Company Details
conduent
36,834
523,798
5415
conduent.com
0
CON_3224842
In-progress

Conduent Company CyberSecurity Posture
conduent.comConduent delivers digital business solutions and services spanning the commercial, government and transportation spectrum – creating valuable outcomes for its clients and the millions of people who count on them. We leverage cloud computing, artificial intelligence, machine learning, automation and advanced analytics to deliver mission-critical solutions. Through a dedicated global team of approximately 55,000 associates, process expertise and advanced technologies, our solutions and services digitally transform our clients’ operations to enhance customer experiences, improve performance, increase efficiencies and reduce costs. We drive progress in every process for our client including disbursing approximately $100 billion in government payments annually, enabling 2.3 billion customer service interactions annually, empowering millions of employees through HR services every year and processing nearly 13 million tolling transactions every day. Learn more at www.conduent.com
Company Details
conduent
36,834
523,798
5415
conduent.com
0
CON_3224842
In-progress
Between 0 and 549

Conduent Global Score (TPRM)XXXX

Description: Conduent, a New Jersey-based business process outsourcing firm, suffered the largest known health data breach of 2025, exposing sensitive healthcare records. The incident triggered multiple post-hack lawsuits and regulatory investigations, with severe reputational and financial repercussions. The breach compromised personal and medical data of countless individuals, leading to potential identity theft, fraud, and legal liabilities. The fallout includes operational disruptions, loss of client trust, and escalating compliance penalties. Given the scale of the breach—affecting healthcare data—it poses long-term risks to affected patients, including exposure of protected health information (PHI) and potential misuse by malicious actors. The company faces mounting legal costs, reputational damage, and possible contractual terminations from partners wary of further vulnerabilities. The breach underscores systemic failures in cybersecurity governance, amplifying scrutiny from regulators and stakeholders.
Description: Conduent Business Services LLC faced a **prolonged data breach** exposing **sensitive personal and health information** of individuals, leading to multiple **class-action lawsuits** in New Jersey federal court. The breach allegedly stemmed from **inadequate security measures**, allowing unauthorized access to confidential data over an extended period. The compromised information likely included **personally identifiable information (PII) and protected health information (PHI)**, heightening risks of identity theft, financial fraud, and reputational harm for affected individuals. The lawsuits accuse Conduent of **negligence in safeguarding data**, failing to detect or mitigate the breach promptly, and not providing timely notifications to victims. The incident underscores systemic vulnerabilities in the company’s cybersecurity framework, with potential long-term consequences for **customer trust, regulatory compliance, and financial stability**. The breach’s duration and the nature of the exposed data suggest a **high-severity impact**, particularly given the involvement of health records, which are highly regulated and sensitive.
Description: Back-office services provider **Conduent** disclosed a cyberattack in January 2025 that exposed data of **10.5 million individuals**, primarily from healthcare insurance clients like **Blue Cross Blue Shield of Montana (462,000 members affected)**. The breach, active from **October 21, 2024, to January 13, 2025**, involved unauthorized access to a 'limited portion' of its IT environment, with attackers exfiltrating files tied to multiple clients. Financial fallout includes **$50 million spent** ($25M on incident response, $25M on breach notifications), alongside **12 class-action lawsuits**, regulatory investigations (e.g., Montana), and warnings of potential **litigation, reputational harm, and regulatory penalties**. The company admitted the attack could adversely impact its financial condition, with ongoing risks from **data theft, legal actions, and operational disruptions**. No ransomware was confirmed, but the scale of exposed **personal and health data** suggests severe long-term consequences for affected individuals and partner organizations.
Description: On February 19, 2025, Conduent disclosed a cyber incident that took place on January 13, 2025. The company promptly engaged Kroll, a leading cybersecurity firm, to conduct a forensic investigation into the potential data impacts of the breach. Preliminary findings confirmed that **no client data was compromised** during the attack, and there was no evidence of unauthorized access to sensitive information. Conduent successfully restored and secured all affected systems, with no further malicious activity detected post-incident. While the nature of the attack was not explicitly detailed, the lack of data exfiltration or operational disruption suggests the incident was contained before significant harm could occur. The company’s swift response and transparency in reporting the event helped mitigate reputational risks, though the incident itself highlights ongoing vulnerabilities in enterprise cybersecurity defenses. No ransom demands, system outages, or financial losses were reported, reinforcing the limited scope of the breach.
Description: Hackers targeted Georgia’s SNAP benefits call center, operated by **Conduent**, via a cyberattack on its **interactive voice response (IVR) system** using bots. The attack disrupted services, forcing system downtime over the weekend and again on Tuesday, while attempting to improperly access **EBT account information** (including benefit balances). Though unconfirmed, the breach aligns with broader **international crime ring activities** cloning POS terminals to steal **hundreds of millions in taxpayer-funded SNAP benefits**—with a **350% fraud surge in Q4 2024**. Authorities urged cardholders to change PINs and lock accounts via Conduent’s **ConnectEBT app**, highlighting systemic vulnerabilities in third-party benefit distribution systems. The incident compounds ongoing **EBT scams** where funds vanish within minutes across multiple states, often through unauthorized retailers. Conduent acknowledged 'unusual call spikes' but avoided confirming a breach, citing generic fraud prevention measures like 'intelligent voice detection.'
Description: Conduent, a leading U.S. government contractor managing critical public services (e.g., Medicaid, child support, food assistance, and toll systems), suffered a **cyberattack** lasting nearly **three months** (October 2024–January 2025). Hackers, later identified as the **SafePay ransomware group**, exfiltrated **8.5 terabytes of data**, compromising **personal information of over 10 million individuals** across multiple states, including **Social Security numbers, medical records, and health insurance details**. The breach disrupted operations, causing **system outages** in states like Wisconsin, where beneficiaries couldn’t process payments for welfare programs. While Conduent claims no evidence of data misuse or dark web publication yet, the scale of the theft—affecting **400,000+ in Texas alone**—poses long-term risks of **identity theft, fraud, and exploitation of public benefit systems**. The company restored operations after containing the breach but faces scrutiny over its cybersecurity preparedness, given its role in handling **$85 billion in annual disbursements** and supporting **100 million residents** through government programs.
Description: Conduent, a publicly traded company spun off from Xerox in 2017, suffered a **cyberattack in October 2024** that compromised **personal and health data of 10.5 million individuals**, including names, Social Security numbers, medical records, and health insurance details. The breach, attributed to the **SafePay ransomware gang**, involved **8.5 TB of stolen data**, with the group threatening to leak it. Affected entities include major insurers (**Blue Cross Blue Shield of Montana, Texas, Humana, Premera**) and state agencies (**Wisconsin DCF, Oklahoma DHS—though the latter denied impact**). Conduent delayed disclosure for **nearly 10 months**, sparking **nine federal class-action lawsuits** alleging negligence in data security. The incident disrupted services, triggered regulatory probes (e.g., **Montana’s investigation into delayed notifications**), and forced Conduent to offer **credit monitoring to victims**. The breach ranks among the **largest health data breaches of 2025**, with potential systemic risks to insurers and government services.
Description: The Conduent data breach, attributed to the **SafePay ransomware group**, compromised the sensitive personal and financial data of **over 10.5 million individuals** across multiple U.S. states. The incident exposed vulnerabilities in Conduent’s cybersecurity framework, leading to severe reputational damage, investor distrust, and a **36% stock decline** over the past year. The breach’s financial and operational fallout includes potential **legal penalties from regulatory bodies (e.g., FTC)**, class-action lawsuits from affected individuals, and long-term erosion of client confidence. The exposed data—likely including identities and financial records—heightens risks of **identity theft, fraud, and financial exploitation**. Market volatility, evidenced by a **daily stock drop of 0.216%**, reflects immediate financial repercussions, while upcoming earnings reports (November 7, 2025) may further clarify the breach’s economic toll. The incident underscores systemic failures in data protection, demanding urgent reforms to mitigate future threats and restore stakeholder trust.
Description: The operations of Conduent in Europe were disrupted by a ransomware attack and data related to customer audits was breached in the incident. The data stolen in the attack was apparently posted by the Maze ransomware group on its Dark web page.


