Company Details
farmers-insurance
44,315
226,382
524
http://www.farmers.com/careers/corporate
0
FAR_6813817
In-progress

Farmers Insurance Company CyberSecurity Posture
http://www.farmers.com/careers/corporateThe companies comprising the Farmers Insurance Group of Companies® currently make up one of the country's largest insurers of vehicles, homes and small businesses, and provide a wide range of other specialty insurance and financial services products. In business since 1928, today at Farmers® we proudly serve more than 10 million households with more than 19 million individual insurance policies across all 50 states through the efforts of nearly 48,000 exclusive and independent agents and approximately 21,000 employees. Our experience provides a rich history and legacy of service and strong customer relationships, while our focus on smart innovation, technology and entrepreneurship helps us to stay creative, to continually improve our product offerings and to drive the evolution of the insurance industry. Farmers Insurance Exchange®, the largest of the three primary insurance insurers that make up Farmers Insurance, is recognized as one of the largest U.S. companies on the 2017 Fortune 500 list. At Farmers®, we understand that every encounter with customers is an opportunity to differentiate ourselves with our personalized service and have an overall positive impact on their lives. We pride ourselves on helping the individuals and businesses we serve become smarter and better prepared to protect the things that matter most to them. We are also deeply committed to giving back. The Farmers culture is built around opportunities to volunteer and help improve the communities in which we work and live.
Company Details
farmers-insurance
44,315
226,382
524
http://www.farmers.com/careers/corporate
0
FAR_6813817
In-progress
Between 0 and 549

Farmers Insurance Global Score (TPRM)XXXX

Description: The California Office of the Attorney General reported that Farmers Insurance experienced a data breach between January 20, 2021, and February 12, 2021, potentially exposing personal information such as names, addresses, dates of birth, and driver's license numbers. The breach was reported on May 4, 2021.
Description: The California Office of the Attorney General disclosed a data breach affecting Farmers Insurance, which transpired on **March 31, 2019**, but was reported later on **December 3, 2019**. The incident involved unauthorized access to sensitive customer data, including **names, Social Security numbers, and medical history**. While the precise number of impacted individuals remains undisclosed, the exposure of such highly personal information poses severe risks, including identity theft, financial fraud, and privacy violations. The breach underscores vulnerabilities in Farmers Insurance’s data protection measures, potentially eroding customer trust and triggering regulatory scrutiny. Given the nature of the compromised data—particularly medical records and Social Security numbers—the long-term repercussions for affected individuals could be substantial, ranging from targeted phishing attacks to fraudulent credit applications. The delay in public disclosure further compounds concerns about transparency and incident response protocols within the organization.
Description: Farmers Insurance Exchange (and its subsidiaries) experienced a data breach after a vendor detected suspicious activity on May 29, 2025. The incident, linked to a broader cybercrime campaign targeting Salesforce environments, resulted in unauthorized access to customer data, including **names, addresses, dates of birth, driver’s license numbers**, and in some cases, the **last four digits of Social Security numbers**. A known cybercrime group claimed responsibility. While the breach was contained with law enforcement and cybersecurity expert support, the exposure of personally identifiable information (PII) poses risks of identity theft, fraud, and reputational harm. The breach is part of a coordinated attack affecting multiple industries, amplifying concerns over third-party vendor vulnerabilities. Affected customers received notification letters, and legal investigations are underway to assess liability and potential compensation for impacted individuals.
Description: A data breach at Farmers Insurance, discovered via a third-party vendor, exposed the personal information of over **1.07 million customers**. The incident occurred on **May 29–30, 2025**, when an unauthorized actor accessed a vendor’s database containing Farmers’ customer records. The compromised data included **names, addresses, dates of birth, driver’s license numbers, and the last four digits of Social Security numbers**. The breach was detected through monitoring tools, prompting containment measures, including blocking unauthorized access. Farmers launched an investigation, confirming on **July 24, 2025**, that customer data had been accessed and acquired. Affected individuals were notified starting **August 22, 2025**, with offers of **24 months of free credit monitoring and identity protection services**. While no evidence suggested further data exposure, the breach highlights vulnerabilities in third-party vendor security, raising concerns over potential identity theft or fraud for impacted policyholders. The incident aligns with a broader trend of cyber threats targeting U.S. insurers in 2025.
Description: Farmers Insurance suffered a data breach linked to a third-party hack at Salesforce, compromising over **1 million customers’ sensitive information**, including names, addresses, birth dates, and driver’s licenses. Among the affected were **agricultural producers**, whose personal and operational data were exposed. The breach fueled follow-on phishing scams, exploiting the stolen data to trick victims into revealing further credentials or financial details. While the attack did not involve ransomware, the exposure of **personally identifiable information (PII)**—critical for farm operations, loan applications, and subsidy eligibility—posed severe risks of **identity theft, financial fraud, and reputational damage**. The incident underscored vulnerabilities in rural sectors, where reliance on third-party platforms (like Salesforce) and shared email systems heightens exposure. No evidence suggested the breach directly disrupted farm operations, but the **leak of customer data**—including ag producers—aligned with broader trends targeting the industry’s digital dependencies.
Description: The New York Department of Financial Services (DFS) fined **Farmers Insurance Exchange** **$2.8 million** for inadequate cybersecurity controls that exposed consumer data—including **driver’s license numbers and birth dates**—through vulnerable online quoting platforms. The breach stemmed from systemic failures in safeguarding sensitive personal information, compounded by the company’s **delay in reporting the incident**, which further undermined consumer protections. DFS mandated remedial measures, including a **comprehensive review of data storage and access protocols**, to prevent future exposures. The enforcement action highlights regulatory scrutiny under New York’s cybersecurity framework (enacted in 2017, updated in 2023), which serves as a benchmark for financial sector oversight. While Farmers Insurance acknowledged the penalties, the case remains part of an **ongoing DFS investigation** into broader industry vulnerabilities. The incident underscores the risks of **unsecured digital platforms** in handling high-value consumer data, particularly in sectors like auto insurance where personally identifiable information (PII) is routinely processed.


