Company Details
department-of-veterans-affairs
197,183
1,532,316
92
va.gov
0
U.S_4630831
In-progress

U.S. Department of Veterans Affairs Company CyberSecurity Posture
va.govWelcome to the United States Department of Veterans Affairs (VA) Official LinkedIn page. We're recruiting the finest employees to care for our #Veterans. Following/engagement ≠ signify VA endorsement. This is a moderated page, meaning that all comments will be reviewed for appropriate content. Please show respect to others. Comments that do not directly relate to the topics covered on this page, including commerce, external links, spam, abusive or vulgar language, hate speech, accusations against individuals, or personal attacks will be considered “off topic” and may not be posted. VA reserves the right to determine which comments are acceptable for this page. VA may remove comments that do not follow these terms, or comments that VA may reasonably believe could cause harm if they remain. VA may, at its sole discretion, terminate a user’s ability to post comments to this site for repeated or excessive violations of these standards. For more information, please visit bit.ly/2Q14Y1p
Company Details
department-of-veterans-affairs
197,183
1,532,316
92
va.gov
0
U.S_4630831
In-progress
Between 700 and 749

UDVA Global Score (TPRM)XXXX

Description: In May 2006, a VA employee’s laptop containing personal data on 26.5 million veterans was stolen from their home. The data included names, dates of birth, and social security numbers. Although the laptop was later recovered and no data was compromised, the incident highlighted significant cybersecurity challenges and led to major changes in the VA’s cybersecurity practices.
Description: The U.S. Department of Veterans Affairs suffered a data breach incident that exposed the COVID-19 vaccination status data for about 500,000 of its employees. Following an internal investigation, the agency removed a spreadsheet containing personal details including vaccination status.
Description: The firing of Jonathan Kamens, the security lead for the Department of Veterans Affairs website, potentially compromises the security of sensitive veteran information. VA.gov, serving as the 'front door' for VA benefits, is a critical platform for over 20 million veterans accessing personal and medical data. The website's cybersecurity is expected to deteriorate without Kamens, risking the exposure of deeply private information and the integrity of digital services essential to veterans and their families.
Description: The termination of cybersecurity lead Jonathan Kamens from the US Digital Service has introduced significant risk to the security of VA.gov, the essential digital platform used by US veterans. The site, relied upon by over 20 million users for sensitive personal and medical data, may suffer in its cybersecurity practices, potentially leading to future incidents where veterans’ private information could be exposed. With Kamens' role being crucial in the maintenance and protection of VA.gov, his abrupt dismissal raises concerns of neglect and the potential for privacy violations impacting millions of veterans.
Description: A cyberattack at the US Department of Veterans Affairs resulted in the personal information of some 46,000 veterans being made public. Unauthorized individuals accessed one of the VA Financial Services Center's web applications, diverting funds intended for healthcare providers to pay for veterans' medical care. The app has been taken offline and won't go back online until the VA has finished its security review. Those whose Social Security numbers may have been hacked are also being given free access to credit monitoring services by the government.


U.S. Department of Veterans Affairs has 207.69% more incidents than the average of same-industry companies with at least one recorded incident.
U.S. Department of Veterans Affairs has 207.69% more incidents than the average of all companies with at least one recorded incident.
U.S. Department of Veterans Affairs reported 2 incidents this year: 1 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.
UDVA cyber incidents detection timeline including parent company and subsidiaries

Welcome to the United States Department of Veterans Affairs (VA) Official LinkedIn page. We're recruiting the finest employees to care for our #Veterans. Following/engagement ≠ signify VA endorsement. This is a moderated page, meaning that all comments will be reviewed for appropriate content. Please show respect to others. Comments that do not directly relate to the topics covered on this page, including commerce, external links, spam, abusive or vulgar language, hate speech, accusations against individuals, or personal attacks will be considered “off topic” and may not be posted. VA reserves the right to determine which comments are acceptable for this page. VA may remove comments that do not follow these terms, or comments that VA may reasonably believe could cause harm if they remain. VA may, at its sole discretion, terminate a user’s ability to post comments to this site for repeated or excessive violations of these standards. For more information, please visit bit.ly/2Q14Y1p


For more information about GAO, please visit www.gao.gov. General Information The U.S. Government Accountability Office (GAO) is an independent, nonpartisan agency that works for Congress. Often called the "congressional watchdog," GAO investigates how the federal government spends taxpayer dolla

Bij de Vlaamse overheid geef je elke dag opnieuw het beste van jezelf, in een job die een verschil maakt in de maatschappij. Pas afgestudeerd of al een aantal jaren professionele ervaring achter de rug? Op zoek naar een job als arbeider, bediende, leidinggevende, administratief medewerker, ingenie