Conduent has 614.29% more incidents than the average of same-industry companies with at least one recorded incident.
Conduent has 515.38% more incidents than the average of all companies with at least one recorded incident.
Conduent reported 4 incidents this year: 1 cyber attacks, 1 ransomware, 0 vulnerabilities, 2 data breaches, compared to industry peers with at least 1 incident.
Conduent cyber incidents detection timeline including parent company and subsidiaries

Conduent delivers digital business solutions and services spanning the commercial, government and transportation spectrum – creating valuable outcomes for its clients and the millions of people who count on them. We leverage cloud computing, artificial intelligence, machine learning, automation and advanced analytics to deliver mission-critical solutions. Through a dedicated global team of approximately 55,000 associates, process expertise and advanced technologies, our solutions and services digitally transform our clients’ operations to enhance customer experiences, improve performance, increase efficiencies and reduce costs. We drive progress in every process for our client including disbursing approximately $100 billion in government payments annually, enabling 2.3 billion customer service interactions annually, empowering millions of employees through HR services every year and processing nearly 13 million tolling transactions every day. Learn more at www.conduent.com

At CDW, we know how to make technology work so people can do great things. Our experts bring a full-stack, full-lifestyle approach with custom solutions, services and relationships to bring your vision to life. Through decades of experience, scale, and deep industry expertise, we deliver the full

Founded in 1982 by a small group of entrepreneurs, Softtek started out in Mexico providing local IT services, and today is a global leader in next-generation digital solutions. The first company to introduce the Nearshore model, Softtek helps Global 2000 organizations build their digital capabilitie

Accenture is a global professional services company with leading capabilities in digital, cloud and security. Combining unmatched experience and specialized skills across more than 40 industries, we offer Strategy and Consulting, Interactive, Technology and Operations services — all powered by the w

eClerx is a productized services company, bringing together people, technology and domain expertise to amplify business results. Our mission is to set the benchmark for client service and success in our industry. Our vision is to be the innovation partner of choice for technology, data analytics and

IGT Solutions is a next-gen customer experience (CX) company, defining and delivering AI-led transformative experiences for the global and most innovative brands using digital technologies. With the combination of Digital and Human Intelligence, IGT becomes the preferred partner for managing end-to-

TIVIT is a Brazil-based multinational company that offers enterprise-level digital solutions, and operates in ten countries in Latin America. We help our clients develop their businesses by offering industry-leading digital solutions divided into four main categories: Digital Business, Cloud Solutio

Akkodis is a global digital engineering company and Smart Industry leader. We enable clients to advance in their digital transformation with Talent, Academy, Consulting, and Solutions services. Our 50,000 experts combine best-in-class technologies, R&D, and deep sector know-how for purposeful innova

ITC Infotech is a global technology solution and services leader providing business-friendly solutions, that enable future-readiness for clients. We seamlessly bring together digital expertise, strong industry-specific alliances, and deep domain expertise from ITC Group businesses. Our solutions and
FPT Software, a subsidiary of FPT Corporation, is a global technology and IT services provider headquartered in Vietnam, with USD 1.22 billion in revenue (2024) and over 33,000 employees in 30 countries. The company champions complex business opportunities and challenges with its world-class servic
.png)
Conduent Business Solutions experienced a data breach that exposed the personal and health information of over 10.5 million people,...
Conduent Business Services LLC is facing significant legal challenges as multiple plaintiffs have initiated class action lawsuits following a substantial...
Conduent Business Services LLC faces serious legal challenges following a substantial data breach affecting 10.5 million individuals.
Conduent is facing a growing wave of federal class action lawsuits after a massive data breach exposed the personal and health information...
Conduent data breach exposed personal information of over 10 million people after hackers infiltrated the government contractor's systems...
Data of over 10.5 million customers was compromised. Lawyers and state regulators are investigating the breach.
The business associate data breach is expected to cost Conduent millions through the first quarter of 2026, the company said in an SEC...
In its first-quarter earnings report, Conduent said it did not experience any material impacts to its operating environment or costs from...
The company has incurred millions in expenses related to data breach notifications stemming from an attack earlier this year.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Conduent is https://www.conduent.com.
According to Rankiteo, Conduent’s AI-generated cybersecurity score is 170, reflecting their Critical security posture.
According to Rankiteo, Conduent currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Conduent is not certified under SOC 2 Type 1.
According to Rankiteo, Conduent does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Conduent is not listed as GDPR compliant.
According to Rankiteo, Conduent does not currently maintain PCI DSS compliance.
According to Rankiteo, Conduent is not compliant with HIPAA regulations.
According to Rankiteo,Conduent is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Conduent operates primarily in the IT Services and IT Consulting industry.
Conduent employs approximately 36,834 people worldwide.
Conduent presently has no subsidiaries across any sectors.
Conduent’s official LinkedIn profile has approximately 523,798 followers.
Conduent is classified under the NAICS code 5415, which corresponds to Computer Systems Design and Related Services.
Yes, Conduent has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/stratacare.
Yes, Conduent maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/conduent.
As of December 10, 2025, Rankiteo reports that Conduent has experienced 9 cybersecurity incidents.
Conduent has an estimated 37,374 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware, Cyber Attack and Breach.
Total Financial Loss: The total financial loss from these incidents is estimated to be $350 million.
Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with yes (conduent blocked suspicious activity at georgia’s request), and law enforcement notified with usda office of inspector general, law enforcement notified with u.s. secret service (linked to broader fraud investigations), and containment measures with blocked suspicious inbound calls, containment measures with shut down call center temporarily, and remediation measures with enhanced bot detection in ivr system (pre-existing 'intelligent voice systems'), remediation measures with advisory for pin changes and card locking, and recovery measures with call center restoration (ongoing as of report), recovery measures with monitoring via connectebt app, and communication strategy with public advisory via georgia dhs, communication strategy with media statements to atlanta news first, communication strategy with direct notifications to cardholders (implied), and enhanced monitoring with ongoing monitoring of ivr system for suspicious activity, and and third party assistance with kroll (investigation), and remediation measures with systems restored and secured, and incident response plan activated with yes (as of 2025-01-13), and law enforcement notified with yes, and containment measures with secured affected systems (per premera's statement), containment measures with dark web monitoring for exfiltrated data, and remediation measures with credit monitoring/identity protection for premera members (2 years), remediation measures with direct notifications to affected individuals, and communication strategy with breach notice on conduent's website, communication strategy with sec filing (april 2025), communication strategy with state regulator notifications (delayed), and law enforcement notified with likely (given nation-state involvement in f5 breach), and incident response plan activated with yes (uk dft + ncsc probe), incident response plan activated with yes (conduent), incident response plan activated with yes (hyundai), incident response plan activated with yes (microsoft patch tuesday), and third party assistance with genians (cybersecurity firm, attributed attack), and and containment measures with attackers ejected (jan 13, 2025), containment measures with attackers ejected (mar 2, 2025), and remediation measures with investigation ongoing, remediation measures with breach notifications + legal/regulatory responses, remediation measures with data breach notices, remediation measures with security patches deployed, and and communication strategy with public probe announcement (the guardian), communication strategy with genians public report, communication strategy with regulatory filings + breach notifications, communication strategy with breach disclosure, communication strategy with patch tuesday bulletin, communication strategy with owasp announcement, and and and and and incident response plan activated with yes (secured networks, restored systems, notified law enforcement), and third party assistance with yes (cybersecurity experts, forensics team for data analysis), and law enforcement notified with yes, and containment measures with network isolation, containment measures with system restoration, and remediation measures with detailed analysis of exfiltrated files, remediation measures with identification of exposed personal information, and recovery measures with operational restoration, recovery measures with dedicated call center for affected individuals, and communication strategy with sec filing (form 8-k), communication strategy with notification letters to affected individuals, communication strategy with public statements..
Title: Conduent Ransomware Attack
Description: The operations of Conduent in Europe were disrupted by a ransomware attack and data related to customer audits was breached in the incident.
Type: Data Breach, Ransomware
Attack Vector: Ransomware
Threat Actor: Maze ransomware group
Motivation: Financial gain
Title: Cyberattack on Georgia’s SNAP Benefits Call Center Operated by Conduent
Description: Hackers targeted Georgia’s privately contracted SNAP benefits call center in a cyberattack, using bots to attack Conduent’s interactive voice response (IVR) system. The attack disrupted services and attempted to improperly access EBT account information. The incident is part of a broader trend of EBT/SNAP fraud linked to international crime rings, with $350 million stolen in taxpayer dollars last year alone. The call center was temporarily shut down, and officials advised cardholders to change their PINs and lock their cards via the ConnectEBT app.
Date Detected: 2025-XX-XX (exact date not specified; attack occurred on a Monday earlier in the week of reporting)
Date Publicly Disclosed: 2025-XX-XX (reported by Atlanta News First; exact date not specified)
Type: Cyberattack
Attack Vector: Bot AttackIVR System ExploitationCredential Stuffing (implied by PIN change advisory)Point-of-Sale (POS) Terminal Cloning (linked broader fraud)
Vulnerability Exploited: Weaknesses in IVR System AuthenticationLack of Multi-Factor Authentication (MFA) for Call-In AccessInsufficient Bot Detection/Prevention
Threat Actor: Unidentified HackersInternational Crime Rings (linked by USDA/Secret Service)
Motivation: Financial GainFraudulent TransactionsTheft of Taxpayer Funds
Title: Conduent Cyber Incident - January 2025
Description: On February 19, 2025, Conduent reported a cyber incident that occurred on January 13, 2025. The company has engaged Kroll to investigate potential data impacts, but initial analysis indicates that client data has not been affected. All systems have been restored and secured, with no further malicious activity detected since the incident.
Date Detected: 2025-01-13
Date Publicly Disclosed: 2025-02-19
Type: Cyber Attack
Title: Conduent Data Breach
Description: The Conduent data breach affected over 10.5 million individuals across multiple U.S. states, attributed to the SafePay ransomware group. The breach exposed sensitive personal and financial data, raising concerns about identity theft, financial fraud, and the company's data protection strategies. The incident has also led to a significant decline in Conduent's stock performance and potential legal and regulatory scrutiny.
Type: Data Breach
Threat Actor: SafePay Ransomware Group
Motivation: Financial GainData Theft
Title: Conduent Data Breach (October 2024)
Description: Publicly traded Conduent, a business services provider spun off from Xerox in 2017, experienced a data breach in October 2024 that compromised personal and health information of over 10.5 million individuals. The breach, attributed to the SafePay ransomware gang, led to multiple class-action lawsuits, regulatory investigations, and notifications to affected entities, including insurers (e.g., Blue Cross Blue Shield, Humana, Premera) and state agencies (e.g., Wisconsin DCF). The incident involved unauthorized access between October 21, 2024, and January 13, 2025, with 8.5 TB of data allegedly exfiltrated. Conduent reported the breach to regulators in April 2025, facing criticism for delayed disclosure.
Date Detected: 2024-10-21
Date Publicly Disclosed: 2025-04
Type: Data Breach
Attack Vector: Network IntrusionExploitation of Vulnerabilities (unspecified)
Threat Actor: SafePay Ransomware Gang
Motivation: Financial GainData Theft/Extortion
Title: Conduent Monthslong Data Breach and Class Action Lawsuits
Description: Conduent Business Services LLC has been hit with a barrage of class action lawsuits in New Jersey federal court alleging it failed to adequately protect sensitive personal and health information of individuals during a monthslong data breach.
Type: Data Breach
Title: Conduent Health Data Breach and F5 Nation-State Hack
Description: The incident involves two major cybersecurity events: (1) The largest known health data breach of 2025 affecting Conduent, a New Jersey-based business process outsourcing firm, leading to lawsuits and investigations. (2) A suspected nation-state hack of cybersecurity vendor F5, involving the theft of source code, with federal response complicated by the U.S. government shutdown. Additionally, there is a noted rise in targeting of Western critical infrastructure by nation-state attackers and hacktivist groups.
Type: Cybercrime
Threat Actor: Nation-state attackers (suspected in F5 breach)Hacktivist groups (targeting critical infrastructure)
Motivation: Espionage (F5 source code theft)Financial gain (Conduent breach)Activism (hacktivist attacks on critical infrastructure)
Title: ['UK Probes Whether Chinese-Made Electric Buses Can Be Remotely Disabled', 'North Korean Hackers Remotely Wipe Android Devices in South Korea', 'Conduent Updates Cost of January 2025 Cyberattack to $50 Million', 'Hyundai Discloses Data Breach Affecting 2.7 Million Individuals', 'Microsoft November Patch Tuesday Addresses 63 Vulnerabilities, Including Zero-Day', 'OWASP Updates Top 10 Web Application Vulnerabilities with Two New Categories']
Description: ['The British government is investigating whether over 2,500 Chinese-manufactured Yutong electric buses in the UK could be remotely disabled via telematics and battery management systems. Norway and Denmark previously discovered similar vulnerabilities, prompting the UK probe. Yutong claims compliance with international cybersecurity standards.', "North Korean APT group Konni (APT37) abused Google's Find Hub feature to remotely wipe Android devices in South Korea. The campaign involved spear-phishing via KakaoTalk, malware propagation (AutoIt scripts, LilithRAT, RemcosRAT), and two waves of attacks in September 2024. Victims included a counselor for North Korean defectors, with data erased and notifications delayed.", 'Conduent Business Solutions disclosed additional $25M in breach notification expenses (totaling $50M) for a January 2025 hack affecting 10.5 million individuals, including healthcare clients like Blue Cross Blue Shield of Montana (462,000 members). Attackers had access from October 21, 2024, to January 13, 2025, exfiltrating files. The company faces lawsuits and regulatory investigations.', 'Hyundai AutoEver America detected unauthorized access between February 22 and March 2, 2025, potentially exposing PII (names, SSNs, driver’s license numbers) of 2.7 million individuals. No ransomware group claimed responsibility, and exfiltration remains unconfirmed.', 'Microsoft’s November 2025 Patch Tuesday fixed 63 vulnerabilities, including a zero-day (CVE-2025-62215, Windows Kernel privilege escalation) and five Critical flaws (e.g., CVE-2025-62199 in Office enabling RCE). Most patches addressed elevation-of-privilege issues in components like Smart Card and Kerberos.', "OWASP added 'Software Supply Chain Failures' and 'Continuous Vulnerability Disclosure Failures' to its Top 10 web app vulnerabilities. The update emphasizes root causes over symptoms, reflecting modern software development risks like dependency management gaps and inconsistent disclosure processes."]
Date Detected: 2024-07-01 (spear-phishing campaign start)2025-01-132025-03-012025-11-01 (Patch Tuesday)
Date Publicly Disclosed: 2024-09-05 (first wipe incident)2025-10-01 (regulatory filing)2025-11-01 (breach notice)2025-11-01 (Patch Tuesday release)2025-11-01 (OWASP update announcement)
Date Resolved: [None, None, None, '2025-03-02 (attackers ejected)', None, None]
Type: Supply Chain Risk / Remote Access Vulnerability
Attack Vector: Telematics/Battery Management System ExploitationSocial Engineering (KakaoTalk spear-phishing) + Google Find Hub AbuseNetwork Intrusion (initial vector unspecified)Network Intrusion (initial vector unspecified)N/A (Vulnerability patches)N/A (Framework update)
Vulnerability Exploited: Remote-access features in Yutong buses (SIM-enabled systems)Google Find Hub (legitimate feature abused for remote wipe)
Threat Actor: Konni (APT37, TA406, Thallium) under Kimsuky umbrella
Motivation: Potential state-sponsored sabotage (unconfirmed)Espionage (targeting defectors and South Korean entities)Financial gain (data theft) / UnknownUnknown (potentially data theft)N/AN/A
Title: Conduent Data Breach (2024-2025)
Description: Hackers infiltrated Conduent's systems for nearly three months (October 21, 2024 – January 2025), exposing personal information linked to over 10 million people across U.S. state-level programs such as Medicaid, child support, food assistance, and toll systems. The SafePay ransomware group claimed responsibility, alleging the theft of 8.5 terabytes of data, including Social Security numbers, medical records, and health insurance details. Conduent confirmed the exfiltration but stated no evidence of data being published online or misused. The breach caused operational disruptions, including downtime for critical public services in multiple states.
Date Detected: January 2025
Date Publicly Disclosed: April 2025 (via SEC Form 8-K filing)
Type: Data Breach
Attack Vector: Third-party compromise (initial access)
Threat Actor: SafePay ransomware group
Motivation: Financial GainData Theft
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through IVR System ExploitationBot-Based Call Flooding, KakaoTalk spear-phishing and Third-party compromise.

