Company Details
digiever-corp-
27
287
5112
digiever.com
0
DIG_7015180
In-progress

DIGIEVER Corp. Company CyberSecurity Posture
digiever.comCompany Overview DIGIEVER is a leading company dedicated to providing high quality and outstanding performance of IP video surveillance solutions. DIGIEVER takes DIGIEVER NVR, Linux-embedded network video recorder, as the core and develops relative video surveillance product lines, including central management software DIGIEVER CMS, DIGIEVER Video Wall Decoder, external storage expansion box DIGIARRAY and DIGIMobileV2 to satisfy increasing video surveillance requirements in the world. DIGIEVER’s comprehensive NVR products have been successfully distributed through worldwide channel partners that cross five continentals. Formed with a group of experts who have rich experience in research and development in networking products, DIGIEVER, focuses on providing leading-edge surveillance solutions not only in software applications, also in hardware design and devoting to optimize users' experience. DIGIEVER is one of the members in Intel Brand Advantage Program and Intel IoT (Internet of Things) Alliance. DIGIEVER also has profound relationship with various global partners all over the world such as AXIS, ImmerVision, Seagate and Western Digital. Vision The products that DIGIEVER introduced are guaranteed to be high quality and outstanding performance to meet client’s demand. Our innovative network video recorder and solutions are well-reputed for its solid hardware design and ease of use software interface. In addition, the comprehensive integration and partnership with numerous network hardware brands increases flexibility and conveys value to our clients and channel partners. With a goal to develop reliable products and services and a mission to drive the IP-based surveillance systems, DIGIEVER is proud to be a supplier in IP video surveillance industry that enable our partners and clients to optimize their approach to business and life.
Company Details
digiever-corp-
27
287
5112
digiever.com
0
DIG_7015180
In-progress
Between 700 and 749

DIGIEVER Corp. Global Score (TPRM)XXXX

Description: A new variant of the Mirai botnet has been identified as targeting DigiEver DS-2105 Pro DVRs, exploiting a vulnerability that allows attackers to commandeer the devices. The botnet, known as 'Hail Cock Botnet', has been active since September 2024, compromised devices in the wild, particularly IoT devices, and incorporated improved encryption with ChaCha20 and XOR decryption algorithms. This campaign involved exploiting unpatched RCE vulnerabilities, with the outdated DigiEver DS-2105 Pro DVR being ten years old and therefore likely lacking updates from the manufacturer. It signifies a lack of security measures for retired or aging hardware, resulting in the botnet's ability to proliferate and potentially bring about further malicious activity.
Description: DigiEver, a manufacturer of DVRs, became the target of a new Mirai botnet variant which exploits a remote code execution vulnerability in their DS-2105 Pro DVRs. Akamai researchers found that this vulnerability allowed botnet operators to inject malicious code and maintain persistence on infected IoT devices. As a result, the compromised DVRs are used for further spreading the malware and brute-forcing operations. The targeted devices are about a decade old, often without the support of their manufacturers, leaving them without security updates. The incident underscores the risks associated with outdated firmware and hardware in IoT devices, which can be co-opted into botnets for large-scale cyber attacks.


No incidents recorded for DIGIEVER Corp. in 2025.
No incidents recorded for DIGIEVER Corp. in 2025.
No incidents recorded for DIGIEVER Corp. in 2025.
DIGIEVER Corp. cyber incidents detection timeline including parent company and subsidiaries

Company Overview DIGIEVER is a leading company dedicated to providing high quality and outstanding performance of IP video surveillance solutions. DIGIEVER takes DIGIEVER NVR, Linux-embedded network video recorder, as the core and develops relative video surveillance product lines, including central management software DIGIEVER CMS, DIGIEVER Video Wall Decoder, external storage expansion box DIGIARRAY and DIGIMobileV2 to satisfy increasing video surveillance requirements in the world. DIGIEVER’s comprehensive NVR products have been successfully distributed through worldwide channel partners that cross five continentals. Formed with a group of experts who have rich experience in research and development in networking products, DIGIEVER, focuses on providing leading-edge surveillance solutions not only in software applications, also in hardware design and devoting to optimize users' experience. DIGIEVER is one of the members in Intel Brand Advantage Program and Intel IoT (Internet of Things) Alliance. DIGIEVER also has profound relationship with various global partners all over the world such as AXIS, ImmerVision, Seagate and Western Digital. Vision The products that DIGIEVER introduced are guaranteed to be high quality and outstanding performance to meet client’s demand. Our innovative network video recorder and solutions are well-reputed for its solid hardware design and ease of use software interface. In addition, the comprehensive integration and partnership with numerous network hardware brands increases flexibility and conveys value to our clients and channel partners. With a goal to develop reliable products and services and a mission to drive the IP-based surveillance systems, DIGIEVER is proud to be a supplier in IP video surveillance industry that enable our partners and clients to optimize their approach to business and life.

