Company Details
defense-security-cooperation-agency
453
22,589
92811
dsca.mil
2
DEF_6190638
Completed


Defense Security Cooperation Agency Company CyberSecurity Posture
dsca.milThe mission of the Defense Security Cooperation Agency (DSCA) is to advance U.S. national security and foreign policy interests by building the capacity of foreign security forces to respond to shared challenges. DSCA leads the broader U.S. security cooperation enterprise in its efforts to train, educate, advise, and equip foreign partners. DSCA administers security cooperation programs that support U.S. policy interests and objectives identified by the White House, Department of Defense, and Department of State. These objectives include developing specific partner capabilities, building alliances and partnerships, and facilitating U.S. access. DSCA integrates security cooperation activities in support of a whole-of-government approach; provides execution guidance to DoD entities that implement security cooperation programs; exercises financial and program management for the Foreign Military Sales system and many other security cooperation programs; and educates and provides for the long-term development of the security cooperation workforce. Programs-at-a-glance include: • Foreign Military Sales (FMS) • Foreign Military Financing (FMF) • Institutional Capacity Building (ICB) • International Military Education and Training (IMET) • Humanitarian Assistance, Disaster Relief and Mine Action (HDM) http://dodcio.defense.gov/SocialMedia/UserAgreement.aspx For more information on DSCA, e-mail: [email protected]
Company Details
defense-security-cooperation-agency
453
22,589
92811
dsca.mil
2
DEF_6190638
Completed
Between 700 and 749

DSCA Global Score (TPRM)XXXX

Description: The Awaken Likho APT group, also known as Core Werewolf and PseudoGamaredon, launched a targeted campaign using a new implant to infiltrate Russian government entities and enterprises. This campaign utilized phishing emails with malicious URLs to distribute the MeshAgent tool, enabling remote system control. An SFX archive concealed the attack by displaying a decoy document while setting up the MeshAgent to maintain a persistent connection with the attackers' server. This allowed for continuous remote access, compromising the integrity of the targeted systems. The attack underscores the evolving threat tactics and sophistication of the APT group.
Description: The Russian-linked threat actor RomCom targeted Ukrainian government agencies and Polish entities in a sophisticated cyber attack campaign since late 2023. The attacks involved spear-phishing to deliver malware, including an updated variant of the RomCom RAT named 'SingleCamper,' as well as new downloaders and backdoors. Tools were executed for initial network reconnaissance and creating remote tunnels for command and control (C2) communications. The group performed data exfiltration, system reconnaissance, and maintained long-term access for espionage. There is also a potential for ransomware deployment to disrupt operations and generate profit. The impact includes the compromise of government systems and the risk of geopolitical instability due to the nature of the targeted entities.


No incidents recorded for Defense Security Cooperation Agency in 2026.
No incidents recorded for Defense Security Cooperation Agency in 2026.
No incidents recorded for Defense Security Cooperation Agency in 2026.
DSCA cyber incidents detection timeline including parent company and subsidiaries

The mission of the Defense Security Cooperation Agency (DSCA) is to advance U.S. national security and foreign policy interests by building the capacity of foreign security forces to respond to shared challenges. DSCA leads the broader U.S. security cooperation enterprise in its efforts to train, educate, advise, and equip foreign partners. DSCA administers security cooperation programs that support U.S. policy interests and objectives identified by the White House, Department of Defense, and Department of State. These objectives include developing specific partner capabilities, building alliances and partnerships, and facilitating U.S. access. DSCA integrates security cooperation activities in support of a whole-of-government approach; provides execution guidance to DoD entities that implement security cooperation programs; exercises financial and program management for the Foreign Military Sales system and many other security cooperation programs; and educates and provides for the long-term development of the security cooperation workforce. Programs-at-a-glance include: • Foreign Military Sales (FMS) • Foreign Military Financing (FMF) • Institutional Capacity Building (ICB) • International Military Education and Training (IMET) • Humanitarian Assistance, Disaster Relief and Mine Action (HDM) http://dodcio.defense.gov/SocialMedia/UserAgreement.aspx For more information on DSCA, e-mail: [email protected]


As the nation’s logistics combat support agency, the DLA manages the end-to-end global defense supply chain – from raw materials to end user disposition – for the five military services, 11 combatant commands, other federal, state and local agencies and partner and allied nations. DLA’s mission is

The Swedish Armed Forces is one of the biggest authorities in Sweden and is headed by a Supreme Commander. The deputy leader of the authority is the Director General. As the only authority permitted to engage in armed combat, the Swedish Armed Forces are Sweden’s ultimate security policy resource