Farmers Insurance has 347.76% more incidents than the average of same-industry companies with at least one recorded incident.
Farmers Insurance has 368.75% more incidents than the average of all companies with at least one recorded incident.
Farmers Insurance reported 3 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 3 data breaches, compared to industry peers with at least 1 incident.
Farmers Insurance cyber incidents detection timeline including parent company and subsidiaries

The companies comprising the Farmers Insurance Group of Companies® currently make up one of the country's largest insurers of vehicles, homes and small businesses, and provide a wide range of other specialty insurance and financial services products. In business since 1928, today at Farmers® we proudly serve more than 10 million households with more than 19 million individual insurance policies across all 50 states through the efforts of nearly 48,000 exclusive and independent agents and approximately 21,000 employees. Our experience provides a rich history and legacy of service and strong customer relationships, while our focus on smart innovation, technology and entrepreneurship helps us to stay creative, to continually improve our product offerings and to drive the evolution of the insurance industry. Farmers Insurance Exchange®, the largest of the three primary insurance insurers that make up Farmers Insurance, is recognized as one of the largest U.S. companies on the 2017 Fortune 500 list. At Farmers®, we understand that every encounter with customers is an opportunity to differentiate ourselves with our personalized service and have an overall positive impact on their lives. We pride ourselves on helping the individuals and businesses we serve become smarter and better prepared to protect the things that matter most to them. We are also deeply committed to giving back. The Farmers culture is built around opportunities to volunteer and help improve the communities in which we work and live.


Blue Cross Blue Shield of Michigan is a nonprofit corporation and an independent licensee of the Blue Cross and Blue Shield Association. BCBSM's commitment to Michigan is what differentiates it from other health insurance companies doing business in the state. That mission has never changed. Nea

RGS operates nationwide with over 2,500 branches, agencies and over 400 claims-handling offices covering every one of Russia's 86 regions - from Kaliningrad on the Baltic Sea in the West to Kamchatka on the Pacific Ocean in the Far East, and from Murmansk on the Barents Sea to Sochi (2014 Winter Oly

Founded in October 1949, The People’s Insurance Company (Group) of China is the first nation-wide insurance company in the People’s Republic of China and has developed into a leading large-scale integrated insurance financial group in the PRC, ranking 208th on the Global 500 (2014) published by the

Established in 1908, Great Eastern places customers at the heart of everything we do. Our legacy extends beyond our products and services to our culture, which is defined by our core values and how we work. As champions of Integrity, Initiative and Involvement, our core values act as a compass, guid

A Porto é mais que uma seguradora, é um ecossistema de soluções de serviços de proteção com tecnologia embarcada, para melhorar e facilitar a experiência do cliente. Com mais de 70 anos de mercado, a atuação da companhia se concentra hoje em quatro pilares estratégicos de negócio: Seguros, Saúde, Pr

Travelers provides insurance coverage to protect the things that are important to you – your home, your car, your valuables and your business. We have been around for more than 170 years and have earned a reputation as one of the best property casualty insurers in the industry because we take care o