Data Compromised: Customer audit data
Operational Impact: Disruption of operations

Financial Loss: $350 million (nationwide EBT fraud in 2024; specific loss from this incident unclear)
Systems Affected: Conduent’s IVR SystemConnectEBT App (indirectly, via advisory)EBT Card Transactions
Downtime: ['Call center down over the weekend (2+ days)', 'Additional outage on Tuesday morning']
Operational Impact: Disruption of SNAP benefits access for Georgia residentsIncreased customer support burdenManual PIN reset/locking required for cardholders
Customer Complaints: ['Dozens of reports from Georgia and other states about stolen benefits']
Brand Reputation Impact: Negative publicity for Conduent and Georgia DHSErosion of trust in EBT system security
Identity Theft Risk: ['Low (primary risk is financial theft, not identity theft)']
Payment Information Risk: ['High (EBT account balances and PINs targeted)']

Data Compromised: None (initial analysis indicates client data was not affected)

Data Compromised: Personal details, Financial details
Brand Reputation Impact: Significant reputational damage, reflected in stock decline and investor caution
Legal Liabilities: Potential investigations by FTC and state authorities; possible legal actions from affected individuals
Identity Theft Risk: High (due to exposure of personal and financial data)
Payment Information Risk: High

Data Compromised: Names, Social security numbers, Medical information, Health insurance information
Systems Affected: Conduent's Network (limited portion)Third-Party Vendor Systems (e.g., administrative services for Premera)
Downtime: {'start': '2024-10-21', 'end': '2025-01-13', 'description': 'Operational disruption reported on 2025-01-13; duration of unauthorized access unknown.'}
Operational Impact: Disruption of services for state agencies (e.g., Oklahoma DHS)Administrative support outages for insurers
Customer Complaints: ['Multiple class-action lawsuits filed (9+ as of 2025-10-27)', 'Investigations by law firms and state regulators (e.g., Montana)']
Brand Reputation Impact: Negative publicity due to delayed disclosure (10 months)Loss of trust from clients and affected individuals
Legal Liabilities: Proposed federal class-action lawsuits (negligence claims)Potential regulatory fines (HIPAA violations under investigation)
Identity Theft Risk: ['High (SSNs and medical data exposed)', 'Complimentary credit monitoring offered to affected Premera members']

Data Compromised: Sensitive personal information, Health information
Customer Complaints: Multiple (Class Action Lawsuits Filed)
Brand Reputation Impact: Negative (Litigation and Public Scrutiny)
Legal Liabilities: Class Action Lawsuits in New Jersey Federal Court
Identity Theft Risk: High (Sensitive Personal Information Exposed)

Data Compromised: Health data (conduent breach), Source code (f5 breach)
Operational Impact: Federal response delayed due to U.S. government shutdown (F5 breach)
Brand Reputation Impact: Significant (Conduent facing lawsuits and investigations)
Legal Liabilities: Lawsuits filed against Conduent

