Company Details
council-for-relationships
128
1,445
62133
councilforrelationships.org
0
COU_1842612
In-progress


Council for Relationships Company CyberSecurity Posture
councilforrelationships.orgCouncil for Relationships is a nonprofit organization whose mission is to help people from all walks of life improve their important relationships by providing exemplary therapy, educating and training clinicians in the family systems approach, and advancing the mental health field through research. More than 70 therapists and psychiatrists provide counseling to individuals, couples, and families in-person at 10 offices and community-based locations in the greater Philadelphia area and online across PA & NJ. Additionally, more than 60 clinical interns per year participating in CFR’s clinician education programs provide counseling on a sliding fee scale. We are committed to providing quality counseling services to all in need, regardless of ability to pay.
Company Details
council-for-relationships
128
1,445
62133
councilforrelationships.org
0
COU_1842612
In-progress
Between 600 and 649

CR Global Score (TPRM)XXXX

Description: On June 12, 2024, the Vermont Office of the Attorney General reported a data breach involving the Council for Relationships (CFR). The incident was due to unauthorized access to a server containing personal information of current and former staff, including names, addresses, social security numbers, payroll information, and bank account details, although it is uncertain if any information was actually taken.
Description: The Maine Office of the Attorney General reported a data breach involving Council for Relationships, Inc. on June 12, 2024. The breach occurred on April 1, 2024, due to an external system breach (hacking), affecting a total of 27,377 individuals, with 4 residents specifically impacted. The breach involved the unauthorized access to personal information, potentially compromising the data of a significant number of individuals.


No incidents recorded for Council for Relationships in 2026.
No incidents recorded for Council for Relationships in 2026.
No incidents recorded for Council for Relationships in 2026.
CR cyber incidents detection timeline including parent company and subsidiaries

Council for Relationships is a nonprofit organization whose mission is to help people from all walks of life improve their important relationships by providing exemplary therapy, educating and training clinicians in the family systems approach, and advancing the mental health field through research. More than 70 therapists and psychiatrists provide counseling to individuals, couples, and families in-person at 10 offices and community-based locations in the greater Philadelphia area and online across PA & NJ. Additionally, more than 60 clinical interns per year participating in CFR’s clinician education programs provide counseling on a sliding fee scale. We are committed to providing quality counseling services to all in need, regardless of ability to pay.


Paragon Behavioral Health Services, LLC is on a mission to forge a path that cultivates and enhances the lives of our communities through attentive and dedicative behavioral health care. We recognize the uniqueness of each participant and strive to promote feelings of dignity and a sense of self-wor

In Tune Counseling and Coaching emphasizes the client – therapist relationship. We offer a safe and comfortable setting that promotes respect, growth and development. Each individual is treated uniquely with regard to personal characteristics and interpersonal skills. Our therapists are invested in

Mindful Transitions, LLC provides Clinical Social Work services to seniors on-site at Independent and Assisted Living residences. We assist the client and family in adjusting to the need for placement, mood changes, adjusting to new surroundings, coping with lifestyle changes, cognitive and physical

New Mexico Solutions is a nonprofit organization offering comprehensive community-based services in the Albuquerque area. Since 1999, New Mexico Solutions has provided effective, ethical and responsive services to the community. New Mexico Solutions provides services under the philosophy that client

Integrate Brain Health (IBH) is a combination of two subsidiaries: Integrated Neuroscience Services and Integrated Neuropsychological Services. Integrated Neuroscience Services provides comprehensive consultation services to the neurofeedback clinician. Drs. Coben and Stevens utilize information t

COMMUNITY THERAPEUTIC SERVICES LIMITED is a Registered Social Care Provider for People with Learning Disabilities, Autism and Mental Health Needs. The main office is located in 81 HIGH STREET WORLE, WESTON-SUPER-MARE, NORTH SOMERSET, United Kingdom. We provide a 'different level' of residential and

Shen-Paco Industries, Inc. was founded in 1974 as a non-profit community based organization providing day support and employment services to adults with disabilities. Shen- Paco Industries started out small, serving less than 10 individuals in a small building located in New Market. Today the num

Apex Recovery offers all-inclusive assistance for anyone seeking to recover from drug addiction or alcohol abuse. We offer services specific to your individual needs as well as comprehensive guidance. We also offer aftercare services to ensure our clients get the care they need to have lasting recov

