Company Details
cooperation-fund-foundation
54
704
54172
cofund.org.pl
0
COO_1031833
In-progress

Cooperation Fund Foundation Company CyberSecurity Posture
cofund.org.plJesteśmy jedną z najdłużej działających w Polsce instytucji powołanych do obsługi zagranicznych środków pomocowych - Skarb Państwa ustanowił Fundację "Fundusz Współpracy" we wrześniu 1990 roku. Wynikało to z potrzeby stworzenia wyspecjalizowanej i sprawnie działającej organizacji, która sposób przejrzysty zarządzałaby w imieniu Rządu RP środkami pomocowymi i zarazem służyłaby wsparciem realizatorom projektów wspieranych z pomocy zagranicznej. Od początku naszym celem było wspieranie gospodarczego i społecznego rozwoju Polski oraz państw, do których kierowana była pomoc zagraniczna i rozwojowa RP, w szczególności poprzez przyjmowanie i dystrybucję środków pieniężnych i rzeczowych pochodzących z Unii Europejskiej, innych instytucjimiędzynarodowych oraz zagranicznych instytucji rządowych i prywatnych.
Company Details
cooperation-fund-foundation
54
704
54172
cofund.org.pl
0
COO_1031833
In-progress
Between 750 and 799

CFF Global Score (TPRM)XXXX



No incidents recorded for Cooperation Fund Foundation in 2025.
No incidents recorded for Cooperation Fund Foundation in 2025.
No incidents recorded for Cooperation Fund Foundation in 2025.
CFF cyber incidents detection timeline including parent company and subsidiaries

Jesteśmy jedną z najdłużej działających w Polsce instytucji powołanych do obsługi zagranicznych środków pomocowych - Skarb Państwa ustanowił Fundację "Fundusz Współpracy" we wrześniu 1990 roku. Wynikało to z potrzeby stworzenia wyspecjalizowanej i sprawnie działającej organizacji, która sposób przejrzysty zarządzałaby w imieniu Rządu RP środkami pomocowymi i zarazem służyłaby wsparciem realizatorom projektów wspieranych z pomocy zagranicznej. Od początku naszym celem było wspieranie gospodarczego i społecznego rozwoju Polski oraz państw, do których kierowana była pomoc zagraniczna i rozwojowa RP, w szczególności poprzez przyjmowanie i dystrybucję środków pieniężnych i rzeczowych pochodzących z Unii Europejskiej, innych instytucjimiędzynarodowych oraz zagranicznych instytucji rządowych i prywatnych.


Beyond Violence as an online movement and global network fighting for non-violent conflict transformation. Beyond Violence listens to the voices of people caught in conflict zones, and connects people all over the world- coming together as one powerful voice calling for peace. Beyond Violence us

Arts and politics are wedded ideas indispensable to the fabric and soul of society. For this reason, The Clyde Fitch Report will act as the nexus of arts and politics. It will serve as a marketplace to challenge and to debate; to interweave openness with obstreperousness; to be a forum where represe
“MIXO” is the name we give to growth-oriented individuals who build their life through their identity and pursue becoming the best versions of themselves. We created The MIXO Identity System to help you discover your unique identity, find your purpose, and pursue your mission, and craft a personal

Portée par une vision d’excellence, le Centre de recherche Azrieli du CHU Sainte-Justine nourrit la vision de faire du Québec un lieu où la santé des mères, des enfants, des adolescentes et adolescents compte parmi les meilleures au monde. C’est dans cette optique qu’il s’active à faire avancer les

The Center works to highlight and dismantle structures and institutions that have been infected by racial bias and plagued by inequality. The Center fulfills its mission by convening public conversations with stakeholders, affected communities, thought leaders, advocates, and students; shaping polic

Amplifier is a nonprofit design lab that builds art and media experiments to amplify the most important movements of our times. Our experiments are built on a foundation of free and open source art, the unlimited possibilities within a human centered design process, and the potentials when analog an
.png)
Misuse of information and communications technologiesThere is growing concern over the misuse of information and communications technologies (ICT) by...
Our commitment to audit quality. At EY US, we are bringing our bold vision for the future of audit to life with quality at the center,...
The EU's Cyber Crisis Management Blueprint establishes a coordinated framework for member states to prevent, respond to, and recover from...
Deadline: 25-Sep-2025 The Government of Canada has announced the Cyber Security Cooperation Program (CSCP) 2025, inviting applications for funding to...
Google.org announced a new $5 million funding in support to The Asia Foundation to expand university-based cybersecurity clinics in 11 countries.
Non-profit organization MITRE has informed that federal government funding for the Common Vulnerabilities and Exposures (CVE) and Common...
The federal agency responsible for the nation's cybersecurity has officially cut funding to support states and local election offices on election security.
This training provides recipients of federal research funding with information on risks and threats to the global research ecosystem.
The US National Science Foundation has funded research to protect national and personal security in today's highly connected, digital world.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Cooperation Fund Foundation is http://www.cofund.org.pl.
According to Rankiteo, Cooperation Fund Foundation’s AI-generated cybersecurity score is 751, reflecting their Fair security posture.
According to Rankiteo, Cooperation Fund Foundation currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Cooperation Fund Foundation is not certified under SOC 2 Type 1.
According to Rankiteo, Cooperation Fund Foundation does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Cooperation Fund Foundation is not listed as GDPR compliant.
According to Rankiteo, Cooperation Fund Foundation does not currently maintain PCI DSS compliance.
According to Rankiteo, Cooperation Fund Foundation is not compliant with HIPAA regulations.
According to Rankiteo,Cooperation Fund Foundation is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Cooperation Fund Foundation operates primarily in the Think Tanks industry.
Cooperation Fund Foundation employs approximately 54 people worldwide.
Cooperation Fund Foundation presently has no subsidiaries across any sectors.
Cooperation Fund Foundation’s official LinkedIn profile has approximately 704 followers.
Cooperation Fund Foundation is classified under the NAICS code 54172, which corresponds to Research and Development in the Social Sciences and Humanities.
No, Cooperation Fund Foundation does not have a profile on Crunchbase.
Yes, Cooperation Fund Foundation maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/cooperation-fund-foundation.
As of December 05, 2025, Rankiteo reports that Cooperation Fund Foundation has not experienced any cybersecurity incidents.
Cooperation Fund Foundation has an estimated 812 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Cooperation Fund Foundation has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
MCP Server Kubernetes is an MCP Server that can connect to a Kubernetes cluster and manage it. Prior to 2.9.8, there is a security issue exists in the exec_in_pod tool of the mcp-server-kubernetes MCP Server. The tool accepts user-provided commands in both array and string formats. When a string format is provided, it is passed directly to shell interpretation (sh -c) without input validation, allowing shell metacharacters to be interpreted. This vulnerability can be exploited through direct command injection or indirect prompt injection attacks, where AI agents may execute commands without explicit user intent. This vulnerability is fixed in 2.9.8.
XML external entity (XXE) injection in eyoucms v1.7.1 allows remote attackers to cause a denial of service via crafted body of a POST request.
An issue was discovered in Fanvil x210 V2 2.12.20 allowing unauthenticated attackers on the local network to access administrative functions of the device (e.g. file upload, firmware update, reboot...) via a crafted authentication bypass.
Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.
Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.