Company Details
centre-for-life
74
3,749
712
life.org.uk
0
INT_1415237
In-progress

International Centre for Life Company CyberSecurity Posture
life.org.ukThe International Centre for Life (or ‘Life’ as we’re known) was founded in 2000, a pioneering science village in the heart of Newcastle upon Tyne. We are proudly independent, entrepreneurial and quirky – and we are always interested in hearing from people with the talent, drive and skills to help us continue to make a difference. Our purpose is to inspire everyone to explore and enjoy science, and to provide a world-class science hub where life enhancing engagement, research and patient treatment can thrive. Life Science Centre, which opened in May 2000, is the science centre for the North, with the North’s biggest Planetarium, too. Our varied and exciting engagement programme serves families, schools, adults, pre-schoolers and teenagers.
Company Details
centre-for-life
74
3,749
712
life.org.uk
0
INT_1415237
In-progress
Between 750 and 799

ICL Global Score (TPRM)XXXX



No incidents recorded for International Centre for Life in 2025.
No incidents recorded for International Centre for Life in 2025.
No incidents recorded for International Centre for Life in 2025.
ICL cyber incidents detection timeline including parent company and subsidiaries

The International Centre for Life (or ‘Life’ as we’re known) was founded in 2000, a pioneering science village in the heart of Newcastle upon Tyne. We are proudly independent, entrepreneurial and quirky – and we are always interested in hearing from people with the talent, drive and skills to help us continue to make a difference. Our purpose is to inspire everyone to explore and enjoy science, and to provide a world-class science hub where life enhancing engagement, research and patient treatment can thrive. Life Science Centre, which opened in May 2000, is the science centre for the North, with the North’s biggest Planetarium, too. Our varied and exciting engagement programme serves families, schools, adults, pre-schoolers and teenagers.

The Grand Rapids Children's Museum is two floors of hands-on interactive exhibits and daily drop-in programs that encourage discovery and learning through play. Founded in 1992 by four community members, GRCM began as a "museum without walls" until overwhelming community support inspired the board

Museon-Omniversum. De plek die je raakt, vermaakt en aanzet tot actie. Museon-Omniversum inspireert jong en oud om bij te dragen aan een wereld waarin iedereen zich inzet voor elkaar en een leefbare aarde. Ontdek de schoonheid én de uitdagingen van onze aarde met spectaculaire grootbeeldfilms, in

Ubuntu is an Xhosa word that roughly translates to ‘I am what I am because of who we all are.' Our exhibits, learning platforms, workshops, and events help people leverage the spirit of Ubuntu by helping them develop the fundamental tools of cultural and social literacy through hands on, experienti

Museums and nature centers hire Taylor Studios to tell their stories in an engaging way. Through the process of interpretive planning, design, and fabrication, these stories become tangible exhibits that spark visitors’ imaginations. Clients choose to work with Taylor Studios because TSI offers a ba

Nauticus is a maritime discovery center located along the waterfront in downtown, Norfolk offering a unique form of experiential learning for all ages. Through interactive exhibits and STEM to STERN programming, Nauticus uses the museum, Battleship Wisconsin, sailing center, and Schooner Virginia to