QBE is an international insurer and reinsurer listed on the Australian Securities Exchange and headquartered in Sydney. We employ over 13,000 people in 26 countries. Leveraging our deep expertise and insights, QBE offers commercial, personal and specialty products and risk management solutions to h
SBI Life Insurance (‘SBI Life’ / ‘The Company’), one of the most trusted life insurance companies in India, was incorporated in October 2000 and is registered with the Insurance Regulatory and Development Authority of India (IRDAI) in March 2001. Serving millions of families across India, SBI Li
We live in a time of unprecedented change. A time when economies, regulations, and social safety nets are all in flux. Customers around the globe have told us they’re overwhelmed by the pace of change and are looking for a trusted partner to help them manage life’s twists and turns. MetLife is com
.png)
CLIMATEWIRE | California has become a national example of how climate change can disrupt property-insurance markets by intensifying...
New York State Department of Financial Services (DFS) Superintendent Adrienne A. Harris has collected more than $19 million in penalties for...
The re-opening offices help farmers apply for farm loans, crop insurance, disaster aid and other programs.
New York DFS fined eight auto insurers and agencies $19 mn for weak cybersecurity controls that exposed personal data through online quoting...
Eight auto insurers failed to meet the requirements of New York's cybersecurity regulations during widespread online attacks in 2021 and...
Security failures exposed consumers' personal data collected through insurers' online apps and agent portals used to deliver online auto...
American Family Mutual Insurance, State Auto Mutual Insurance, Metromile, Liberty Mutual, Hagerty Insurance Agency, Farmers Insurance,...
Car insurance price-quote tools that auto-populated with people's sensitive data allowed cybercriminals to commit fraud elsewhere,...
New York State is securing more than $19 million in penalties from eight auto insurance providers for violations of the state's...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Farmers Insurance is http://www.farmers.com/careers/corporate.
According to Rankiteo, Farmers Insurance’s AI-generated cybersecurity score is 510, reflecting their Critical security posture.
According to Rankiteo, Farmers Insurance currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Farmers Insurance is not certified under SOC 2 Type 1.
According to Rankiteo, Farmers Insurance does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Farmers Insurance is not listed as GDPR compliant.
According to Rankiteo, Farmers Insurance does not currently maintain PCI DSS compliance.
According to Rankiteo, Farmers Insurance is not compliant with HIPAA regulations.
According to Rankiteo,Farmers Insurance is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Farmers Insurance operates primarily in the Insurance industry.
Farmers Insurance employs approximately 44,315 people worldwide.
Farmers Insurance presently has no subsidiaries across any sectors.
Farmers Insurance’s official LinkedIn profile has approximately 226,382 followers.
Farmers Insurance is classified under the NAICS code 524, which corresponds to Insurance Carriers and Related Activities.
Yes, Farmers Insurance has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/farmers-insurance-6c6a.
Yes, Farmers Insurance maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/farmers-insurance.
As of November 27, 2025, Rankiteo reports that Farmers Insurance has experienced 6 cybersecurity incidents.
Farmers Insurance has an estimated 14,863 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Total Financial Loss: The total financial loss from these incidents is estimated to be $19.30 million.
Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with yes, and third party assistance with yes (vendor containment measures), and law enforcement notified with yes, and containment measures with blocked unauthorized access to vendor database, and recovery measures with 24 months of free cyberscout credit monitoring for affected individuals, and communication strategy with written notices to affected individuals (sent ~2025-08-22), communication strategy with public disclosure via website and maine ag notification, communication strategy with dedicated helpline (1-833-426-6809), and incident response plan activated with yes, and third party assistance with cybersecurity experts, third party assistance with law enforcement, and law enforcement notified with yes, and containment measures with vendor’s monitoring tools contained the incident, and communication strategy with customer notification letters sent, and containment measures with review of consumer data storage and access, and remediation measures with full review of data handling practices, and communication strategy with public statements (e.g., liberty mutual’s acknowledgment), and incident response plan activated with yes (google issued warnings and forced password resets), and containment measures with password reset enforcement, containment measures with phishing scam alerts, and remediation measures with user education on mfa, remediation measures with encouragement to update security software, and communication strategy with public announcements by google, communication strategy with media coverage highlighting agricultural risks..
Title: Farmers Insurance Data Breach
Description: The California Office of the Attorney General reported that Farmers Insurance experienced a data breach between January 20, 2021, and February 12, 2021, potentially exposing personal information such as names, addresses, dates of birth, and driver's license numbers. The breach was reported on May 4, 2021.
Date Publicly Disclosed: 2021-05-04
Type: Data Breach
Title: Farmers Insurance Data Breach (2019)
Description: The California Office of the Attorney General reported a data breach involving Farmers Insurance on December 3, 2019. The breach occurred on March 31, 2019, and involved unauthorized access to customer information, including names, Social Security numbers, and medical history. The exact number of individuals affected is unknown.
Date Publicly Disclosed: 2019-12-03
Type: Data Breach
Title: Farmers Insurance Data Breach Impacting Over One Million Customers
Description: A data breach at Farmers Insurance, detected via a third-party vendor, exposed personal information of over 1.07 million policyholders. The breach involved unauthorized access to a vendor’s database containing customer data, including names, addresses, dates of birth, driver’s license numbers, and the last four digits of Social Security numbers. Farmers launched an investigation, notified law enforcement, and offered 24 months of free credit monitoring to affected individuals.
Date Detected: 2025-05-30
Date Publicly Disclosed: 2025-08-22
Type: Data Breach
Attack Vector: Third-party vendor compromise (unauthorized database access)
Threat Actor: Unauthorized actor (unknown)
Title: Farmers Insurance Data Breach (May 2025)
Description: Bragar Eagel & Squire, P.C. is investigating potential claims against Farmers Insurance Exchange and its subsidiaries regarding a data breach. The breach, detected on May 30, 2025, involved unauthorized access to customer information, including names, addresses, dates of birth, driver’s license numbers, and in some cases, the last four digits of Social Security numbers. The incident is linked to a broader series of cyberattacks targeting Salesforce environments by a known cybercrime group.
Date Detected: 2025-05-30
Date Publicly Disclosed: 2025-09-18
Type: Data Breach
Attack Vector: Third-party vendor compromise (Salesforce environment)
Threat Actor: Known cybercrime group (unnamed)
Title: New York DFS Fines Eight Auto Insurers $19M for Inadequate Cybersecurity Controls Exposing Consumer Data
Description: The New York Department of Financial Services (DFS) fined eight auto insurers and agencies over $19 million for inadequate cybersecurity controls that exposed consumer data, including driver’s license numbers and birth dates, through online quoting platforms. Farmers Insurance Exchange and Infinity Insurance Co. were additionally penalized for failing to report incidents in a timely manner. The settlements mandate remedial measures, including a full review of consumer data storage and access protocols.
Type: Data Breach
Attack Vector: Insecure Online Quoting PlatformsPoor Access Controls
Vulnerability Exploited: Inadequate Data Protection MeasuresLack of Timely Incident Reporting
Title: Massive Data Breach in Gmail and Salesforce Affecting Agricultural Sector
Description: Google warned Gmail users of a massive data breach tied to a third-party hack at Salesforce, exposing sensitive data and sparking phishing scams. The breach affected 2.5 billion accounts, including those of farmers and ranchers using Gmail for business. The incident highlights growing cyber threats in the agriculture sector, where ransomware and phishing attacks have surged by 607% since 2020. Farmers Insurance also suffered a Salesforce-linked hack, compromising over 1 million customers' personal data, including agricultural producers. The breach underscores vulnerabilities in rural businesses, which often lack dedicated IT staff and rely on common email services like Gmail (76% U.S. market share).
Type: data breach
Attack Vector: phishing emailsexploited software vulnerabilities (Salesforce)credential harvesting
Vulnerability Exploited: third-party vendor (Salesforce) security flawweak password practiceslack of multi-factor authentication (MFA)
Motivation: financial gaindata theft for phishing/scamspotential espionage (agricultural data)
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Third-party vendor database, Third-party vendor (Salesforce environment) and Salesforce third-party vulnerability.