The mission of the Department of War is to provide military forces necessary to protect the security of our country. The U.S. military defends the homeland, deters adversaries, and builds security around the world by projecting U.S. influence and working with allies and partners. In case deterrence

The Albanian Armed Forces (AAF) (Albanian: Forcat e Armatosura të Republikës së Shqipërisë (FARSH)) were formed after the declaration of independence in 1912. Today it consists of: the General Staff, the Albanian Land Force, the Albanian Air Force and the Albanian Naval Force. According to the Al

The United States is a maritime nation, and the U.S. Navy protects America at sea. Alongside our allies and partners, we defend freedom, preserve economic prosperity, and keep the seas open and free. Our nation is engaged in long-term competition. To defend American interests around the globe, the U

This is the Official LinkedIn Page of Marine Corps Recruiting. We make Marines. We win our nation's battles. We develop quality citizens. These are the promises the Marine Corps makes to our nation and to our Marines. The core values that guide us, and the leadership skills that enable us, not on

Official LinkedIn account of the U.S. Coast Guard — The Nation’s premier maritime military service and leading counter-drug force, protecting the maritime domain and advancing national security in service to the American people. Semper Paratus! As one of the six branches of the Armed Forces, the U.

Joining the British Army, you’ll get much more from life than you ever would with a civilian career – you’ll have the opportunity to do something that really matters, with a team that are like family to you. The sense of belonging in the Army is next level: when you’ve trained with each other and ov

Het Ministerie van Defensie bestaat uit de Koninklijke Marine, de Koninklijke Landmacht, de Koninklijke Luchtmacht, de Koninklijke Marechaussee, het Commando DienstenCentra en de Defensie Materieel Organisatie. Aan het hoofd van de Bestuursstaf (het departement) staat de minister van Defensie. We
.png)
The US State Department has notified Congress of eight prospective foreign military sales (FMS) to the Taipei Economic and Cultural...
Beijing did not take the announcement well, saying the offer of the arms package "grossly violates the one-China principle," undermines...
The missiles may be carried by Germany's new F127 class frigates as part of a maritime air defense capability, a US government notice said.
Secretary Pete Hegseth announced details of sweeping reforms aimed at promoting competition, reducing bureaucracy, and accelerating the...
Guest: Stephanie Kostro. Title: President, Professional Services Council. Summary: Defense Secretary Pete Hegseth laid out a plan last week...
Defense Secretary Pete Hegseth issued new guidance to modernize the Pentagon's arms transfer system and streamline foreign military sales.
Defense Secretary Pete Hegseth is planning a Nov. 7 speech to roll out the Trump administration's plans to change the defense acquisition...
Under Hegseth's proposed restructuring plan, DSCA overseeing FMS deals will move to the acquisition and sustainment office led by Michael...
The Defense secretary will announce changes to the Pentagon's weapons purchases at an unusual gathering of defense industry executives.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Defense Security Cooperation Agency is http://www.dsca.mil.
According to Rankiteo, Defense Security Cooperation Agency’s AI-generated cybersecurity score is 735, reflecting their Moderate security posture.
According to Rankiteo, Defense Security Cooperation Agency currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Defense Security Cooperation Agency has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Defense Security Cooperation Agency is not certified under SOC 2 Type 1.
According to Rankiteo, Defense Security Cooperation Agency does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Defense Security Cooperation Agency is not listed as GDPR compliant.
According to Rankiteo, Defense Security Cooperation Agency does not currently maintain PCI DSS compliance.
According to Rankiteo, Defense Security Cooperation Agency is not compliant with HIPAA regulations.
According to Rankiteo,Defense Security Cooperation Agency is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Defense Security Cooperation Agency operates primarily in the Armed Forces industry.
Defense Security Cooperation Agency employs approximately 453 people worldwide.
Defense Security Cooperation Agency presently has no subsidiaries across any sectors.
Defense Security Cooperation Agency’s official LinkedIn profile has approximately 22,589 followers.
Defense Security Cooperation Agency is classified under the NAICS code 92811, which corresponds to National Security.
No, Defense Security Cooperation Agency does not have a profile on Crunchbase.
Yes, Defense Security Cooperation Agency maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/defense-security-cooperation-agency.
As of January 24, 2026, Rankiteo reports that Defense Security Cooperation Agency has experienced 2 cybersecurity incidents.
Defense Security Cooperation Agency has an estimated 818 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.
Title: Awaken Likho APT Group Campaign
Description: The Awaken Likho APT group, also known as Core Werewolf and PseudoGamaredon, launched a targeted campaign using a new implant to infiltrate Russian government entities and enterprises. This campaign utilized phishing emails with malicious URLs to distribute the MeshAgent tool, enabling remote system control. An SFX archive concealed the attack by displaying a decoy document while setting up the MeshAgent to maintain a persistent connection with the attackers' server. This allowed for continuous remote access, compromising the integrity of the targeted systems. The attack underscores the evolving threat tactics and sophistication of the APT group.
Type: Phishing
Attack Vector: Phishing emails with malicious URLs
Threat Actor: Awaken Likho APT GroupCore WerewolfPseudoGamaredon
Title: RomCom Cyber Attack Campaign
Description: The Russian-linked threat actor RomCom targeted Ukrainian government agencies and Polish entities in a sophisticated cyber attack campaign since late 2023. The attacks involved spear-phishing to deliver malware, including an updated variant of the RomCom RAT named 'SingleCamper,' as well as new downloaders and backdoors. Tools were executed for initial network reconnaissance and creating remote tunnels for command and control (C2) communications. The group performed data exfiltration, system reconnaissance, and maintained long-term access for espionage. There is also a potential for ransomware deployment to disrupt operations and generate profit. The impact includes the compromise of government systems and the risk of geopolitical instability due to the nature of the targeted entities.
Date Detected: Late 2023
Type: Cyber Espionage, Potential Ransomware
Attack Vector: Spear-phishingMalware Delivery
Threat Actor: RomCom
Motivation: EspionagePotential Profit
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Phishing emails with malicious URLs and Spear-phishing.

