ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

We are a family-owned business focused on development and operation of real estate, restaurants, and convenience stores primarily in the Cape Girardeau and San Antonio markets but also in many cities across the country. Nationally, we also develop and construct hotels in several states. Founded on the principles of strong work ethic and an honest approach to growth, we strive to provide our customers with expertise, quality, and service and a top-notch product.

Drury Southwest, Inc. A.I CyberSecurity Scoring

DSI

Company Details

Linkedin ID:

drury-southwest-inc

Employees number:

66

Number of followers:

778

NAICS:

None

Industry Type:

Real Estate

Homepage:

drurysouthwest.com

IP Addresses:

0

Company ID:

DRU_2822480

Scan Status:

In-progress

AI scoreDSI Risk Score (AI oriented)

Between 650 and 699

https://images.rankiteo.com/companyimages/drury-southwest-inc.jpeg
DSI Real Estate
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreDSI Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/drury-southwest-inc.jpeg
DSI Real Estate
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

DSI Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Drury Southwest, Inc.: Drury Southwest Data Breach InvestigationBreach85412/2025
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: **Drury Southwest Reports Data Breach Exposing Sensitive Personal and Health Information** On December 5, 2025, Drury Southwest, a Texas-based company, notified the state’s Attorney General of a data breach involving unauthorized access to sensitive personal and protected health information. The incident, which remains under investigation, may have exposed a range of data, including names, Social Security numbers, driver’s license details, financial account information, and medical records. As of December 9, 2025, Drury Southwest has not released further public details about the breach’s scope or the number of affected individuals. However, the company has begun notifying impacted parties, as required by the Texas Attorney General’s breach reporting process. The exact timeline of the unauthorized access and the method used by the threat actor have not been disclosed. The breach highlights ongoing risks to personal and health-related data, particularly in sectors handling sensitive information. Further updates may emerge as the investigation progresses.

Drury Southwest, Inc.: Drury Southwest Data Breach Investigation
Breach
Severity: 85
Impact: 4
Seen: 12/2025
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: **Drury Southwest Reports Data Breach Exposing Sensitive Personal and Health Information** On December 5, 2025, Drury Southwest, a Texas-based company, notified the state’s Attorney General of a data breach involving unauthorized access to sensitive personal and protected health information. The incident, which remains under investigation, may have exposed a range of data, including names, Social Security numbers, driver’s license details, financial account information, and medical records. As of December 9, 2025, Drury Southwest has not released further public details about the breach’s scope or the number of affected individuals. However, the company has begun notifying impacted parties, as required by the Texas Attorney General’s breach reporting process. The exact timeline of the unauthorized access and the method used by the threat actor have not been disclosed. The breach highlights ongoing risks to personal and health-related data, particularly in sectors handling sensitive information. Further updates may emerge as the investigation progresses.

Ailogo

DSI Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for DSI

Incidents vs Real Estate Industry Average (This Year)

Drury Southwest, Inc. has 40.85% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

Drury Southwest, Inc. has 53.85% more incidents than the average of all companies with at least one recorded incident.

Incident Types DSI vs Real Estate Industry Avg (This Year)

Drury Southwest, Inc. reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.

Incident History — DSI (X = Date, Y = Severity)

DSI cyber incidents detection timeline including parent company and subsidiaries

DSI Company Subsidiaries

SubsidiaryImage

We are a family-owned business focused on development and operation of real estate, restaurants, and convenience stores primarily in the Cape Girardeau and San Antonio markets but also in many cities across the country. Nationally, we also develop and construct hotels in several states. Founded on the principles of strong work ethic and an honest approach to growth, we strive to provide our customers with expertise, quality, and service and a top-notch product.

Loading...
similarCompanies

DSI Similar Companies

Lopes Consultoria de Imóveis

A GARANTIA DE SER LOPES A Lopes é a maior empresa de soluções integradas de intermediação, consultoria e promoção de financiamentos de imóveis do Brasil. Está presente em 10 estados - São Paulo, Rio de Janeiro, Minas Gerais, Espírito Santo, Rio Grande do Sul, Paraná, Santa Catarina, Bahia, Per

SM Supermalls

The SM Group of companies stands today as an institution, a store, a mall, a bank, a home, a resort, a hotel, and a place to see and experience with the family. One of the core business areas of the SM Group is the Shopping Center Management Corporation, generally referred to as SM Supermalls. The