Data Compromised: Names, Addresses, Dates of birth, Driver's license numbers

Data Compromised: Names, Social security numbers, Medical history
Identity Theft Risk: High (PII exposed)

Data Compromised: Name, Address, Date of birth, Driver’s license number, Last four digits of social security number
Systems Affected: Third-party vendor database
Brand Reputation Impact: Potential reputational damage due to exposure of 1M+ customer records
Identity Theft Risk: High (PII exposed)

Data Compromised: Names, Addresses, Dates of birth, Driver’s license numbers, Last four digits of social security numbers (in certain cases)
Systems Affected: Salesforce environments
Brand Reputation Impact: Potential (litigation investigation underway)
Legal Liabilities: Potential (investigation by Bragar Eagel & Squire, P.C.)
Identity Theft Risk: High (PII exposed)

Financial Loss: $19,300,000 (Total Fines)
Data Compromised: Driver’s license numbers, Birth dates, Personal details
Systems Affected: Online Quoting Platforms
Operational Impact: Regulatory ScrutinyMandatory Remedial Measures
Brand Reputation Impact: Potential Trust Erosion Due to Data Exposure
Legal Liabilities: Regulatory FinesOngoing Investigations
Identity Theft Risk: ['High (Due to Exposure of PII)']

Data Compromised: Names, Addresses, Birth dates, Driver’s licenses, Business email data, Potential farm-specific data (crop records, gps mappings, precision ag info)
Systems Affected: Gmail accountsSalesforce platformslinked agricultural business systems
Operational Impact: increased phishing scams targeting farmersurgent password resets for 2.5 billion accountspotential disruption to farm operations if ransomware spreads
Customer Complaints: ['reports of spoofed emails', 'identity theft concerns']
Brand Reputation Impact: erosion of trust in Gmail/Salesforce securityheightened awareness of agricultural sector vulnerabilities
Identity Theft Risk: high (due to exposed PII like driver’s licenses and birth dates)
Payment Information Risk: potential (if linked financial data was accessed)
Average Financial Loss: The average financial loss per incident is $3.22 million.
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Addresses, Dates Of Birth, Driver'S License Numbers, , Personally Identifiable Information (Pii), Protected Health Information (Phi), , Personally Identifiable Information (Pii), Partial Social Security Numbers (Last 4 Digits), Driver’S License Numbers, , Personally Identifiable Information (Pii), Partial Social Security Numbers, , Personally Identifiable Information (Pii), , Personal Identifiable Information (Pii), Business Email Data, Potential Agricultural Operational Data and .

Entity Name: Farmers Insurance
Entity Type: Insurance Company
Industry: Insurance
Location: California

Entity Name: Farmers Insurance
Entity Type: Insurance Company
Industry: Insurance
Location: California, USA
Customers Affected: Unknown

Entity Name: Farmers Insurance Exchange
Entity Type: Insurance Provider
Industry: Insurance
Location: United States
Customers Affected: 1,071,172

Entity Name: Farmers Group Inc.
Entity Type: Insurance Holding Company
Industry: Insurance
Location: United States
Customers Affected: 1,071,172

Entity Name: Unnamed Third-Party Vendor
Entity Type: Service Provider

Entity Name: Farmers Insurance Exchange
Entity Type: Insurance Company
Industry: Insurance
Location: United States

Entity Name: Farmers Insurance Exchange
Entity Type: Insurance Company
Industry: Automotive Insurance
Location: USA (New York)

Entity Name: Hagerty Insurance Agency LLC
Entity Type: Insurance Agency
Industry: Automotive Insurance
Location: USA (New York)

Entity Name: Hartford Fire Insurance Co.
Entity Type: Insurance Company
Industry: Automotive Insurance
Location: USA (New York)

Entity Name: Infinity Insurance Co.
Entity Type: Insurance Company
Industry: Automotive Insurance
Location: USA (New York)

Entity Name: Liberty Mutual Insurance Co.
Entity Type: Insurance Company
Industry: Automotive Insurance
Location: USA (New York)

Entity Name: Metromile Insurance Co.
Entity Type: Insurance Company
Industry: Automotive Insurance
Location: USA (New York)

Entity Name: Midvale Indemnity Co.
Entity Type: Insurance Company
Industry: Automotive Insurance
Location: USA (New York)

Entity Name: Safe Automobile Mutual Insurance Co.
Entity Type: Insurance Company
Industry: Automotive Insurance
Location: USA (New York)

Entity Name: Google (Gmail)
Entity Type: technology company
Industry: cloud services/email
Location: global (U.S. market focus)
Size: 2.5 billion affected accounts
Customers Affected: 2.5 billion

Entity Name: Salesforce
Entity Type: CRM/enterprise software
Industry: technology
Location: global

Entity Name: Farmers Insurance
Entity Type: insurance provider
Industry: financial services
Location: U.S.
Customers Affected: 1 million+ (including agricultural producers)

Entity Name: U.S. Agricultural Sector (small family farms/ranches)
Entity Type: businesses
Industry: agriculture
Location: U.S. (focus on rural/High Plains regions)

Incident Response Plan Activated: Yes
Third Party Assistance: Yes (vendor containment measures)
Law Enforcement Notified: Yes
Containment Measures: Blocked unauthorized access to vendor database
Recovery Measures: 24 months of free Cyberscout credit monitoring for affected individuals
Communication Strategy: Written notices to affected individuals (sent ~2025-08-22)Public disclosure via website and Maine AG notificationDedicated helpline (1-833-426-6809)

Incident Response Plan Activated: Yes
Third Party Assistance: Cybersecurity Experts, Law Enforcement.
Law Enforcement Notified: Yes
Containment Measures: Vendor’s monitoring tools contained the incident
Communication Strategy: Customer notification letters sent

Containment Measures: Review of Consumer Data Storage and Access
Remediation Measures: Full Review of Data Handling Practices
Communication Strategy: Public Statements (e.g., Liberty Mutual’s Acknowledgment)

Incident Response Plan Activated: yes (Google issued warnings and forced password resets)
Containment Measures: password reset enforcementphishing scam alerts
Remediation Measures: user education on MFAencouragement to update security software
Communication Strategy: public announcements by Googlemedia coverage highlighting agricultural risks
Incident Response Plan: The company's incident response plan is described as Yes, Yes, .
Third-Party Assistance: The company involves third-party assistance in incident response through Yes (vendor containment measures), Cybersecurity experts, Law enforcement, .

