Company Details
dallas-county
4,476
25,279
92
https://www.dallascounty.org
54
DAL_2190722
Completed

Dallas County Company CyberSecurity Posture
https://www.dallascounty.orgDallas County is the second most populous county in Texas, accountable to two million residents spread over 30 municipalities. The County is a rich tapestry of individuals of varying ages, backgrounds, nationalities and faiths. One-fourth of our population is foreign-born, contributing to the unique vibrancy that sets our County apart. We provide essential community programs, including public and mental health services, a court and juvenile justice system, the recording of property and the issuance of licenses for marriage, drivers and vehicle plates. These services are provided to the citizens by more than 6,500 employees working in 100 different departments and elected offices. Whether you’re a seasoned professional, ready to apply your expertise to the next challenge, or a new member of the workforce researching career options, we invite you to explore our wide range of job opportunities.
Company Details
dallas-county
4,476
25,279
92
https://www.dallascounty.org
54
DAL_2190722
Completed
Between 550 and 599

Dallas County Global Score (TPRM)XXXX

Description: The Vermont Office of the Attorney General reported on July 10, 2024, that Dallas County, Texas, experienced a cybersecurity incident on October 19, 2023, which may have compromised the names of individuals associated with the County. The County engaged third-party cybersecurity specialists to investigate and took steps to secure its information, including deploying an Endpoint Detection and Response (EDR) tool and forcing password changes.
Description: The Texas Attorney General reported a data breach involving Dallas County on July 10, 2024. The breach, discovered on June 27, 2024, occurred due to external system hacking on October 16, 2023, affecting a total of 201,404 individuals with specific impact on one resident's name.
Description: In the October 2023 ransomware incident, Dallas County experienced a significant security breach, with over 200,000 individuals' personal information compromised. Among the data exposed were names, Social Security numbers, dates of birth, driver's license or state ID numbers, and for some, medical and health insurance information. Despite refusing to pay the ransom, the Play ransomware group published the stolen documents, prompting Dallas County to enhance its cybersecurity measures, including deploying EDR tools, initiating password changes, and blocking malicious IP addresses. They also offered credit monitoring and identity theft protection to affected individuals.


No incidents recorded for Dallas County in 2025.
No incidents recorded for Dallas County in 2025.
No incidents recorded for Dallas County in 2025.
Dallas County cyber incidents detection timeline including parent company and subsidiaries

Dallas County is the second most populous county in Texas, accountable to two million residents spread over 30 municipalities. The County is a rich tapestry of individuals of varying ages, backgrounds, nationalities and faiths. One-fourth of our population is foreign-born, contributing to the unique vibrancy that sets our County apart. We provide essential community programs, including public and mental health services, a court and juvenile justice system, the recording of property and the issuance of licenses for marriage, drivers and vehicle plates. These services are provided to the citizens by more than 6,500 employees working in 100 different departments and elected offices. Whether you’re a seasoned professional, ready to apply your expertise to the next challenge, or a new member of the workforce researching career options, we invite you to explore our wide range of job opportunities.


Welcome to the Internal Revenue Service’s official LinkedIn account. Here, you will find the latest and greatest news and updates for taxpayers to help them understand and meet their tax responsibilities. Also, this is a place to learn about a meaningful career with the IRS. Check out the tabs above

Employment with the State of Ohio is more than ‘just a job’ – it is a privilege to serve our families, friends and neighbors who rely on us throughout our great state. We are a team of dedicated public servants committed to high performance, innovative thinking, and delivering excellent and efficien

We are working to provide excellent customs service in the field of legitimate trade according to the latest international practices that is characterized by quality, leadership, justice and satisfaction of customers and employees. We also work to make the necessary legislative amendments to achieve

CDC works 24/7 keeping America safe from health, safety and security threats, both foreign and domestic. Whether diseases start at home or abroad, are chronic or acute, curable or preventable, human error or deliberate attack, CDC fights it and supports communities and citizens to prevent it. CDC is

Work with the Alberta government to build a stronger province for current and future generations. We offer diverse and rewarding employment opportunities in an environment that encourages continuous learning and career growth. We are one of the largest employers in Alberta with over 27,000 empl

MINISTRY of ENVIRONMENT and URBANISM (MEU) MAIN SERVICE UNITS ================== 1) General Directorate of Construction Works 2) General Directorate of Spatial Planning 3) General Directorate of Environmental Management 4) General Directorate of EIA, Permits and Control 5) General Directo

Montréal est la plus grande ville francophone d’Amérique et elle se distingue par sa vitalité culturelle exceptionnelle et des forces créatrices reconnues mondialement. Elle se développe un peu plus chaque jour en une ville contemporaine, inclusive et dynamique sur les plans économique, culturel

GENERAL DIRECTORATE of FORESTRY (GDF) ORMAN GENEL MÜDÜRLÜĞÜ (OGM) The first organization of forestry extends back to 1839, during rule of Ottoman Empire. The establishment of the first management planning team in 1916 and the preparation of the first management plan 1917 fall in this period. The

Minnesota State Government is the third largest employer in the state of Minnesota, employing over 50,000 diverse and talented employees in more than 100 state agencies, boards, commissions, colleges, and universities. Our workplaces can be found across the state in 86 out of 87 Minnesota counties a
.png)
A large suburb outside of Dallas was one of multiple municipalities across the U.S. this week to report cyber incidents affecting public...
Texas Cyber Command must step up as Trump cuts national protection.
Frisco-based HITRUST appointed Gregory Webb as CEO, with founder Daniel S. Nutkis transitioning to executive chairman to guide strategy and...
The Texas Cyber Command, created earlier this year as a priority of the GOP governor, will be led by Timothy James “TJ” White — a retired...
The North Texas Internet Crimes Against Children Task Force and FBI Dallas's North Texas Child Exploitation Task Force have announced the...
Cybersecurity, emergency response and infrastructure projects are among the key proposals in a $13 billion spending bill advanced Tuesday by the Texas Senate.
The city of Abilene disconnected servers after officials detected a cyber incident last week.
Gov. Greg Abbott laid out seven emergency items – bills he wants to see passed as soon as possible – for Texas lawmakers to consider.
Dallas College, Tarrant County College, Collin College, Hill College and Paris Junior College collectively received over $1.4 million from...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Dallas County is https://www.dallascounty.org.
According to Rankiteo, Dallas County’s AI-generated cybersecurity score is 574, reflecting their Very Poor security posture.
According to Rankiteo, Dallas County currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Dallas County is not certified under SOC 2 Type 1.
According to Rankiteo, Dallas County does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Dallas County is not listed as GDPR compliant.
According to Rankiteo, Dallas County does not currently maintain PCI DSS compliance.
According to Rankiteo, Dallas County is not compliant with HIPAA regulations.
According to Rankiteo,Dallas County is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Dallas County operates primarily in the Government Administration industry.
Dallas County employs approximately 4,476 people worldwide.
Dallas County presently has no subsidiaries across any sectors.
Dallas County’s official LinkedIn profile has approximately 25,279 followers.
Dallas County is classified under the NAICS code 92, which corresponds to Public Administration.
No, Dallas County does not have a profile on Crunchbase.
Yes, Dallas County maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/dallas-county.
As of November 27, 2025, Rankiteo reports that Dallas County has experienced 3 cybersecurity incidents.
Dallas County has an estimated 11,116 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach and Ransomware.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with deploying edr tools, containment measures with initiating password changes, containment measures with blocking malicious ip addresses, and remediation measures with credit monitoring, remediation measures with identity theft protection, and third party assistance with cybersecurity specialists, and containment measures with deploying an endpoint detection and response (edr) tool, containment measures with forcing password changes..
Title: Dallas County Ransomware Incident
Description: In the October 2023 ransomware incident, Dallas County experienced a significant security breach, with over 200,000 individuals' personal information compromised. Among the data exposed were names, Social Security numbers, dates of birth, driver's license or state ID numbers, and for some, medical and health insurance information. Despite refusing to pay the ransom, the Play ransomware group published the stolen documents, prompting Dallas County to enhance its cybersecurity measures, including deploying EDR tools, initiating password changes, and blocking malicious IP addresses. They also offered credit monitoring and identity theft protection to affected individuals.
Date Detected: 2023-10
Type: Ransomware
Threat Actor: Play ransomware group
Motivation: Financial
Title: Dallas County Cybersecurity Incident
Description: The Vermont Office of the Attorney General reported on July 10, 2024, that Dallas County, Texas, experienced a cybersecurity incident on October 19, 2023, which may have compromised the names of individuals associated with the County. The County engaged third-party cybersecurity specialists to investigate and took steps to secure its information, including deploying an Endpoint Detection and Response (EDR) tool and forcing password changes.
Date Detected: 2023-10-19
Date Publicly Disclosed: 2024-07-10
Type: Cybersecurity Incident
Title: Dallas County Data Breach
Description: The Texas Attorney General reported a data breach involving Dallas County on July 10, 2024. The breach, discovered on June 27, 2024, occurred due to external system hacking on October 16, 2023, affecting a total of 201,404 individuals with specific impact on one resident's name.
Date Detected: 2024-06-27
Date Publicly Disclosed: 2024-07-10
Type: Data Breach
Attack Vector: External System Hacking
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Names, Social security numbers, Dates of birth, Driver's license or state id numbers, Medical and health insurance information
Identity Theft Risk: True

Data Compromised: Names of individuals

Data Compromised: Name
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Social Security Numbers, Dates Of Birth, Driver'S License Or State Id Numbers, Medical And Health Insurance Information, , names of individuals, Name and .

Entity Name: Dallas County
Entity Type: Government
Industry: Public Administration
Location: Dallas, Texas
Customers Affected: 200000

Entity Name: Dallas County
Entity Type: Government
Industry: Public Administration
Location: Texas, USA

Entity Name: Dallas County
Entity Type: Government
Industry: Public Administration
Location: Dallas, Texas
Customers Affected: 201404

Containment Measures: Deploying EDR toolsInitiating password changesBlocking malicious IP addresses
Remediation Measures: Credit monitoringIdentity theft protection

Third Party Assistance: cybersecurity specialists
Containment Measures: deploying an Endpoint Detection and Response (EDR) toolforcing password changes
Third-Party Assistance: The company involves third-party assistance in incident response through cybersecurity specialists.

Type of Data Compromised: Names, Social security numbers, Dates of birth, Driver's license or state id numbers, Medical and health insurance information
Number of Records Exposed: 200000
Sensitivity of Data: High

Type of Data Compromised: names of individuals

Type of Data Compromised: Name
Number of Records Exposed: 201404
Personally Identifiable Information: Name
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Credit monitoring, Identity theft protection, .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by deploying edr tools, initiating password changes, blocking malicious ip addresses, , deploying an endpoint detection and response (edr) tool, forcing password changes and .

Ransom Demanded: True
Ransomware Strain: Play
Data Exfiltration: True

Source: Vermont Office of the Attorney General
Date Accessed: 2024-07-10
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Vermont Office of the Attorney GeneralDate Accessed: 2024-07-10, and Source: Texas Attorney GeneralDate Accessed: 2024-07-10.
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as cybersecurity specialists.
Last Ransom Demanded: The amount of the last ransom demanded was True.
Last Attacking Group: The attacking group in the last incident was an Play ransomware group.
Most Recent Incident Detected: The most recent incident detected was on 2023-10.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-07-10.
Most Significant Data Compromised: The most significant data compromised in an incident were Names, Social Security numbers, Dates of birth, Driver's license or state ID numbers, Medical and health insurance information, , names of individuals, , Name and .
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was cybersecurity specialists.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Deploying EDR toolsInitiating password changesBlocking malicious IP addresses and deploying an Endpoint Detection and Response (EDR) toolforcing password changes.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Name, Social Security numbers, Dates of birth, Medical and health insurance information, names of individuals, Driver's license or state ID numbers and Names.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 805.0.
Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was True.
Most Recent Source: The most recent source of information about an incident are Texas Attorney General and Vermont Office of the Attorney General.
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.