Keller Williams Realty, LLC

Austin, Texas-based Keller Williams, the world’s largest real estate franchise by agent count, has more than 1,100 offices and 176,000 agents. The franchise is also No. 1 in units and sales volume in the United States. Since 1983, the company has cultivated an agent-centric, technology-driven, and

Empire Company Limited

Empire Company Limited (TSX: EMP.A) is a Canadian company headquartered in Stellarton, Nova Scotia. Empire’s key businesses are food retailing, through wholly-owned subsidiary Sobeys Inc., and related real estate. With approximately $30.5 billion in annual sales and $16.5 billion in assets, Empire C

Coldwell Banker

Welcome to Coldwell Banker Real Estate LLC, a company founded in 1906 on a commitment to professionalism and customer service which remains the cornerstone of our business philosophy today. We are the nation’s oldest real estate company and our experience has helped make the dream of homeownership a

Anywhere Real Estate Inc.

Anywhere Real Estate Inc. (NYSE: HOUS) is moving the real estate industry to what's next. A leader of integrated residential real estate services, Anywhere includes franchise, brokerage, relocation, and title and settlement businesses, as well as mortgage and title insurance underwriter joint ventur

Lendlease

Lendlease is Australia’s leading real estate business with an international investments platform. We’re city shapers, asset creators and trusted partners. Our deep property experience and bold thinking delivers innovative real estate and investment solutions. Very few organisations can build cit

City Developments Limited

City Developments Limited (CDL) is a leading global real estate company with a network spanning 163 locations in 29 countries and regions. Listed on the Singapore Exchange, the Group is one of the largest companies by market capitalisation. Its income-stable and geographically-diverse portfolio comp

Colliers

Colliers (NASDAQ, TSX: CIGI) is a leading diversified professional services and investment management company. With operations in 68 countries, our 19,000 enterprising professionals work collaboratively to provide expert real estate and investment advice to clients. For more than 29 years, our exper

newsone

DSI CyberSecurity News

December 09, 2025 03:10 PM
Drury Southwest Data Breach Investigation

Strauss Borrelli PLLC, a leading data breach law firm, is investigating Drury Southwest, Inc. regarding its recent data breach.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

DSI CyberSecurity History Information

Official Website of Drury Southwest, Inc.

The official website of Drury Southwest, Inc. is https://www.drurysouthwest.com/.

Drury Southwest, Inc.’s AI-Generated Cybersecurity Score

According to Rankiteo, Drury Southwest, Inc.’s AI-generated cybersecurity score is 697, reflecting their Weak security posture.

How many security badges does Drury Southwest, Inc.’ have ?

According to Rankiteo, Drury Southwest, Inc. currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Drury Southwest, Inc. have SOC 2 Type 1 certification ?

According to Rankiteo, Drury Southwest, Inc. is not certified under SOC 2 Type 1.

Does Drury Southwest, Inc. have SOC 2 Type 2 certification ?

According to Rankiteo, Drury Southwest, Inc. does not hold a SOC 2 Type 2 certification.

Does Drury Southwest, Inc. comply with GDPR ?

According to Rankiteo, Drury Southwest, Inc. is not listed as GDPR compliant.

Does Drury Southwest, Inc. have PCI DSS certification ?

According to Rankiteo, Drury Southwest, Inc. does not currently maintain PCI DSS compliance.

Does Drury Southwest, Inc. comply with HIPAA ?

According to Rankiteo, Drury Southwest, Inc. is not compliant with HIPAA regulations.

Does Drury Southwest, Inc. have ISO 27001 certification ?

According to Rankiteo,Drury Southwest, Inc. is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Drury Southwest, Inc.

Drury Southwest, Inc. operates primarily in the Real Estate industry.

Number of Employees at Drury Southwest, Inc.

Drury Southwest, Inc. employs approximately 66 people worldwide.

Subsidiaries Owned by Drury Southwest, Inc.

Drury Southwest, Inc. presently has no subsidiaries across any sectors.

Drury Southwest, Inc.’s LinkedIn Followers

Drury Southwest, Inc.’s official LinkedIn profile has approximately 778 followers.

NAICS Classification of Drury Southwest, Inc.

Drury Southwest, Inc. is classified under the NAICS code None, which corresponds to Others.

Drury Southwest, Inc.’s Presence on Crunchbase

No, Drury Southwest, Inc. does not have a profile on Crunchbase.

Drury Southwest, Inc.’s Presence on LinkedIn

Yes, Drury Southwest, Inc. maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/drury-southwest-inc.

