Comparison Overview

City of Odessa, Texas

VS

U.S. Department of Health and Human Services (HHS)

City of Odessa, Texas

411 W 8th St, Odessa, Texas, 79761, US
Last Update: 2025-03-05 (UTC)
Between 700 and 749

City of Odessa, TX LinkedIn Filled with amazing people, food & places! Social Media - https://tinyurl.com/26ckbwsv

NAICS: 92
NAICS Definition: Public Administration
Employees: 293
Subsidiaries: 0
12-month incidents
0
Known data breaches
1
Attack type number
1

U.S. Department of Health and Human Services (HHS)

200 Independence Avenue S.W., Washington, District of Columbia, US, 20201
Last Update: 2025-10-28 (UTC)
Between 550 and 599

The Department of Health and Human Services (HHS) is the United States government's principal agency for protecting the health of all Americans and providing essential human services, especially for those who are least able to help themselves.

NAICS: 92
NAICS Definition: Public Administration
Employees: 12,802
Subsidiaries: 16
12-month incidents
1
Known data breaches
1
Attack type number
4

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/city-of-odessa-texas.jpeg
City of Odessa, Texas
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/hhsgov.jpeg
U.S. Department of Health and Human Services (HHS)
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
City of Odessa, Texas
100%
Compliance Rate
0/4 Standards Verified
U.S. Department of Health and Human Services (HHS)
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Government Administration Industry Average (This Year)

No incidents recorded for City of Odessa, Texas in 2025.

Incidents vs Government Administration Industry Average (This Year)

U.S. Department of Health and Human Services (HHS) has 47.06% more incidents than the average of same-industry companies with at least one recorded incident.

Incident History — City of Odessa, Texas (X = Date, Y = Severity)

City of Odessa, Texas cyber incidents detection timeline including parent company and subsidiaries

Incident History — U.S. Department of Health and Human Services (HHS) (X = Date, Y = Severity)

U.S. Department of Health and Human Services (HHS) cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/city-of-odessa-texas.jpeg
City of Odessa, Texas
Incidents

Date Detected: 10/2020
Type:Breach
Blog: Blog
https://images.rankiteo.com/companyimages/hhsgov.jpeg
U.S. Department of Health and Human Services (HHS)
Incidents

Date Detected: 6/2025
Type:Ransomware
Attack Vector: Spearphishing campaigns, Remote Monitoring & Management software exploitation, Multifactor authentication bombing, SIM swapping techniques
Motivation: Financial gain
Blog: Blog

Date Detected: 12/2023
Type:Breach
Attack Vector: Network Infiltration
Blog: Blog

Date Detected: 12/2023
Type:Cyber Attack
Blog: Blog

FAQ

City of Odessa, Texas company demonstrates a stronger AI Cybersecurity Score compared to U.S. Department of Health and Human Services (HHS) company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

U.S. Department of Health and Human Services (HHS) company has faced a higher number of disclosed cyber incidents historically compared to City of Odessa, Texas company.

In the current year, U.S. Department of Health and Human Services (HHS) company has reported more cyber incidents than City of Odessa, Texas company.

U.S. Department of Health and Human Services (HHS) company has confirmed experiencing a ransomware attack, while City of Odessa, Texas company has not reported such incidents publicly.

Both U.S. Department of Health and Human Services (HHS) company and City of Odessa, Texas company have disclosed experiencing at least one data breach.

U.S. Department of Health and Human Services (HHS) company has reported targeted cyberattacks, while City of Odessa, Texas company has not reported such incidents publicly.

Neither City of Odessa, Texas company nor U.S. Department of Health and Human Services (HHS) company has reported experiencing or disclosing vulnerabilities publicly.

Neither City of Odessa, Texas nor U.S. Department of Health and Human Services (HHS) holds any compliance certifications.

Neither company holds any compliance certifications.

U.S. Department of Health and Human Services (HHS) company has more subsidiaries worldwide compared to City of Odessa, Texas company.

U.S. Department of Health and Human Services (HHS) company employs more people globally than City of Odessa, Texas company, reflecting its scale as a Government Administration.

Neither City of Odessa, Texas nor U.S. Department of Health and Human Services (HHS) holds SOC 2 Type 1 certification.

Neither City of Odessa, Texas nor U.S. Department of Health and Human Services (HHS) holds SOC 2 Type 2 certification.

Neither City of Odessa, Texas nor U.S. Department of Health and Human Services (HHS) holds ISO 27001 certification.

Neither City of Odessa, Texas nor U.S. Department of Health and Human Services (HHS) holds PCI DSS certification.

Neither City of Odessa, Texas nor U.S. Department of Health and Human Services (HHS) holds HIPAA certification.

Neither City of Odessa, Texas nor U.S. Department of Health and Human Services (HHS) holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Cursor is a code editor built for programming with AI. In versions 1.7.44 and below, various NTFS path quirks allow a prompt injection attacker to circumvent sensitive file protections and overwrite files which Cursor requires human approval to overwrite. Modification of some of the protected files can lead to RCE. Must be chained with a prompt injection or malicious model attach. Only affects systems supporting NTFS. This issue is fixed in version 2.0.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Description

Cursor is a code editor built for programming with AI. In versions 1.7.52 and below, manipulating internal settings may lead to RCE. Cursor detects path manipulation via forward slashes (./.cursor/./././././mcp.json etc.), and requires human approval to complete the operation. However, the same kind of manipulation using backslashes was not correctly detected, allowing an attacker who had already achieved prompt injection or some other level of control to overwrite sensitive editor files without approval on Windows machines. This issue is fixed in version 2.0.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Description

Cursor is a code editor built for programming with AI. In versions 1.7.28 and below, an input validation flaw in Cursor's MCP server installation enables specially crafted deep-links to bypass the standard security warnings and conceal executed commands from users if they choose to accept the server. If an attacker is able to convince a victim to navigate to a malicious deeplink, the victim will not see the correct speedbump modal, and if they choose to accept, will execute commands specified by the attackers deeplink.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Description

LinkAce is a self-hosted archive to collect website links. In versions 2.3.1 and below, the social media sharing functionality contains a Stored Cross-Site Scripting (XSS) vulnerability that allows any authenticated user to inject arbitrary JavaScript by creating a link with malicious HTML in the title field. When a user views the link details page and the shareable links are rendered, the malicious JavaScript executes in their browser. This vulnerability affects multiple sharing services and can be exploited to steal session cookies, perform actions on behalf of users, or deliver malware. This issue is fixed in version 2.4.0.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

CVE-2025-59596 is a denial-of-service vulnerability in Secure Access Windows client versions 12.0 to 14.10 that is addressed in version 14.12. If a local networking policy is active, attackers on an adjacent network may be able to send a crafted packet and cause the client system to crash.

Risk Information
cvss4
Base: 6.0
Severity: LOW
CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X