Providing couples and marriage counseling, family therapy, teen counseling and individual therapy in the Tri-Valley and East Bay area through our offices in Pleasanton & Alameda. About Us We believe that at the core, much of our human distress is caused by relationship "malfunction". All of us
.png)
This is the eighth chapter of the report “Is Europe waking up to the China challenge? How geopolitics are reshaping EU and transatlantic...
Amid the current US-Colombia tensions, both countries should remind themselves of how important this relationship is for their shared goals.
The latest report in the Atlantic Council's Russia Tomorrow series explores Russia's wartime cyber operations and broader cyber web.
The growing military and diplomatic cooperation between New Delhi and Yerevan benefits both beyond immediate defense concerns.
China has built the world's most comprehensive ecosystem for capture-the-flag (CTF) competitions—the predominant form of hacking competitions...
South Korea is sounding the alarm on North Korean cybersecurity threats. In line with his “Global Pivotal State” (GPS) agenda,...
Organized crime groups in Southeast Asia have seized on Myanmar's instability amid civil war to establish a string of scam centers engaged in global online...
See how Microsoft collaborates with European works councils during product rollouts to ensure compliance and maintain healthy labor...
The role of the TTC is not to address direct regulatory controversies but to seek “success stories” and set the stage for future collaboration.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Council for Relationships is http://www.councilforrelationships.org.
According to Rankiteo, Council for Relationships’s AI-generated cybersecurity score is 648, reflecting their Poor security posture.
According to Rankiteo, Council for Relationships currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Council for Relationships has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Council for Relationships is not certified under SOC 2 Type 1.
According to Rankiteo, Council for Relationships does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Council for Relationships is not listed as GDPR compliant.
According to Rankiteo, Council for Relationships does not currently maintain PCI DSS compliance.
According to Rankiteo, Council for Relationships is not compliant with HIPAA regulations.
According to Rankiteo,Council for Relationships is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Council for Relationships operates primarily in the Mental Health Care industry.
Council for Relationships employs approximately 128 people worldwide.
Council for Relationships presently has no subsidiaries across any sectors.
Council for Relationships’s official LinkedIn profile has approximately 1,445 followers.
Council for Relationships is classified under the NAICS code 62133, which corresponds to Offices of Mental Health Practitioners (except Physicians).
No, Council for Relationships does not have a profile on Crunchbase.
Yes, Council for Relationships maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/council-for-relationships.
As of January 22, 2026, Rankiteo reports that Council for Relationships has experienced 2 cybersecurity incidents.
Council for Relationships has an estimated 5,278 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Title: Data Breach at Council for Relationships, Inc.
Description: The Maine Office of the Attorney General reported a data breach involving Council for Relationships, Inc. on June 12, 2024. The breach occurred on April 1, 2024, due to an external system breach (hacking), affecting a total of 27,377 individuals, with 4 residents specifically impacted.
Date Detected: 2024-04-01
Date Publicly Disclosed: 2024-06-12
Type: Data Breach
Attack Vector: External System Breach (Hacking)
Title: Data Breach at Council for Relationships
Description: Unauthorized access to a server containing personal information of current and former staff, including names, addresses, social security numbers, payroll information, and bank account details.
Date Detected: 2024-06-12
Date Publicly Disclosed: 2024-06-12
Type: Data Breach
Attack Vector: Unauthorized Access
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Names, Addresses, Social security numbers, Payroll information, Bank account details
Systems Affected: server
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information, Financial Information and .

Entity Name: Council for Relationships, Inc.
Entity Type: Organization
Customers Affected: 27377

Entity Name: Council for Relationships
Entity Type: Non-profit Organization
Industry: Health and Social Services

Number of Records Exposed: 27377

Type of Data Compromised: Personal information, Financial information
Sensitivity of Data: High
Personally Identifiable Information: namesaddressessocial security numbers