Operational Impact: Compromised integrity of targeted systems

Systems Affected: Government Systems

Entity Name: Ukrainian Government Agencies
Entity Type: Government
Industry: Public Sector
Location: Ukraine

Entity Name: Polish Entities
Entity Type: Government
Industry: Public Sector
Location: Poland


Data Exfiltration: True

Entry Point: Phishing emails with malicious URLs

Entry Point: Spear-phishing
Backdoors Established: True
High Value Targets: Ukrainian Government Agencies, Polish Entities,
Data Sold on Dark Web: Ukrainian Government Agencies, Polish Entities,
Last Attacking Group: The attacking group in the last incident were an Awaken Likho APT GroupCore WerewolfPseudoGamaredon and RomCom.
Most Recent Incident Detected: The most recent incident detected was on Late 2023.
Most Significant System Affected: The most significant system affected in an incident was Government Systems.
Most Recent Entry Point: The most recent entry point used by an initial access broker were an Spear-phishing and Phishing emails with malicious URLs.
.png)
Typemill is a flat-file, Markdown-based CMS designed for informational documentation websites. A reflected Cross-Site Scripting (XSS) exists in the login error view template `login.twig` of versions 2.19.1 and below. The `username` value can be echoed back without proper contextual encoding when authentication fails. An attacker can execute script in the login page context. This issue has been fixed in version 2.19.2.
A DOM-based Cross-Site Scripting (XSS) vulnerability exists in the DomainCheckerApp class within domain/script.js of Sourcecodester Domain Availability Checker v1.0. The vulnerability occurs because the application improperly handles user-supplied data in the createResultElement method by using the unsafe innerHTML property to render domain search results.
A Remote Code Execution (RCE) vulnerability exists in Sourcecodester Modern Image Gallery App v1.0 within the gallery/upload.php component. The application fails to properly validate uploaded file contents. Additionally, the application preserves the user-supplied file extension during the save process. This allows an unauthenticated attacker to upload arbitrary PHP code by spoofing the MIME type as an image, leading to full system compromise.
A UNIX symbolic link following issue in the jailer component in Firecracker version v1.13.1 and earlier and 1.14.0 on Linux may allow a local host user with write access to the pre-created jailer directories to overwrite arbitrary host files via a symlink attack during the initialization copy at jailer startup, if the jailer is executed with root privileges. To mitigate this issue, users should upgrade to version v1.13.2 or 1.14.1 or above.
An information disclosure vulnerability exists in the /srvs/membersrv/getCashiers endpoint of the Aptsys gemscms backend platform thru 2025-05-28. This unauthenticated endpoint returns a list of cashier accounts, including names, email addresses, usernames, and passwords hashed using MD5. As MD5 is a broken cryptographic function, the hashes can be easily reversed using public tools, exposing user credentials in plaintext. This allows remote attackers to perform unauthorized logins and potentially gain access to sensitive POS operations or backend functions.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.