Cybersecurity Incidents Involving Drury Southwest, Inc.

As of December 10, 2025, Rankiteo reports that Drury Southwest, Inc. has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Drury Southwest, Inc. has an estimated 29,472 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Drury Southwest, Inc. ?

Incident Types: The types of cybersecurity incidents that have occurred include Breach.

How does Drury Southwest, Inc. detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an communication strategy with notices being provided to impacted individuals..

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Drury Southwest Data Breach

Description: Drury Southwest reported a data breach where sensitive personal identifiable information and protected health information may have been accessed by an unauthorized third party.

Date Publicly Disclosed: 2025-12-05

Type: Data Breach

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach DRU1765348159

Data Compromised: Sensitive personal identifiable information and protected health information

Identity Theft Risk: High

Payment Information Risk: High

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Identifiable Information, Protected Health Information and .

Which entities were affected by each incident ?

Incident : Data Breach DRU1765348159

Entity Name: Drury Southwest

Entity Type: Company

Customers Affected: Impacted individuals

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Data Breach DRU1765348159

Communication Strategy: Notices being provided to impacted individuals

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach DRU1765348159

Type of Data Compromised: Personal identifiable information, Protected health information

Sensitivity of Data: High

Personally Identifiable Information: NameSocial Security numberDriver’s license numberFinancial information (account number, credit or debit card number)Medical information

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : Data Breach DRU1765348159

Regulatory Notifications: Attorney General of Texas

References

Where can I find more information about each incident ?

Incident : Data Breach DRU1765348159

Source: Attorney General of Texas breach report

Date Accessed: 2025-12-09

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Attorney General of Texas breach reportDate Accessed: 2025-12-09.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Data Breach DRU1765348159

Investigation Status: Ongoing

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notices being provided to impacted individuals.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Data Breach DRU1765348159

Customer Advisories: Notices being provided to impacted individuals

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Notices being provided to impacted individuals.

Additional Questions

Incident Details

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-12-05.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident was Sensitive personal identifiable information and protected health information.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Sensitive personal identifiable information and protected health information.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is Attorney General of Texas breach report.

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.

Stakeholder and Customer Advisories

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued was an Notices being provided to impacted individuals.

cve

Latest Global CVEs (Not Company-Specific)

Description

WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. Versions 3.5.4 and below contain a Stored Cross-Site Scripting (XSS) vulnerability in the /WeGIA/html/geral/configurar_senhas.php endpoint. The application does not sanitize user-controlled data before rendering it inside the employee selection dropdown. The application retrieves employee names from the database and injects them directly into HTML <option> elements without proper escaping. This issue is fixed in version 3.5.5.

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

ZITADEL is an open-source identity infrastructure tool. Versions 4.0.0-rc.1 through 4.7.0 are vulnerable to DOM-Based XSS through the Zitadel V2 logout endpoint. The /logout endpoint insecurely routes to a value that is supplied in the post_logout_redirect GET parameter. As a result, unauthenticated remote attacker can execute malicious JS code on Zitadel users’ browsers. To carry out an attack, multiple user sessions need to be active in the same browser, however, account takeover is mitigated when using Multi-Factor Authentication (MFA) or Passwordless authentication. This issue is fixed in version 4.7.1.

Risk Information
cvss3
Base: 8.0
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
Description

ZITADEL is an open-source identity infrastructure tool. Versions 4.7.0 and below are vulnerable to an unauthenticated, full-read SSRF vulnerability. The ZITADEL Login UI (V2) treats the x-zitadel-forward-host header as a trusted fallback for all deployments, including self-hosted instances. This allows an unauthenticated attacker to force the server to make HTTP requests to arbitrary domains, such as internal addresses, and read the responses, enabling data exfiltration and bypassing network-segmentation controls. This issue is fixed in version 4.7.1.

Risk Information
cvss3
Base: 9.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
Description

NiceGUI is a Python-based UI framework. Versions 3.3.1 and below are vulnerable to directory traversal through the App.add_media_files() function, which allows a remote attacker to read arbitrary files on the server filesystem. This issue is fixed in version 3.4.0.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Description

FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions are vulnerable to authentication bypass when the authentication type is set to "webserver." When providing an Authorization header with an arbitrary value, a session is associated with the target user regardless of valid credentials. This issue is fixed in versions 16.0.44 and 17.0.23.

Risk Information
cvss4
Base: 9.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=drury-southwest-inc' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge