Company Details
caltrans
12,475
101,001
92
ca.gov
0
CAL_3173240
In-progress

Caltrans Company CyberSecurity Posture
ca.govFrom roads less traveled to highways supporting California’s demanding commute. The California Department of Transportation (Caltrans) manages more than 50,000 miles of California's highway and freeway lanes, provides inter-city rail services, permits more than 400 public-use airports and special-use hospital heliports, and works with local agencies to keep California moving. More than the road workers, we are California’s transportation infrastructure; established in 1895, Caltrans has been active in moving the people and commerce of California and continues to model the way in innovative transportation systems. Caltrans specializes in many areas related to transportation: Engineering, Environmental Analysis, Information Technology, Maintenance, Equipment, Transportation Planning, Land Surveys, Right of Way, Finance, Traffic Operations, Aeronautics, Legal, and Administration It is our commitment to the residents of California that keeps us honest in our mission of providing a safe and reliable transportation network that serves all people and respects the environment.
Company Details
caltrans
12,475
101,001
92
ca.gov
0
CAL_3173240
In-progress
Between 750 and 799

Caltrans Global Score (TPRM)XXXX

Description: The California Department of Motor Vehicles (CA DMV) reported a data breach on November 6, 2015, involving an erroneous disclosure of personal information on September 28, 2015. The breach affected the Riverside Probation Department and involved the accidental transmission of names, dates of birth, physical descriptions, and driver license numbers, but did not include Social Security Numbers.
Description: Seven government agencies now have access to some drivers' Social Security numbers thanks to a data breach at the California Department of Motor Vehicles. According to the organisation, the breach had an impact on 3,200 people for at least the previous four years. The DMV says that it was not hacked and that no private persons or organisations received the information. According to the DMV, steps were taken right away to fix the access issue and make sure that no further private information was leaked.
Description: On May 11, 2021, the California Department of State Hospitals reported a data breach involving improper access to personal information. The breach, discovered on April 13, 2021, affected 1,415 patient names, COVID-19 test results, and health information, as well as the personal information of approximately 1,735 employees and job applicants. Details about the specific method of breach are not provided.
Description: The California Department of State Hospitals reported a data breach on April 5, 2021, involving improper access to personal information of approximately 1,735 employees and former employees, as well as 1,217 job applicants. The breach was discovered during an investigation initiated on February 25, 2021, with no evidence of misuse of the compromised information.
Description: The California Department of State Hospitals reported a data breach on May 24, 2013, involving the unauthorized disclosure of Social Security Numbers and other personal information of employees due to a security incident on May 8, 2013. The information was available on the intranet for approximately 6 hours, affecting an unknown number of individuals. The breach was made public through a notification letter, which provided recommendations for identity theft protection.
Description: The California Department of State Hospitals – Coalinga reported a data breach on September 3, 2021. The breach involved unauthorized disclosure of patient information to the United States District Court, which occurred on or around August 12, 2021. The specific types of compromised information included names, case numbers, birth dates, legal commitments, admission dates, unit numbers, and genders of patients, but did not include Social Security numbers or financial account numbers.
Description: The California Office of the Attorney General reported a data breach involving the Department of State Hospitals (DSH) on February 28, 2024. The breach, discovered on February 15, 2024, involved the unauthorized dissemination of Leave and Activity Balance reports containing confidential information, including full social security numbers and names. Approximately 1,000 individuals were affected by this incident.
Description: The California Department of State Hospitals experienced a data breach in early 2021, where unauthorized access to sensitive information was detected on **February 25, 2021**, though the breach spanned from **November 6, 2020, to February 5, 2021**. The incident compromised the data of **1,415 patients and 617 employees**, exposing **COVID-19 test results and health-related details**. However, no **Social Security numbers or financial information** were accessed. The breach involved improper access to both **patient and employee records**, raising concerns over privacy violations and potential misuse of medical data. While the exact method of unauthorized access was not disclosed, the exposure of health information—even without financial identifiers—poses risks of identity profiling, targeted phishing, or reputational harm to the affected individuals and the institution. The department took steps to investigate and mitigate the breach, though the long-term consequences for those impacted remain uncertain.
Description: The California Department of Child Support Services reported a potential disclosure of personal information on May 6, 2014. The breach occurred on April 7, 2014, when letters from the Solano County Department of Child Support Services were misplaced during transport. The exact number of individuals affected is unknown, and the types of information compromised are not specified.
Description: The California Department of Child Support Services reported a data breach on January 14, 2025, involving the inadvertent emailing of personal information to a personal email account. The breach affected individuals' first names, last names, dates of birth, addresses, driver’s license numbers, and social security numbers. This incident highlights the vulnerability of sensitive personal data and the potential consequences of such breaches on individuals' privacy and security.
Description: The California Office of the Attorney General reported a data breach involving the California Department of Child Support Services (DCSS) on September 13, 2022. The breach occurred on or around March 8, 2022, when an employee sent an email to their personal account containing personal information, including individuals' names, IRS Tax Intercept amounts, and IRS collection sources. The total number of affected individuals is currently unknown.
Description: On March 29, 2012, the California Department of Child Support Services reported a data breach involving missing storage devices that potentially contained personal information of parents, caregivers, and children. The breach occurred on March 12, 2012, and involved personal information such as names, addresses, Social Security numbers, and health insurance details. The agency is working with International Business Machines (IBM) and Iron Mountain Inc. to locate the missing devices.
Description: The Finance Department for the state of California was a recent target of Lockbit, the notorious Russian-linked ransomware group. The group allegedly posted on the dark web to threaten them that if the ransom demands aren’t met by December 24, they will leak the stolen data. The hackers also published online the number of directories and files that contained over 246,000 files and over 114,000 folders totalling 75.3GB of data, as displayed in the properties dialogue. However, an initial access broker (IAB) was offering a way past the department’s cyber defences for $30,000 per breached server.
Description: The California Department of Health Care Services (DHCS) reported a data breach involving the erroneous mailing of Beneficiary Identification Cards (BIC) due to a computer programming error. The breach occurred between December 10 and December 18, 2012, potentially affecting an unknown number of individuals, with exposed information including names, Client Index Numbers, dates of birth, and genders. Affected parties were informed on December 21, 2012, and a new card was to be issued by January 1, 2013.
Description: The California Department of Health Care Services (DHCS) reported a privacy incident on December 5, 2012, involving the exposure of Social Security numbers (SSNs) of In-Home Supportive Services (IHSS) providers. The breach occurred on November 5, 2012, when lists of Medi-Cal providers were posted online, inadvertently including an SSN in a non-standard format. The number of affected individuals is unknown.
Description: The California Department of Health Care Services (DHCS) reported a data breach on March 20, 2023, related to a security incident involving a subcontractor, Advanced Image Direct (AID), that occurred on January 12, 2023. The breach potentially exposed personal information, including names, addresses, county case numbers, dates of birth, and the last four digits of Social Security Numbers (SSNs). Approximately 1,500 individuals are reported to have been affected.
Description: The California Department of Justice’s 2022 Firearms Dashboard Portal accidentally went live with publicly-accessible files that include identifying information of California gun owners. The leaked information included the person’s full name, race, home address, date of birth, and date their permit was issued. The investigation revealed that the leaked files included home addresses, full names, and dates of birth for all seven custodial officers, 63 people with a place of employment permit, and 420 reserve officers. However, the leaked information was soon removed by the department.
Description: The California Department of Justice experienced a data breach on **June 27, 2022**, involving the unauthorized disclosure of sensitive personal information. The incident primarily affected approximately **100 individuals** holding **concealed carry weapons (CCW) permits**. The exposed data included **names, dates of birth, residential addresses, and CCW license numbers**—information that, if misused, could pose significant privacy and security risks to the affected individuals. The breach raises concerns about potential **identity theft, targeted harassment, or physical safety threats** for permit holders, given the sensitive nature of the leaked data. While the exact cause of the breach (e.g., insider threat, system vulnerability, or external cyberattack) was not specified in the report, the exposure of such regulated information underscores critical lapses in data protection protocols within a **government law enforcement agency**. The incident highlights the broader implications of **mishandling firearm-related records**, which are subject to strict confidentiality laws in many jurisdictions. The breach not only erodes public trust in the agency’s ability to safeguard sensitive data but also may lead to **legal repercussions, reputational damage, and heightened scrutiny** over its cybersecurity practices.
Description: The California Department of Justice reported on May 11, 2012, that hackers affiliated with Anonymous accessed private email accounts of a retired agent from the Computer and Technology Crime High-Tech Response Team (CATCH) in November 2011. The breach potentially exposed personal information, including names and financial account information, although the exact number of individuals affected and specific details regarding the breach are unknown.
Description: The California Department of Public Health reported a data breach on May 8, 2012, involving the theft of a survey binder containing personal and medical information after it was left in an unattended vehicle. Approximately 1 individual was affected, and the compromised information included name, date of birth, age, medications, room number, and medical record number.
Description: The California Department of Public Health (CDPH) reported a data breach on May 8, 2013, involving a roll of microfiche containing approximately 2,000 birth records from 1974 found at an unsecure non-State location. The affected records include names, addresses, Social Security numbers, and some medical information, potentially impacting around 6,000 individuals born in specific months and counties in California.
Description: The California Department of Public Health reported a data breach involving the Women, Infants, and Children (WIC) Program on September 26, 2013. The breach occurred on August 20, 2013, when a Madera County WIC employee mistakenly disclosed personal and medical information, including names and expected delivery dates, to another participant. The number of individuals affected is unknown.
Description: The sensitive medical information of citizens of California was exposed by a misconfigured database managed by the California Department of Public Health. The misconfiguration resulted from an error made by a third-party contractor and led to the breach of names, dates of birth, addresses, and Covid-19-related health information of the citizens. The department set up a dedicated call center to help out the people of California affected by the breach.
Description: On May 23, 2018, the California Department of Public Health (CDPH) reported a data breach that occurred on March 12, 2018, involving the theft of documents and a laptop from a contractor's vehicle. This incident potentially exposed personal and health information such as names, Social Security numbers, and health insurance information. The breach highlights the vulnerability of sensitive data when handled by third-party contractors and the importance of robust security measures to protect personal information.
Description: On January 9, 2019, the California Department of Rehabilitation suffered a data breach involving an exposed spreadsheet containing sensitive employee information. The compromised data included employee names and Social Security numbers, affecting approximately 12 individuals. The breach was reported to the California Office of the Attorney General on January 25, 2019. In response, the Department took corrective action by offering credit monitoring services to the impacted employees to mitigate potential risks such as identity theft or financial fraud. The incident highlighted vulnerabilities in the handling of personally identifiable information (PII) within the organization, raising concerns about internal data protection protocols and the safeguarding of employee records against unauthorized access or disclosure.
Description: The California Office of the Attorney General reported a data breach involving the Department of Rehabilitation on December 7, 2017. The breach occurred on November 22, 2017, when a file containing personal information, specifically names and social security numbers, was inadvertently emailed without encryption to an outside entity. The number of individuals affected is currently unknown.
Description: The California Department of Social Services (CDSS) reported a data breach involving the unauthorized release of personal information on July 17, 2014. The breach, which occurred on July 16, 2014, involved accidentally discarded confidential documents that may have contained names, mailing addresses, dates of birth, and Social Security numbers. The number of individuals affected is currently unknown.
Description: The California Department of Social Services reported a data breach on February 16, 2023, involving an incident that occurred on January 6, 2023. An employee emailed a document containing personal information, including names and Social Security numbers, to a personal account. The breach potentially affected an unspecified number of individuals. Corrective actions have been implemented to minimize future risks.
Description: On August 19, 2022, the California Department of Social Services (CDSS) reported a data breach that occurred on August 11, 2022. An email containing personal information, including names and Social Security numbers (SSN), was sent to unauthorized individuals. The total number of individuals affected is currently unknown.
Description: The California Department of Social Services (CDSS) reported a data breach involving the Sun Bucks Program on October 3, 2024. The breach, which involved unauthorized access to case information in the ebtEDGE Web Admin platform, was discovered on July 19, 2024, and affected personal information including children's names, addresses, dates of birth, card numbers, and EBT account numbers. The number of individuals affected is not specified.
Description: On **May 1, 2012**, the **California Department of Social Services (CDSS)** experienced a **security breach** involving the **In Home Supportive Services (IHSS) program**. The incident occurred during the transit of a package containing **personal information**, which was found **damaged** upon arrival, with some contents confirmed as **missing**. The exact number of affected individuals and the specific types of compromised data (e.g., names, Social Security numbers, medical records, or financial details) remain **undisclosed**.The breach highlights a **physical security failure** in safeguarding sensitive data during transportation, exposing participants of the IHSS program—who often include vulnerable populations such as elderly or disabled individuals—to potential risks like **identity theft, fraud, or unauthorized access to personal details**. While no evidence of malicious exploitation was reported, the **unknown scope of the leak** and the **sensitive nature of the program’s data** raise concerns about long-term repercussions for those impacted. The incident underscores the need for stricter **data handling protocols**, especially for government agencies managing high-risk personal information.