Bli en samhällsbyggare – jobba i Malmö stad! Genom att arbeta i Malmö stad får du möjlighet att arbeta med hållbar samhällsutveckling. Som en samhällsbyggare spelar du en viktig roll i Malmös utveckling och därför ser vi oss som framtidens arbetsplats. Människors lika värde är en förutsättning fö

Ontario Government | Gouvernement de l’Ontario The Ontario Government works to serve the public interest and uphold the public trust by providing Ministers with objective advice and expert guidance. The Ontario Public Service carries out the decisions and policies of the elected government with int

Employment with the State of Ohio is more than ‘just a job’ – it is a privilege to serve our families, friends and neighbors who rely on us throughout our great state. We are a team of dedicated public servants committed to high performance, innovative thinking, and delivering excellent and efficien

Empresa Brasileira de Correios e Telégrafos foi criada como empresa em 1969 por decreto lei. Hoje conta com mais de 100.000 empregados, tem presença em todos os municípios do Brasil. NEGÓCIO: Soluções que aproximam. MISSÃO: Fornecer soluções acessíveis e confiáveis para conectar pessoas, institu

Region Midtjyllands mål er at skabe sundhed, trivsel, vækst og velstand for regionens 1,3 millioner borgere. Vi er cirka 30.000 kolleger, der er fælles om at sikre helhed og sammenhæng for patienter, brugere og borgere i regionen. Det gælder lige fra at tilbyde den bedste behandling her og nu til
Year after year, the Commonwealth of Massachusetts has continued to pioneer bold legislative actions and programs, some of which have been embraced on a national scale. We are always looking for talented individuals to help us maintain this momentum and improve the services that millions of people d

We are the largest and most diverse organisation in our state. We have more than 90 government departments and organisations providing essential services across 4000+ locations—from the Torres Strait to the Gold Coast; Mount Isa to Brisbane. We are passionate about making Queensland better through
.png)
The Department of Veterans Affairs' top technology priorities encompass cybersecurity, modernization and veteran experience, emphasizing a shift from...
The Department of Veterans Affairs is conducting market research to identify companies capable of providing a new Information Technology...
The Department of Veterans Affairs says employees under the special salary rate won't face a pay cut and will move to a corresponding...
A key technology leader at the Department of Veterans Affairs told lawmakers Monday that the agency intends to “capitalize” on artificial...
Labor unions are urging the Department of Veterans Affairs to restore collective bargaining before a fast-approaching deadline.
Employees from the Department of Veterans Affairs are rallying across the country today in protest of the Trump administration's changes to...
The VA has gone through more than 2.5 million claims so far in fiscal 2025, surpassing last year's total.
PRNewswire/ -- SkillStorm, a leading U.S. talent tech accelerator, today unveiled two immersive certification tracks—Cloud Engineering and.
The group has been connected to intrusions into U.S. mobile networks and the hacking of dozens of high-profile U.S. officials.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of U.S. Department of Veterans Affairs is https://www.va.gov/.
According to Rankiteo, U.S. Department of Veterans Affairs’s AI-generated cybersecurity score is 740, reflecting their Moderate security posture.
According to Rankiteo, U.S. Department of Veterans Affairs currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, U.S. Department of Veterans Affairs is not certified under SOC 2 Type 1.
According to Rankiteo, U.S. Department of Veterans Affairs does not hold a SOC 2 Type 2 certification.
According to Rankiteo, U.S. Department of Veterans Affairs is not listed as GDPR compliant.
According to Rankiteo, U.S. Department of Veterans Affairs does not currently maintain PCI DSS compliance.
According to Rankiteo, U.S. Department of Veterans Affairs is not compliant with HIPAA regulations.
According to Rankiteo,U.S. Department of Veterans Affairs is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
U.S. Department of Veterans Affairs operates primarily in the Government Administration industry.
U.S. Department of Veterans Affairs employs approximately 197,183 people worldwide.
U.S. Department of Veterans Affairs presently has no subsidiaries across any sectors.
U.S. Department of Veterans Affairs’s official LinkedIn profile has approximately 1,532,316 followers.
U.S. Department of Veterans Affairs is classified under the NAICS code 92, which corresponds to Public Administration.
No, U.S. Department of Veterans Affairs does not have a profile on Crunchbase.
Yes, U.S. Department of Veterans Affairs maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/department-of-veterans-affairs.
As of December 10, 2025, Rankiteo reports that U.S. Department of Veterans Affairs has experienced 5 cybersecurity incidents.
U.S. Department of Veterans Affairs has an estimated 11,484 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Data Leak, Cyber Attack and Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with removed the spreadsheet containing personal details, and containment measures with app taken offline, and remediation measures with security review, and communication strategy with free credit monitoring services offered, and law enforcement notified with yes..
Title: U.S. Department of Veterans Affairs Data Breach
Description: The U.S. Department of Veterans Affairs suffered a data breach incident that exposed the COVID-19 vaccination status data for about 500,000 of its employees. Following an internal investigation, the agency removed a spreadsheet containing personal details including vaccination status.
Type: Data Breach
Title: Cyberattack at US Department of Veterans Affairs
Description: A cyberattack at the US Department of Veterans Affairs resulted in the personal information of some 46,000 veterans being made public. Unauthorized individuals accessed one of the VA Financial Services Center's web applications, diverting funds intended for healthcare providers to pay for veterans' medical care. The app has been taken offline and won't go back online until the VA has finished its security review. Those whose Social Security numbers may have been hacked are also being given free access to credit monitoring services by the government.
Type: Data Breach
Attack Vector: Web Application Vulnerability
Threat Actor: Unauthorized Individuals
Motivation: Financial Gain
Title: Potential Security Risks at VA.gov Following Firing of Security Lead
Description: The firing of Jonathan Kamens, the security lead for the Department of Veterans Affairs website, potentially compromises the security of sensitive veteran information. VA.gov, serving as the 'front door' for VA benefits, is a critical platform for over 20 million veterans accessing personal and medical data. The website's cybersecurity is expected to deteriorate without Kamens, risking the exposure of deeply private information and the integrity of digital services essential to veterans and their families.
Type: Potential Security Deterioration
Title: Termination of Cybersecurity Lead at US Digital Service Introduces Risk to VA.gov
Description: The termination of cybersecurity lead Jonathan Kamens from the US Digital Service has introduced significant risk to the security of VA.gov, the essential digital platform used by US veterans. The site, relied upon by over 20 million users for sensitive personal and medical data, may suffer in its cybersecurity practices, potentially leading to future incidents where veterans’ private information could be exposed. With Kamens' role being crucial in the maintenance and protection of VA.gov, his abrupt dismissal raises concerns of neglect and the potential for privacy violations impacting millions of veterans.
Type: Potential Data Breach
Vulnerability Exploited: Lack of Cybersecurity Leadership
Title: VA Data Breach
Description: A VA employee’s laptop was stolen. It contained personal data on 26.5 million veterans. While the information was recovered, the incident highlighted data security challenges and led to major cybersecurity changes at the VA and across government.
Date Detected: 2006-05-03
Date Resolved: 2006-06-29
Type: Data Breach
Attack Vector: Physical Theft
Vulnerability Exploited: Unencrypted Data
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Web Application and Physical Theft.