The Bell Museum is Minnesota’s official natural history museum, established by the legislature in 1872 and held in trust by the University of Minnesota. For over a century, the museum has preserved and interpreted our state’s rich natural history. The Bell’s collections contain over one million spec
.png)
Our commitment to audit quality. At EY US, we are bringing our bold vision for the future of audit to life with quality at the center,...
The alumni of the National Law School India University (NLSIU) belonging to the Cyber Law and Cyber Forensic programme will hold Cyber Vidhi...
In 2019, Gorden Cheng BS'03 presented a solo recital at UT Dallas where he played the same Steinway piano he practiced on while a student.
Embracing AI to improve health and drive innovation whilst protecting data.
ICAT reportedly plans cybersecurity certification for cars to counter hacking risks, targeting M2M SIM vulnerabilities.
Dr Patricia Esteve-Gonzalez from Oxford University's Global Cyber Security Capacity Centre (GCSCC), Department of Computer Science,...
Explore strategies for optimizing data center infrastructure to balance scalability, reliability and efficiency amid energy demands and...
As we enter 2025, our latest Global Cybersecurity Outlook reveals an unprecedented convergence of challenges reshaping the digital security landscape.
A Deloitte survey reveals that health care executives in six countries are prioritizing efficiency, productivity, and patient engagement in...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of International Centre for Life is http://www.life.org.uk.
According to Rankiteo, International Centre for Life’s AI-generated cybersecurity score is 763, reflecting their Fair security posture.
According to Rankiteo, International Centre for Life currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, International Centre for Life is not certified under SOC 2 Type 1.
According to Rankiteo, International Centre for Life does not hold a SOC 2 Type 2 certification.
According to Rankiteo, International Centre for Life is not listed as GDPR compliant.
According to Rankiteo, International Centre for Life does not currently maintain PCI DSS compliance.
According to Rankiteo, International Centre for Life is not compliant with HIPAA regulations.
According to Rankiteo,International Centre for Life is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
International Centre for Life operates primarily in the Museums, Historical Sites, and Zoos industry.
International Centre for Life employs approximately 74 people worldwide.
International Centre for Life presently has no subsidiaries across any sectors.
International Centre for Life’s official LinkedIn profile has approximately 3,749 followers.
No, International Centre for Life does not have a profile on Crunchbase.
Yes, International Centre for Life maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/centre-for-life.
As of December 02, 2025, Rankiteo reports that International Centre for Life has not experienced any cybersecurity incidents.
International Centre for Life has an estimated 2,131 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, International Centre for Life has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
vLLM is an inference and serving engine for large language models (LLMs). Prior to 0.11.1, vllm has a critical remote code execution vector in a config class named Nemotron_Nano_VL_Config. When vllm loads a model config that contains an auto_map entry, the config class resolves that mapping with get_class_from_dynamic_module(...) and immediately instantiates the returned class. This fetches and executes Python from the remote repository referenced in the auto_map string. Crucially, this happens even when the caller explicitly sets trust_remote_code=False in vllm.transformers_utils.config.get_config. In practice, an attacker can publish a benign-looking frontend repo whose config.json points via auto_map to a separate malicious backend repo; loading the frontend will silently run the backend’s code on the victim host. This vulnerability is fixed in 0.11.1.
fastify-reply-from is a Fastify plugin to forward the current HTTP request to another server. Prior to 12.5.0, by crafting a malicious URL, an attacker could access routes that are not allowed, even though the reply.from is defined for specific routes in @fastify/reply-from. This vulnerability is fixed in 12.5.0.
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to 21.0.2, 20.3.15, and 19.2.17, A Stored Cross-Site Scripting (XSS) vulnerability has been identified in the Angular Template Compiler. It occurs because the compiler's internal security schema is incomplete, allowing attackers to bypass Angular's built-in security sanitization. Specifically, the schema fails to classify certain URL-holding attributes (e.g., those that could contain javascript: URLs) as requiring strict URL security, enabling the injection of malicious scripts. This vulnerability is fixed in 21.0.2, 20.3.15, and 19.2.17.
Gin-vue-admin is a backstage management system based on vue and gin. In 2.8.6 and earlier, attackers can delete any file on the server at will, causing damage or unavailability of server resources. Attackers can control the 'FileMd5' parameter to delete any file and folder.
Portkey.ai Gateway is a blazing fast AI Gateway with integrated guardrails. Prior to 1.14.0, the gateway determined the destination baseURL by prioritizing the value in the x-portkey-custom-host request header. The proxy route then appends the client-specified path to perform an external fetch. This can be maliciously used by users for SSRF attacks. This vulnerability is fixed in 1.14.0.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.