Company Details
colorado-group-psychotherapy-society
1
33
621
cogps.org
0
FOU_1648875
In-progress


Four Corners Group Psychotherapy Society Company CyberSecurity Posture
cogps.orgThe Four Corners Group Psychotherapy Society has been created to foster and encourage quality education and training around Group Psychotherapy. We aim to embrace all forms of group treatment and to create dialogue between differing schools of thought. FCGPS will be the gathering place for group leaders of all backgrounds, orientations, and affiliations. We are an affiliate society of the American Group Psychotherapy Association and work to promote their mission in the Four Corners Region. Our goal is to deepen our clinician’s understanding of group treatment so that they can be of better service to their clients. We also aim to encourage the development of local group leaders and psychotherapy techniques and propel them to the national stage.
Company Details
colorado-group-psychotherapy-society
1
33
621
cogps.org
0
FOU_1648875
In-progress
Between 750 and 799

FCGPS Global Score (TPRM)XXXX



No incidents recorded for Four Corners Group Psychotherapy Society in 2026.
No incidents recorded for Four Corners Group Psychotherapy Society in 2026.
No incidents recorded for Four Corners Group Psychotherapy Society in 2026.
FCGPS cyber incidents detection timeline including parent company and subsidiaries

The Four Corners Group Psychotherapy Society has been created to foster and encourage quality education and training around Group Psychotherapy. We aim to embrace all forms of group treatment and to create dialogue between differing schools of thought. FCGPS will be the gathering place for group leaders of all backgrounds, orientations, and affiliations. We are an affiliate society of the American Group Psychotherapy Association and work to promote their mission in the Four Corners Region. Our goal is to deepen our clinician’s understanding of group treatment so that they can be of better service to their clients. We also aim to encourage the development of local group leaders and psychotherapy techniques and propel them to the national stage.


Minnesota Autism Center (MAC) Midwest provides therapeutic services to children and adolescents between the ages of 18 months to 21 years who have autism spectrum disorder (ASD). Our services are center-based and in-home, utilizing several therapeutic modalities all based on the principles of appl

Behavioral Learning Network was founded in 2013 to meet the growing need for quality behavior intervention services for individuals diagnosed with autism spectrum disorder. Behavioral Learning Network provides one-to-one services in the home, community or school setting as well as assessments and co

Mindjurny is an evidence-based emotional wellbeing support tool for schools, safe and easy to use. Features include, essential resources and recorded video workshops tailored for young people and parents/carers, providing valuable guidance and support. Mindjurny can help to increase awareness and

Families Together Inc. is dedicated to providing quality services to our exceptional children, families and adults. FTI will provide services that are culturally aware, strength based, competency based and in partnership with consumers and stakeholders. FTI will assist consumers in building natural

The Children's Home has served Western North Carolina as a safe place for children and their families for more than a century. With campuses in Winston-Salem and Franklin, The Children's Home has remained a nimble provider of care, serving as a welcoming place for children who have no one, and a li

Vinland National Center is dedicated to full lives for people with disabilities. For more than 30 years, we have helped individuals with multiple disabilities live productive and fulfilling lives through a whole-person approach that addresses the mind, body and spirit. We are well-known for meeting

Lotus Counseling Group is a trusted brand for mental health services, consultation, and training. We specialize in relationship therapy with a focus on couples, individuals, and families. We are also trauma-inform clinicians who work to empower, search for strengths, and forge connections in your re

A Change in Trajectory, Inc. (ACT) is a family-oriented agency that’s committed to narrowing the gap between the developmental path of individuals with special needs and those with typical development. We provide comprehensive behavioral services for infants, children, adolescents, and young adults

The Anne Sippi Clinic treatment groups mission is to help individuals to restore a happy and meaningful life with its inherent civil liberties. We partner with consumers, family members, community members, service providers, and agencies. We consider this partnership to be fundamental in assisting i
.png)
Hacker's Movie Guide” with Foreword by Steve Wozniak, co-founder of Apple.
Hackers demonstrated they can take over Twitter's technology infrastructure, a brazen move that hints at how such an attack could...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Four Corners Group Psychotherapy Society is http://www.cogps.org.
According to Rankiteo, Four Corners Group Psychotherapy Society’s AI-generated cybersecurity score is 754, reflecting their Fair security posture.
According to Rankiteo, Four Corners Group Psychotherapy Society currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Four Corners Group Psychotherapy Society has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Four Corners Group Psychotherapy Society is not certified under SOC 2 Type 1.
According to Rankiteo, Four Corners Group Psychotherapy Society does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Four Corners Group Psychotherapy Society is not listed as GDPR compliant.
According to Rankiteo, Four Corners Group Psychotherapy Society does not currently maintain PCI DSS compliance.
According to Rankiteo, Four Corners Group Psychotherapy Society is not compliant with HIPAA regulations.
According to Rankiteo,Four Corners Group Psychotherapy Society is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Four Corners Group Psychotherapy Society operates primarily in the Mental Health Care industry.
Four Corners Group Psychotherapy Society employs approximately 1 people worldwide.
Four Corners Group Psychotherapy Society presently has no subsidiaries across any sectors.
Four Corners Group Psychotherapy Society’s official LinkedIn profile has approximately 33 followers.
No, Four Corners Group Psychotherapy Society does not have a profile on Crunchbase.
Yes, Four Corners Group Psychotherapy Society maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/colorado-group-psychotherapy-society.
As of January 21, 2026, Rankiteo reports that Four Corners Group Psychotherapy Society has not experienced any cybersecurity incidents.
Four Corners Group Psychotherapy Society has an estimated 5,282 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Four Corners Group Psychotherapy Society has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g., execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.