Company Details
celeriumdefense
41
1,419
541514
celerium.com
0
CEL_1586270
In-progress

Celerium Company CyberSecurity Posture
celerium.comCelerium powers active cyber defense solutions to help organizations detect, prevent, and contain data breaches.
Company Details
celeriumdefense
41
1,419
541514
celerium.com
0
CEL_1586270
In-progress
Between 600 and 649

Celerium Global Score (TPRM)XXXX

Description: The tidal wave of data Data is undoubtedly a key asset today, but all it takes is a breach to turn it into a dreaded liability. With more data generated than ever, organizations have a hard time tracking and storing it. Approximately 402.74 million terabytes of data are produced each day on average. To put this into perspective, this amount of storage can hold roughly 100 billion high-definition movies. Does more data mean more risks? With GenAI in play, data generation has skyrocketed further. However, the lack of data security measures leads to data breaches, often causing operational and financial disruptions, and also inviting regulatory intervention. There are many examples of weak security policies leading to breaches. Change Healthcare, a US-based technology company, suffered a ransomware attack that caused a data breach affecting 190 million US citizens. Such examples compel regulatory bodies to further flex their muscles. Approximately 79% of countries (155 out of 194) have some form of data protection and privacy legislation in place. shutterstock/Gorodenkoff The situation demands data security measures Solutions such as data security posture management (DSPM) enable real-time discovery and classification of sensitive data across multi-cloud and on-premises environments, reducing the risk of exposure. AI-driven DSPM solution automates risk assessments, detect anomalous data movements, and enforce security policies dynamically, ensuring proactive protection a


Celerium has 104.08% more incidents than the average of same-industry companies with at least one recorded incident.
Celerium has 53.85% more incidents than the average of all companies with at least one recorded incident.
Celerium reported 1 incidents this year: 0 cyber attacks, 1 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
Celerium cyber incidents detection timeline including parent company and subsidiaries

Celerium powers active cyber defense solutions to help organizations detect, prevent, and contain data breaches.


CrowdStrike (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk — endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-clas
Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest s
.png)
Celerium is proud to be recognized by the American Hospital Association (AHA) as a Preferred Cybersecurity Provider for Data Breach Defense.
PRNewswire/ -- Holiday weekends are prime time for cyberattacks, particularly for healthcare organizations. To counter this growing threat,...
LAST YEAR: 1.9. CHANGE: 4% AGE: 74. RESIDENCE: Brentwood SOURCE OF WEALTH: Technology. THE MONEY: Chernick launched software firm Candle...
Celerium's acquisition of Dark Cubed triggers a shift from cyber threat sharing to active defense for its customers and the MSP partners.
PRNewswire/ -- Celerium Inc., a leader in innovative cyber defense solutions, today announced it has acquired Dark Cubed,...
Now is the time for defense contractors to explore the Cybersecurity Maturity Model Certification (CMMC) program requirements.
PRNewswire/ -- NC4®, a leader in revolutionizing safety and security solutions, announced today the formation of Celerium, which will focus...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Celerium is http://www.celerium.com.
According to Rankiteo, Celerium’s AI-generated cybersecurity score is 638, reflecting their Poor security posture.
According to Rankiteo, Celerium currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Celerium is not certified under SOC 2 Type 1.
According to Rankiteo, Celerium does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Celerium is not listed as GDPR compliant.
According to Rankiteo, Celerium does not currently maintain PCI DSS compliance.
According to Rankiteo, Celerium is not compliant with HIPAA regulations.
According to Rankiteo,Celerium is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Celerium operates primarily in the Computer and Network Security industry.
Celerium employs approximately 41 people worldwide.
Celerium presently has no subsidiaries across any sectors.
Celerium’s official LinkedIn profile has approximately 1,419 followers.
Celerium is classified under the NAICS code 541514, which corresponds to Others.
No, Celerium does not have a profile on Crunchbase.
Yes, Celerium maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/celeriumdefense.
As of December 08, 2025, Rankiteo reports that Celerium has experienced 1 cybersecurity incidents.
Celerium has an estimated 2,946 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
A vulnerability has been found in TykoDev cherry-studio-TykoFork 0.1. This issue affects the function redirectToAuthorization of the file /.well-known/oauth-authorization-server of the component OAuth Server Discovery. Such manipulation of the argument authorizationUrl leads to os command injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.
A flaw has been found in code-projects Question Paper Generator up to 1.0. This vulnerability affects unknown code of the file /selectquestionuser.php. This manipulation of the argument subid causes sql injection. Remote exploitation of the attack is possible. The exploit has been published and may be used.
A vulnerability was found in alokjaiswal Hotel-Management-services-using-MYSQL-and-php up to 5f8b60a7aa6c06a5632de569d4e3f6a8cd82f76f. Affected by this vulnerability is an unknown functionality of the file /dishsub.php. The manipulation of the argument item.name results in cross site scripting. It is possible to launch the attack remotely. The exploit has been made public and could be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability has been found in alokjaiswal Hotel-Management-services-using-MYSQL-and-php up to 5f8b60a7aa6c06a5632de569d4e3f6a8cd82f76f. Affected is an unknown function of the file /usersub.php of the component Request Pending Page. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
A flaw has been found in Verysync 微力同步 up to 2.21.3. This impacts an unknown function of the file /rest/f/api/resources/f96956469e7be39d/tmp/text.txt?override=false of the component Web Administration Module. Executing manipulation can lead to unrestricted upload. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.