Company Details
codac-behavioral-healthcare-codac-inc-
127
1,044
62133
codacinc.org
0
COD_1550115
In-progress


CODAC Behavioral Healthcare (CODAC Inc.) Company CyberSecurity Posture
codacinc.orgCODAC, a non-profit organization based in Rhode Island, has provided treatment, recovery and prevention services to individuals, families and communities for over 40 years. With seven convenient locations, CODAC is uniquely positioned to provide a wide range of outpatient recovery, treatment and prevention services to adolescents and adults struggling with the challenges of substance abuse, gambling disorders, tobacco use, behavioral healthcare issues, and other addictive or abusive behaviors.
Company Details
codac-behavioral-healthcare-codac-inc-
127
1,044
62133
codacinc.org
0
COD_1550115
In-progress
Between 750 and 799

CBH Global Score (TPRM)XXXX



No incidents recorded for CODAC Behavioral Healthcare (CODAC Inc.) in 2026.
No incidents recorded for CODAC Behavioral Healthcare (CODAC Inc.) in 2026.
No incidents recorded for CODAC Behavioral Healthcare (CODAC Inc.) in 2026.
CBH cyber incidents detection timeline including parent company and subsidiaries

CODAC, a non-profit organization based in Rhode Island, has provided treatment, recovery and prevention services to individuals, families and communities for over 40 years. With seven convenient locations, CODAC is uniquely positioned to provide a wide range of outpatient recovery, treatment and prevention services to adolescents and adults struggling with the challenges of substance abuse, gambling disorders, tobacco use, behavioral healthcare issues, and other addictive or abusive behaviors.

.png)
The Qilin ransomware group listed CODAC Behavioral Healthcare, a nonprofit health care treatment organization, as one of their latest victims.
Since the rise of the pandemic and co-occurring spike in opioid overdoses, medication-assisted treatment (MAT), the standard of care for...
Governor Gina Raimondo has named Rebecca Boss as her choice to lead the Department of Behavioral Healthcare, Developmental Disabilities and...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of CODAC Behavioral Healthcare (CODAC Inc.) is http://www.codacinc.org.
According to Rankiteo, CODAC Behavioral Healthcare (CODAC Inc.)’s AI-generated cybersecurity score is 756, reflecting their Fair security posture.
According to Rankiteo, CODAC Behavioral Healthcare (CODAC Inc.) currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, CODAC Behavioral Healthcare (CODAC Inc.) has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, CODAC Behavioral Healthcare (CODAC Inc.) is not certified under SOC 2 Type 1.
According to Rankiteo, CODAC Behavioral Healthcare (CODAC Inc.) does not hold a SOC 2 Type 2 certification.
According to Rankiteo, CODAC Behavioral Healthcare (CODAC Inc.) is not listed as GDPR compliant.
According to Rankiteo, CODAC Behavioral Healthcare (CODAC Inc.) does not currently maintain PCI DSS compliance.
According to Rankiteo, CODAC Behavioral Healthcare (CODAC Inc.) is not compliant with HIPAA regulations.
According to Rankiteo,CODAC Behavioral Healthcare (CODAC Inc.) is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
CODAC Behavioral Healthcare (CODAC Inc.) operates primarily in the Mental Health Care industry.
CODAC Behavioral Healthcare (CODAC Inc.) employs approximately 127 people worldwide.
CODAC Behavioral Healthcare (CODAC Inc.) presently has no subsidiaries across any sectors.
CODAC Behavioral Healthcare (CODAC Inc.)’s official LinkedIn profile has approximately 1,044 followers.
CODAC Behavioral Healthcare (CODAC Inc.) is classified under the NAICS code 62133, which corresponds to Offices of Mental Health Practitioners (except Physicians).
Yes, CODAC Behavioral Healthcare (CODAC Inc.) has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/codac-behavioral-healthcare.
Yes, CODAC Behavioral Healthcare (CODAC Inc.) maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/codac-behavioral-healthcare-codac-inc-.
As of January 23, 2026, Rankiteo reports that CODAC Behavioral Healthcare (CODAC Inc.) has not experienced any cybersecurity incidents.
CODAC Behavioral Healthcare (CODAC Inc.) has an estimated 5,279 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, CODAC Behavioral Healthcare (CODAC Inc.) has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Improper validation of specified type of input in M365 Copilot allows an unauthorized attacker to disclose information over a network.
Improper access control in Azure Front Door (AFD) allows an unauthorized attacker to elevate privileges over a network.
Azure Entra ID Elevation of Privilege Vulnerability
Moonraker is a Python web server providing API access to Klipper 3D printing firmware. In versions 0.9.3 and below, instances configured with the "ldap" component enabled are vulnerable to LDAP search filter injection techniques via the login endpoint. The 401 error response message can be used to determine whether or not a search was successful, allowing for brute force methods to discover LDAP entries on the server such as user IDs and user attributes. This issue has been fixed in version 0.10.0.
Runtipi is a Docker-based, personal homeserver orchestrator that facilitates multiple services on a single server. Versions 3.7.0 and above allow an authenticated user to execute arbitrary system commands on the host server by injecting shell metacharacters into backup filenames. The BackupManager fails to sanitize the filenames of uploaded backups. The system persists user-uploaded files directly to the host filesystem using the raw originalname provided in the request. This allows an attacker to stage a file containing shell metacharacters (e.g., $(id).tar.gz) at a predictable path, which is later referenced during the restore process. The successful storage of the file is what allows the subsequent restore command to reference and execute it. This issue has been fixed in version 4.7.0.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.