No incidents recorded for Caltrans in 2025.
No incidents recorded for Caltrans in 2025.
No incidents recorded for Caltrans in 2025.
Caltrans cyber incidents detection timeline including parent company and subsidiaries

From roads less traveled to highways supporting California’s demanding commute. The California Department of Transportation (Caltrans) manages more than 50,000 miles of California's highway and freeway lanes, provides inter-city rail services, permits more than 400 public-use airports and special-use hospital heliports, and works with local agencies to keep California moving. More than the road workers, we are California’s transportation infrastructure; established in 1895, Caltrans has been active in moving the people and commerce of California and continues to model the way in innovative transportation systems. Caltrans specializes in many areas related to transportation: Engineering, Environmental Analysis, Information Technology, Maintenance, Equipment, Transportation Planning, Land Surveys, Right of Way, Finance, Traffic Operations, Aeronautics, Legal, and Administration It is our commitment to the residents of California that keeps us honest in our mission of providing a safe and reliable transportation network that serves all people and respects the environment.


State government is the largest employer in Tennessee, with approximately 43,500 employees in the three branches of government. The State of Tennessee has approximately 1,300 different job classifications in areas such as administrative, health services, historic preservation, legal, agriculture, co

Its main functions are to: collect and administer all national taxes, duties and levies; collect revenue that may be imposed under any other legislation, as agreed on between SARS and an organ of state or institution entitled to the revenue; provide protection against the illegal importation

The Transportation Security Administration (TSA) is a component agency of the U.S. Department of Homeland Security (DHS), committed to securing the nation’s transportation systems to ensure safe and efficient travel for all. Our mission is to protect the American people by preventing threats and dis

Region Västra Götaland is governed by democratically elected politicians and with just over 50,000 employees is one of Sweden’s biggest employers. It is tasked with offering good healthcare and dental care and providing the prerequisites for good public health, a rich cultural life, a good enviro

Every day the contributions and achievements of State of Michigan employees have a direct impact on over 10 million Michiganders across the state. If you're looking for a fulfilling career in state government that can make a real difference in the lives of others, you can find your place working wit

Build the Missouri of tomorrow. Ensure a strong foundation today. Join a group of innovative team members focused on driving the State of Missouri forward. As public servants, our team members have the opportunity to produce work that is both lasting and important. This work serves to protect famil

Ontario Government | Gouvernement de l’Ontario The Ontario Government works to serve the public interest and uphold the public trust by providing Ministers with objective advice and expert guidance. The Ontario Public Service carries out the decisions and policies of the elected government with int

OVERVIEW Framingham was incorporated as a town on June 25, 1700. Chapter 143 of the Acts of 1949 established the Town of Framingham Representative Town Government by Limited Town Meetings. The Citizens of Framingham adopted the Home Rule Charter for the City of Framingham at an election held on Ap

