Company Details
brigham-young-university
16,356
344,512
6113
byu.edu
0
BRI_2742062
In-progress

Brigham Young University Company CyberSecurity Posture
byu.eduWe believe a world yearning for hope and joy needs the graduates of Brigham Young University—disciples of Jesus Christ who are driven by love for God and His children and who are prepared to serve and lead. This preparation demands a unique university model: at BYU, belief enhances inquiry, study amplifies faith, and revelation leads to rich understanding; at BYU, helping students develop their full divine potential is central to both our teaching and our scholarship. As the flagship higher education institution of The Church of Jesus Christ of Latter-day Saints, BYU strives to be among the exceptional universities in the world and an essential university for the world.
Company Details
brigham-young-university
16,356
344,512
6113
byu.edu
0
BRI_2742062
In-progress
Between 750 and 799

BYU Global Score (TPRM)XXXX

Description: The personal information of hundreds of international students at Brigham Young University was inadvertently released by email. The message was sent by a staff member in the University Advisement Center who was sending out a notice of a career workshop but attacked a complete list of students with personal information. The details included the students’ names, email addresses, phone numbers and student ID numbers of all 1,300 international students.


No incidents recorded for Brigham Young University in 2025.
No incidents recorded for Brigham Young University in 2025.
No incidents recorded for Brigham Young University in 2025.
BYU cyber incidents detection timeline including parent company and subsidiaries

We believe a world yearning for hope and joy needs the graduates of Brigham Young University—disciples of Jesus Christ who are driven by love for God and His children and who are prepared to serve and lead. This preparation demands a unique university model: at BYU, belief enhances inquiry, study amplifies faith, and revelation leads to rich understanding; at BYU, helping students develop their full divine potential is central to both our teaching and our scholarship. As the flagship higher education institution of The Church of Jesus Christ of Latter-day Saints, BYU strives to be among the exceptional universities in the world and an essential university for the world.


Indiana University Bloomington is the flagship residential, research-intensive campus of Indiana University. Its academic excellence is grounded in the humanities, arts and sciences, and a range of highly ranked professional programs. Founded in 1820, the campus serves more than 42,000 undergradua

The University of South Florida, a high-impact research university dedicated to student success and committed to community engagement, generates an annual economic impact of more than $6 billion. With campuses in Tampa, St. Petersburg and Sarasota-Manatee, USF serves approximately 50,000 students wh

Founded in 1831, NYU is one of the world’s foremost research universities and is a member of the selective Association of American Universities. The first Global Network University, NYU has degree-granting university campuses in New York and Abu Dhabi, and has announced a third in Shanghai; has a do

As the largest university in one of the nation’s most iconic cities, Temple educates diverse future leaders from across Philadelphia, the country and the world who share a common drive to learn, prepare for their careers and make a real impact. Founded as a night school by Russell Conwell in 1884, T

Amity University is India's top ranked non-profit private University where more emphasis is given on not only making you academically brilliant, but true leaders and team players, thus preparing you for the real life corporate world. Amity is the leading education group of India with Most Hi-tech Ca

Stanford is a place of discovery, creativity and innovation located in the San Francisco Bay Area on the ancestral land of the Muwekma Ohlone Tribe. Dedicated to our founding mission—benefitting society through research and education—we are working toward a sustainable future, accelerating the impac

Harvard University is devoted to excellence in teaching, learning, and research, and to developing leaders in many disciplines who make a difference globally. Founded in 1636, Harvard is the oldest institution of higher learning in the United States. The official flagship Harvard social media chann

Leeds is among the top ten universities for research power in the UK. Our academic breadth, commitment to quality and determination to make a genuine impact on the world around us enables us to achieve extraordinary results in: • Creating knowledge through research and innovation. • Disseminating i

The University of Pretoria is a multi-faculty research-intensive university that has remained among the top South African universities in research output and impact. UP is also the top producer of graduates in the country. With campuses in Pretoria and its surrounds, as well as in the country’s econ
.png)
Top 15 Colleges and Universities in Hawaii. Colleges Ranking Index by Rebellion Research. Hawaii built a small but important higher...
If your X (formerly Twitter) account is locked, limited, or suspended, these steps can help you get your account back in good standing.
The eCTF competition invites university and high school teams to develop, secure, and defend embedded systems against simulated cyberattacks.
In a riveting display of Wolverine grit, Utah Valley University's (UVU) “W0LV3R1NES” cybersecurity team claimed first place among 45 top university,...
Students from 10 regional colleges and universities huddled around computers, anticipating an onslaught of simulated cyberattacks.
Five-time Grammy winner Mark Lettieri agreed to work with BYU commercial music students to write and record a new single.
In 2025, Orem's tech sector thrives with an 18% growth, creating over 5,000 tech jobs. Utah Valley University and Brigham Young University...
In 2025, Boise's tech education flourishes with ten top colleges offering programs in AI, cybersecurity, and software development,...
Top institutions like the University of Hawaii at Manoa and Hawaii Pacific University leading in innovative programs.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Brigham Young University is https://byu.edu.
According to Rankiteo, Brigham Young University’s AI-generated cybersecurity score is 799, reflecting their Fair security posture.
According to Rankiteo, Brigham Young University currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Brigham Young University is not certified under SOC 2 Type 1.
According to Rankiteo, Brigham Young University does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Brigham Young University is not listed as GDPR compliant.
According to Rankiteo, Brigham Young University does not currently maintain PCI DSS compliance.
According to Rankiteo, Brigham Young University is not compliant with HIPAA regulations.
According to Rankiteo,Brigham Young University is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Brigham Young University operates primarily in the Higher Education industry.
Brigham Young University employs approximately 16,356 people worldwide.
Brigham Young University presently has no subsidiaries across any sectors.
Brigham Young University’s official LinkedIn profile has approximately 344,512 followers.
Brigham Young University is classified under the NAICS code 6113, which corresponds to Colleges, Universities, and Professional Schools.
No, Brigham Young University does not have a profile on Crunchbase.
Yes, Brigham Young University maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/brigham-young-university.
As of November 27, 2025, Rankiteo reports that Brigham Young University has experienced 1 cybersecurity incidents.
Brigham Young University has an estimated 14,032 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Data Leak.
Title: Data Breach at Brigham Young University
Description: The personal information of hundreds of international students at Brigham Young University was inadvertently released by email. The message was sent by a staff member in the University Advisement Center who was sending out a notice of a career workshop but attached a complete list of students with personal information. The details included the students’ names, email addresses, phone numbers and student ID numbers of all 1,300 international students.
Type: Data Breach
Attack Vector: Email
Vulnerability Exploited: Human Error
Threat Actor: Internal Staff
Motivation: Accidental
Common Attack Types: The most common types of attacks the company has faced is Data Leak.

Data Compromised: Names, Email addresses, Phone numbers, Student id numbers
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personally Identifiable Information and .

Entity Name: Brigham Young University
Entity Type: Educational Institution
Industry: Education
Customers Affected: 1300

Type of Data Compromised: Personally identifiable information
Number of Records Exposed: 1300
Sensitivity of Data: High
Personally Identifiable Information: NamesEmail AddressesPhone NumbersStudent ID Numbers
Last Attacking Group: The attacking group in the last incident was an Internal Staff.
Most Significant Data Compromised: The most significant data compromised in an incident were Names, Email Addresses, Phone Numbers, Student ID Numbers and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Names, Email Addresses, Student ID Numbers and Phone Numbers.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 130.0.
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.