Financial Loss: $50 million (incident response + notifications)
Data Compromised: Personal data (remote wipe) + kakaotalk account hijacking, Files associated with healthcare clients (10.5m individuals), Pii (names, ssns, driver’s license numbers) of 2.7m individuals
Systems Affected: 2,500+ Yutong electric buses (UK)Android devices (South Korea, including smartphones/tablets)Conduent IT environment (limited portion)Hyundai AutoEver America systemsWindows, Office, Azure, Visual Studio, etc.
Downtime: [None, None, 'Oct 21, 2024 – Jan 13, 2025 (access period)', 'Feb 22 – Mar 2, 2025 (access period)', None, None]
Operational Impact: Potential remote disablement of busesDisrupted communications (KakaoTalk) + data lossOperational disruption (Jan 13, 2025)
Conversion Rate Impact: [None, None, None, None, None, None]
Revenue Loss: [None, None, 'Potential (litigation, reputational harm)', None, None, None]
Customer Complaints: [None, None, 'Class action lawsuits (12+ proposed)', None, None, None]
Brand Reputation Impact: Potential distrust in Chinese-manufactured vehiclesErosion of trust in Google/KakaoTalk securityReputational harm (healthcare sector)Reputational risk (automotive sector)
Legal Liabilities: Regulatory investigations (e.g., Montana) + lawsuits
Identity Theft Risk: [None, None, 'High (10.5M individuals)', 'High (2.7M individuals)', None, None]
Payment Information Risk: [None, None, None, None, None, None]

Data Compromised: Social security numbers, Medical records, Health insurance details, Personal information linked to state programs (medicaid, child support, food assistance, toll systems)
Systems Affected: Payment processing systemsCustomer service interactionsState government program databases
Downtime: Several days (disrupted services in multiple states, e.g., Wisconsin child support/welfare payments)
Operational Impact: Critical public service disruptions (e.g., inability to process payments for child support, welfare programs)
Customer Complaints: Expected (dedicated call center established for inquiries)
Brand Reputation Impact: High (handling sensitive government data for 100 million residents)
Legal Liabilities: Potential (notifications sent to affected individuals; SEC filing made)
Identity Theft Risk: High (SSNs and medical records exposed)
Payment Information Risk: Moderate (financial data linked to state disbursement programs)
Average Financial Loss: The average financial loss per incident is $38.89 million.
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Customer audit data, Personal Information, Financial Information, , Pii (Personally Identifiable Information), Phi (Protected Health Information), , Personal Information, Health Information, , Health Data (Conduent), Source Code (F5), , Personal Data (Remote Wipe) + Account Credentials, Client Files (Healthcare Data), Pii (Names, Ssns, Driver’S License Numbers), , Personally Identifiable Information (Pii), Protected Health Information (Phi), Financial Data and .

Entity Name: Conduent
Entity Type: Company
Location: Europe

Entity Name: Georgia Department of Human Services (DHS)
Entity Type: Government Agency
Industry: Public Welfare
Location: Georgia, USA
Customers Affected: Thousands of SNAP beneficiaries in Georgia (exact number unspecified)

Entity Name: Conduent
Entity Type: Private Contractor
Industry: Business Process Services
Location: Global (HQ in Florham Park, NJ, USA)
Customers Affected: SNAP beneficiaries using Conduent’s IVR system in Georgia

Entity Name: Conduent
Entity Type: Corporation
Customers Affected: None (initial analysis indicates no client data impact)

Entity Name: Conduent Incorporated
Entity Type: Public Company
Industry: Information Technology Services
Location: United States (multiple states)
Customers Affected: 10.5 million individuals

Entity Name: Conduent Business Solutions
Entity Type: Publicly Traded Company
Industry: Business Process Outsourcing, Healthcare Administration, Government Services
Location: New Jersey, USA
Size: $3.4B revenue (2024), operates in 22 countries
Customers Affected: 10.52 million individuals

Entity Name: Blue Cross Blue Shield of Montana
Entity Type: Health Insurer
Industry: Healthcare
Location: Montana, USA
Customers Affected: 462,000 members

Entity Name: Blue Cross Blue Shield of Texas
Entity Type: Health Insurer
Industry: Healthcare
Location: Texas, USA

Entity Name: Humana
Entity Type: Health Insurer
Industry: Healthcare
Location: Kentucky, USA

Entity Name: Premera Blue Cross
Entity Type: Health Insurer
Industry: Healthcare
Location: Washington, USA

Entity Name: Wisconsin Department of Children and Families
Entity Type: State Government Agency
Industry: Public Sector
Location: Wisconsin, USA

Entity Name: Oklahoma Department of Human Services
Entity Type: State Government Agency
Industry: Public Sector
Location: Oklahoma, USA
Customers Affected: 0 (no impact confirmed)

Entity Name: Conduent Business Services LLC
Entity Type: Corporation
Industry: Business Process Services, Healthcare Services
Location: United States (New Jersey Federal Court Jurisdiction)

Entity Name: Conduent
Entity Type: Business Process Outsourcing (BPO) Firm
Industry: Healthcare / Outsourcing
Location: New Jersey, USA

Entity Name: F5
Entity Type: Cybersecurity Vendor
Industry: Technology / Security
Location: USA

Entity Name: U.S. Federal Government
Entity Type: Government
Industry: Public Sector
Location: USA

Entity Name: Western Critical Infrastructure Sectors
Entity Type: Critical Infrastructure
Industry: Multiple (e.g., Energy, Healthcare, Transportation)
Location: Western countries

Entity Name: UK Department for Transport / National Cyber Security Centre
Entity Type: Government
Industry: Transportation
Location: United Kingdom

Entity Name: Yutong (bus manufacturer)
Entity Type: Private Company
Industry: Automotive
Location: China
Customers Affected: 2,500+ buses in UK

Entity Name: South Korean Android Users (including counselors for North Korean defectors)
Entity Type: Individuals/NGOs
Industry: Various
Location: South Korea

Entity Name: Conduent Business Solutions
Entity Type: Private Company
Industry: Business Services
Location: United States
Customers Affected: 10.5 million individuals (healthcare clients)

Entity Name: Blue Cross Blue Shield of Montana
Entity Type: Healthcare Provider
Industry: Healthcare
Location: United States (Montana)
Customers Affected: 462,000 members

Entity Name: Hyundai AutoEver America
Entity Type: Subsidiary
Industry: Automotive
Location: United States
Customers Affected: 2.7 million individuals

Entity Name: Microsoft Customers
Entity Type: Global
Industry: Various
Location: Worldwide

Entity Name: Conduent
Entity Type: Government Contractor
Industry: Public Sector Services (Technology & Payment Systems)
Location: United States
Size: Large (supports ~100 million residents; processes $85B in annual disbursements)
Customers Affected: 10+ million individuals

Entity Name: Texas State Government
Entity Type: State Agency
Industry: Public Health & Welfare
Location: Texas, USA
Customers Affected: 400,000+ individuals

Entity Name: Washington State Government
Entity Type: State Agency
Industry: Public Health & Welfare
Location: Washington, USA

Entity Name: South Carolina State Government
Entity Type: State Agency
Industry: Public Health & Welfare
Location: South Carolina, USA

Entity Name: New Hampshire State Government
Entity Type: State Agency
Industry: Public Health & Welfare
Location: New Hampshire, USA

Entity Name: Maine State Government
Entity Type: State Agency
Industry: Public Health & Welfare
Location: Maine, USA

Entity Name: Oregon State Government
Entity Type: State Agency
Industry: Public Health & Welfare
Location: Oregon, USA

Entity Name: Massachusetts State Government
Entity Type: State Agency
Industry: Public Health & Welfare
Location: Massachusetts, USA

Entity Name: California State Government
Entity Type: State Agency
Industry: Public Health & Welfare
Location: California, USA

Entity Name: Wisconsin State Government
Entity Type: State Agency
Industry: Public Health & Welfare
Location: Wisconsin, USA

Incident Response Plan Activated: Yes (Conduent blocked suspicious activity at Georgia’s request)
Law Enforcement Notified: USDA Office of Inspector General, U.S. Secret Service (linked to broader fraud investigations),
Containment Measures: Blocked suspicious inbound callsShut down call center temporarily
Remediation Measures: Enhanced bot detection in IVR system (pre-existing 'intelligent voice systems')Advisory for PIN changes and card locking
Recovery Measures: Call center restoration (ongoing as of report)Monitoring via ConnectEBT app
Communication Strategy: Public advisory via Georgia DHSMedia statements to Atlanta News FirstDirect notifications to cardholders (implied)
Enhanced Monitoring: Ongoing monitoring of IVR system for suspicious activity

Incident Response Plan Activated: True
Third Party Assistance: Kroll (investigation)
Remediation Measures: Systems restored and secured

Incident Response Plan Activated: Yes (as of 2025-01-13)
Law Enforcement Notified: Yes
Containment Measures: Secured affected systems (per Premera's statement)Dark web monitoring for exfiltrated data
Remediation Measures: Credit monitoring/identity protection for Premera members (2 years)Direct notifications to affected individuals
Communication Strategy: Breach notice on Conduent's websiteSEC filing (April 2025)State regulator notifications (delayed)

Law Enforcement Notified: Likely (given nation-state involvement in F5 breach)

Incident Response Plan Activated: ['Yes (UK DfT + NCSC probe)', None, 'Yes (Conduent)', 'Yes (Hyundai)', 'Yes (Microsoft Patch Tuesday)', None]
Third Party Assistance: Genians (Cybersecurity Firm, Attributed Attack).
Containment Measures: Attackers ejected (Jan 13, 2025)Attackers ejected (Mar 2, 2025)
Remediation Measures: Investigation ongoingBreach notifications + legal/regulatory responsesData breach noticesSecurity patches deployed
Communication Strategy: Public probe announcement (The Guardian)Genians public reportRegulatory filings + breach notificationsBreach disclosurePatch Tuesday bulletinOWASP announcement
Adaptive Behavioral WAF: [None, None, None, None, None, None]
On-Demand Scrubbing Services: [None, None, None, None, None, None]
Network Segmentation: [None, None, None, None, None, None]