Type of Data Compromised: Names, Addresses, Dates of birth, Driver's license numbers

Type of Data Compromised: Personally identifiable information (pii), Protected health information (phi)
Number of Records Exposed: Unknown
Sensitivity of Data: High
Personally Identifiable Information: namesSocial Security numbers

Type of Data Compromised: Personally identifiable information (pii), Partial social security numbers (last 4 digits), Driver’s license numbers
Number of Records Exposed: 1,071,172
Sensitivity of Data: High (PII with identity theft risk)
Data Exfiltration: Yes (unauthorized access and acquisition confirmed)
Personally Identifiable Information: Yes

Type of Data Compromised: Personally identifiable information (pii), Partial social security numbers
Sensitivity of Data: High
Data Exfiltration: Likely (data accessed by threat actor)
Personally Identifiable Information: Yes

Type of Data Compromised: Personally identifiable information (pii)
Sensitivity of Data: High (Driver’s License Numbers, Birth Dates)
Personally Identifiable Information: Driver’s License NumbersBirth Dates

Type of Data Compromised: Personal identifiable information (pii), Business email data, Potential agricultural operational data
Number of Records Exposed: 2.5 billion (Gmail) + 1 million (Farmers Insurance)
Sensitivity of Data: high (PII, financial, and farm-specific data)
Data Exfiltration: yes
Personally Identifiable Information: namesaddressesbirth datesdriver’s licenses
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Full Review of Data Handling Practices, , user education on MFA, encouragement to update security software, .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by blocked unauthorized access to vendor database, , vendor’s monitoring tools contained the incident, review of consumer data storage and access, , password reset enforcement, phishing scam alerts and .
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through 24 months of free Cyberscout credit monitoring for affected individuals, .

Regulations Violated: Potential HIPAA (PHI exposure), Potential state data breach laws (e.g., California Civil Code § 1798.82),
Regulatory Notifications: California Office of the Attorney General

Regulatory Notifications: Maine Attorney General

Legal Actions: Potential litigation (under investigation by Bragar Eagel & Squire, P.C.)

Regulations Violated: New York DFS Cybersecurity Regulation (2017, Updated 2023),
Fines Imposed: $19,300,000 (Total)
Legal Actions: Settlements with Mandatory Remedial Measures,
Regulatory Notifications: Delayed Reporting by Farmers Insurance Exchange and Infinity Insurance Co.

Regulatory Notifications: potential reporting under state data breach laws (e.g., California CCPA)
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Potential litigation (under investigation by Bragar Eagel & Squire, P.C.), Settlements with Mandatory Remedial Measures, .

Lessons Learned: Timely incident reporting is critical to compliance and consumer protection., Robust access controls and data protection measures are essential for online platforms handling PII., Regulatory frameworks like NY DFS’s cybersecurity rules set enforceable standards for financial institutions.

Lessons Learned: Agricultural sector is increasingly targeted due to weak cybersecurity practices and high-value data (crop/GPS/financial records)., Third-party vulnerabilities (e.g., Salesforce) can cascade into sector-wide risks., Rural businesses lack awareness: 82% of farms believe they’ve never been attacked, despite evidence to the contrary., Basic measures (MFA, password hygiene, antivirus) are critically underutilized in agriculture.

Recommendations: Implement comprehensive vulnerability scanning and access reviews for online platforms., Ensure timely incident reporting to regulators to avoid compounded penalties., Invest in cybersecurity programs to align with evolving regulatory requirements (e.g., NY DFS 2023 updates)., Adopt basic cyber preparedness measures, such as incident response plans, to mitigate risks.Implement comprehensive vulnerability scanning and access reviews for online platforms., Ensure timely incident reporting to regulators to avoid compounded penalties., Invest in cybersecurity programs to align with evolving regulatory requirements (e.g., NY DFS 2023 updates)., Adopt basic cyber preparedness measures, such as incident response plans, to mitigate risks.Implement comprehensive vulnerability scanning and access reviews for online platforms., Ensure timely incident reporting to regulators to avoid compounded penalties., Invest in cybersecurity programs to align with evolving regulatory requirements (e.g., NY DFS 2023 updates)., Adopt basic cyber preparedness measures, such as incident response plans, to mitigate risks.Implement comprehensive vulnerability scanning and access reviews for online platforms., Ensure timely incident reporting to regulators to avoid compounded penalties., Invest in cybersecurity programs to align with evolving regulatory requirements (e.g., NY DFS 2023 updates)., Adopt basic cyber preparedness measures, such as incident response plans, to mitigate risks.

Recommendations: Enable multi-factor authentication (MFA) on all email and business accounts., Use strong, unique passwords (12+ characters) and change them post-breach., Invest in reputable antivirus software (e.g., Norton, McAfee, Bitdefender) with phishing protection., Regularly update software and patch vulnerabilities., Back up data to external drives/clouds to mitigate ransomware risks., Train employees/family to recognize phishing (e.g., spoofed USDA/supplier emails)., Avoid public Wi-Fi for sensitive transactions., Conduct cybersecurity assessments using free resources (e.g., CISA for agriculture)., Monitor for breaches using tools like McAfee/Norton’s personal data cleanup., Consider encrypted email services for farm-specific data., Support legislative efforts like the Farm and Food Cybersecurity Act (2025).Enable multi-factor authentication (MFA) on all email and business accounts., Use strong, unique passwords (12+ characters) and change them post-breach., Invest in reputable antivirus software (e.g., Norton, McAfee, Bitdefender) with phishing protection., Regularly update software and patch vulnerabilities., Back up data to external drives/clouds to mitigate ransomware risks., Train employees/family to recognize phishing (e.g., spoofed USDA/supplier emails)., Avoid public Wi-Fi for sensitive transactions., Conduct cybersecurity assessments using free resources (e.g., CISA for agriculture)., Monitor for breaches using tools like McAfee/Norton’s personal data cleanup., Consider encrypted email services for farm-specific data., Support legislative efforts like the Farm and Food Cybersecurity Act (2025).Enable multi-factor authentication (MFA) on all email and business accounts., Use strong, unique passwords (12+ characters) and change them post-breach., Invest in reputable antivirus software (e.g., Norton, McAfee, Bitdefender) with phishing protection., Regularly update software and patch vulnerabilities., Back up data to external drives/clouds to mitigate ransomware risks., Train employees/family to recognize phishing (e.g., spoofed USDA/supplier emails)., Avoid public Wi-Fi for sensitive transactions., Conduct cybersecurity assessments using free resources (e.g., CISA for agriculture)., Monitor for breaches using tools like McAfee/Norton’s personal data cleanup., Consider encrypted email services for farm-specific data., Support legislative efforts like the Farm and Food Cybersecurity Act (2025).Enable multi-factor authentication (MFA) on all email and business accounts., Use strong, unique passwords (12+ characters) and change them post-breach., Invest in reputable antivirus software (e.g., Norton, McAfee, Bitdefender) with phishing protection., Regularly update software and patch vulnerabilities., Back up data to external drives/clouds to mitigate ransomware risks., Train employees/family to recognize phishing (e.g., spoofed USDA/supplier emails)., Avoid public Wi-Fi for sensitive transactions., Conduct cybersecurity assessments using free resources (e.g., CISA for agriculture)., Monitor for breaches using tools like McAfee/Norton’s personal data cleanup., Consider encrypted email services for farm-specific data., Support legislative efforts like the Farm and Food Cybersecurity Act (2025).Enable multi-factor authentication (MFA) on all email and business accounts., Use strong, unique passwords (12+ characters) and change them post-breach., Invest in reputable antivirus software (e.g., Norton, McAfee, Bitdefender) with phishing protection., Regularly update software and patch vulnerabilities., Back up data to external drives/clouds to mitigate ransomware risks., Train employees/family to recognize phishing (e.g., spoofed USDA/supplier emails)., Avoid public Wi-Fi for sensitive transactions., Conduct cybersecurity assessments using free resources (e.g., CISA for agriculture)., Monitor for breaches using tools like McAfee/Norton’s personal data cleanup., Consider encrypted email services for farm-specific data., Support legislative efforts like the Farm and Food Cybersecurity Act (2025).Enable multi-factor authentication (MFA) on all email and business accounts., Use strong, unique passwords (12+ characters) and change them post-breach., Invest in reputable antivirus software (e.g., Norton, McAfee, Bitdefender) with phishing protection., Regularly update software and patch vulnerabilities., Back up data to external drives/clouds to mitigate ransomware risks., Train employees/family to recognize phishing (e.g., spoofed USDA/supplier emails)., Avoid public Wi-Fi for sensitive transactions., Conduct cybersecurity assessments using free resources (e.g., CISA for agriculture)., Monitor for breaches using tools like McAfee/Norton’s personal data cleanup., Consider encrypted email services for farm-specific data., Support legislative efforts like the Farm and Food Cybersecurity Act (2025).Enable multi-factor authentication (MFA) on all email and business accounts., Use strong, unique passwords (12+ characters) and change them post-breach., Invest in reputable antivirus software (e.g., Norton, McAfee, Bitdefender) with phishing protection., Regularly update software and patch vulnerabilities., Back up data to external drives/clouds to mitigate ransomware risks., Train employees/family to recognize phishing (e.g., spoofed USDA/supplier emails)., Avoid public Wi-Fi for sensitive transactions., Conduct cybersecurity assessments using free resources (e.g., CISA for agriculture)., Monitor for breaches using tools like McAfee/Norton’s personal data cleanup., Consider encrypted email services for farm-specific data., Support legislative efforts like the Farm and Food Cybersecurity Act (2025).Enable multi-factor authentication (MFA) on all email and business accounts., Use strong, unique passwords (12+ characters) and change them post-breach., Invest in reputable antivirus software (e.g., Norton, McAfee, Bitdefender) with phishing protection., Regularly update software and patch vulnerabilities., Back up data to external drives/clouds to mitigate ransomware risks., Train employees/family to recognize phishing (e.g., spoofed USDA/supplier emails)., Avoid public Wi-Fi for sensitive transactions., Conduct cybersecurity assessments using free resources (e.g., CISA for agriculture)., Monitor for breaches using tools like McAfee/Norton’s personal data cleanup., Consider encrypted email services for farm-specific data., Support legislative efforts like the Farm and Food Cybersecurity Act (2025).Enable multi-factor authentication (MFA) on all email and business accounts., Use strong, unique passwords (12+ characters) and change them post-breach., Invest in reputable antivirus software (e.g., Norton, McAfee, Bitdefender) with phishing protection., Regularly update software and patch vulnerabilities., Back up data to external drives/clouds to mitigate ransomware risks., Train employees/family to recognize phishing (e.g., spoofed USDA/supplier emails)., Avoid public Wi-Fi for sensitive transactions., Conduct cybersecurity assessments using free resources (e.g., CISA for agriculture)., Monitor for breaches using tools like McAfee/Norton’s personal data cleanup., Consider encrypted email services for farm-specific data., Support legislative efforts like the Farm and Food Cybersecurity Act (2025).Enable multi-factor authentication (MFA) on all email and business accounts., Use strong, unique passwords (12+ characters) and change them post-breach., Invest in reputable antivirus software (e.g., Norton, McAfee, Bitdefender) with phishing protection., Regularly update software and patch vulnerabilities., Back up data to external drives/clouds to mitigate ransomware risks., Train employees/family to recognize phishing (e.g., spoofed USDA/supplier emails)., Avoid public Wi-Fi for sensitive transactions., Conduct cybersecurity assessments using free resources (e.g., CISA for agriculture)., Monitor for breaches using tools like McAfee/Norton’s personal data cleanup., Consider encrypted email services for farm-specific data., Support legislative efforts like the Farm and Food Cybersecurity Act (2025).Enable multi-factor authentication (MFA) on all email and business accounts., Use strong, unique passwords (12+ characters) and change them post-breach., Invest in reputable antivirus software (e.g., Norton, McAfee, Bitdefender) with phishing protection., Regularly update software and patch vulnerabilities., Back up data to external drives/clouds to mitigate ransomware risks., Train employees/family to recognize phishing (e.g., spoofed USDA/supplier emails)., Avoid public Wi-Fi for sensitive transactions., Conduct cybersecurity assessments using free resources (e.g., CISA for agriculture)., Monitor for breaches using tools like McAfee/Norton’s personal data cleanup., Consider encrypted email services for farm-specific data., Support legislative efforts like the Farm and Food Cybersecurity Act (2025).
Key Lessons Learned: The key lessons learned from past incidents are Timely incident reporting is critical to compliance and consumer protection.,Robust access controls and data protection measures are essential for online platforms handling PII.,Regulatory frameworks like NY DFS’s cybersecurity rules set enforceable standards for financial institutions.Agricultural sector is increasingly targeted due to weak cybersecurity practices and high-value data (crop/GPS/financial records).,Third-party vulnerabilities (e.g., Salesforce) can cascade into sector-wide risks.,Rural businesses lack awareness: 82% of farms believe they’ve never been attacked, despite evidence to the contrary.,Basic measures (MFA, password hygiene, antivirus) are critically underutilized in agriculture.

