ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

San Francisco International Airport (SFO), an enterprise department of the City & County of San Francisco, has a workforce of approximately 1,700 City employees and strives to be a diverse, equitable, and inclusive employer. SFO’s mission is to provide an exceptional airport in service to our communities and our core values are Safety and Security, Teamwork, Excellence, Care and Equity. https://www.flysfo.com/social-media-policy

San Francisco International Airport A.I CyberSecurity Scoring

SFIA

Company Details

Linkedin ID:

flysfo

Employees number:

1,247

Number of followers:

21,939

NAICS:

481

Industry Type:

Airlines and Aviation

Homepage:

flysfo.com

IP Addresses:

0

Company ID:

SAN_2718945

Scan Status:

In-progress

AI scoreSFIA Risk Score (AI oriented)

Between 700 and 749

https://images.rankiteo.com/companyimages/flysfo.jpeg
SFIA Airlines and Aviation
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreSFIA Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/flysfo.jpeg
SFIA Airlines and Aviation
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

SFIA Company CyberSecurity News & History

Past Incidents
2
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
SFOBreach2513/2020
Rankiteo Explanation :
Attack without any consequences

Description: The California Office of the Attorney General reported a data breach involving SFO, which occurred on March 5, 2020. The breach affected usernames and passwords for users of SFOConnect.com and SFOConstruction.com, potentially impacting multiple users, although the exact number is unknown. The breach was reported on May 27, 2020, and actions taken included the removal of malicious code and a forced password reset on March 23, 2020.

San Francisco International AirportBreach6033/2020
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: San Francisco International Airport (SFO) disclosed a data breach after two of its websites, SFOConnect.com and SFOConstruction.com were hacked in March 2020. The attackers gained access to the login credentials of users registered on the two breached sites. San Francisco International Airport is Bay Area's largest airport and it currently offers flights throughout North America with non-stop connections to 86 cities in the U.S. on 12 domestic airlines. Attackers injected malicious code to steal credentials. Airport reseted all email and network passwords.

SFO
Breach
Severity: 25
Impact: 1
Seen: 3/2020
Blog:
Rankiteo Explanation
Attack without any consequences

Description: The California Office of the Attorney General reported a data breach involving SFO, which occurred on March 5, 2020. The breach affected usernames and passwords for users of SFOConnect.com and SFOConstruction.com, potentially impacting multiple users, although the exact number is unknown. The breach was reported on May 27, 2020, and actions taken included the removal of malicious code and a forced password reset on March 23, 2020.

San Francisco International Airport
Breach
Severity: 60
Impact: 3
Seen: 3/2020
Blog:
Rankiteo Explanation
Attack with significant impact with internal employee data leaks

Description: San Francisco International Airport (SFO) disclosed a data breach after two of its websites, SFOConnect.com and SFOConstruction.com were hacked in March 2020. The attackers gained access to the login credentials of users registered on the two breached sites. San Francisco International Airport is Bay Area's largest airport and it currently offers flights throughout North America with non-stop connections to 86 cities in the U.S. on 12 domestic airlines. Attackers injected malicious code to steal credentials. Airport reseted all email and network passwords.

Ailogo

SFIA Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for SFIA

Incidents vs Airlines and Aviation Industry Average (This Year)

No incidents recorded for San Francisco International Airport in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for San Francisco International Airport in 2025.

Incident Types SFIA vs Airlines and Aviation Industry Avg (This Year)

No incidents recorded for San Francisco International Airport in 2025.

Incident History — SFIA (X = Date, Y = Severity)

SFIA cyber incidents detection timeline including parent company and subsidiaries

SFIA Company Subsidiaries

SubsidiaryImage

San Francisco International Airport (SFO), an enterprise department of the City & County of San Francisco, has a workforce of approximately 1,700 City employees and strives to be a diverse, equitable, and inclusive employer. SFO’s mission is to provide an exceptional airport in service to our communities and our core values are Safety and Security, Teamwork, Excellence, Care and Equity. https://www.flysfo.com/social-media-policy

Loading...
similarCompanies

SFIA Similar Companies

JetBlue

When JetBlue first took flight in February 2000, our founding goal was to bring humanity back to air travel, and over two decades later, we still put our customers, crewmembers and communities at the center of everything we do. Before we even had aircraft to fly, our founders selected five values