Incident Response Plan Activated: Yes (secured networks, restored systems, notified law enforcement)
Third Party Assistance: Yes (cybersecurity experts, forensics team for data analysis)
Law Enforcement Notified: Yes
Containment Measures: Network isolationSystem restoration
Remediation Measures: Detailed analysis of exfiltrated filesIdentification of exposed personal information
Recovery Measures: Operational restorationDedicated call center for affected individuals
Communication Strategy: SEC filing (Form 8-K)Notification letters to affected individualsPublic statements
Incident Response Plan: The company's incident response plan is described as Yes (Conduent blocked suspicious activity at Georgia’s request), , Yes (as of 2025-01-13), Yes (UK DfT + NCSC probe), Yes (Conduent), Yes (Hyundai), Yes (Microsoft Patch Tuesday), , Yes (secured networks, restored systems, notified law enforcement).
Third-Party Assistance: The company involves third-party assistance in incident response through Kroll (investigation), Genians (cybersecurity firm, attributed attack), , Yes (cybersecurity experts, forensics team for data analysis).

Type of Data Compromised: Customer audit data
Data Exfiltration: Posted on Dark web

Sensitivity of Data: EBT Account BalancesPINs (potentially)
Data Exfiltration: Unconfirmed (attempted but not verified)
Personally Identifiable Information: EBT Card Numbers (likely)PINs (if compromised)

Type of Data Compromised: Personal information, Financial information
Number of Records Exposed: 10.5 million
Sensitivity of Data: High
Data Exfiltration: Yes
Personally Identifiable Information: Yes

Type of Data Compromised: Pii (personally identifiable information), Phi (protected health information)
Number of Records Exposed: 10.52 million
Sensitivity of Data: High (SSNs, medical/health insurance data)
Data Exfiltration: Yes (8.5 TB allegedly stolen by SafePay)
Personally Identifiable Information: NamesSocial Security NumbersMedical InformationHealth Insurance Details

Type of Data Compromised: Personal information, Health information
Sensitivity of Data: High

Type of Data Compromised: Health data (conduent), Source code (f5)
Sensitivity of Data: High (health data and proprietary source code)
Data Exfiltration: Confirmed (F5 source code theft)
Personally Identifiable Information: Likely (health data breach)

Type of Data Compromised: Personal data (remote wipe) + account credentials, Client files (healthcare data), Pii (names, ssns, driver’s license numbers)
Number of Records Exposed: None, None, 10.5 million, 2.7 million, None, None
Sensitivity of Data: High (personal + communication data)High (healthcare PII)High (PII)
Data Exfiltration: Yes (files exfiltrated)Unconfirmed
Data Encryption: [None, None, None, None, None, None]
Personally Identifiable Information: Yes (via Google accounts)Yes (healthcare PII)Yes (SSNs, driver’s licenses)

Type of Data Compromised: Personally identifiable information (pii), Protected health information (phi), Financial data
Number of Records Exposed: 10+ million
Sensitivity of Data: High (SSNs, medical records, health insurance details)
Data Exfiltration: Confirmed (8.5 terabytes stolen)
Personally Identifiable Information: Social Security numbersMedical recordsHealth insurance detailsState program beneficiary data
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Enhanced bot detection in IVR system (pre-existing 'intelligent voice systems'), Advisory for PIN changes and card locking, , Systems restored and secured, Credit monitoring/identity protection for Premera members (2 years), Direct notifications to affected individuals, , Investigation ongoing, Breach notifications + legal/regulatory responses, Data breach notices, Security patches deployed, , Detailed analysis of exfiltrated files, Identification of exposed personal information, .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by blocked suspicious inbound calls, shut down call center temporarily, , secured affected systems (per premera's statement), dark web monitoring for exfiltrated data, , attackers ejected (jan 13, 2025), attackers ejected (mar 2, 2025), , network isolation, system restoration and .

Ransomware Strain: Maze
Data Exfiltration: Posted on Dark web

Ransom Demanded: [None, None, None, None, None, None]
Data Encryption: [None, None, None, None, None, None]
Data Exfiltration: [None, None, None, None, None, None]

Ransom Paid: No
Ransomware Strain: SafePay
Data Exfiltration: Yes (8.5 TB)
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Call center restoration (ongoing as of report), Monitoring via ConnectEBT app, , , Operational restoration, Dedicated call center for affected individuals, .

Regulatory Notifications: USDA and Secret Service involved in broader fraud investigations

Legal Actions: Potential investigations by FTC and state authorities, Possible lawsuits from affected individuals,

Regulations Violated: Potential HIPAA violations (under investigation), State data breach notification laws (delayed disclosure),
Legal Actions: 9+ class-action lawsuits (as of 2025-10-27), Montana state regulator investigation,
Regulatory Notifications: SEC filing (April 2025)State regulator reports (e.g., Oklahoma, Wisconsin)

Legal Actions: Class Action Lawsuits

Legal Actions: Lawsuits filed against Conduent

Regulations Violated: Potential HIPAA (healthcare data),
Fines Imposed: [None, None, None, None, None, None]
Legal Actions: None, None, 12+ class action lawsuits + state investigations (e.g., Montana), None, None, None,
Regulatory Notifications: Yes (e.g., Montana BCBS disclosure)Breach notices

Regulatory Notifications: SEC Form 8-K filingState-level notifications to affected individuals
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Potential investigations by FTC and state authorities, Possible lawsuits from affected individuals, , 9+ class-action lawsuits (as of 2025-10-27), Montana state regulator investigation, , Class Action Lawsuits, Lawsuits filed against Conduent, None, None, 12+ class action lawsuits + state investigations (e.g., Montana), None, None, None, .

Lessons Learned: Need for stronger authentication in IVR systems (e.g., MFA), Proactive bot mitigation strategies for call centers, Importance of real-time transaction monitoring for EBT fraud, Public awareness campaigns for cardholder security (e.g., PIN changes, card locking)

Lessons Learned: The breach underscores the need for robust cybersecurity frameworks, especially for companies handling large volumes of sensitive data. Proactive measures, such as enhanced monitoring, incident response planning, and regulatory compliance, are critical to mitigating risks and maintaining stakeholder trust.

Lessons Learned: Supply chain risks in IoT/vehicle telematics require stricter oversight., Legitimate device-management features (e.g., Find Hub) can be weaponized; MFA and behavioral monitoring are critical., Prolonged network access (3+ months) underscores need for continuous threat detection and faster incident response., Unconfirmed exfiltration highlights challenges in breach attribution and impact assessment., Zero-day exploitation (CVE-2025-62215) reinforces urgency of patch management for privilege escalation flaws., Supply chain and vulnerability disclosure gaps demand proactive dependency management and transparent reporting.

Lessons Learned: Need for stricter cybersecurity oversight in government contractor systems; long-term risks of data exfiltration (identity theft, fraud in public benefit systems); importance of rapid incident response and transparency.

Recommendations: Implement MFA for EBT account access via IVR/call centers, Enhance bot detection with AI/ML-based anomaly detection, Expand use of the ConnectEBT app’s security features (e.g., card locking), Collaborate with USDA/Secret Service to disrupt international fraud rings, Audit and update POS terminal security to prevent cloningImplement MFA for EBT account access via IVR/call centers, Enhance bot detection with AI/ML-based anomaly detection, Expand use of the ConnectEBT app’s security features (e.g., card locking), Collaborate with USDA/Secret Service to disrupt international fraud rings, Audit and update POS terminal security to prevent cloningImplement MFA for EBT account access via IVR/call centers, Enhance bot detection with AI/ML-based anomaly detection, Expand use of the ConnectEBT app’s security features (e.g., card locking), Collaborate with USDA/Secret Service to disrupt international fraud rings, Audit and update POS terminal security to prevent cloningImplement MFA for EBT account access via IVR/call centers, Enhance bot detection with AI/ML-based anomaly detection, Expand use of the ConnectEBT app’s security features (e.g., card locking), Collaborate with USDA/Secret Service to disrupt international fraud rings, Audit and update POS terminal security to prevent cloningImplement MFA for EBT account access via IVR/call centers, Enhance bot detection with AI/ML-based anomaly detection, Expand use of the ConnectEBT app’s security features (e.g., card locking), Collaborate with USDA/Secret Service to disrupt international fraud rings, Audit and update POS terminal security to prevent cloning

Recommendations: Strengthen cybersecurity measures to prevent future breaches, Implement stricter data protection strategies, Enhance transparency in communication with stakeholders and affected individuals, Prepare for regulatory scrutiny and potential legal actions, Monitor market and investor sentiment closely, especially ahead of earnings announcementsStrengthen cybersecurity measures to prevent future breaches, Implement stricter data protection strategies, Enhance transparency in communication with stakeholders and affected individuals, Prepare for regulatory scrutiny and potential legal actions, Monitor market and investor sentiment closely, especially ahead of earnings announcementsStrengthen cybersecurity measures to prevent future breaches, Implement stricter data protection strategies, Enhance transparency in communication with stakeholders and affected individuals, Prepare for regulatory scrutiny and potential legal actions, Monitor market and investor sentiment closely, especially ahead of earnings announcementsStrengthen cybersecurity measures to prevent future breaches, Implement stricter data protection strategies, Enhance transparency in communication with stakeholders and affected individuals, Prepare for regulatory scrutiny and potential legal actions, Monitor market and investor sentiment closely, especially ahead of earnings announcementsStrengthen cybersecurity measures to prevent future breaches, Implement stricter data protection strategies, Enhance transparency in communication with stakeholders and affected individuals, Prepare for regulatory scrutiny and potential legal actions, Monitor market and investor sentiment closely, especially ahead of earnings announcements