Source: California Office of the Attorney General

Source: California Office of the Attorney General

Source: Farmers Insurance Breach Notice (Website)

Source: Maine Attorney General Notification

Source: GlobeNewswire (Bragar Eagel & Squire, P.C.)
Date Accessed: 2025-09-18

Source: Top Class Actions

Source: New York Department of Financial Services (DFS)

Source: Aon’s Global Cyber Risk Report

Source: Google Security Blog (hypothetical, based on described announcement)

Source: Farmers Insurance Data Breach Notification

Source: USDA Reports on Agricultural Cybersecurity (2025)

Source: Critical Infrastructure Security and Resilience in America’s Cyber Defense Agency (CISA)
URL: https://www.cisa.gov
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney General, and Source: California Office of the Attorney General, and Source: Farmers Insurance Breach Notice (Website), and Source: Maine Attorney General Notification, and Source: GlobeNewswire (Bragar Eagel & Squire, P.C.)Date Accessed: 2025-09-18, and Source: Top Class Actions, and Source: New York Department of Financial Services (DFS), and Source: Aon’s Global Cyber Risk Report, and Source: Google Security Blog (hypothetical, based on described announcement), and Source: Farmers Insurance Data Breach Notification, and Source: USDA Reports on Agricultural Cybersecurity (2025), and Source: Critical Infrastructure Security and Resilience in America’s Cyber Defense Agency (CISA)Url: https://www.cisa.gov.

Investigation Status: Completed (as of 2025-07-24)

Investigation Status: Ongoing (legal investigation by Bragar Eagel & Squire, P.C.)

Investigation Status: Ongoing (DFS investigation into related breaches continues)

Investigation Status: ongoing (no resolution details provided)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Written Notices To Affected Individuals (Sent ~2025-08-22), Public Disclosure Via Website And Maine Ag Notification, Dedicated Helpline (1-833-426-6809), Customer notification letters sent, Public Statements (E.G., Liberty Mutual’S Acknowledgment), Public Announcements By Google and Media Coverage Highlighting Agricultural Risks.

Customer Advisories: Written notices with credit monitoring offerHelpline for eligibility checks

Stakeholder Advisories: Customers notified via letters; legal firm encouraging affected individuals to contact them
Customer Advisories: Notification letters sent to affected customers

Stakeholder Advisories: Google Urged Users To Reset Passwords And Enable Mfa., Agricultural Organizations (E.G., Farm Bureaus) Advised Members To Audit Cybersecurity Practices., Usda Promoted Resources For Rural Cybersecurity Awareness..
Customer Advisories: Gmail users received breach notifications with phishing warnings.Farmers Insurance customers were notified of PII exposure and offered credit monitoring.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Written Notices With Credit Monitoring Offer, Helpline For Eligibility Checks, , Customers notified via letters; legal firm encouraging affected individuals to contact them, Notification letters sent to affected customers, Google Urged Users To Reset Passwords And Enable Mfa., Agricultural Organizations (E.G., Farm Bureaus) Advised Members To Audit Cybersecurity Practices., Usda Promoted Resources For Rural Cybersecurity Awareness., Gmail Users Received Breach Notifications With Phishing Warnings., Farmers Insurance Customers Were Notified Of Pii Exposure And Offered Credit Monitoring. and .

Entry Point: Third-party vendor database
High Value Targets: Customer Pii,
Data Sold on Dark Web: Customer Pii,

Entry Point: Third-party vendor (Salesforce environment)

Entry Point: Salesforce third-party vulnerability
High Value Targets: Agricultural Producers' Pii, Farm Operational Data,
Data Sold on Dark Web: Agricultural Producers' Pii, Farm Operational Data,

Root Causes: Third-Party Vendor Security Vulnerability,

Root Causes: Inadequate Cybersecurity Controls On Online Quoting Platforms., Failure To Report Incidents Promptly (Farmers Insurance Exchange, Infinity Insurance Co.)., Lack Of Basic Preparedness (E.G., Response Plans, Vulnerability Scans).,
Corrective Actions: Mandatory Review Of Consumer Data Storage And Access Protocols., Enhanced Compliance With Ny Dfs Cybersecurity Regulations., Investment In Cybersecurity Programs (E.G., Liberty Mutual’S Ongoing Efforts).,

