versions 4.7.0 and below are vulnerable to an unauthenticated, full-read SSRF vulnerability. The ZITADEL Login UI (V2) treats the x-zitadel-forward-host header as a trusted fallback for all deployments, including self-hosted instances. This allows an unauthenticated attacker to force the server to make HTTP requests to arbitrary domains, such as internal addresses, and read the responses, enabling data exfiltration and bypassing network-segmentation controls. This issue is fixed in version 4.7.1.
NiceGUI is a Python-based UI framework. Versions 3.3.1 and below are vulnerable to directory traversal through the App.add_media_files() function, which allows a remote attacker to read arbitrary files on the server filesystem. This issue is fixed in version 3.4.0.
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions are vulnerable to authentication bypass when the authentication type is set to "webserver." When providing an Authorization header with an arbitrary value, a session is associated with the target user regardless of valid credentials. This issue is fixed in versions 16.0.44 and 17.0.23.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.