The County of Santa Clara is located at the southern end of the San Francisco Bay and encompasses 1,312 square miles. It has one of the highest median family incomes in the country, and a wide diversity of cultures, backgrounds and talents. The County of Santa Clara continues to attract people fro
.png)
The departments recently posted job descriptions for a chief information security and privacy officer; a statewide technology, policy and...
Transportation agency chief technology officers (CTOs) are at the forefront of digital transformation in transportation.
SACRAMENTO, California — California's Transportation Department said Friday it has approved less than 10 percent of key permits needed for...
At this week's event, held Tuesday and Wednesday in Sacramento and presented by Government Technology, the CIO Academy honored dozens in...
California said it will invest early $300 million in federal funding on 288 traffic safety projects across the state. The funding, part of the federal...
Aiming to enhance the state's resilience against cyber threats, the California Governor's Office of Emergency Services (Cal OES) today...
Gov. Gavin Newsom signed a bill Friday that requires California transportation officials to strengthen their rules for building crosswalks,...
The Best of California Awards, presented during the California Government Innovation Summit, acknowledge high-achieving state IT officials and significant...
WHAT YOU NEED TO KNOW: Caltrans has awarded the first GenAI vendor contracts in California history, testing innovative solutions to protect...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Caltrans is http://www.dot.ca.gov/.
According to Rankiteo, Caltrans’s AI-generated cybersecurity score is 781, reflecting their Fair security posture.
According to Rankiteo, Caltrans currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Caltrans is not certified under SOC 2 Type 1.
According to Rankiteo, Caltrans does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Caltrans is not listed as GDPR compliant.
According to Rankiteo, Caltrans does not currently maintain PCI DSS compliance.
According to Rankiteo, Caltrans is not compliant with HIPAA regulations.
According to Rankiteo,Caltrans is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Caltrans operates primarily in the Government Administration industry.
Caltrans employs approximately 12,475 people worldwide.
Caltrans presently has no subsidiaries across any sectors.
Caltrans’s official LinkedIn profile has approximately 101,001 followers.
Caltrans is classified under the NAICS code 92, which corresponds to Public Administration.
No, Caltrans does not have a profile on Crunchbase.
Yes, Caltrans maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/caltrans.
As of December 09, 2025, Rankiteo reports that Caltrans has experienced 31 cybersecurity incidents.
Caltrans has an estimated 11,445 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Data Leak, Ransomware and Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an recovery measures with dedicated call center set up to help affected individuals, and containment measures with steps were taken right away to fix the access issue, and remediation measures with corrective actions implemented, and remediation measures with issuing new beneficiary identification cards, and communication strategy with informing affected parties, and third party assistance with international business machines (ibm), third party assistance with iron mountain inc., and communication strategy with notification letter with recommendations for identity theft protection, and recovery measures with credit monitoring services offered to affected individuals, and communication strategy with public disclosure on 2012-05-11, and communication strategy with public disclosure on march 17, 2021..
Title: California Department of Public Health Data Breach
Description: The sensitive medical information of citizens of California was exposed by a misconfigured database managed by the California Department of Public Health. The misconfiguration resulted from an error made by a third-party contractor and led to the breach of names, dates of birth, addresses, and Covid-19-related health information of the citizens. The department set up a dedicated call center to help out the people of California affected by the breach.
Type: Data Breach
Attack Vector: Misconfigured Database
Vulnerability Exploited: Error by a third-party contractor
Title: California Department of Justice Firearms Dashboard Portal Data Leak
Description: The California Department of Justice’s 2022 Firearms Dashboard Portal accidentally went live with publicly-accessible files that include identifying information of California gun owners. The leaked information included the person’s full name, race, home address, date of birth, and date their permit was issued. The investigation revealed that the leaked files included home addresses, full names, and dates of birth for all seven custodial officers, 63 people with a place of employment permit, and 420 reserve officers. However, the leaked information was soon removed by the department.
Type: Data Leak
Title: Ransomware Attack on California Finance Department
Description: The Finance Department for the state of California was targeted by Lockbit, a Russian-linked ransomware group. The group threatened to leak stolen data if ransom demands weren't met by December 24. The hackers published details of the stolen data, including 246,000 files and 114,000 folders totaling 75.3GB. An initial access broker was offering access to the department's cyber defenses for $30,000 per breached server.
Type: Ransomware
Threat Actor: Lockbit
Motivation: Financial
Title: California DMV Data Breach
Description: Seven government agencies now have access to some drivers' Social Security numbers thanks to a data breach at the California Department of Motor Vehicles.
Type: Data Breach
Title: California Department of Social Services Data Breach
Description: A document containing personal information, including names and Social Security numbers, was emailed to a personal account by an employee.
Date Detected: 2023-02-16
Date Publicly Disclosed: 2023-02-16
Type: Data Breach
Attack Vector: Email
Vulnerability Exploited: Human Error
Threat Actor: Internal Employee
Motivation: Accidental
Title: California Department of Social Services Data Breach
Description: The California Department of Social Services (CDSS) reported a data breach involving unauthorized release of personal information on July 17, 2014. The breach, which occurred on July 16, 2014, involved accidentally discarded confidential documents that may have contained names, mailing addresses, dates of birth, and Social Security numbers. The number of individuals affected is currently unknown.
Date Detected: 2014-07-17
Date Publicly Disclosed: 2014-07-17
Type: Data Breach
Attack Vector: Accidental Discard of Confidential Documents
Title: CA DMV Data Breach
Description: The California Department of Motor Vehicles (CA DMV) reported a data breach on November 6, 2015, involving an erroneous disclosure of personal information on September 28, 2015. The breach affected the Riverside Probation Department and involved the accidental transmission of names, dates of birth, physical descriptions, and driver license numbers, but did not include Social Security Numbers.
Date Detected: 2015-11-06
Date Publicly Disclosed: 2015-11-06
Type: Data Breach
Attack Vector: Erroneous Disclosure
Title: California DHCS Data Breach
Description: The California Department of Health Care Services (DHCS) reported a data breach involving the erroneous mailing of Beneficiary Identification Cards (BIC) due to a computer programming error.
Date Detected: 2012-12-21
Date Resolved: 2013-01-01
Type: Data Breach
Attack Vector: Computer Programming Error
Vulnerability Exploited: Computer Programming Error
Title: California Department of Child Support Services Data Breach
Description: The California Department of Child Support Services reported a data breach involving missing storage devices that potentially contained personal information of parents, caregivers, and children.
Date Detected: 2012-03-29
Type: Data Breach
Attack Vector: Physical Theft/Loss
Title: Data Breach at California Department of Child Support Services
Description: An employee sent an email to their personal account containing personal information, including individuals' names, IRS Tax Intercept amounts, and IRS collection sources.
Date Detected: 2022-09-13
Date Publicly Disclosed: 2022-09-13
Type: Data Breach
Attack Vector: Email
Vulnerability Exploited: Human Error
Threat Actor: Internal Employee
Title: Data Breach at California Department of Public Health
Description: Theft of documents and a laptop from a contractor's vehicle, potentially exposing personal and health information.
Date Detected: 2018-05-23
Date Publicly Disclosed: 2018-05-23
Type: Data Breach
Attack Vector: Physical Theft
Title: California Department of Justice Email Breach
Description: Hackers affiliated with Anonymous accessed private email accounts of a retired agent from the Computer and Technology Crime High-Tech Response Team (CATCH) in November 2011.
Date Detected: 2011-11-01
Date Publicly Disclosed: 2012-05-11