SAUDI AIRLINES

At Saudia Group, we're on a mission to inspire people to go beyond borders. Our purpose is rooted in unlocking human potential and connecting the world in ways never thought possible. We are committed to reshaping the aviation ecosystem in our region and beyond, by embracing innovation and a custome

easyJet

We’re on a mission to make low-cost travel easy. Whatever your role, you’ll connect millions of people to what they love using Europe’s best airline network, great value fares, and friendly service. And to help us get there we’ll give you everything you need to make a personal impact on our growing

Singapore Airlines

Welcome aboard Singapore Airlines on LinkedIn. Discover travel inspirations, business travel tips, cultural insights, our latest updates, and more. Singapore Airlines is a global company dedicated to providing air transportation services of the highest quality and to maximising returns for the ben

KLM Royal Dutch Airlines

Welcome to our LinkedIn page! To learn how we can assist you, please check: http://klmf.ly/ContactCentre. KLM was founded in 1919 and is the oldest airline in the world. With a vast network of European and intercontinental destinations, KLM can offer direct flights to major cities and economic cen

Lufthansa Group

The Lufthansa Group is an aviation company with operations worldwide. It plays a leading role in its European home market. With 109,509 employees, the Lufthansa Group generated revenue of EUR 32.770m in the financial year 2022. The Passenger Airlines segment includes, on the one hand, the network a

Delta Air Lines

Delta Air Lines (NYSE: DAL) is the U.S. global airline leader in safety, innovation, reliability and customer experience. Powered by our employees around the world, Delta has for a decade led the airline industry in operational excellence while maintaining our reputation for award-winning customer s

Emirates

Based in Dubai, the Emirates Group employs over 103,363 staff from more than 160 nationalities. The Emirates Group’s extensive and diverse international portfolio includes the world’s largest international airline, Emirates, and one of the largest combined air services provider in the world, dnata.

GOL Linhas Aéreas

Somos a maior Companhia Aérea do País e estamos entre as que mais crescem no mundo. A nossa história começou em 2001 e, desde então, somos responsáveis por inovar o mercado da aviação no Brasil. Tudo isso graças à dedicação do nosso Time para garantir o nosso Valor número 1, a Segurança, entregand

newsone

SFIA CyberSecurity News

November 19, 2025 08:00 AM
Travel data trade with US government to be halted

The Airline Reporting Corporation, a data broker owned by leading airlines, will discontinue its Travel Intelligence Program,...

November 05, 2025 11:15 PM
San Francisco International Airport’s Energy Management Control System

Leveraging technology to enable net zero for the Bay Area's largest airport.

November 04, 2025 08:00 AM
SFO Offers Free Commute Option for Federal Workers

San Francisco International Airport (SFO) has announced that is has begun offering a free commute option to any essential federal workers.

November 01, 2025 07:00 AM
US govt shutdown impact: Air traffic controllers unpaid, flights delayed; staffing crunch hits key airpor

US News: The ongoing US government shutdown is severely impacting air travel, with widespread delays and staffing shortages plaguing air...

October 29, 2025 07:00 AM
Who is Sami Hamdi? Muslim journalist detained by ICE at San Francisco Airport

US News: British Muslim journalist Sami Hamdi was detained by ICE at San Francisco International Airport after his visa was revoked.

October 19, 2025 07:00 AM
New Jersey, California, Florida in Thanksgiving Day Chaos Waiting List, While Hawaii, Nevada See US Federal Government Shutdown Effect and Pennsylvania, New York Marred by Trump Tariff Impact, What’s Going On in American Travel Sector

New Jersey, California, and Florida can be hit hard by Thanksgiving Day chaos in 2025 and it was happened in 2024, with waiting lists...

October 14, 2025 07:00 AM
American, Delta, United, Southwest and Alaska Airlines Soar While KLM and Iberia Crumble: September Flight Cancellations Exposed, New Real Story Behind This is For You

American, Delta, United, Southwest, and Alaska Airlines soared above the chaos while KLM and Iberia crumbled under significant disruptions.

September 25, 2025 07:00 AM
United Airlines Ground Stop Disrupts US and Canada Flights

United Airlines temporarily grounded all flights in the U.S. and Canada due to a connectivity issue, causing brief but widespread delays.

September 17, 2025 07:00 AM
Waymo To Test Serving SFO And Other Airports, Best Yet To Come

Waymo has announced it has reached an agreement with San Francisco SFO airport to carry passengers for money. The pilot will be quite modest...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

SFIA CyberSecurity History Information

Official Website of San Francisco International Airport

The official website of San Francisco International Airport is http://www.flysfo.com/careers.

San Francisco International Airport’s AI-Generated Cybersecurity Score

According to Rankiteo, San Francisco International Airport’s AI-generated cybersecurity score is 727, reflecting their Moderate security posture.

How many security badges does San Francisco International Airport’ have ?

According to Rankiteo, San Francisco International Airport currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does San Francisco International Airport have SOC 2 Type 1 certification ?

According to Rankiteo, San Francisco International Airport is not certified under SOC 2 Type 1.

Does San Francisco International Airport have SOC 2 Type 2 certification ?

According to Rankiteo, San Francisco International Airport does not hold a SOC 2 Type 2 certification.

Does San Francisco International Airport comply with GDPR ?

According to Rankiteo, San Francisco International Airport is not listed as GDPR compliant.

Does San Francisco International Airport have PCI DSS certification ?

According to Rankiteo, San Francisco International Airport does not currently maintain PCI DSS compliance.

Does San Francisco International Airport comply with HIPAA ?

According to Rankiteo, San Francisco International Airport is not compliant with HIPAA regulations.

Does San Francisco International Airport have ISO 27001 certification ?

According to Rankiteo,San Francisco International Airport is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of San Francisco International Airport

San Francisco International Airport operates primarily in the Airlines and Aviation industry.

Number of Employees at San Francisco International Airport

San Francisco International Airport employs approximately 1,247 people worldwide.

Subsidiaries Owned by San Francisco International Airport

San Francisco International Airport presently has no subsidiaries across any sectors.

San Francisco International Airport’s LinkedIn Followers

San Francisco International Airport’s official LinkedIn profile has approximately 21,939 followers.

NAICS Classification of San Francisco International Airport

San Francisco International Airport is classified under the NAICS code 481, which corresponds to Air Transportation.

San Francisco International Airport’s Presence on Crunchbase

No, San Francisco International Airport does not have a profile on Crunchbase.

San Francisco International Airport’s Presence on LinkedIn

Yes, San Francisco International Airport maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/flysfo.

Cybersecurity Incidents Involving San Francisco International Airport

As of December 06, 2025, Rankiteo reports that San Francisco International Airport has experienced 2 cybersecurity incidents.

Number of Peer and Competitor Companies

San Francisco International Airport has an estimated 3,430 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at San Francisco International Airport ?

Incident Types: The types of cybersecurity incidents that have occurred include Breach.

How does San Francisco International Airport detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with reset all email and network passwords, and containment measures with removal of malicious code, and remediation measures with forced password reset..

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: San Francisco International Airport Data Breach

Description: San Francisco International Airport (SFO) disclosed a data breach after two of its websites, SFOConnect.com and SFOConstruction.com were hacked in March 2020. The attackers gained access to the login credentials of users registered on the two breached sites. Attackers injected malicious code to steal credentials. Airport reseted all email and network passwords.

Date Detected: March 2020

Type: Data Breach

Attack Vector: Malicious Code Injection

Motivation: Credential Theft

Incident : Data Breach

Title: SFO Data Breach

Description: The California Office of the Attorney General reported a data breach involving SFO, which occurred on March 5, 2020. The breach affected usernames and passwords for users of SFOConnect.com and SFOConstruction.com, potentially impacting multiple users, although the exact number is unknown. The breach was reported on May 27, 2020, and actions taken included the removal of malicious code and a forced password reset on March 23, 2020.

Date Detected: 2020-03-05

Date Publicly Disclosed: 2020-05-27

Date Resolved: 2020-03-23

Type: Data Breach

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach SAN1516291222

Data Compromised: Login credentials

Systems Affected: SFOConnect.comSFOConstruction.com

Incident : Data Breach FLY333072725

Data Compromised: Usernames, Passwords

Systems Affected: SFOConnect.comSFOConstruction.com

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Login Credentials, , Usernames, Passwords and .

Which entities were affected by each incident ?