Source: Maine Office of the Attorney General
Date Accessed: 2024-06-12

Source: Vermont Office of the Attorney General
Date Accessed: 2024-06-12
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Maine Office of the Attorney GeneralDate Accessed: 2024-06-12, and Source: Vermont Office of the Attorney GeneralDate Accessed: 2024-06-12.
Most Recent Incident Detected: The most recent incident detected was on 2024-04-01.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-06-12.
Most Significant Data Compromised: The most significant data compromised in an incident were names, addresses, social security numbers, payroll information, bank account details and .
Most Significant System Affected: The most significant system affected in an incident was server.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were addresses, names, bank account details, social security numbers and payroll information.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 350.0.
Most Recent Source: The most recent source of information about an incident are Vermont Office of the Attorney General and Maine Office of the Attorney General.
.png)
Backstage is an open framework for building developer portals, and @backstage/backend-defaults provides the default implementations and setup for a standard Backstage backend app. Prior to versions 0.12.2, 0.13.2, 0.14.1, and 0.15.0, the `FetchUrlReader` component, used by the catalog and other plugins to fetch content from URLs, followed HTTP redirects automatically. This allowed an attacker who controls a host listed in `backend.reading.allow` to redirect requests to internal or sensitive URLs that are not on the allowlist, bypassing the URL allowlist security control. This is a Server-Side Request Forgery (SSRF) vulnerability that could allow access to internal resources, but it does not allow attackers to include additional request headers. This vulnerability is fixed in `@backstage/backend-defaults` version 0.12.2, 0.13.2, 0.14.1, and 0.15.0. Users should upgrade to this version or later. Some workarounds are available. Restrict `backend.reading.allow` to only trusted hosts that you control and that do not issue redirects, ensure allowed hosts do not have open redirect vulnerabilities, and/or use network-level controls to block access from Backstage to sensitive internal endpoints.
Backstage is an open framework for building developer portals, and @backstage/cli-common provides config loading functionality used by the backend and command line interface of Backstage. Prior to version 0.1.17, the `resolveSafeChildPath` utility function in `@backstage/backend-plugin-api`, which is used to prevent path traversal attacks, failed to properly validate symlink chains and dangling symlinks. An attacker could bypass the path validation via symlink chains (creating `link1 → link2 → /outside` where intermediate symlinks eventually resolve outside the allowed directory) and dangling symlinks (creating symlinks pointing to non-existent paths outside the base directory, which would later be created during file operations). This function is used by Scaffolder actions and other backend components to ensure file operations stay within designated directories. This vulnerability is fixed in `@backstage/backend-plugin-api` version 0.1.17. Users should upgrade to this version or later. Some workarounds are available. Run Backstage in a containerized environment with limited filesystem access and/or restrict template creation to trusted users.
Backstage is an open framework for building developer portals. Multiple Scaffolder actions and archive extraction utilities were vulnerable to symlink-based path traversal attacks. An attacker with access to create and execute Scaffolder templates could exploit symlinks to read arbitrary files via the `debug:log` action by creating a symlink pointing to sensitive files (e.g., `/etc/passwd`, configuration files, secrets); delete arbitrary files via the `fs:delete` action by creating symlinks pointing outside the workspace, and write files outside the workspace via archive extraction (tar/zip) containing malicious symlinks. This affects any Backstage deployment where users can create or execute Scaffolder templates. This vulnerability is fixed in `@backstage/backend-defaults` versions 0.12.2, 0.13.2, 0.14.1, and 0.15.0; `@backstage/plugin-scaffolder-backend` versions 2.2.2, 3.0.2, and 3.1.1; and `@backstage/plugin-scaffolder-node` versions 0.11.2 and 0.12.3. Users should upgrade to these versions or later. Some workarounds are available. Follow the recommendation in the Backstage Threat Model to limit access to creating and updating templates, restrict who can create and execute Scaffolder templates using the permissions framework, audit existing templates for symlink usage, and/or run Backstage in a containerized environment with limited filesystem access.
FastAPI Api Key provides a backend-agnostic library that provides an API key system. Version 1.1.0 has a timing side-channel vulnerability in verify_key(). The method applied a random delay only on verification failures, allowing an attacker to statistically distinguish valid from invalid API keys by measuring response latencies. With enough repeated requests, an adversary could infer whether a key_id corresponds to a valid key, potentially accelerating brute-force or enumeration attacks. All users relying on verify_key() for API key authentication prior to the fix are affected. Users should upgrade to version 1.1.0 to receive a patch. The patch applies a uniform random delay (min_delay to max_delay) to all responses regardless of outcome, eliminating the timing correlation. Some workarounds are available. Add an application-level fixed delay or random jitter to all authentication responses (success and failure) before the fix is applied and/or use rate limiting to reduce the feasibility of statistical timing attacks.
The Flux Operator is a Kubernetes CRD controller that manages the lifecycle of CNCF Flux CD and the ControlPlane enterprise distribution. Starting in version 0.36.0 and prior to version 0.40.0, a privilege escalation vulnerability exists in the Flux Operator Web UI authentication code that allows an attacker to bypass Kubernetes RBAC impersonation and execute API requests with the operator's service account privileges. In order to be vulnerable, cluster admins must configure the Flux Operator with an OIDC provider that issues tokens lacking the expected claims (e.g., `email`, `groups`), or configure custom CEL expressions that can evaluate to empty values. After OIDC token claims are processed through CEL expressions, there is no validation that the resulting `username` and `groups` values are non-empty. When both values are empty, the Kubernetes client-go library does not add impersonation headers to API requests, causing them to be executed with the flux-operator service account's credentials instead of the authenticated user's limited permissions. This can result in privilege escalation, data exposure, and/or information disclosure. Version 0.40.0 patches the issue.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.