ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Cybercube is platform where everyone gets gg's they deserve. Bet on your skill and the smart matchmaking system will do everything to ensure that the chances are equal. Victory is only in your hands!

Cybercube A.I CyberSecurity Scoring

Cybercube

Company Details

Linkedin ID:

cybercube

Employees number:

4

Number of followers:

247

NAICS:

513

Industry Type:

Technology, Information and Internet

Homepage:

cybercube.gg

IP Addresses:

0

Company ID:

CYB_2437745

Scan Status:

In-progress

AI scoreCybercube Risk Score (AI oriented)

Between 650 and 699

https://images.rankiteo.com/companyimages/cybercube.jpeg
Cybercube Technology, Information and Internet
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreCybercube Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/cybercube.jpeg
Cybercube Technology, Information and Internet
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Cybercube Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Cybercube: Ransomware keeps widening its reachRansomware100512/2025
Rankiteo Explanation :
Attack threatening the organization's existence

Description: **Ransomware Expands into New Sectors and Regions, With Public Sector at High Risk** A new report from CyberCube’s *Global Threat Briefing for H2 2025* reveals that ransomware attacks are increasingly targeting sectors and regions previously considered lower-risk. The analysis, which examined incident patterns, threat actor behavior, and security postures, highlights a shifting landscape where attackers exploit weaker defensive baselines and slower adoption of security controls. Ransomware incidents are growing fastest in regions with historically lower attack volumes, driven in part by the expansion of established groups like LockBit. The report underscores that threat actors are drawn to areas with less mature cybersecurity infrastructure, making it harder for organizations to anticipate emerging risks. Industry comparisons show significant variation in defensive strength. While some sectors demonstrate strong security hygiene and fewer vulnerabilities, others exhibit weaker controls—such as exposed remote services, outdated software, and open ports—correlating with higher ransomware activity. Notably, security posture varies widely even within the same industry, meaning sector classification alone is not a reliable predictor of resilience. The public sector emerges as a particularly high-risk target. The report finds that **53% of state and local government offices worldwide fall into a high-risk category for LockBit attacks**, placing them among the most exposed groups in the dataset. Many public sector organizations struggle with inconsistent security practices, though some maintain robust defenses. The analysis groups these entities into risk clusters based on exposure and security posture: - **16%** exhibit both high exposure and weak security, making them prime targets due to slow patching and visible attack surfaces. - **19%** show high exposure but stronger controls, reducing the likelihood of successful ransomware deployment despite remaining attractive targets. - The remaining organizations have lower exposure, where targeted improvements could yield faster risk reduction. The report emphasizes that early indicators—such as rising negative cyber signals, shifting exposure patterns, and threat actor movement—can help forecast future attack trends. Ransomware growth often aligns with unpatched vulnerabilities, expanded attack surfaces, and delayed remediation, reinforcing the need for proactive monitoring and adaptive defenses.

Cybercube: Ransomware keeps widening its reach
Ransomware
Severity: 100
Impact: 5
Seen: 12/2025
Blog:
Rankiteo Explanation
Attack threatening the organization's existence

Description: **Ransomware Expands into New Sectors and Regions, With Public Sector at High Risk** A new report from CyberCube’s *Global Threat Briefing for H2 2025* reveals that ransomware attacks are increasingly targeting sectors and regions previously considered lower-risk. The analysis, which examined incident patterns, threat actor behavior, and security postures, highlights a shifting landscape where attackers exploit weaker defensive baselines and slower adoption of security controls. Ransomware incidents are growing fastest in regions with historically lower attack volumes, driven in part by the expansion of established groups like LockBit. The report underscores that threat actors are drawn to areas with less mature cybersecurity infrastructure, making it harder for organizations to anticipate emerging risks. Industry comparisons show significant variation in defensive strength. While some sectors demonstrate strong security hygiene and fewer vulnerabilities, others exhibit weaker controls—such as exposed remote services, outdated software, and open ports—correlating with higher ransomware activity. Notably, security posture varies widely even within the same industry, meaning sector classification alone is not a reliable predictor of resilience. The public sector emerges as a particularly high-risk target. The report finds that **53% of state and local government offices worldwide fall into a high-risk category for LockBit attacks**, placing them among the most exposed groups in the dataset. Many public sector organizations struggle with inconsistent security practices, though some maintain robust defenses. The analysis groups these entities into risk clusters based on exposure and security posture: - **16%** exhibit both high exposure and weak security, making them prime targets due to slow patching and visible attack surfaces. - **19%** show high exposure but stronger controls, reducing the likelihood of successful ransomware deployment despite remaining attractive targets. - The remaining organizations have lower exposure, where targeted improvements could yield faster risk reduction. The report emphasizes that early indicators—such as rising negative cyber signals, shifting exposure patterns, and threat actor movement—can help forecast future attack trends. Ransomware growth often aligns with unpatched vulnerabilities, expanded attack surfaces, and delayed remediation, reinforcing the need for proactive monitoring and adaptive defenses.

Ailogo

Cybercube Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Cybercube

Incidents vs Technology, Information and Internet Industry Average (This Year)

Cybercube has 14.94% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

Cybercube has 29.87% more incidents than the average of all companies with at least one recorded incident.

Incident Types Cybercube vs Technology, Information and Internet Industry Avg (This Year)

Cybercube reported 1 incidents this year: 0 cyber attacks, 1 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.

Incident History — Cybercube (X = Date, Y = Severity)

Cybercube cyber incidents detection timeline including parent company and subsidiaries

Cybercube Company Subsidiaries

SubsidiaryImage

Cybercube is platform where everyone gets gg's they deserve. Bet on your skill and the smart matchmaking system will do everything to ensure that the chances are equal. Victory is only in your hands!

Loading...
similarCompanies

Cybercube Similar Companies

Swiggy

Swiggy is India’s pioneering on-demand convenience platform, catering to millions of consumers each month. Founded in 2014, its mission is to elevate the quality of life for the urban consumer by offering unparalleled convenience. With an extensive footprint in food delivery, Swiggy Food collaborate

Delivery Hero

As the world’s leading local delivery platform, our mission is to deliver an amazing experience, fast, easy, and to your door. We operate in over 70+ countries worldwide, powered by tech but driven by people. As one of Europe’s largest tech platforms, we enable ambitious talent to deliver solutions

Mercado Livre Brasil

Fundada em 1999, MercadoLivre é uma companhia de tecnologia líder em comércio eletrônico na América Latina. Por meio de suas principais plataformas MercadoLivre.com e MercadoPago.com, oferece soluções de comércio eletrônico para que pessoas e empresas possam comprar, vender, pagar e anunciar produto

At Flipkart, we're driven by our purpose of empowering every Indian's dream by delivering value through innovation in technology and commerce. With a customer base of over 350 million, product coverage of over 150 million across 80+ categories, a focus on generating direct and indirect employment an

Avnet

Avnet is a global electronic components distributor with extensive design, product, marketing and supply chain expertise for customers and suppliers at every stage of the product lifecycle. For the past 100 years, Avnet has helped its customers and suppliers around the world realize the transformati

At eBay, we create pathways to connect millions of sellers and buyers in more than 190 markets around the world. Our technology empowers our customers, providing everyone the opportunity to grow and thrive — no matter who they are or where they are in the world. And the ripple effect of our work cre

Taobao Marketplace

Launched in May 2003, Taobao Marketplace (www.taobao.com) is the online shopping destination of choice for Chinese consumers looking for wide selection, value and convenience. Shoppers choose from a wide range of products and services on Taobao Marketplace, which features hundreds of millions of pro

Independiente / Freelance

La etimología de la palabra deriva del término medieval inglés usado para un mercenario (free-independiente o lance-lanza), es decir, un caballero que no servía a ningún señor en concreto y cuyos servicios podían ser alquilados por cualquiera. El término fue acuñado inicialmente por Sir Walter Scot

Synechron

At Synechron, we believe in the power of digital to transform businesses for the better. Our global consulting firm combines creativity and innovative technology to deliver industry-leading digital solutions. Synechron’s progressive technologies and optimization strategies span end-to-end Artificial

newsone

Cybercube CyberSecurity News

October 03, 2025 07:00 AM
CyberCube’s $180m raise headlines $930m week for global FinTech deals

A $180m round for CyberCube headlined a busy week for FinTech, with investors deploying more than $930m across 24 deals worldwide.

October 03, 2025 07:00 AM
The Week’s 10 Biggest Funding Rounds: Another Big Week For AI And California Startups

Want to keep track of the largest startup funding deals in 2025 with our curated list of $100 million-plus venture deals to U.S.-based...