Incident : Data Breach SAN1516291222

Entity Name: San Francisco International Airport

Entity Type: Airport

Industry: Aviation

Location: San Francisco, CA

Incident : Data Breach FLY333072725

Entity Name: SFO

Entity Type: Government

Industry: Transportation

Location: California

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Data Breach SAN1516291222

Containment Measures: Reset all email and network passwords

Incident : Data Breach FLY333072725

Containment Measures: removal of malicious code

Remediation Measures: forced password reset

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach SAN1516291222

Type of Data Compromised: Login credentials

Incident : Data Breach FLY333072725

Type of Data Compromised: Usernames, Passwords

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: forced password reset, .

How does the company handle incidents involving personally identifiable information (PII) ?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by reset all email and network passwords, , removal of malicious code and .

References

Where can I find more information about each incident ?

Incident : Data Breach FLY333072725

Source: California Office of the Attorney General

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney General.

Additional Questions

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on March 2020.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2020-05-27.

What was the most recent incident resolved ?

Most Recent Incident Resolved: The most recent incident resolved was on 2020-03-23.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Login Credentials, , usernames, passwords and .

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident was SFOConnect.comSFOConstruction.com and SFOConnect.comSFOConstruction.com.

Response to the Incidents

What containment measures were taken in the most recent incident ?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Reset all email and network passwords and removal of malicious code.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were usernames, passwords and Login Credentials.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is California Office of the Attorney General.

cve

Latest Global CVEs (Not Company-Specific)

Description

HedgeDoc is an open source, real-time, collaborative, markdown notes application. Prior to 1.10.4, some of HedgeDoc's OAuth2 endpoints for social login providers such as Google, GitHub, GitLab, Facebook or Dropbox lack CSRF protection, since they don't send a state parameter and verify the response using this parameter. This vulnerability is fixed in 1.10.4.

Risk Information
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N
Description

Langflow versions up to and including 1.6.9 contain a chained vulnerability that enables account takeover and remote code execution. An overly permissive CORS configuration (allow_origins='*' with allow_credentials=True) combined with a refresh token cookie configured as SameSite=None allows a malicious webpage to perform cross-origin requests that include credentials and successfully call the refresh endpoint. An attacker-controlled origin can therefore obtain fresh access_token / refresh_token pairs for a victim session. Obtained tokens permit access to authenticated endpoints — including built-in code-execution functionality — allowing the attacker to execute arbitrary code and achieve full system compromise.

Risk Information
cvss4
Base: 9.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was detected in xerrors Yuxi-Know up to 0.4.0. This vulnerability affects the function OtherEmbedding.aencode of the file /src/models/embed.py. Performing manipulation of the argument health_url results in server-side request forgery. The attack can be initiated remotely. The exploit is now public and may be used. The patch is named 0ff771dc1933d5a6b78f804115e78a7d8625c3f3. To fix this issue, it is recommended to deploy a patch. The vendor responded with a vulnerability confirmation and a list of security measures they have established already (e.g. disabled URL parsing, disabled URL upload mode, removed URL-to-markdown conversion).

Risk Information
cvss2
Base: 5.8
Severity: LOW
AV:N/AC:L/Au:M/C:P/I:P/A:P
cvss3
Base: 4.7
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security vulnerability has been detected in Rarlab RAR App up to 7.11 Build 127 on Android. This affects an unknown part of the component com.rarlab.rar. Such manipulation leads to path traversal. It is possible to launch the attack remotely. Attacks of this nature are highly complex. It is indicated that the exploitability is difficult. The exploit has been disclosed publicly and may be used. Upgrading to version 7.20 build 128 is able to mitigate this issue. You should upgrade the affected component. The vendor responded very professional: "This is the real vulnerability affecting RAR for Android only. WinRAR and Unix RAR versions are not affected. We already fixed it in RAR for Android 7.20 build 128 and we publicly mentioned it in that version changelog. (...) To avoid confusion among users, it would be useful if such disclosure emphasizes that it is RAR for Android only issue and WinRAR isn't affected."

Risk Information
cvss2
Base: 5.1
Severity: HIGH
AV:N/AC:H/Au:N/C:P/I:P/A:P
cvss3
Base: 5.0
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
cvss4
Base: 2.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in ZSPACE Q2C NAS up to 1.1.0210050. Affected by this issue is the function zfilev2_api.OpenSafe of the file /v2/file/safe/open of the component HTTP POST Request Handler. This manipulation of the argument safe_dir causes command injection. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=flysfo' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge