Company Details
brigham-young-university
16,356
344,512
6113
byu.edu
0
BRI_2742062
In-progress


Brigham Young University Company CyberSecurity Posture
byu.eduWe believe a world yearning for hope and joy needs the graduates of Brigham Young University—disciples of Jesus Christ who are driven by love for God and His children and who are prepared to serve and lead. This preparation demands a unique university model: at BYU, belief enhances inquiry, study amplifies faith, and revelation leads to rich understanding; at BYU, helping students develop their full divine potential is central to both our teaching and our scholarship. As the flagship higher education institution of The Church of Jesus Christ of Latter-day Saints, BYU strives to be among the exceptional universities in the world and an essential university for the world.
Company Details
brigham-young-university
16,356
344,512
6113
byu.edu
0
BRI_2742062
In-progress
Between 750 and 799

BYU Global Score (TPRM)XXXX

Description: The personal information of hundreds of international students at Brigham Young University was inadvertently released by email. The message was sent by a staff member in the University Advisement Center who was sending out a notice of a career workshop but attacked a complete list of students with personal information. The details included the students’ names, email addresses, phone numbers and student ID numbers of all 1,300 international students.


No incidents recorded for Brigham Young University in 2026.
No incidents recorded for Brigham Young University in 2026.
No incidents recorded for Brigham Young University in 2026.
BYU cyber incidents detection timeline including parent company and subsidiaries

We believe a world yearning for hope and joy needs the graduates of Brigham Young University—disciples of Jesus Christ who are driven by love for God and His children and who are prepared to serve and lead. This preparation demands a unique university model: at BYU, belief enhances inquiry, study amplifies faith, and revelation leads to rich understanding; at BYU, helping students develop their full divine potential is central to both our teaching and our scholarship. As the flagship higher education institution of The Church of Jesus Christ of Latter-day Saints, BYU strives to be among the exceptional universities in the world and an essential university for the world.


For more than 20 years, we have remained committed to making a positive impact in the communities we serve, by providing accessible, high-quality undergraduate, graduate, and specialized degree programs. We know that when our students succeed, countries prosper, and societies benefit. We take very

We’re Virginia Commonwealth University — the university FOR Virginia. You will see an incredible mix of attitudes, styles and stories. Inclusion is our heartbeat and it drives us to tackle difficult challenges others can’t or won’t. We do things differently here, because we know that different w

The Tecnológico de Monterrey is a private university system with 33 campuses in 26 cities in Mexico, which serves more than 96,000 students in its high school, undergraduate and graduate programs. It also has liaison offices in 12 countries. Through the promotion of research, generation of knowle

Ranked in the top 10 schools and programs of public health in the world by US News and World Report, Boston University School of Public Health provides the opportunity to engage in world-renowned research, scholarship, social justice, and public health practice. Founded in 1976, BUSPH offers master

Founded in 1827, the University of Toronto is Canada’s top university with a long history of challenging the impossible and transforming society through the ingenuity and resolve of our faculty, students, alumni, and supporters. We are proud to be one of the world’s top research-intensive univers

Washington State University is a nationally recognized land-grant research university, founded in Pullman in 1890. WSU’s statewide system includes campuses in Pullman, Spokane, Everett, Tri-Cities and Vancouver, with extension and research offices in every county of the state, and a nationally ranke

Dedicated to its motto, Ut Prosim (That I May Serve), Virginia Tech takes a hands-on, engaging approach to education, preparing scholars to be leaders in their fields and communities. As the commonwealth’s most comprehensive university and its leading research institution, Virginia Tech offers 215 u

Located in historic Providence, Rhode Island and founded in 1764, Brown University is the seventh-oldest college in the United States. Brown is an independent, coeducational Ivy League institution comprising undergraduate and graduate programs, plus the Alpert Medical School, School of Public Health

School of Visual Arts has been a leader in the education of artists, designers, and creative professionals for more than seven decades. With a faculty of distinguished working professionals, a dynamic curriculum, and an emphasis on critical thinking, SVA is a catalyst for innovation and social respo
.png)
The Collegiate Penetration Testing Competition brings together the best offense-based cybersecurity students in the world.
From BYU's Jane Hedengren, to New Mexico's Habtom Samuel, the NCAA Cross Country Championships expect to offer unpredictability on Nov. 22.
University of South Florida student explores robotics reinforcement learning and multi-goal spatial navigation using hierarchical learning...
The eCTF competition invites university and high school teams to develop, secure, and defend embedded systems against simulated cyberattacks.
In a riveting display of Wolverine grit, Utah Valley University's (UVU) “W0LV3R1NES” cybersecurity team claimed first place among 45 top university,...
Students from 10 regional colleges and universities huddled around computers, anticipating an onslaught of simulated cyberattacks.
In 2025, Orem's tech sector thrives with an 18% growth, creating over 5,000 tech jobs. Utah Valley University and Brigham Young University...
In 2025, Boise's tech education flourishes with ten top colleges offering programs in AI, cybersecurity, and software development,...
Top institutions like the University of Hawaii at Manoa and Hawaii Pacific University leading in innovative programs.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Brigham Young University is https://byu.edu.
According to Rankiteo, Brigham Young University’s AI-generated cybersecurity score is 799, reflecting their Fair security posture.
According to Rankiteo, Brigham Young University currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Brigham Young University has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Brigham Young University is not certified under SOC 2 Type 1.
According to Rankiteo, Brigham Young University does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Brigham Young University is not listed as GDPR compliant.
According to Rankiteo, Brigham Young University does not currently maintain PCI DSS compliance.
According to Rankiteo, Brigham Young University is not compliant with HIPAA regulations.
According to Rankiteo,Brigham Young University is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Brigham Young University operates primarily in the Higher Education industry.
Brigham Young University employs approximately 16,356 people worldwide.
Brigham Young University presently has no subsidiaries across any sectors.
Brigham Young University’s official LinkedIn profile has approximately 344,512 followers.
Brigham Young University is classified under the NAICS code 6113, which corresponds to Colleges, Universities, and Professional Schools.
No, Brigham Young University does not have a profile on Crunchbase.
Yes, Brigham Young University maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/brigham-young-university.
As of January 23, 2026, Rankiteo reports that Brigham Young University has experienced 1 cybersecurity incidents.
Brigham Young University has an estimated 15,167 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Data Leak.
Title: Data Breach at Brigham Young University
Description: The personal information of hundreds of international students at Brigham Young University was inadvertently released by email. The message was sent by a staff member in the University Advisement Center who was sending out a notice of a career workshop but attached a complete list of students with personal information. The details included the students’ names, email addresses, phone numbers and student ID numbers of all 1,300 international students.
Type: Data Breach
Attack Vector: Email
Vulnerability Exploited: Human Error
Threat Actor: Internal Staff
Motivation: Accidental
Common Attack Types: The most common types of attacks the company has faced is Data Leak.

Data Compromised: Names, Email addresses, Phone numbers, Student id numbers
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personally Identifiable Information and .

Entity Name: Brigham Young University
Entity Type: Educational Institution
Industry: Education
Customers Affected: 1300

Type of Data Compromised: Personally identifiable information
Number of Records Exposed: 1300
Sensitivity of Data: High
Personally Identifiable Information: NamesEmail AddressesPhone NumbersStudent ID Numbers
Last Attacking Group: The attacking group in the last incident was an Internal Staff.
Most Significant Data Compromised: The most significant data compromised in an incident were Names, Email Addresses, Phone Numbers, Student ID Numbers and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Student ID Numbers, Phone Numbers, Names and Email Addresses.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 130.0.
.png)
Improper validation of specified type of input in M365 Copilot allows an unauthorized attacker to disclose information over a network.
Improper access control in Azure Front Door (AFD) allows an unauthorized attacker to elevate privileges over a network.
Azure Entra ID Elevation of Privilege Vulnerability
Moonraker is a Python web server providing API access to Klipper 3D printing firmware. In versions 0.9.3 and below, instances configured with the "ldap" component enabled are vulnerable to LDAP search filter injection techniques via the login endpoint. The 401 error response message can be used to determine whether or not a search was successful, allowing for brute force methods to discover LDAP entries on the server such as user IDs and user attributes. This issue has been fixed in version 0.10.0.
Runtipi is a Docker-based, personal homeserver orchestrator that facilitates multiple services on a single server. Versions 3.7.0 and above allow an authenticated user to execute arbitrary system commands on the host server by injecting shell metacharacters into backup filenames. The BackupManager fails to sanitize the filenames of uploaded backups. The system persists user-uploaded files directly to the host filesystem using the raw originalname provided in the request. This allows an attacker to stage a file containing shell metacharacters (e.g., $(id).tar.gz) at a predictable path, which is later referenced during the restore process. The successful storage of the file is what allows the subsequent restore command to reference and execute it. This issue has been fixed in version 4.7.0.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.