Recommendations: Mandate third-party audits for IoT/vehicle remote-access capabilities; enforce air-gapped controls for critical functions., Disable or restrict Google Find Hub for high-risk users; implement hardware-based authentication for account recovery., Enhance EDR/XDR to detect lateral movement; conduct tabletop exercises for healthcare data breaches., Deploy endpoint detection for PII access anomalies; offer credit monitoring to affected individuals., Prioritize patching for elevation-of-privilege vulnerabilities; test mitigations for use-after-free flaws in Office., Adopt SBOMs for software supply chains; automate vulnerability disclosure workflows with SLAs.Mandate third-party audits for IoT/vehicle remote-access capabilities; enforce air-gapped controls for critical functions., Disable or restrict Google Find Hub for high-risk users; implement hardware-based authentication for account recovery., Enhance EDR/XDR to detect lateral movement; conduct tabletop exercises for healthcare data breaches., Deploy endpoint detection for PII access anomalies; offer credit monitoring to affected individuals., Prioritize patching for elevation-of-privilege vulnerabilities; test mitigations for use-after-free flaws in Office., Adopt SBOMs for software supply chains; automate vulnerability disclosure workflows with SLAs.Mandate third-party audits for IoT/vehicle remote-access capabilities; enforce air-gapped controls for critical functions., Disable or restrict Google Find Hub for high-risk users; implement hardware-based authentication for account recovery., Enhance EDR/XDR to detect lateral movement; conduct tabletop exercises for healthcare data breaches., Deploy endpoint detection for PII access anomalies; offer credit monitoring to affected individuals., Prioritize patching for elevation-of-privilege vulnerabilities; test mitigations for use-after-free flaws in Office., Adopt SBOMs for software supply chains; automate vulnerability disclosure workflows with SLAs.Mandate third-party audits for IoT/vehicle remote-access capabilities; enforce air-gapped controls for critical functions., Disable or restrict Google Find Hub for high-risk users; implement hardware-based authentication for account recovery., Enhance EDR/XDR to detect lateral movement; conduct tabletop exercises for healthcare data breaches., Deploy endpoint detection for PII access anomalies; offer credit monitoring to affected individuals., Prioritize patching for elevation-of-privilege vulnerabilities; test mitigations for use-after-free flaws in Office., Adopt SBOMs for software supply chains; automate vulnerability disclosure workflows with SLAs.Mandate third-party audits for IoT/vehicle remote-access capabilities; enforce air-gapped controls for critical functions., Disable or restrict Google Find Hub for high-risk users; implement hardware-based authentication for account recovery., Enhance EDR/XDR to detect lateral movement; conduct tabletop exercises for healthcare data breaches., Deploy endpoint detection for PII access anomalies; offer credit monitoring to affected individuals., Prioritize patching for elevation-of-privilege vulnerabilities; test mitigations for use-after-free flaws in Office., Adopt SBOMs for software supply chains; automate vulnerability disclosure workflows with SLAs.Mandate third-party audits for IoT/vehicle remote-access capabilities; enforce air-gapped controls for critical functions., Disable or restrict Google Find Hub for high-risk users; implement hardware-based authentication for account recovery., Enhance EDR/XDR to detect lateral movement; conduct tabletop exercises for healthcare data breaches., Deploy endpoint detection for PII access anomalies; offer credit monitoring to affected individuals., Prioritize patching for elevation-of-privilege vulnerabilities; test mitigations for use-after-free flaws in Office., Adopt SBOMs for software supply chains; automate vulnerability disclosure workflows with SLAs.

Recommendations: Enhance third-party risk management, Implement continuous monitoring for anomalous activity, Strengthen data encryption and access controls, Expand employee training on phishing/social engineering, Develop faster breach notification protocolsEnhance third-party risk management, Implement continuous monitoring for anomalous activity, Strengthen data encryption and access controls, Expand employee training on phishing/social engineering, Develop faster breach notification protocolsEnhance third-party risk management, Implement continuous monitoring for anomalous activity, Strengthen data encryption and access controls, Expand employee training on phishing/social engineering, Develop faster breach notification protocolsEnhance third-party risk management, Implement continuous monitoring for anomalous activity, Strengthen data encryption and access controls, Expand employee training on phishing/social engineering, Develop faster breach notification protocolsEnhance third-party risk management, Implement continuous monitoring for anomalous activity, Strengthen data encryption and access controls, Expand employee training on phishing/social engineering, Develop faster breach notification protocols
Key Lessons Learned: The key lessons learned from past incidents are Need for stronger authentication in IVR systems (e.g., MFA),Proactive bot mitigation strategies for call centers,Importance of real-time transaction monitoring for EBT fraud,Public awareness campaigns for cardholder security (e.g., PIN changes, card locking)The breach underscores the need for robust cybersecurity frameworks, especially for companies handling large volumes of sensitive data. Proactive measures, such as enhanced monitoring, incident response planning, and regulatory compliance, are critical to mitigating risks and maintaining stakeholder trust.Supply chain risks in IoT/vehicle telematics require stricter oversight.,Legitimate device-management features (e.g., Find Hub) can be weaponized; MFA and behavioral monitoring are critical.,Prolonged network access (3+ months) underscores need for continuous threat detection and faster incident response.,Unconfirmed exfiltration highlights challenges in breach attribution and impact assessment.,Zero-day exploitation (CVE-2025-62215) reinforces urgency of patch management for privilege escalation flaws.,Supply chain and vulnerability disclosure gaps demand proactive dependency management and transparent reporting.Need for stricter cybersecurity oversight in government contractor systems; long-term risks of data exfiltration (identity theft, fraud in public benefit systems); importance of rapid incident response and transparency.

Source: Atlanta News First
URL: https://www.atlantanewsfirst.com/ (hypothetical; exact URL not provided)
Date Accessed: 2025-XX-XX

Source: USDA Press Release (May 2025)

Source: Conduent Press Release (July 22, 2025)

Source: Latest coverage on the Conduent data breach

Source: Yahoo Finance - Conduent Stock Performance

Source: Information Security Media Group (ISMG)

Source: Conduent Breach Notice

Source: U.S. Securities and Exchange Commission (SEC) Filing
Date Accessed: 2025-04

Source: Ransomware.live (Darkweb Monitoring)
Date Accessed: 2025-02

Source: Law360 (Partial Article by Carla Baranauckas)

Source: ISMG Editors' Panel

Source: Midnight in the War Room (documentary preview)

Source: The Guardian

Source: Genians (via ISMG)

Source: Conduent Regulatory Filing
Date Accessed: 2025-10-01

Source: Hyundai AutoEver America Breach Notice
Date Accessed: 2025-11-01

Source: Microsoft Security Update Guide
URL: https://msrc.microsoft.com/update-guide
Date Accessed: 2025-11-01

Source: OWASP Top 10 2025
URL: https://owasp.org/www-project-top-ten/
Date Accessed: 2025-11-01

Source: ISMG Breach Roundup
URL: https://www.ismg.com
Date Accessed: 2025-11-01

Source: Fox News – CyberGuy Report
URL: https://www.foxnews.com/tech/conduent-data-breach-scale-impact
Date Accessed: 2025

Source: Conduent SEC Form 8-K Filing (April 2025)
Date Accessed: 2025
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Atlanta News FirstUrl: https://www.atlantanewsfirst.com/ (hypothetical; exact URL not provided)Date Accessed: 2025-XX-XX, and Source: USDA Press Release (May 2025), and Source: Conduent Press Release (July 22, 2025), and Source: Latest coverage on the Conduent data breach, and Source: Yahoo Finance - Conduent Stock PerformanceUrl: https://finance.yahoo.com/quote/CNDT/, and Source: Information Security Media Group (ISMG), and Source: Conduent Breach Notice, and Source: U.S. Securities and Exchange Commission (SEC) FilingDate Accessed: 2025-04, and Source: Ransomware.live (Darkweb Monitoring)Date Accessed: 2025-02, and Source: Law360 (Partial Article by Carla Baranauckas), and Source: ISMG Editors' Panel, and Source: Midnight in the War Room (documentary preview), and Source: The Guardian, and Source: Genians (via ISMG), and Source: Conduent Regulatory FilingDate Accessed: 2025-10-01, and Source: Hyundai AutoEver America Breach NoticeDate Accessed: 2025-11-01, and Source: Microsoft Security Update GuideUrl: https://msrc.microsoft.com/update-guideDate Accessed: 2025-11-01, and Source: OWASP Top 10 2025Url: https://owasp.org/www-project-top-ten/Date Accessed: 2025-11-01, and Source: ISMG Breach RoundupUrl: https://www.ismg.comDate Accessed: 2025-11-01, and Source: Fox News – CyberGuy ReportUrl: https://www.foxnews.com/tech/conduent-data-breach-scale-impactDate Accessed: 2025, and Source: Conduent SEC Form 8-K Filing (April 2025)Date Accessed: 2025.