Atlassian powers the collaboration that helps teams accomplish what would otherwise be impossible alone. From space missions and motor racing to bugs in code and IT requests, no task is too large or too small with the right team, the right tools, and the right practices. Over 300,000 global compa

**Snowflake is proud to be the Official Data Collaboration Provider for LA28 and Team USA.** Snowflake delivers the AI Data Cloud — a global network where thousands of organizations mobilize data with near-unlimited scale, concurrency, and performance. Inside the AI Data Cloud, organizations unite

Thomson Reuters is the world’s leading provider of news and information-based tools to professionals. Our worldwide network of journalists and specialist editors keep customers up to speed on global developments, with a particular focus on legal, regulatory and tax changes. Our customers operat
Starting our journey in 2011, today, bigbasket - a Tata Enterprise is India’s largest online supermarket with over 13 million customers and a presence in 60+ cities & towns. With our presence spanning the entire spectrum of consumer needs, we operate through a range of business lines - bigbasket, bb

OpenText is a leading Cloud and AI company that provides organizations around the world with a comprehensive suite of Business AI, Business Clouds, and Business Technology. We help organizations grow, innovate, become more efficient and effective, and do so in a trusted and secure way—through Inform
Shopify is a leading global commerce company, providing trusted tools to start, grow, market, and manage a retail business of any size. Shopify makes commerce better for everyone with a platform and services that are engineered for reliability, while delivering a better shopping experience for consu
SAP is the leading enterprise application and business AI company. We stand at the intersection of business and technology, where our innovations are designed to directly address real business challenges and produce real-world impacts. Our solutions are the backbone for the world’s most complex and

Just Eat Takeaway.com is a leading global online delivery marketplace, connecting consumers and restaurants through our platform in 19 countries. Like a dinner table, working at JET brings our office employees and couriers together. From coding to customer service to couriers, JET is a

Founded in 1998, Oracle NetSuite is the world’s first cloud company. For more than 25 years, NetSuite has helped businesses gain the insight, control, and agility to build and grow a successful business. First focused on financials and ERP, we now provide an AI-powered unified business system that
.png)
Lior Div's cybersecurity startup 7AI raised $130M in the largest Series A in industry history, aiming to double or triple its Boston...
South Carolina Gov. Henry McMaster and other officials announced Wednesday that the state will soon establish a cybersecurity hub.
Nir Zuk tells the story of how, frustrated by cybersecurity, he set out on his own with a an idea to transform the industry: the Next-Gen Firewall.
Food safety depends not only on clean equipment, but secure networks, protected data, and resilient OT.
Security researchers on Wednesday warned about a critical vulnerability in React Server Components (RCS) and Next.js.
The Trump administration has said little about how it will prevent hackers from abusing AI.
Recent ransomware attacks on Estes and Ward prove transportation is vulnerable. Discover why legacy systems and ELDs are creating hidden...
The Distinguished Lecture Series (DLS) at The University of Alabama in Huntsville (UAH), a part of The University of Alabama System,...
Endurance mindset connects the marathon course to cybersecurity.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of DIGIEVER Corp. is http://www.digiever.com.
According to Rankiteo, DIGIEVER Corp.’s AI-generated cybersecurity score is 738, reflecting their Moderate security posture.
According to Rankiteo, DIGIEVER Corp. currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, DIGIEVER Corp. is not certified under SOC 2 Type 1.
According to Rankiteo, DIGIEVER Corp. does not hold a SOC 2 Type 2 certification.
According to Rankiteo, DIGIEVER Corp. is not listed as GDPR compliant.
According to Rankiteo, DIGIEVER Corp. does not currently maintain PCI DSS compliance.
According to Rankiteo, DIGIEVER Corp. is not compliant with HIPAA regulations.
According to Rankiteo,DIGIEVER Corp. is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
DIGIEVER Corp. operates primarily in the Software Development industry.
DIGIEVER Corp. employs approximately 27 people worldwide.
DIGIEVER Corp. presently has no subsidiaries across any sectors.
DIGIEVER Corp.’s official LinkedIn profile has approximately 287 followers.
DIGIEVER Corp. is classified under the NAICS code 5112, which corresponds to Software Publishers.
No, DIGIEVER Corp. does not have a profile on Crunchbase.
Yes, DIGIEVER Corp. maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/digiever-corp-.
As of December 04, 2025, Rankiteo reports that DIGIEVER Corp. has experienced 2 cybersecurity incidents.
DIGIEVER Corp. has an estimated 27,194 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability and Cyber Attack.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with akamai..
Title: Mirai Botnet Variant Targets DigiEver DVRs
Description: DigiEver, a manufacturer of DVRs, became the target of a new Mirai botnet variant which exploits a remote code execution vulnerability in their DS-2105 Pro DVRs. Akamai researchers found that this vulnerability allowed botnet operators to inject malicious code and maintain persistence on infected IoT devices. As a result, the compromised DVRs are used for further spreading the malware and brute-forcing operations. The targeted devices are about a decade old, often without the support of their manufacturers, leaving them without security updates. The incident underscores the risks associated with outdated firmware and hardware in IoT devices, which can be co-opted into botnets for large-scale cyber attacks.
Type: Botnet
Attack Vector: Remote Code Execution
Vulnerability Exploited: Remote Code Execution Vulnerability in DS-2105 Pro DVRs
Threat Actor: Mirai Botnet Operators
Motivation: Malware Spreading, Brute-forcing Operations
Title: Hail Cock Botnet Targeting DigiEver DS-2105 Pro DVRs
Description: A new variant of the Mirai botnet, known as 'Hail Cock Botnet', has been identified as targeting DigiEver DS-2105 Pro DVRs. This botnet exploits a vulnerability that allows attackers to commandeer the devices, incorporating improved encryption with ChaCha20 and XOR decryption algorithms. The campaign involves exploiting unpatched RCE vulnerabilities, with the outdated DigiEver DS-2105 Pro DVR being ten years old and therefore likely lacking updates from the manufacturer. This incident signifies a lack of security measures for retired or aging hardware, resulting in the botnet's ability to proliferate and potentially bring about further malicious activity.
Date Detected: September 2024
Type: Botnet
Attack Vector: RCE vulnerabilities
Vulnerability Exploited: Unpatched RCE vulnerabilities
Threat Actor: Hail Cock Botnet
Motivation: Commandeer devices
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Remote Code Execution Vulnerability.

Systems Affected: DS-2105 Pro DVRs

Systems Affected: DigiEver DS-2105 Pro DVRs

Third Party Assistance: Akamai
Third-Party Assistance: The company involves third-party assistance in incident response through Akamai.

Data Encryption: ChaCha20 and XOR decryption algorithms

Lessons Learned: Risks associated with outdated firmware and hardware in IoT devices, which can be co-opted into botnets for large-scale cyber attacks.

Lessons Learned: Lack of security measures for retired or aging hardware
Key Lessons Learned: The key lessons learned from past incidents are Risks associated with outdated firmware and hardware in IoT devices, which can be co-opted into botnets for large-scale cyber attacks.Lack of security measures for retired or aging hardware.

Source: Akamai Researchers
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Akamai Researchers.

Entry Point: Remote Code Execution Vulnerability

Root Causes: Outdated firmware and hardware in IoT devices

Root Causes: Unpatched RCE vulnerabilities in outdated hardware
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Akamai.
Last Attacking Group: The attacking group in the last incident were an Mirai Botnet Operators and Hail Cock Botnet.
Most Recent Incident Detected: The most recent incident detected was on September 2024.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Akamai.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Risks associated with outdated firmware and hardware in IoT devices, which can be co-opted into botnets for large-scale cyber attacks., Lack of security measures for retired or aging hardware.
Most Recent Source: The most recent source of information about an incident is Akamai Researchers.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Remote Code Execution Vulnerability.
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Outdated firmware and hardware in IoT devices, Unpatched RCE vulnerabilities in outdated hardware.
.png)
MCP Server Kubernetes is an MCP Server that can connect to a Kubernetes cluster and manage it. Prior to 2.9.8, there is a security issue exists in the exec_in_pod tool of the mcp-server-kubernetes MCP Server. The tool accepts user-provided commands in both array and string formats. When a string format is provided, it is passed directly to shell interpretation (sh -c) without input validation, allowing shell metacharacters to be interpreted. This vulnerability can be exploited through direct command injection or indirect prompt injection attacks, where AI agents may execute commands without explicit user intent. This vulnerability is fixed in 2.9.8.
XML external entity (XXE) injection in eyoucms v1.7.1 allows remote attackers to cause a denial of service via crafted body of a POST request.
An issue was discovered in Fanvil x210 V2 2.12.20 allowing unauthenticated attackers on the local network to access administrative functions of the device (e.g. file upload, firmware update, reboot...) via a crafted authentication bypass.
Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.
Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.