Data Compromised: Covid-19 vaccination status, Personal details

Data Compromised: Personal information, Social security numbers
Systems Affected: Web Application
Downtime: ['Web Application']
Identity Theft Risk: ['High']

Data Compromised: Personal data, Medical data
Systems Affected: VA.gov
Operational Impact: Potential for privacy violations
Identity Theft Risk: High

Data Compromised: Names, Dates of birth, Social security numbers
Systems Affected: LaptopExternal Hard Drive
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Covid-19 Vaccination Status, Personal Details, , Personal Information, Social Security Numbers, , Personal Data, Medical Data, , Names, Dates Of Birth, Social Security Numbers and .

Entity Name: U.S. Department of Veterans Affairs
Entity Type: Government Agency
Industry: Government
Location: United States
Customers Affected: 500000

Entity Name: US Department of Veterans Affairs
Entity Type: Government Agency
Industry: Healthcare
Location: United States
Customers Affected: 46,000 veterans

Entity Name: Department of Veterans Affairs
Entity Type: Government
Industry: Healthcare
Location: United States
Customers Affected: 20 million veterans

Entity Name: US Digital Service
Entity Type: Government Agency
Industry: Government
Location: United States
Customers Affected: Over 20 million veterans

Entity Name: Department of Veterans Affairs
Entity Type: Government Agency
Industry: Public Sector
Location: United States
Customers Affected: 26.5 million veterans

Remediation Measures: Removed the spreadsheet containing personal details

Containment Measures: App taken offline
Remediation Measures: Security Review
Communication Strategy: Free credit monitoring services offered

Law Enforcement Notified: Yes

Type of Data Compromised: Covid-19 vaccination status, Personal details
Number of Records Exposed: 500000
File Types Exposed: spreadsheet

Type of Data Compromised: Personal information, Social security numbers
Number of Records Exposed: 46,000
Sensitivity of Data: High
Personally Identifiable Information: Social Security Numbers

Type of Data Compromised: Personal data, Medical data
Sensitivity of Data: High
Personally Identifiable Information: Yes

Type of Data Compromised: Names, Dates of birth, Social security numbers
Number of Records Exposed: 26.5 million
Sensitivity of Data: High
Data Encryption: No
Personally Identifiable Information: Yes
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Removed the spreadsheet containing personal details, , Security Review, .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by app taken offline and .