Investigation Status: Ongoing (as of report)

Investigation Status: Ongoing (Kroll investigating potential data impacts)

Investigation Status: Ongoing (potential investigations by FTC and state authorities)

Investigation Status: Ongoing (class-action lawsuits, Montana regulator probe, potential HIPAA investigation)

Investigation Status: Ongoing (Litigation in Progress)

Investigation Status: Ongoing (Conduent lawsuits and F5 breach response delayed by government shutdown)

Investigation Status: ['Ongoing (UK probe)', 'Attributed to Konni/APT37 (Genians)', 'Ongoing (litigation/regulatory)', 'Disclosed (no further updates)', 'Patches released', 'Framework published']

Investigation Status: Ongoing (no evidence of data misuse or dark web publication as of latest update)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public Advisory Via Georgia Dhs, Media Statements To Atlanta News First, Direct Notifications To Cardholders (Implied), Breach Notice On Conduent'S Website, Sec Filing (April 2025), State Regulator Notifications (Delayed), Public Probe Announcement (The Guardian), Genians Public Report, Regulatory Filings + Breach Notifications, Breach Disclosure, Patch Tuesday Bulletin, Owasp Announcement, Sec Filing (Form 8-K), Notification Letters To Affected Individuals and Public Statements.

Stakeholder Advisories: Georgia Dhs Advisory To Change Pins And Lock Ebt Cards, Usda/Secret Service Warnings About International Fraud Rings.
Customer Advisories: Use ConnectEBT app to monitor accounts and lock cardsReport fraud to USDA OIG via phone/online

Stakeholder Advisories: Premera Blue Cross: Clarified No Breach Of Their Systems; Offered Credit Monitoring, Oklahoma Dhs: Confirmed No Impact To Their Data.
Customer Advisories: Conduent: Notified affected individuals directly (timing unclear)Premera: Offered 2 years of credit monitoring/identity protection

Stakeholder Advisories: Uk Dft/Ncsc Warnings To Transport Operators, Genians Advisory To South Korean Organizations, Conduent Notifications To Healthcare Clients, Hyundai Notices To Affected Individuals, Microsoft Guidance For Sysadmins, Owasp Guidance For Developers.
Customer Advisories: KakaoTalk security alerts (via Genians)Conduent breach letters + credit monitoring offersHyundai identity protection services

Stakeholder Advisories: Notifications sent to affected individuals; dedicated call center established
Customer Advisories: Monitor accounts for fraudulent activityEnable two-factor authentication (2FA)Use password managers and antivirus softwareConsider identity theft protection servicesCheck for exposed data via personal removal services
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Georgia Dhs Advisory To Change Pins And Lock Ebt Cards, Usda/Secret Service Warnings About International Fraud Rings, Use Connectebt App To Monitor Accounts And Lock Cards, Report Fraud To Usda Oig Via Phone/Online, , Premera Blue Cross: Clarified No Breach Of Their Systems; Offered Credit Monitoring, Oklahoma Dhs: Confirmed No Impact To Their Data, Conduent: Notified Affected Individuals Directly (Timing Unclear), Premera: Offered 2 Years Of Credit Monitoring/Identity Protection, , Uk Dft/Ncsc Warnings To Transport Operators, Genians Advisory To South Korean Organizations, Conduent Notifications To Healthcare Clients, Hyundai Notices To Affected Individuals, Microsoft Guidance For Sysadmins, Owasp Guidance For Developers, Kakaotalk Security Alerts (Via Genians), Conduent Breach Letters + Credit Monitoring Offers, Hyundai Identity Protection Services, , Notifications sent to affected individuals; dedicated call center established, Monitor Accounts For Fraudulent Activity, Enable Two-Factor Authentication (2Fa), Use Password Managers And Antivirus Software, Consider Identity Theft Protection Services, Check For Exposed Data Via Personal Removal Services and .

Entry Point: Ivr System Exploitation, Bot-Based Call Flooding,
High Value Targets: Ebt Account Balances, Pins,
Data Sold on Dark Web: Ebt Account Balances, Pins,

High Value Targets: Health Insurance Data, State Agency Client Data,
Data Sold on Dark Web: Health Insurance Data, State Agency Client Data,

High Value Targets: F5 Source Code, Conduent Health Data,
Data Sold on Dark Web: F5 Source Code, Conduent Health Data,

Entry Point: Kakaotalk Spear-Phishing,
Reconnaissance Period: [None, 'July 2024 (phishing campaign start)', None, None, None, None]
Backdoors Established: [None, None, None, None, None, None]
High Value Targets: North Korean Defectors’ Counselors, Healthcare Insurance Data,
Data Sold on Dark Web: North Korean Defectors’ Counselors, Healthcare Insurance Data,

Entry Point: Third-party compromise
Reconnaissance Period: Potentially from October 21, 2024 (intrusion start) to January 2025 (detection)
High Value Targets: State Medicaid Programs, Child Support Systems, Food Assistance Databases, Toll Payment Systems,
Data Sold on Dark Web: State Medicaid Programs, Child Support Systems, Food Assistance Databases, Toll Payment Systems,

Root Causes: Inadequate Bot Protection In Ivr System, Lack Of Real-Time Fraud Detection For Ebt Transactions, Weak Authentication For Call-In Account Access,
Corrective Actions: Deployed Enhanced Bot Detection (Per Conduent’S July 2025 Press Release), Temporary Call Center Shutdown To Contain Attack, Public Campaign For Pin Resets And Card Locking,

Root Causes: Failure To Implement Reasonable Data Security Measures (Per Lawsuits), Delayed Detection/Containment (October 2024–January 2025),

Root Causes: Alleged Failure to Adequately Protect Sensitive Data

Root Causes: Lack Of Supply Chain Cybersecurity Standards For Vehicle Telematics., Over-Reliance On Single-Factor Authentication (Google Accounts) + Abuse Of Legitimate Tools (Find Hub)., Inadequate Network Segmentation Allowing 3-Month Dwell Time., Unspecified Initial Access Vector (Potential Unpatched Vulnerability)., Race Condition In Windows Kernel (Cve-2025-62215)., Gaps In Dependency Tracking And Vulnerability Disclosure Processes.,
Corrective Actions: Uk May Impose Cybersecurity Requirements For Chinese-Manufactured Vehicles., Google/Kakaotalk May Restrict Find Hub Access; South Korea To Enhance Apt Defenses., Conduent Investing In Edr And Incident Response Playbooks., Hyundai Reviewing Pii Access Controls And Logging., Microsoft Urges Immediate Patching For Cve-2025-62215., Owasp Recommends Sbom Adoption And Automated Disclosure Workflows.,