Type: Data Breach
Attack Vector: Email Compromise
Threat Actor: Anonymous
Title: Data Breach at California Department of Health Care Services
Description: The California Department of Health Care Services (DHCS) reported a data breach on March 20, 2023, related to a security incident involving a subcontractor, Advanced Image Direct (AID), that occurred on January 12, 2023. The breach potentially exposed personal information, including names, addresses, county case numbers, dates of birth, and the last four digits of Social Security Numbers (SSNs). Approximately 1,500 individuals are reported to have been affected.
Date Detected: 2023-01-12
Date Publicly Disclosed: 2023-03-20
Type: Data Breach
Title: Data Breach at California Department of Rehabilitation
Description: The California Office of the Attorney General reported a data breach involving the Department of Rehabilitation on December 7, 2017. The breach occurred on November 22, 2017, when a file containing personal information, specifically names and social security numbers, was inadvertently emailed without encryption to an outside entity. The number of individuals affected is currently unknown.
Date Detected: 2017-11-22
Date Publicly Disclosed: 2017-12-07
Type: Data Breach
Attack Vector: Email
Vulnerability Exploited: Unencrypted Email
Title: California Department of Social Services Data Breach
Description: The California Department of Social Services (CDSS) reported a data breach involving the Sun Bucks Program on October 3, 2024. The breach, which involved unauthorized access to case information in the ebtEDGE Web Admin platform, was discovered on July 19, 2024, and affected personal information including children's names, addresses, dates of birth, card numbers, and EBT account numbers. The number of individuals affected is not specified.
Date Detected: 2024-07-19
Date Publicly Disclosed: 2024-10-03
Type: Data Breach
Attack Vector: Unauthorized Access
Title: California Department of State Hospitals Data Breach
Description: A data breach involving improper access to personal information was reported by the California Department of State Hospitals.
Date Detected: 2021-04-13
Date Publicly Disclosed: 2021-05-11
Type: Data Breach
Title: California Department of State Hospitals Data Breach
Description: Unauthorized disclosure of Social Security Numbers and other personal information of employees due to a security incident.
Date Detected: 2013-05-08
Date Publicly Disclosed: 2013-05-24
Type: Data Breach
Title: California DHCS Privacy Incident
Description: The California Department of Health Care Services (DHCS) reported a privacy incident on December 5, 2012, involving the exposure of Social Security numbers (SSNs) of In-Home Supportive Services (IHSS) providers. The breach occurred on November 5, 2012, when lists of Medi-Cal providers were posted online, inadvertently including an SSN in a non-standard format. The number of affected individuals is unknown.
Date Detected: 2012-11-05
Date Publicly Disclosed: 2012-12-05
Type: Data Breach
Attack Vector: Inadvertent Exposure
Vulnerability Exploited: Data Handling Error
Title: California Department of Public Health Data Breach
Description: The California Department of Public Health (CDPH) reported a data breach on May 8, 2013, involving a roll of microfiche containing approximately 2,000 birth records from 1974 found at an unsecure non-State location. The affected records include names, addresses, Social Security numbers, and some medical information, potentially impacting around 6,000 individuals born in specific months and counties in California.
Date Detected: 2013-05-08
Date Publicly Disclosed: 2013-05-08
Type: Data Breach
Title: California Department of Social Services Data Breach
Description: An email containing personal information, including names and Social Security numbers (SSN), was sent to unauthorized individuals.
Date Detected: 2022-08-19
Date Publicly Disclosed: 2022-08-19
Type: Data Breach
Attack Vector: Email
Title: California Department of Public Health Data Breach
Description: The California Department of Public Health reported a data breach involving the theft of a survey binder containing personal and medical information after it was left in an unattended vehicle.
Date Detected: 2012-05-08
Type: Data Breach
Attack Vector: Physical Theft
Vulnerability Exploited: Unattended Vehicle
Title: Potential Disclosure of Personal Information by California Department of Child Support Services
Description: The California Department of Child Support Services reported a potential disclosure of personal information on May 6, 2014. The breach occurred on April 7, 2014, when letters from the Solano County Department of Child Support Services were misplaced during transport. The exact number of individuals affected is unknown, and the types of information compromised are not specified.
Date Detected: 2014-05-06
Date Publicly Disclosed: 2014-05-06
Type: Data Breach
Attack Vector: Physical Theft/Loss
Title: Data Breach at Department of State Hospitals
Description: The California Office of the Attorney General reported a data breach involving the Department of State Hospitals (DSH) on February 28, 2024. The breach, discovered on February 15, 2024, involved the unauthorized dissemination of Leave and Activity Balance reports containing confidential information, including full social security numbers and names. Approximately 1,000 individuals were affected by this incident.
Date Detected: 2024-02-15
Date Publicly Disclosed: 2024-02-28
Type: Data Breach
Attack Vector: Unauthorized Dissemination
Title: California Department of State Hospitals – Coalinga Data Breach
Description: The California Department of State Hospitals – Coalinga reported a data breach involving unauthorized disclosure of patient information to the United States District Court.
Date Detected: 2021-09-03
Date Publicly Disclosed: 2021-09-03
Type: Data Breach
Attack Vector: Unauthorized Disclosure
Title: California Department of Child Support Services Data Breach
Description: The California Department of Child Support Services reported a data breach that occurred on January 14, 2025, involving the inadvertent emailing of personal information to a personal email account. The breach affected individuals' first names, last names, dates of birth, addresses, driver’s license numbers, and social security numbers.
Date Detected: 2025-01-14
Type: Data Breach
Attack Vector: Inadvertent Email
Title: California Department of State Hospitals Data Breach
Description: The California Department of State Hospitals reported a data breach on April 5, 2021, involving improper access to personal information of approximately 1,735 employees and former employees, as well as 1,217 job applicants. The breach was discovered during an investigation initiated on February 25, 2021, with no evidence of misuse of the compromised information.
Date Detected: 2021-02-25
Date Publicly Disclosed: 2021-04-05
Type: Data Breach
Title: California Department of Public Health WIC Program Data Breach
Description: The California Department of Public Health reported a data breach involving the Women, Infants, and Children (WIC) Program on September 26, 2013. The breach occurred on August 20, 2013, when a Madera County WIC employee mistakenly disclosed personal and medical information, including names and expected delivery dates, to another participant. The number of individuals affected is unknown.
Date Detected: 2013-08-20
Date Publicly Disclosed: 2013-09-26
Type: Data Breach
Attack Vector: Human Error
Vulnerability Exploited: Mistaken Disclosure
Threat Actor: Internal Employee
Motivation: Accidental
Title: California Department of Rehabilitation Data Breach (2019)
Description: The California Office of the Attorney General reported that the Department of Rehabilitation experienced a data breach involving a spreadsheet that included employee names and Social Security numbers. Approximately 12 individuals were affected, and the Department offered credit monitoring services to those impacted.
Date Detected: 2019-01-09
Date Publicly Disclosed: 2019-01-25
Type: Data Breach
Title: California Department of Social Services IHSS Data Breach (2012)
Description: The California Department of Social Services reported a security incident involving personal information relating to the In Home Supportive Services program (IHSS). The breach occurred during transit when a package containing personal information was damaged, with some contents determined missing. The number of individuals affected and specific types of information compromised are unknown.
Date Detected: 2012-05-11
Date Publicly Disclosed: 2012-05-11
Type: Data Breach (Physical Loss/Theft)
Attack Vector: Physical Theft/Loss During Transit
Title: California Department of Justice CCW Permit Data Breach
Description: The California Department of Justice reported a data breach involving the unauthorized release of personal information primarily related to individuals with concealed carry weapons (CCW) permits. Exposed data included names, dates of birth, addresses, and CCW license numbers, affecting approximately 100 individuals.
Date Detected: 2022-06-27
Date Publicly Disclosed: 2022-06-27
Type: Data Breach
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Email.

Data Compromised: Names, Dates of birth, Addresses, Covid-19-related health information

Data Compromised: Full name, Race, Home address, Date of birth, Date their permit was issued

Data Compromised: 246,000 files and 114,000 folders totaling 75.3GB

Data Compromised: Social security numbers

Data Compromised: Names, Social security numbers

Data Compromised: Names, Mailing addresses, Dates of birth, Social security numbers

Data Compromised: Names, Dates of birth, Physical descriptions, Driver license numbers

Data Compromised: Names, Client index numbers, Dates of birth, Genders

Data Compromised: Names, Addresses, Social security numbers, Health insurance details

Data Compromised: Individuals' names, Irs tax intercept amounts, Irs collection sources

Data Compromised: Names, Social security numbers, Health insurance information

Data Compromised: Names, Financial account information

Data Compromised: Names, Addresses, County case numbers, Dates of birth, Last four digits of ssns

Data Compromised: Names, Social security numbers

Data Compromised: Children's names, Addresses, Dates of birth, Card numbers, Ebt account numbers
Systems Affected: ebtEDGE Web Admin platform

Data Compromised: Patient names, Covid-19 test results, Health information, Personal information of employees and job applicants

Data Compromised: Social security numbers, Other personal information
Identity Theft Risk: High

Data Compromised: Social security numbers

Data Compromised: Names, Addresses, Social security numbers, Medical information

Data Compromised: Names, Social security numbers (ssn)

Data Compromised: Name, Date of birth, Age, Medications, Room number, Medical record number

Data Compromised: Full social security numbers, Names

Data Compromised: Names, Case numbers, Birth dates, Legal commitments, Admission dates, Unit numbers, Genders

Data Compromised: First names, Last names, Dates of birth, Addresses, Driver’s license numbers, Social security numbers

Data Compromised: Personal information

Data Compromised: Personal information, Medical information

Data Compromised: Employee names, Social security numbers
Identity Theft Risk: High (SSNs exposed)

Brand Reputation Impact: Potential (unknown scale)
Identity Theft Risk: Potential (unknown scale)

Data Compromised: Names, Dates of birth, Addresses, Ccw license numbers
Brand Reputation Impact: Potential reputational damage due to exposure of sensitive permit holder data
Identity Theft Risk: High (due to exposure of PII including names, DOBs, and addresses)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Dates Of Birth, Addresses, Covid-19-Related Health Information, , Full Name, Race, Home Address, Date Of Birth, Date Their Permit Was Issued, , Social Security numbers, Personal Information, , Names, Mailing Addresses, Dates Of Birth, Social Security Numbers, , Names, Dates Of Birth, Physical Descriptions, Driver License Numbers, , Names, Client Index Numbers, Dates Of Birth, Genders, , Personal Information, , Individuals' Names, Irs Tax Intercept Amounts, Irs Collection Sources, , Personal Information, Health Information, , Names, Financial Account Information, , Names, Addresses, County Case Numbers, Dates Of Birth, Last Four Digits Of Ssns, , Names, Social Security Numbers, , Personal Information, , Patient Names, Covid-19 Test Results, Health Information, Personal Information Of Employees And Job Applicants, , Social Security Numbers, Other Personal Information, , Social Security numbers, Names, Addresses, Social Security Numbers, Medical Information, , Names, Social Security Numbers (Ssn), , Personal Information, Medical Information, , Full Social Security Numbers, Names, , Names, Case Numbers, Birth Dates, Legal Commitments, Admission Dates, Unit Numbers, Genders, , First Names, Last Names, Dates Of Birth, Addresses, Driver’S License Numbers, Social Security Numbers, , Personal Information, , Personal Information, Medical Information, , Personally Identifiable Information (Pii), , Personal Information (specific types unknown), Personally Identifiable Information (Pii), License/Permit Data, , Covid-19 Test Results, Health Information and .

Entity Name: California Department of Public Health
Entity Type: Government Agency
Industry: Healthcare
Location: California
Customers Affected: Citizens of California

Entity Name: California Department of Justice
Entity Type: Government
Industry: Public Administration
Location: California

Entity Name: Finance Department for the state of California
Entity Type: Government
Industry: Public Administration
Location: California

Entity Name: California Department of Motor Vehicles
Entity Type: Government Agency
Industry: Government
Location: California, USA
Customers Affected: 3200

Entity Name: California Department of Social Services
Entity Type: Government Agency
Industry: Public Administration
Location: California, USA
Customers Affected: Unspecified number of individuals

Entity Name: California Department of Social Services
Entity Type: Government Agency
Industry: Public Sector
Location: California, USA

Entity Name: Riverside Probation Department
Entity Type: Government Agency
Industry: Law Enforcement
Location: Riverside, California

Entity Name: California Department of Health Care Services
Entity Type: Government Agency
Industry: Healthcare
Location: California, USA
Customers Affected: Unknown

Entity Name: California Department of Child Support Services
Entity Type: Government Agency
Industry: Public Administration
Location: California, USA

Entity Name: California Department of Child Support Services
Entity Type: Government Agency
Industry: Public Administration
Location: California, USA

Entity Name: California Department of Public Health
Entity Type: Government Agency
Industry: Healthcare
Location: California, USA

Entity Name: California Department of Justice
Entity Type: Government Agency
Industry: Law Enforcement
Location: California, USA

Entity Name: California Department of Health Care Services
Entity Type: Government Agency
Industry: Healthcare
Location: California, USA
Customers Affected: 1500

Entity Name: California Department of Rehabilitation
Entity Type: Government Agency
Industry: Public Administration
Location: California, USA

Entity Name: California Department of Social Services
Entity Type: Government Agency
Industry: Social Services
Location: California

Entity Name: California Department of State Hospitals
Entity Type: Government
Industry: Healthcare
Location: California
Customers Affected: 1,415 patients, 1,735 employees and job applicants

Entity Name: California Department of State Hospitals
Entity Type: Government
Industry: Healthcare
Location: California, USA

Entity Name: California Department of Health Care Services
Entity Type: Government Agency
Industry: Healthcare
Location: California, USA

Entity Name: California Department of Public Health
Entity Type: Government Agency
Industry: Healthcare
Location: California
Customers Affected: 6000

Entity Name: California Department of Social Services
Entity Type: Government Agency
Industry: Public Administration
Location: California, USA

Entity Name: California Department of Public Health
Entity Type: Government Agency
Industry: Healthcare
Location: California, USA
Customers Affected: 1

Entity Name: California Department of Child Support Services
Entity Type: Government Agency
Industry: Public Administration
Location: California, USA

Entity Name: Department of State Hospitals
Entity Type: Government Agency
Industry: Healthcare
Location: California
Customers Affected: 1000

Entity Name: California Department of State Hospitals – Coalinga
Entity Type: Government
Industry: Healthcare
Location: Coalinga, California

Entity Name: California Department of Child Support Services
Entity Type: Government Agency
Industry: Public Administration
Location: California, USA

Entity Name: California Department of State Hospitals
Entity Type: Government
Industry: Healthcare
Location: California, USA

Entity Name: California Department of Public Health
Entity Type: Government Agency
Industry: Healthcare
Location: California, USA

Entity Name: California Department of Rehabilitation
Entity Type: Government Agency
Industry: Public Administration / Social Services
Location: California, USA
Customers Affected: 12 (employees)

Entity Name: California Department of Social Services
Entity Type: Government Agency
Industry: Public Administration / Social Services
Location: California, USA
Customers Affected: Unknown (In Home Supportive Services program participants)

Entity Name: California Department of Justice
Entity Type: Government Agency
Industry: Law Enforcement / Public Safety
Location: California, USA
Customers Affected: 100

Recovery Measures: Dedicated call center set up to help affected individuals

Containment Measures: Steps were taken right away to fix the access issue

Remediation Measures: Corrective actions implemented

Remediation Measures: Issuing new Beneficiary Identification Cards
Communication Strategy: Informing affected parties

Third Party Assistance: International Business Machines (Ibm), Iron Mountain Inc..

Communication Strategy: Notification letter with recommendations for identity theft protection

Recovery Measures: Credit monitoring services offered to affected individuals

Communication Strategy: Public disclosure on 2012-05-11
Third-Party Assistance: The company involves third-party assistance in incident response through International Business Machines (IBM), Iron Mountain Inc., .

Type of Data Compromised: Names, Dates of birth, Addresses, Covid-19-related health information
Sensitivity of Data: High
Personally Identifiable Information: Yes

Type of Data Compromised: Full name, Race, Home address, Date of birth, Date their permit was issued
Sensitivity of Data: High

Number of Records Exposed: 246,000 files and 114,000 folders
Data Exfiltration: Yes

Type of Data Compromised: Social Security numbers
Number of Records Exposed: 3200
Sensitivity of Data: High
Personally Identifiable Information: Social Security numbers

Type of Data Compromised: Personal information
Number of Records Exposed: Unspecified
Sensitivity of Data: High
Personally Identifiable Information: NamesSocial Security numbers

Type of Data Compromised: Names, Mailing addresses, Dates of birth, Social security numbers
Sensitivity of Data: High

Type of Data Compromised: Names, Dates of birth, Physical descriptions, Driver license numbers
Sensitivity of Data: High

Type of Data Compromised: Names, Client index numbers, Dates of birth, Genders
Number of Records Exposed: Unknown
Personally Identifiable Information: namesClient Index Numbersdates of birthgenders

Type of Data Compromised: Personal information
Sensitivity of Data: High
Personally Identifiable Information: namesaddressesSocial Security numbershealth insurance details

Type of Data Compromised: Individuals' names, Irs tax intercept amounts, Irs collection sources
Sensitivity of Data: High

Type of Data Compromised: Personal information, Health information
Sensitivity of Data: High

Type of Data Compromised: Names, Financial account information

Type of Data Compromised: Names, Addresses, County case numbers, Dates of birth, Last four digits of ssns
Number of Records Exposed: 1500
Sensitivity of Data: High

Type of Data Compromised: Names, Social security numbers
Sensitivity of Data: High
Data Encryption: No
Personally Identifiable Information: Yes

Type of Data Compromised: Personal information
Sensitivity of Data: High
Personally Identifiable Information: children's namesaddressesdates of birthcard numbersEBT account numbers

Type of Data Compromised: Patient names, Covid-19 test results, Health information, Personal information of employees and job applicants
Number of Records Exposed: 1,415 patient records, 1,735 employee and job applicant records

Type of Data Compromised: Social security numbers, Other personal information
Sensitivity of Data: High
Personally Identifiable Information: Yes

Type of Data Compromised: Social Security numbers
Sensitivity of Data: High
Personally Identifiable Information: Social Security numbers

Type of Data Compromised: Names, Addresses, Social security numbers, Medical information
Number of Records Exposed: 2000
Sensitivity of Data: High
File Types Exposed: Microfiche

Type of Data Compromised: Names, Social security numbers (ssn)
Sensitivity of Data: High

Type of Data Compromised: Personal information, Medical information
Number of Records Exposed: 1
Sensitivity of Data: High
Personally Identifiable Information: namedate of birthagemedicationsroom numbermedical record number

Type of Data Compromised: Full social security numbers, Names
Number of Records Exposed: 1000
Sensitivity of Data: High
Personally Identifiable Information: Full Social Security NumbersNames

Type of Data Compromised: Names, Case numbers, Birth dates, Legal commitments, Admission dates, Unit numbers, Genders
Sensitivity of Data: Medium

Type of Data Compromised: First names, Last names, Dates of birth, Addresses, Driver’s license numbers, Social security numbers
Sensitivity of Data: High

Type of Data Compromised: Personal information
Number of Records Exposed: 2952

Type of Data Compromised: Personal information, Medical information
Sensitivity of Data: High
Personally Identifiable Information: NamesExpected Delivery Dates

Type of Data Compromised: Personally identifiable information (pii)
Number of Records Exposed: 12
Sensitivity of Data: High (includes SSNs)
File Types Exposed: Spreadsheet
Personally Identifiable Information: NamesSocial Security numbers

Type of Data Compromised: Personal Information (specific types unknown)
Number of Records Exposed: Unknown
Sensitivity of Data: High (personal information)

Type of Data Compromised: Personally identifiable information (pii), License/permit data
Number of Records Exposed: 100
Sensitivity of Data: High (includes names, DOBs, addresses, and CCW license numbers)
Data Exfiltration: Yes (unauthorized release)
Personally Identifiable Information: Full NamesDates of BirthPhysical AddressesCCW License Numbers
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Corrective actions implemented, , Issuing new Beneficiary Identification Cards, .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by steps were taken right away to fix the access issue and .
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Dedicated call center set up to help affected individuals, Credit monitoring services offered to affected individuals.

Regulatory Notifications: Reported to the California Office of the Attorney General

Recommendations: Identity theft protection measures
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Identity theft protection measures.

Source: California Department of Social Services
Date Accessed: 2023-02-16

Source: California Department of Social Services
Date Accessed: 2014-07-17

Source: California Office of the Attorney General
Date Accessed: 2022-09-13

Source: California Department of Public Health
Date Accessed: 2018-05-23

Source: California Department of Justice
Date Accessed: 2012-05-11

Source: California Department of Health Care Services

Source: California Office of the Attorney General
Date Accessed: 2017-12-07

Source: California Department of State Hospitals

Source: Notification letter

Source: California Department of Child Support Services

Source: California Office of the Attorney General
Date Accessed: 2024-02-28

Source: California Department of State Hospitals – Coalinga
Date Accessed: 2021-09-03

Source: California Department of State Hospitals

Source: California Department of Public Health

Source: California Office of the Attorney General
Date Accessed: 2019-01-25

Source: California Department of Social Services Public Statement
Date Accessed: 2012-05-11

Source: California Department of Justice Public Disclosure
Date Accessed: 2022-06-27
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Department of Social ServicesDate Accessed: 2023-02-16, and Source: California Department of Social ServicesDate Accessed: 2014-07-17, and Source: CA DMV Data Breach ReportDate Accessed: 2015-11-06, and Source: California Office of the Attorney GeneralDate Accessed: 2022-09-13, and Source: California Department of Public HealthDate Accessed: 2018-05-23, and Source: California Department of JusticeDate Accessed: 2012-05-11, and Source: California Department of Health Care Services, and Source: California Office of the Attorney GeneralDate Accessed: 2017-12-07, and Source: California Department of State Hospitals, and Source: Notification letter, and Source: California Department of Child Support Services, and Source: California Office of the Attorney GeneralDate Accessed: 2024-02-28, and Source: California Department of State Hospitals – CoalingaDate Accessed: 2021-09-03, and Source: California Department of State Hospitals, and Source: California Department of Public Health, and Source: California Office of the Attorney GeneralDate Accessed: 2019-01-25, and Source: California Department of Social Services Public StatementDate Accessed: 2012-05-11, and Source: California Department of Justice Public DisclosureDate Accessed: 2022-06-27, and Source: California Department of State Hospitals Breach Notice.

Investigation Status: Unknown (no follow-up details provided)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Informing Affected Parties, Notification letter with recommendations for identity theft protection, Public disclosure on 2012-05-11, Public disclosure on March 17 and 2021.