Lessons Learned: Need for stronger cybersecurity practices, Focus on security and real-time monitoring of vulnerabilities, Empowerment of the agency’s CIO, Improved breach notification processes
Key Lessons Learned: The key lessons learned from past incidents are Need for stronger cybersecurity practices,Focus on security and real-time monitoring of vulnerabilities,Empowerment of the agency’s CIO,Improved breach notification processes.

Source: Federal News Network
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Federal News Network.

Investigation Status: Resolved
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Free Credit Monitoring Services Offered.

Entry Point: Web Application

Entry Point: Physical Theft

Root Causes: Termination of key cybersecurity personnel

Root Causes: Unencrypted Data, Lack Of Password Protection, Delayed Breach Notification,
Corrective Actions: Encryption Of Devices, Two-Factor Authentication, Real-Time Visibility Into Network Vulnerabilities, Breach Notification Guidance,
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Encryption Of Devices, Two-Factor Authentication, Real-Time Visibility Into Network Vulnerabilities, Breach Notification Guidance, .
Last Attacking Group: The attacking group in the last incident was an Unauthorized Individuals.
Most Recent Incident Detected: The most recent incident detected was on 2006-05-03.
Most Recent Incident Resolved: The most recent incident resolved was on 2006-06-29.
Most Significant Data Compromised: The most significant data compromised in an incident were COVID-19 vaccination status, personal details, , Personal Information, Social Security Numbers, , Personal Data, Medical Data, , Names, Dates of Birth, Social Security Numbers and .
Most Significant System Affected: The most significant system affected in an incident was Web Application and VA.gov and LaptopExternal Hard Drive.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was App taken offline.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Personal Data, Medical Data, personal details, Social Security Numbers, Names, Personal Information, Dates of Birth and COVID-19 vaccination status.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 26.5M.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Improved breach notification processes.
Most Recent Source: The most recent source of information about an incident is Federal News Network.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Resolved.
Most Recent Entry Point: The most recent entry point used by an initial access broker were an Web Application and Physical Theft.
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Termination of key cybersecurity personnel, Unencrypted dataLack of password protectionDelayed breach notification.
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Encryption of devicesTwo-factor authenticationReal-time visibility into network vulnerabilitiesBreach notification guidance.
.png)
WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. Versions 3.5.4 and below contain a Stored Cross-Site Scripting (XSS) vulnerability in the /WeGIA/html/geral/configurar_senhas.php endpoint. The application does not sanitize user-controlled data before rendering it inside the employee selection dropdown. The application retrieves employee names from the database and injects them directly into HTML <option> elements without proper escaping. This issue is fixed in version 3.5.5.
ZITADEL is an open-source identity infrastructure tool. Versions 4.0.0-rc.1 through 4.7.0 are vulnerable to DOM-Based XSS through the Zitadel V2 logout endpoint. The /logout endpoint insecurely routes to a value that is supplied in the post_logout_redirect GET parameter. As a result, unauthenticated remote attacker can execute malicious JS code on Zitadel users’ browsers. To carry out an attack, multiple user sessions need to be active in the same browser, however, account takeover is mitigated when using Multi-Factor Authentication (MFA) or Passwordless authentication. This issue is fixed in version 4.7.1.
ZITADEL is an open-source identity infrastructure tool. Versions 4.7.0 and below are vulnerable to an unauthenticated, full-read SSRF vulnerability. The ZITADEL Login UI (V2) treats the x-zitadel-forward-host header as a trusted fallback for all deployments, including self-hosted instances. This allows an unauthenticated attacker to force the server to make HTTP requests to arbitrary domains, such as internal addresses, and read the responses, enabling data exfiltration and bypassing network-segmentation controls. This issue is fixed in version 4.7.1.
NiceGUI is a Python-based UI framework. Versions 3.3.1 and below are vulnerable to directory traversal through the App.add_media_files() function, which allows a remote attacker to read arbitrary files on the server filesystem. This issue is fixed in version 3.4.0.
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions are vulnerable to authentication bypass when the authentication type is set to "webserver." When providing an Authorization header with an arbitrary value, a session is associated with the target user regardless of valid credentials. This issue is fixed in versions 16.0.44 and 17.0.23.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.