Root Causes: Third-Party Vendor (Salesforce) Security Failure., Overreliance On Consumer-Grade Email (Gmail) For Business Operations In Agriculture., Lack Of Mfa And Weak Password Practices In Rural Sectors., Low Cybersecurity Awareness Among Farmers (82% Believed They Were Never Attacked)., Outdated Software And Unpatched Systems In Agricultural Businesses.,
Corrective Actions: Google Enforced Password Resets And Phishing Alerts., Agricultural Sector Urged To Adopt Mfa, Antivirus, And Employee Training., Legislative Push For Farm And Food Cybersecurity Act (2025) To Fund Rural Cyber Defenses., Cisa And Usda Expanded Free Cybersecurity Resources For Farmers.,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Cybersecurity Experts, Law Enforcement, .
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Mandatory Review Of Consumer Data Storage And Access Protocols., Enhanced Compliance With Ny Dfs Cybersecurity Regulations., Investment In Cybersecurity Programs (E.G., Liberty Mutual’S Ongoing Efforts)., , Google Enforced Password Resets And Phishing Alerts., Agricultural Sector Urged To Adopt Mfa, Antivirus, And Employee Training., Legislative Push For Farm And Food Cybersecurity Act (2025) To Fund Rural Cyber Defenses., Cisa And Usda Expanded Free Cybersecurity Resources For Farmers., .
Last Attacking Group: The attacking group in the last incident were an Unauthorized actor (unknown) and Known cybercrime group (unnamed).
Most Recent Incident Detected: The most recent incident detected was on 2025-05-30.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-09-18.
Highest Financial Loss: The highest financial loss from an incident was $19,300,000 (Total Fines).
Most Significant Data Compromised: The most significant data compromised in an incident were names, addresses, dates of birth, driver's license numbers, , names, Social Security numbers, medical history, , Name, Address, Date of birth, Driver’s license number, Last four digits of Social Security number, , Names, Addresses, Dates of birth, Driver’s license numbers, Last four digits of Social Security numbers (in certain cases), , Driver’s License Numbers, Birth Dates, Personal Details, , names, addresses, birth dates, driver’s licenses, business email data, potential farm-specific data (crop records, GPS mappings, precision ag info) and .
Most Significant System Affected: The most significant system affected in an incident was Third-party vendor database and Salesforce environments and Online Quoting Platforms and Gmail accountsSalesforce platformslinked agricultural business systems.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was cybersecurity experts, law enforcement, .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Blocked unauthorized access to vendor database, Vendor’s monitoring tools contained the incident, Review of Consumer Data Storage and Access and password reset enforcementphishing scam alerts.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Date of birth, driver's license numbers, Address, Driver’s License Numbers, Social Security numbers, addresses, Driver’s license number, Last four digits of Social Security number, Birth Dates, Name, dates of birth, medical history, business email data, driver’s licenses, Dates of birth, potential farm-specific data (crop records, GPS mappings, precision ag info), Personal Details, Last four digits of Social Security numbers (in certain cases), Driver’s license numbers, Names, Addresses, birth dates and names.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 2.5B.
Highest Fine Imposed: The highest fine imposed for a regulatory violation was $19,300,000 (Total).
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Potential litigation (under investigation by Bragar Eagel & Squire, P.C.), Settlements with Mandatory Remedial Measures, .
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Basic measures (MFA, password hygiene, antivirus) are critically underutilized in agriculture.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Avoid public Wi-Fi for sensitive transactions., Implement comprehensive vulnerability scanning and access reviews for online platforms., Enable multi-factor authentication (MFA) on all email and business accounts., Use strong, unique passwords (12+ characters) and change them post-breach., Support legislative efforts like the Farm and Food Cybersecurity Act (2025)., Monitor for breaches using tools like McAfee/Norton’s personal data cleanup., Conduct cybersecurity assessments using free resources (e.g., CISA for agriculture)., Adopt basic cyber preparedness measures, such as incident response plans, to mitigate risks., Invest in cybersecurity programs to align with evolving regulatory requirements (e.g., NY DFS 2023 updates)., Train employees/family to recognize phishing (e.g., spoofed USDA/supplier emails)., Consider encrypted email services for farm-specific data., Back up data to external drives/clouds to mitigate ransomware risks., Invest in reputable antivirus software (e.g., Norton, McAfee, Bitdefender) with phishing protection., Regularly update software and patch vulnerabilities. and Ensure timely incident reporting to regulators to avoid compounded penalties..
Most Recent Source: The most recent source of information about an incident are Farmers Insurance Breach Notice (Website), Top Class Actions, Google Security Blog (hypothetical, based on described announcement), GlobeNewswire (Bragar Eagel & Squire, P.C.), California Office of the Attorney General, Farmers Insurance Data Breach Notification, New York Department of Financial Services (DFS), USDA Reports on Agricultural Cybersecurity (2025), Critical Infrastructure Security and Resilience in America’s Cyber Defense Agency (CISA), Aon’s Global Cyber Risk Report and Maine Attorney General Notification.
Most Recent URL for Additional Resources: The most recent URL for additional resources on cybersecurity best practices is https://www.cisa.gov .
Current Status of Most Recent Investigation: The current status of the most recent investigation is Completed (as of 2025-07-24).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Customers notified via letters; legal firm encouraging affected individuals to contact them, Google urged users to reset passwords and enable MFA., Agricultural organizations (e.g., Farm Bureaus) advised members to audit cybersecurity practices., USDA promoted resources for rural cybersecurity awareness., .
Most Recent Customer Advisory: The most recent customer advisory issued were an Written notices with credit monitoring offerHelpline for eligibility checks, Notification letters sent to affected customers and Gmail users received breach notifications with phishing warnings.Farmers Insurance customers were notified of PII exposure and offered credit monitoring.
Most Recent Entry Point: The most recent entry point used by an initial access broker were an Third-party vendor database, Third-party vendor (Salesforce environment) and Salesforce third-party vulnerability.
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Third-party vendor security vulnerability, Inadequate cybersecurity controls on online quoting platforms.Failure to report incidents promptly (Farmers Insurance Exchange, Infinity Insurance Co.).Lack of basic preparedness (e.g., response plans, vulnerability scans)., Third-party vendor (Salesforce) security failure.Overreliance on consumer-grade email (Gmail) for business operations in agriculture.Lack of MFA and weak password practices in rural sectors.Low cybersecurity awareness among farmers (82% believed they were never attacked).Outdated software and unpatched systems in agricultural businesses..
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Mandatory review of consumer data storage and access protocols.Enhanced compliance with NY DFS cybersecurity regulations.Investment in cybersecurity programs (e.g., Liberty Mutual’s ongoing efforts)., Google enforced password resets and phishing alerts.Agricultural sector urged to adopt MFA, antivirus, and employee training.Legislative push for Farm and Food Cybersecurity Act (2025) to fund rural cyber defenses.CISA and USDA expanded free cybersecurity resources for farmers..
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.