Company Details
cannabis-isao
4
452
519
cannabisisao.org
0
CAN_1622626
In-progress

Cannabis Information Sharing & Analysis Organization (Cannabis ISAO) Company CyberSecurity Posture
cannabisisao.orgThe Cannabis Information Sharing & Analysis Center
Company Details
cannabis-isao
4
452
519
cannabisisao.org
0
CAN_1622626
In-progress
Between 700 and 749

CISAO Global Score (TPRM)XXXX

Description: The Everest ransomware group experienced a significant security breach when their Tor leak site was defaced and subsequently taken offline. This group, known for its ransomware activities and initial access broker operations, has been a threat since 2020, listing more than 200 victims including healthcare organizations. In 2024, the group targeted a U.S. healthcare facility, demonstrating its continuous impact on sensitive sectors. The defacement, which left a message deriding crime, suggests a potential backlash from the cyber community or an inside exit scam, although no party has claimed responsibility. This incident impacts the group's operations by disrupting their communication and data leak platform, likely affecting their extortion capabilities.


No incidents recorded for Cannabis Information Sharing & Analysis Organization (Cannabis ISAO) in 2025.
No incidents recorded for Cannabis Information Sharing & Analysis Organization (Cannabis ISAO) in 2025.
No incidents recorded for Cannabis Information Sharing & Analysis Organization (Cannabis ISAO) in 2025.
CISAO cyber incidents detection timeline including parent company and subsidiaries

The Cannabis Information Sharing & Analysis Center


NielsenIQ (NIQ) is the world’s leading consumer intelligence company, delivering the most complete understanding of consumer buying behavior and revealing new pathways to growth. NIQ combined with GfK in 2023, bringing together the two industry leaders with unparalleled global reach. Today NIQ has

Experian is a global data and technology company, powering opportunities for people and businesses around the world. We help to redefine lending practices, uncover and prevent fraud, simplify healthcare, deliver digital marketing solutions, and gain deeper insights into the automotive market, all us
Wolters Kluwer (EURONEXT: WKL) is a global leader in professional information, software solutions, and services for the healthcare, tax and accounting, financial and corporate compliance, legal and regulatory, and corporate performance and ESG sectors. We help our customers make critical decisions e

CASA is an industry leading association that can provide you with the edge you need to be an effective business owner with a substantial property portfolio and gives you the power to confidently manage your business and structures to enable you, the business owner, to later on become a member of our

We deliver actionable, objective business and technology insights. Our expert guidance and tools enable faster, smarter decisions and stronger performance on an organization’s mission-critical priorities. Our unrivaled combination of business and technology insights steers clients toward the right

Be Part of Progress - together we bring greater understanding to the world Springer Nature is one of the leading publishers of research in the world. We publish the largest number of journals and books and are a pioneer in open research. Through our leading brands, trusted for more than 180 years,
GLG is the world’s largest insight network. We connect decision makers to the right experts so they can act with the confidence that comes from true clarity and have what it takes to get ahead. Our network of experts is the world’s largest source of first-hand expertise, and we recruit hundreds of n
.png)
Scromiting refers to an intense form of illness – a mix of screaming and vomiting – brought on by overindulging in cannabis.
The cannabis industry's digital transformation is creating a new challenge for dispensary owners: cybersecurity.
Washington cannabis dispensary Uncle Ike's is subject to a proposed class action in federal court alleging that it shared information on...
The Senate version of legislation to reopen the federal government includes language to temporarily reinstate two key cyber laws that...
Federal immigration enforcement officials sought a wide range of sensitive information about suspected undocumented immigrants from the IRS,...
GPhC medicinal cannabis supply review flags gaps in information sharing ... The General Pharmaceutical Council (GPhC) has called for stronger...
Senate Homeland Security ranking member Gary Peters (D-Mich.) plans to introduce a new bill to reauthorize a foundational cybersecurity...
A key law that helps the federal government guard against cyber threats to U.S. critical systems expired as the government shut down...
The fight to reinstate a bedrock cyber threat-sharing law that expired on Tuesday continued on Capitol Hill on Wednesday in between fiery...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Cannabis Information Sharing & Analysis Organization (Cannabis ISAO) is http://www.cannabisisao.org.
According to Rankiteo, Cannabis Information Sharing & Analysis Organization (Cannabis ISAO)’s AI-generated cybersecurity score is 735, reflecting their Moderate security posture.
According to Rankiteo, Cannabis Information Sharing & Analysis Organization (Cannabis ISAO) currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Cannabis Information Sharing & Analysis Organization (Cannabis ISAO) is not certified under SOC 2 Type 1.
According to Rankiteo, Cannabis Information Sharing & Analysis Organization (Cannabis ISAO) does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Cannabis Information Sharing & Analysis Organization (Cannabis ISAO) is not listed as GDPR compliant.
According to Rankiteo, Cannabis Information Sharing & Analysis Organization (Cannabis ISAO) does not currently maintain PCI DSS compliance.
According to Rankiteo, Cannabis Information Sharing & Analysis Organization (Cannabis ISAO) is not compliant with HIPAA regulations.
According to Rankiteo,Cannabis Information Sharing & Analysis Organization (Cannabis ISAO) is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Cannabis Information Sharing & Analysis Organization (Cannabis ISAO) operates primarily in the Information Services industry.
Cannabis Information Sharing & Analysis Organization (Cannabis ISAO) employs approximately 4 people worldwide.
Cannabis Information Sharing & Analysis Organization (Cannabis ISAO) presently has no subsidiaries across any sectors.
Cannabis Information Sharing & Analysis Organization (Cannabis ISAO)’s official LinkedIn profile has approximately 452 followers.
Cannabis Information Sharing & Analysis Organization (Cannabis ISAO) is classified under the NAICS code 519, which corresponds to Other Information Services.
No, Cannabis Information Sharing & Analysis Organization (Cannabis ISAO) does not have a profile on Crunchbase.
Yes, Cannabis Information Sharing & Analysis Organization (Cannabis ISAO) maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/cannabis-isao.
As of December 15, 2025, Rankiteo reports that Cannabis Information Sharing & Analysis Organization (Cannabis ISAO) has experienced 1 cybersecurity incidents.
Cannabis Information Sharing & Analysis Organization (Cannabis ISAO) has an estimated 2,362 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Title: Everest Ransomware Group Tor Leak Site Defacement
Description: The Everest ransomware group experienced a significant security breach when their Tor leak site was defaced and subsequently taken offline. This group, known for its ransomware activities and initial access broker operations, has been a threat since 2020, listing more than 200 victims including healthcare organizations. In 2024, the group targeted a U.S. healthcare facility, demonstrating its continuous impact on sensitive sectors. The defacement, which left a message deriding crime, suggests a potential backlash from the cyber community or an inside exit scam, although no party has claimed responsibility. This incident impacts the group's operations by disrupting their communication and data leak platform, likely affecting their extortion capabilities.
Type: Defacement
Attack Vector: Defacement of Tor leak site
Threat Actor: Unknown
Motivation: Potential backlash from the cyber community or an inside exit scam
Common Attack Types: The most common types of attacks the company has faced is Breach.

Systems Affected: Tor leak site
Operational Impact: Disruption of communication and data leak platform

Entity Name: Everest Ransomware Group
Entity Type: Cybercriminal Group
Industry: Cybercrime
Last Attacking Group: The attacking group in the last incident was an Unknown.
.png)
NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.
uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.
A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."
MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.
A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.