October 01, 2025 07:00 AM
CyberCube Secures $180 Million Investment from Spectrum Equity

Cyber risk analytics firm CyberCube has raised over $180 million in new funding from Spectrum Equity, which now joins ForgePoint Capital,...

October 01, 2025 07:00 AM
CyberCube Raises More Than $180MM from New Cornerstone Investor Spectrum Equity

CyberCube, a leading cyber risk modeling and analytics business, today announced an investment of more than $180MM by Spectrum Equity,...

September 25, 2025 07:00 AM
Cyber insurance could greatly reduce losses from diversification, mitigation measures

A report by CyberCube shows the global market is heavily concentrated in the U.S. and would benefit from expanding into new segments and...

September 17, 2025 07:00 AM
New Cyber Insurance MGA Launches with Exclusive Partnership with Global Cybersecurity Firm, Trend Micro

"Discover the power of cybersecurity and insurance combined with Invision Cyber's new partnership with Trend Micro.

August 31, 2025 07:00 AM
Gurugram Engineer Starts A Cybersecurity Co. From Home; His Startup Now Serves 800+ Clients Globally & Generated ₹25 Cr+ Rev During Last FY

Meet Anil Kumar, the Gurugram engineer who turned his home into a cybersecurity launchpad. His bootstrapped venture, CyberCube,...

August 31, 2025 07:00 AM
How a Gurugram Engineer Built a ₹25 Crore Cybersecurity Firm Cybercube Serving 800+ Clients Worldwide

Anil Kumar, a young engineer from the small town of Jewar in Uttar Pradesh, has turned his childhood dream into reality.

July 21, 2025 07:00 AM
Munich Re, CyberCube Report Warns of Growing Systemic Cyber Risk

The report – titled “Key insights into systemic cyber risk” – provided insights from 93 cybersecurity experts on two of the biggest cyber accumulation risks.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Cybercube CyberSecurity History Information

Official Website of Cybercube

The official website of Cybercube is http://www.cybercube.gg.

Cybercube’s AI-Generated Cybersecurity Score

According to Rankiteo, Cybercube’s AI-generated cybersecurity score is 654, reflecting their Weak security posture.

How many security badges does Cybercube’ have ?

According to Rankiteo, Cybercube currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Cybercube have SOC 2 Type 1 certification ?

According to Rankiteo, Cybercube is not certified under SOC 2 Type 1.

Does Cybercube have SOC 2 Type 2 certification ?

According to Rankiteo, Cybercube does not hold a SOC 2 Type 2 certification.

Does Cybercube comply with GDPR ?

According to Rankiteo, Cybercube is not listed as GDPR compliant.

Does Cybercube have PCI DSS certification ?

According to Rankiteo, Cybercube does not currently maintain PCI DSS compliance.

Does Cybercube comply with HIPAA ?

According to Rankiteo, Cybercube is not compliant with HIPAA regulations.

Does Cybercube have ISO 27001 certification ?

According to Rankiteo,Cybercube is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Cybercube

Cybercube operates primarily in the Technology, Information and Internet industry.

Number of Employees at Cybercube

Cybercube employs approximately 4 people worldwide.

Subsidiaries Owned by Cybercube

Cybercube presently has no subsidiaries across any sectors.

Cybercube’s LinkedIn Followers

Cybercube’s official LinkedIn profile has approximately 247 followers.

NAICS Classification of Cybercube

Cybercube is classified under the NAICS code 513, which corresponds to Others.

Cybercube’s Presence on Crunchbase

No, Cybercube does not have a profile on Crunchbase.

Cybercube’s Presence on LinkedIn

Yes, Cybercube maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/cybercube.

Cybersecurity Incidents Involving Cybercube

As of December 12, 2025, Rankiteo reports that Cybercube has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Cybercube has an estimated 13,095 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Cybercube ?

Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.

Incident Details

Can you provide details on each incident ?

Incident : Ransomware

Title: Global Ransomware Spread and Sector Exposure Trends (H2 2025)

Description: Ransomware incidents are spreading into new sectors and regions, with varying defensive strengths across industries. Public sector organizations show high exposure to LockBit ransomware, with 53% of state and local government offices worldwide falling into a high-risk category. The report highlights growth trends, sector comparisons, and risk clusters based on exposure and security posture.