Root Causes: Third-Party Vulnerability Exploitation, Insufficient Detection Of Prolonged Network Infiltration,
Corrective Actions: Network Security Hardening, Enhanced Forensic Analysis Capabilities, Improved Incident Response Coordination With State Partners,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Ongoing Monitoring Of Ivr System For Suspicious Activity, , Kroll (investigation), Genians (Cybersecurity Firm, Attributed Attack), , , .
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Deployed Enhanced Bot Detection (Per Conduent’S July 2025 Press Release), Temporary Call Center Shutdown To Contain Attack, Public Campaign For Pin Resets And Card Locking, , Uk May Impose Cybersecurity Requirements For Chinese-Manufactured Vehicles., Google/Kakaotalk May Restrict Find Hub Access; South Korea To Enhance Apt Defenses., Conduent Investing In Edr And Incident Response Playbooks., Hyundai Reviewing Pii Access Controls And Logging., Microsoft Urges Immediate Patching For Cve-2025-62215., Owasp Recommends Sbom Adoption And Automated Disclosure Workflows., , Network Security Hardening, Enhanced Forensic Analysis Capabilities, Improved Incident Response Coordination With State Partners, .
Ransom Payment History: The company has Paid ransoms in the past.
Last Ransom Demanded: The amount of the last ransom demanded was [None, None, None, None, None, None].
Last Attacking Group: The attacking group in the last incident were an Maze ransomware group, Unidentified HackersInternational Crime Rings (linked by USDA/Secret Service), SafePay Ransomware Group, SafePay Ransomware Gang, Nation-state attackers (suspected in F5 breach)Hacktivist groups (targeting critical infrastructure), Konni (APT37, TA406, Thallium) under Kimsuky umbrella and SafePay ransomware group.
Most Recent Incident Detected: The most recent incident detected was on 2025-XX-XX (exact date not specified; attack occurred on a Monday earlier in the week of reporting).
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on April 2025 (via SEC Form 8-K filing).
Most Recent Incident Resolved: The most recent incident resolved was on [None, None, None, '2025-03-02 (attackers ejected)', None, None].
Most Significant Data Compromised: The most significant data compromised in an incident were Customer audit data, None (initial analysis indicates client data was not affected), Personal Details, Financial Details, , Names, Social Security Numbers, Medical Information, Health Insurance Information, , Sensitive Personal Information, Health Information, , Health data (Conduent breach), Source code (F5 breach), , Personal data (remote wipe) + KakaoTalk account hijacking, Files associated with healthcare clients (10.5M individuals), PII (names, SSNs, driver’s license numbers) of 2.7M individuals, , Social Security numbers, Medical records, Health insurance details, Personal information linked to state programs (Medicaid, child support, food assistance, toll systems) and .
Most Significant System Affected: The most significant system affected in an incident were Conduent’s IVR SystemConnectEBT App (indirectly, via advisory)EBT Card Transactions and Conduent's Network (limited portion)Third-Party Vendor Systems (e.g., administrative services for Premera) and 2,500+ Yutong electric buses (UK)Android devices (South Korea, including smartphones/tablets)Conduent IT environment (limited portion)Hyundai AutoEver America systemsWindows, Office, Azure, Visual Studio, etc. and Payment processing systemsCustomer service interactionsState government program databases.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Kroll (investigation), genians (cybersecurity firm, attributed attack), , .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Blocked suspicious inbound callsShut down call center temporarily, Secured affected systems (per Premera's statement)Dark web monitoring for exfiltrated data, Attackers ejected (Jan 13, 2025)Attackers ejected (Mar 2, 2025) and Network isolationSystem restoration.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Social Security numbers, Personal data (remote wipe) + KakaoTalk account hijacking, Health data (Conduent breach), Names, Medical Information, Sensitive Personal Information, Health Information, Health Insurance Information, Source code (F5 breach), Files associated with healthcare clients (10.5M individuals), Medical records, PII (names, SSNs, driver’s license numbers) of 2.7M individuals, Customer audit data, None (initial analysis indicates client data was not affected), Social Security Numbers, Personal Details, Health insurance details, Personal information linked to state programs (Medicaid, child support, food assistance, toll systems) and Financial Details.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 34.2M.
Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was [None, None, None, None, None, None].
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Potential investigations by FTC and state authorities, Possible lawsuits from affected individuals, , 9+ class-action lawsuits (as of 2025-10-27), Montana state regulator investigation, , Class Action Lawsuits, Lawsuits filed against Conduent, None, None, 12+ class action lawsuits + state investigations (e.g., Montana), None, None, None, .
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Supply chain and vulnerability disclosure gaps demand proactive dependency management and transparent reporting., Need for stricter cybersecurity oversight in government contractor systems; long-term risks of data exfiltration (identity theft, fraud in public benefit systems); importance of rapid incident response and transparency.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Expand use of the ConnectEBT app’s security features (e.g., card locking), Disable or restrict Google Find Hub for high-risk users; implement hardware-based authentication for account recovery., Deploy endpoint detection for PII access anomalies; offer credit monitoring to affected individuals., Prioritize patching for elevation-of-privilege vulnerabilities; test mitigations for use-after-free flaws in Office., Develop faster breach notification protocols, Implement continuous monitoring for anomalous activity, Enhance third-party risk management, Strengthen data encryption and access controls, Audit and update POS terminal security to prevent cloning, Adopt SBOMs for software supply chains; automate vulnerability disclosure workflows with SLAs., Enhance bot detection with AI/ML-based anomaly detection, Implement MFA for EBT account access via IVR/call centers, Expand employee training on phishing/social engineering, Strengthen cybersecurity measures to prevent future breaches, Enhance transparency in communication with stakeholders and affected individuals, Enhance EDR/XDR to detect lateral movement; conduct tabletop exercises for healthcare data breaches., Prepare for regulatory scrutiny and potential legal actions, Monitor market and investor sentiment closely, especially ahead of earnings announcements, Mandate third-party audits for IoT/vehicle remote-access capabilities; enforce air-gapped controls for critical functions., Implement stricter data protection strategies and Collaborate with USDA/Secret Service to disrupt international fraud rings.
Most Recent Source: The most recent source of information about an incident are Conduent SEC Form 8-K Filing (April 2025), Conduent Regulatory Filing, Conduent Breach Notice, Genians (via ISMG), ISMG Breach Roundup, Latest coverage on the Conduent data breach, Microsoft Security Update Guide, U.S. Securities and Exchange Commission (SEC) Filing, Conduent Press Release (July 22, 2025), Atlanta News First, Fox News – CyberGuy Report, OWASP Top 10 2025, The Guardian, Ransomware.live (Darkweb Monitoring), Yahoo Finance - Conduent Stock Performance, Information Security Media Group (ISMG), ISMG Editors' Panel, Hyundai AutoEver America Breach Notice, Law360 (Partial Article by Carla Baranauckas), Midnight in the War Room (documentary preview) and USDA Press Release (May 2025).
Most Recent URL for Additional Resources: The most recent URL for additional resources on cybersecurity best practices is https://www.atlantanewsfirst.com/ (hypothetical; exact URL not provided), https://finance.yahoo.com/quote/CNDT/, https://msrc.microsoft.com/update-guide, https://owasp.org/www-project-top-ten/, https://www.ismg.com, https://www.foxnews.com/tech/conduent-data-breach-scale-impact .
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (as of report).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Georgia DHS advisory to change PINs and lock EBT cards, USDA/Secret Service warnings about international fraud rings, Premera Blue Cross: Clarified no breach of their systems; offered credit monitoring, Oklahoma DHS: Confirmed no impact to their data, UK DfT/NCSC warnings to transport operators, Genians advisory to South Korean organizations, Conduent notifications to healthcare clients, Hyundai notices to affected individuals, Microsoft guidance for sysadmins, OWASP guidance for developers, Notifications sent to affected individuals; dedicated call center established, .
Most Recent Customer Advisory: The most recent customer advisory issued were an Use ConnectEBT app to monitor accounts and lock cardsReport fraud to USDA OIG via phone/online, Conduent: Notified affected individuals directly (timing unclear)Premera: Offered 2 years of credit monitoring/identity protection, KakaoTalk security alerts (via Genians)Conduent breach letters + credit monitoring offersHyundai identity protection services and Monitor accounts for fraudulent activityEnable two-factor authentication (2FA)Use password managers and antivirus softwareConsider identity theft protection servicesCheck for exposed data via personal removal services.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Third-party compromise.
Most Recent Reconnaissance Period: The most recent reconnaissance period for an incident was July 2024 (phishing campaign start), Potentially from October 21, 2024 (intrusion start) to January 2025 (detection).
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Inadequate bot protection in IVR systemLack of real-time fraud detection for EBT transactionsWeak authentication for call-in account access, Failure to implement reasonable data security measures (per lawsuits)Delayed detection/containment (October 2024–January 2025), Alleged Failure to Adequately Protect Sensitive Data, Lack of supply chain cybersecurity standards for vehicle telematics.Over-reliance on single-factor authentication (Google accounts) + abuse of legitimate tools (Find Hub).Inadequate network segmentation allowing 3-month dwell time.Unspecified initial access vector (potential unpatched vulnerability).Race condition in Windows Kernel (CVE-2025-62215).Gaps in dependency tracking and vulnerability disclosure processes., Third-party vulnerability exploitationInsufficient detection of prolonged network infiltration.
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Deployed enhanced bot detection (per Conduent’s July 2025 press release)Temporary call center shutdown to contain attackPublic campaign for PIN resets and card locking, UK may impose cybersecurity requirements for Chinese-manufactured vehicles.Google/KakaoTalk may restrict Find Hub access; South Korea to enhance APT defenses.Conduent investing in EDR and incident response playbooks.Hyundai reviewing PII access controls and logging.Microsoft urges immediate patching for CVE-2025-62215.OWASP recommends SBOM adoption and automated disclosure workflows., Network security hardeningEnhanced forensic analysis capabilitiesImproved incident response coordination with state partners.
.png)
Tuleap is a free and open source suite for management of software development and collaboration. Versions of Tuleap Community Edition prior to 17.0.99.1763126988 and Tuleap Enterprise Edition prior to 17.0-3 and 16.13-8 have missing CSRF protections which allow attackers to create or remove tracker triggers. This issue is fixed in Tuleap Community Edition version 17.0.99.1763126988 and Tuleap Enterprise Edition versions 17.0-3 and 16.13-8.
Tuleap is a free and open source suite for management of software development and collaboration. Tuleap Community Editon versions prior to 17.0.99.1762456922 and Tuleap Enterprise Edition versions prior to 17.0-2, 16.13-7 and 16.12-10 are vulnerable to CSRF attacks through planning management API. Attackers have access to create, edit or remove plans. This issue is fixed in Tuleap Community Edition version 17.0.99.1762456922 and Tuleap Enterprise Edtion versions 17.0-2, 16.13-7 and 16.12-10.
Tuleap is an Open Source Suite for management of software development and collaboration. Tuleap Community Edition versions below 17.0.99.1762444754 and Tuleap Enterprise Edition versions prior to 17.0-2, 16.13-7 and 16.12-10 allow attackers trick victims into changing tracker general settings. This issue is fixed in version Tuleap Community Edition version 17.0.99.1762444754 and Tuleap Enterprise Edition versions 17.0-2, 16.13-7 and 16.12-10.
Tuleap is an Open Source Suite for management of software development and collaboration. Versions below 17.0.99.1762431347 of Tuleap Community Edition and Tuleap Enterprise Edition below 17.0-2, 16.13-7 and 16.12-10 allow attackers to access file release system information in projects they do not have access to. This issue is fixed in version 17.0.99.1762431347 of the Tuleap Community Edition and versions 17.0-2, 16.13-7 and 16.12-10 of Tuleap Enterprise Edition.
IBM watsonx.data 2.2 through 2.2.1 could allow an authenticated user to cause a denial of service through ingestion pods due to improper allocation of resources without limits.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.