Company Details
city-of-killeen-texas
519
3,741
92
killeentexas.gov
0
CIT_2810269
In-progress

City of Killeen, Texas Company CyberSecurity Posture
killeentexas.govSummary With the adoption of the City Charter in 1949, the council-manager form of government under which the City of Killeen currently operates was established. The mayor is the City’s chief elected officer, but has no administrative power. The mayor presides over the City’s seven member City Council, which sets all policy. The operations of the City are overseen by a city manager appointed by the council. The citizens elect a mayor and three council members at large. The other four council members represent specific districts of the City and are elected by voters living in their districts. Terms for the mayor and all council members are two years, with a three-consecutive-term limitation for each office. The City holds nonpartisan elections each May. The mayor and the at-large council members are elected in even-numbered years, and the four district council members are elected in odd-numbered years. Mission Dedicated Service - Every Day, for Everyone! Description #3 Most Affordable Places to Live (Kiplinger.com) #5 Best Performing City in the Nation (Milken Institute) #5 Strongest Economy in Texas (Policom) #7 Happiest Cities for Work (CareerBliss.com) #8 Strongest Economy in the Nation (Policcom) #19 Best Cities for College Students (American Institute of Economic Research) National Register of Historic Places (National Park Service) GO TEXAN Certified Retirement Community (Texas Department of Agriculture) Playful City USA (KaBOOM!) Tree City USA (Arbor Day Foundation)
Company Details
city-of-killeen-texas
519
3,741
92
killeentexas.gov
0
CIT_2810269
In-progress
Between 750 and 799

CKT Global Score (TPRM)XXXX

Description: The City of Killeen's website was hit by a targeted cyberattack in August 2016. Visitors to the Killeen's website were welcomed with a message of “HACKED BY llJACKSPARROWll” along with an image of a Turkish Flag and Turkey President Recep Tayyip Erdogan. They immediately started an investigation and restored the website.


No incidents recorded for City of Killeen, Texas in 2025.
No incidents recorded for City of Killeen, Texas in 2025.
No incidents recorded for City of Killeen, Texas in 2025.
CKT cyber incidents detection timeline including parent company and subsidiaries

Summary With the adoption of the City Charter in 1949, the council-manager form of government under which the City of Killeen currently operates was established. The mayor is the City’s chief elected officer, but has no administrative power. The mayor presides over the City’s seven member City Council, which sets all policy. The operations of the City are overseen by a city manager appointed by the council. The citizens elect a mayor and three council members at large. The other four council members represent specific districts of the City and are elected by voters living in their districts. Terms for the mayor and all council members are two years, with a three-consecutive-term limitation for each office. The City holds nonpartisan elections each May. The mayor and the at-large council members are elected in even-numbered years, and the four district council members are elected in odd-numbered years. Mission Dedicated Service - Every Day, for Everyone! Description #3 Most Affordable Places to Live (Kiplinger.com) #5 Best Performing City in the Nation (Milken Institute) #5 Strongest Economy in Texas (Policom) #7 Happiest Cities for Work (CareerBliss.com) #8 Strongest Economy in the Nation (Policcom) #19 Best Cities for College Students (American Institute of Economic Research) National Register of Historic Places (National Park Service) GO TEXAN Certified Retirement Community (Texas Department of Agriculture) Playful City USA (KaBOOM!) Tree City USA (Arbor Day Foundation)


The United States Department of Agriculture is the United States federal executive department responsible for developing and executing U.S. federal government policy on farming, agriculture, and food. It aims to meet the needs of farmers and ranchers, promote agricultural trade and production, work

The Government of Canada works on behalf of Canadians, both at home and abroad. Visit www.Canada.ca to learn more. Canada’s professional, non-partisan public service is among the best in the world, and many of its departments and agencies place in Canada’s Top 100 Employers year after year. If you

At the Home Office, we help to ensure that the country is safe and secure. We’ve been looking after UK citizens since 1782. We are responsible for: - working on the problems caused by illegal drug use - shaping the alcohol strategy, policy and licensing conditions - keeping the United Kingdom safe

The City of Los Angeles employs more than 45,000 people in a wide range of careers. Visit our website for information on current openings, including regular civil service positions, exempt and emergency appointment opportunities, in addition to internships! The City of Los Angeles is a Mayor-Counci

Il ministero dell'Interno è una struttura complessa il cui assetto organizzativo è disciplinato dal D.L.vo n. 300/99 e dai provvedimenti attuativi. A livello centrale, si articola in uffici di diretta collaborazione con il ministro (D.P.R. n. 98/2002) e cinque dipartimenti (D.P.R. n. 398/2001 e succ

Welcome to the official WA Government page where you can stay up to date on the latest information about Western Australia and WA government initiatives. Questions relating to a specific activity within the WA Government should be referred to the relevant Department or Minister’s Office for a re

Our mission is to promote student achievement and preparation for global competitiveness by fostering educational excellence and ensuring equal access. ED is dedicated to: • Establishing policies on federal financial aid for education, and distributing as well as monitoring those funds. • Collect

The Commission represents and upholds the interests of the EU as a whole, and is independent of national governments. The European Commission prepares legislation for adoption by the Council (representing the member countries) and the Parliament (representing the citizens). It administers the budge

EThekwini Municipality is a Metropolitan Municipality found in the South African province of KwaZulu-Natal. Home to the world-famous city of Durban. EThekwini is the largest City in the province and the third largest city in the country. It is a sophisticated cosmopolitan city of over 3 468 088 peop
.png)
Killeen residents have filed recall petitions against two city councilmembers, accusing them of ignoring community concerns over...
KILLEEN, Texas and NORTH SIOUX CITY, S.D., June 24, 2025 (GLOBE NEWSWIRE) -- Centex Technologies, a four-time Inc. 5000 honoree and leading...
House Bill 150 establishes the Texas Cyber Command at The University of Texas at San Antonio.
Abilene city officials said the April 18 cyberattack is still causing network issues.
ABILENE, Texas (KTAB/KRBC) – The City of Abilene has confirmed a ransom was demanded after hackers stole 477 gigabytes worth of data during...
Killeen, Texas, is rising as a notable tech hub in 2025, driven by robust infrastructure and partnerships with Central Texas College and...
Explore cybersecurity job trends in Killeen, Texas for 2025. Discover growth areas, key opportunities, and local educational initiatives.
In 2025, Killeen offers top tech education options with affordable tuition, adaptable programs, and high completion rates.
In 2025, Killeen, Texas emerges as a top tech destination, offering immense career opportunities in software development, data science,...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of City of Killeen, Texas is http://www.killeentexas.gov.
According to Rankiteo, City of Killeen, Texas’s AI-generated cybersecurity score is 762, reflecting their Fair security posture.
According to Rankiteo, City of Killeen, Texas currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, City of Killeen, Texas is not certified under SOC 2 Type 1.
According to Rankiteo, City of Killeen, Texas does not hold a SOC 2 Type 2 certification.
According to Rankiteo, City of Killeen, Texas is not listed as GDPR compliant.
According to Rankiteo, City of Killeen, Texas does not currently maintain PCI DSS compliance.
According to Rankiteo, City of Killeen, Texas is not compliant with HIPAA regulations.
According to Rankiteo,City of Killeen, Texas is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
City of Killeen, Texas operates primarily in the Government Administration industry.
City of Killeen, Texas employs approximately 519 people worldwide.
City of Killeen, Texas presently has no subsidiaries across any sectors.
City of Killeen, Texas’s official LinkedIn profile has approximately 3,741 followers.
City of Killeen, Texas is classified under the NAICS code 92, which corresponds to Public Administration.
No, City of Killeen, Texas does not have a profile on Crunchbase.
Yes, City of Killeen, Texas maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/city-of-killeen-texas.
As of December 21, 2025, Rankiteo reports that City of Killeen, Texas has experienced 1 cybersecurity incidents.
City of Killeen, Texas has an estimated 11,755 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with restored the website..
Title: Cyberattack on City of Killeen's Website
Description: The City of Killeen's website was hit by a targeted cyberattack in August 2016. Visitors to the Killeen's website were welcomed with a message of “HACKED BY llJACKSPARROWll” along with an image of a Turkish Flag and Turkey President Recep Tayyip Erdogan. They immediately started an investigation and restored the website.
Date Detected: 2016-08
Type: Website Defacement
Attack Vector: Website Defacement
Threat Actor: llJACKSPARROWll
Motivation: Political
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Systems Affected: City of Killeen's Website

Entity Name: City of Killeen
Entity Type: Government
Industry: Public Administration
Location: Killeen, Texas, USA

Remediation Measures: Restored the website
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Restored the website, .
Last Attacking Group: The attacking group in the last incident was an llJACKSPARROWll.
Most Recent Incident Detected: The most recent incident detected was on 2016-08.
Most Significant System Affected: The most significant system affected in an incident was City of Killeen's Website.
.png)
Versa SASE Client for Windows versions released between 7.8.7 and 7.9.4 contain a local privilege escalation vulnerability in the audit log export functionality. The client communicates user-controlled file paths to a privileged service, which performs file system operations without impersonating the requesting user. Due to improper privilege handling and a time-of-check time-of-use race condition combined with symbolic link and mount point manipulation, a local authenticated attacker can coerce the service into deleting arbitrary directories with SYSTEM privileges. This can be exploited to delete protected system folders such as C:\\Config.msi and subsequently achieve execution as NT AUTHORITY\\SYSTEM via MSI rollback techniques.
The WP JobHunt plugin for WordPress, used by the JobCareer theme, is vulnerable to unauthorized modification of data due to a missing capability check on the 'cs_update_application_status_callback' function in all versions up to, and including, 7.7. This makes it possible for authenticated attackers, with Candidate-level access and above, to inject cross-site scripting into the 'status' parameter of applied jobs for any user.
The WP JobHunt plugin for WordPress, used by the JobCareer theme, is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 7.7 via the 'cs_update_application_status_callback' due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Candidate-level access and above, to send a site-generated email with injected HTML to any user.
The FiboSearch – Ajax Search for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `thegem_te_search` shortcode in all versions up to, and including, 1.32.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This vulnerability requires TheGem theme (premium) to be installed with Header Builder mode enabled, and the FiboSearch "Replace search bars" option enabled for TheGem integration.
The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.11.0 via the ajax_get_members function. This is due to the use of a predictable low-entropy token (5 hex characters derived from md5 of post ID) to identify member directories and insufficient authorization checks on the unauthenticated AJAX endpoint. This makes it possible for unauthenticated attackers to extract sensitive data including usernames, display names, user roles (including administrator accounts), profile URLs, and user IDs by enumerating predictable directory_id values or brute-forcing the small 16^5 token space.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.