Customer Advisories: Credit monitoring services offered to affected employees

Customer Advisories: Public notification issued to IHSS program participants (assumed)
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Credit monitoring services offered to affected employees, Public notification issued to IHSS program participants (assumed), Affected individuals were likely notified as part of regulatory requirements (e.g. and HIPAA)..

Entry Point: Email

Root Causes: Misconfiguration by a third-party contractor

Root Causes: Human Error
Corrective Actions: Corrective actions implemented

Root Causes: Computer Programming Error
Corrective Actions: Issuing New Beneficiary Identification Cards,

Root Causes: Human Error

Root Causes: Human Error

Root Causes: Physical security failure during transit of sensitive documents
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as International Business Machines (Ibm), Iron Mountain Inc., .
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Corrective actions implemented, Issuing New Beneficiary Identification Cards, .
Last Attacking Group: The attacking group in the last incident were an Lockbit, Internal Employee, Internal Employee, Anonymous and Internal Employee.
Most Recent Incident Detected: The most recent incident detected was on 2023-02-16.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2021-03-17.
Most Recent Incident Resolved: The most recent incident resolved was on 2013-01-01.
Most Significant Data Compromised: The most significant data compromised in an incident were names, dates of birth, addresses, Covid-19-related health information, , full name, race, home address, date of birth, date their permit was issued, , 246,000 files and 114,000 folders totaling 75.3GB, Social Security numbers, , Names, Social Security numbers, , names, mailing addresses, dates of birth, Social Security numbers, , Names, Dates of Birth, Physical Descriptions, Driver License Numbers, , names, Client Index Numbers, dates of birth, genders, , names, addresses, Social Security numbers, health insurance details, , Individuals' names, IRS Tax Intercept amounts, IRS collection sources, , names, Social Security numbers, health insurance information, , Names, Financial Account Information, , names, addresses, county case numbers, dates of birth, last four digits of SSNs, , Names, Social Security Numbers, , children's names, addresses, dates of birth, card numbers, EBT account numbers, , patient names, COVID-19 test results, health information, personal information of employees and job applicants, , Social Security Numbers, Other personal information, , Social Security numbers, , names, addresses, Social Security numbers, medical information, , Names, Social Security numbers (SSN), , name, date of birth, age, medications, room number, medical record number, , Full Social Security Numbers, Names, , names, case numbers, birth dates, legal commitments, admission dates, unit numbers, genders, , First Names, Last Names, Dates of Birth, Addresses, Driver’s License Numbers, Social Security Numbers, , Personal Information, , Personal Information, Medical Information, , Employee names, Social Security numbers, , , names, dates of birth, addresses, CCW license numbers, , COVID-19 test results, health information and .
Most Significant System Affected: The most significant system affected in an incident was ebtEDGE Web Admin platform.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was international business machines (ibm), iron mountain inc., .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Steps were taken right away to fix the access issue.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Driver License Numbers, date of birth, Other personal information, IRS collection sources, name, legal commitments, Social Security numbers, addresses, Employee names, full name, health insurance details, room number, Individuals' names, Physical Descriptions, Covid-19-related health information, COVID-19 test results, health information, patient names, 246,000 files and 114,000 folders totaling 75.3GB, names, medical information, mailing addresses, CCW license numbers, dates of birth, case numbers, age, Addresses, admission dates, Full Social Security Numbers, First Names, county case numbers, Last Names, EBT account numbers, birth dates, Social Security Numbers, medical record number, Driver’s License Numbers, Personal Information, Dates of Birth, unit numbers, IRS Tax Intercept amounts, Medical Information, home address, Social Security numbers (SSN), personal information of employees and job applicants, health insurance information, Names, children's names, medications, race, Client Index Numbers, card numbers, last four digits of SSNs, date their permit was issued, Financial Account Information and genders.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 364.5K.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Identity theft protection measures.
Most Recent Source: The most recent source of information about an incident are California Department of State Hospitals, California Department of Justice Public Disclosure, California Department of Social Services, California Department of Health Care Services, California Department of Public Health, California Department of Child Support Services, California Office of the Attorney General, California Department of State Hospitals Breach Notice, CA DMV Data Breach Report, Notification letter, California Department of State Hospitals – Coalinga, California Department of Social Services Public Statement and California Department of Justice.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Unknown (no follow-up details provided).
Most Recent Customer Advisory: The most recent customer advisory issued were an Credit monitoring services offered to affected employees, Public notification issued to IHSS program participants (assumed), Affected individuals were likely notified as part of regulatory requirements (e.g. and HIPAA).
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Email.
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Misconfiguration by a third-party contractor, Human Error, Computer Programming Error, Human Error, Human Error, Physical security failure during transit of sensitive documents.
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Corrective actions implemented, Issuing new Beneficiary Identification Cards.
.png)
Tuleap is a free and open source suite for management of software development and collaboration. Versions of Tuleap Community Edition prior to 17.0.99.1763126988 and Tuleap Enterprise Edition prior to 17.0-3 and 16.13-8 have missing CSRF protections which allow attackers to create or remove tracker triggers. This issue is fixed in Tuleap Community Edition version 17.0.99.1763126988 and Tuleap Enterprise Edition versions 17.0-3 and 16.13-8.
Tuleap is a free and open source suite for management of software development and collaboration. Tuleap Community Editon versions prior to 17.0.99.1762456922 and Tuleap Enterprise Edition versions prior to 17.0-2, 16.13-7 and 16.12-10 are vulnerable to CSRF attacks through planning management API. Attackers have access to create, edit or remove plans. This issue is fixed in Tuleap Community Edition version 17.0.99.1762456922 and Tuleap Enterprise Edtion versions 17.0-2, 16.13-7 and 16.12-10.
Tuleap is an Open Source Suite for management of software development and collaboration. Tuleap Community Edition versions below 17.0.99.1762444754 and Tuleap Enterprise Edition versions prior to 17.0-2, 16.13-7 and 16.12-10 allow attackers trick victims into changing tracker general settings. This issue is fixed in version Tuleap Community Edition version 17.0.99.1762444754 and Tuleap Enterprise Edition versions 17.0-2, 16.13-7 and 16.12-10.
Tuleap is an Open Source Suite for management of software development and collaboration. Versions below 17.0.99.1762431347 of Tuleap Community Edition and Tuleap Enterprise Edition below 17.0-2, 16.13-7 and 16.12-10 allow attackers to access file release system information in projects they do not have access to. This issue is fixed in version 17.0.99.1762431347 of the Tuleap Community Edition and versions 17.0-2, 16.13-7 and 16.12-10 of Tuleap Enterprise Edition.
IBM watsonx.data 2.2 through 2.2.1 could allow an authenticated user to cause a denial of service through ingestion pods due to improper allocation of resources without limits.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.