Date Publicly Disclosed: 2025

Type: Ransomware

Vulnerability Exploited: open portsoutdated softwareexposed remote services

Threat Actor: LockBit

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Impact of the Incidents

Which entities were affected by each incident ?

Incident : Ransomware CYB1765526320

Entity Type: Public Sector

Industry: Government

Location: Global

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : Ransomware CYB1765526320

Ransomware Strain: LockBit

Lessons Learned and Recommendations

What lessons were learned from each incident ?

Incident : Ransomware CYB1765526320

Lessons Learned: Ransomware growth often mirrors gaps in patching, increased availability of attack surfaces, and slower remediation of known weaknesses. Early indicators such as rising negative cyber signals and changing exposure patterns can help forecast shifts in threat behavior.

What recommendations were made to prevent future incidents ?

Incident : Ransomware CYB1765526320

Recommendations: Improve security posture by addressing open ports, outdated software, and exposed remote services., Enhance monitoring and quick adjustment to early threat indicators., Target improvements in high-exposure, weak-security clusters for faster impact.Improve security posture by addressing open ports, outdated software, and exposed remote services., Enhance monitoring and quick adjustment to early threat indicators., Target improvements in high-exposure, weak-security clusters for faster impact.Improve security posture by addressing open ports, outdated software, and exposed remote services., Enhance monitoring and quick adjustment to early threat indicators., Target improvements in high-exposure, weak-security clusters for faster impact.

What are the key lessons learned from past incidents ?

Key Lessons Learned: The key lessons learned from past incidents are Ransomware growth often mirrors gaps in patching, increased availability of attack surfaces, and slower remediation of known weaknesses. Early indicators such as rising negative cyber signals and changing exposure patterns can help forecast shifts in threat behavior.

References

Where can I find more information about each incident ?

Incident : Ransomware CYB1765526320

Source: CyberCube Global Threat Briefing for H2 2025

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: CyberCube Global Threat Briefing for H2 2025.

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Ransomware CYB1765526320

Root Causes: Slow Patching Cycles, Visible Attack Surfaces, Weaker Security Controls,

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident was an LockBit.

Incident Details

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025.

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents ?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was Ransomware growth often mirrors gaps in patching, increased availability of attack surfaces, and slower remediation of known weaknesses. Early indicators such as rising negative cyber signals and changing exposure patterns can help forecast shifts in threat behavior.

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Enhance monitoring and quick adjustment to early threat indicators., Improve security posture by addressing open ports, outdated software, and exposed remote services., Target improvements in high-exposure and weak-security clusters for faster impact..

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is CyberCube Global Threat Briefing for H2 2025.

cve

Latest Global CVEs (Not Company-Specific)

Description

LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, there is no handler for JSON parsing errors; SyntaxError from express.json() includes user input in the error message, which gets reflected in responses. User input (including HTML/JavaScript) can be exposed in error responses, creating an XSS risk if Content-Type isn't strictly enforced. This issue does not have a fix at the time of publication.

Risk Information
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, when creating prompts, JSON requests are sent to define and modify the prompts via PATCH endpoint for prompt groups (/api/prompts/groups/:groupId). However, the request bodies are not sufficiently validated for proper input, enabling users to modify prompts in a way that was not intended as part of the front end system. The patchPromptGroup function passes req.body directly to updatePromptGroup() without filtering sensitive fields. This issue is fixed in version 0.8.1.

Risk Information
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, when a user posts a question, the iconURL parameter of the POST request can be modified by an attacker. The malicious code is then stored in the chat which can then be shared to other users. When sharing chats with a potentially malicious “tracker”, resources loaded can lead to loss of privacy for users who view the chat link that is sent to them. This issue is fixed in version 0.8.1.

Risk Information
cvss4
Base: 8.6
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

MaxKB is an open-source AI assistant for enterprise. Versions 2.3.1 and below have improper file permissions which allow attackers to overwrite the built-in dynamic linker and other critical files, potentially resulting in privilege escalation. This issue is fixed in version 2.4.0.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Description

MaxKB is an open-source AI assistant for enterprise. In versions 2.3.1 and below, the tool module allows an attacker to escape the sandbox environment and escalate privileges under certain concurrent conditions. This issue is fixed in version 2.4.0.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=cybercube' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge