Company Details
flysfo
1,247
21,939
481
flysfo.com
0
SAN_2718945
In-progress

San Francisco International Airport Company CyberSecurity Posture
flysfo.comSan Francisco International Airport (SFO), an enterprise department of the City & County of San Francisco, has a workforce of approximately 1,700 City employees and strives to be a diverse, equitable, and inclusive employer. SFO’s mission is to provide an exceptional airport in service to our communities and our core values are Safety and Security, Teamwork, Excellence, Care and Equity. https://www.flysfo.com/social-media-policy
Company Details
flysfo
1,247
21,939
481
flysfo.com
0
SAN_2718945
In-progress
Between 700 and 749

SFIA Global Score (TPRM)XXXX

Description: The California Office of the Attorney General reported a data breach involving SFO, which occurred on March 5, 2020. The breach affected usernames and passwords for users of SFOConnect.com and SFOConstruction.com, potentially impacting multiple users, although the exact number is unknown. The breach was reported on May 27, 2020, and actions taken included the removal of malicious code and a forced password reset on March 23, 2020.
Description: San Francisco International Airport (SFO) disclosed a data breach after two of its websites, SFOConnect.com and SFOConstruction.com were hacked in March 2020. The attackers gained access to the login credentials of users registered on the two breached sites. San Francisco International Airport is Bay Area's largest airport and it currently offers flights throughout North America with non-stop connections to 86 cities in the U.S. on 12 domestic airlines. Attackers injected malicious code to steal credentials. Airport reseted all email and network passwords.


No incidents recorded for San Francisco International Airport in 2025.
No incidents recorded for San Francisco International Airport in 2025.
No incidents recorded for San Francisco International Airport in 2025.
SFIA cyber incidents detection timeline including parent company and subsidiaries

San Francisco International Airport (SFO), an enterprise department of the City & County of San Francisco, has a workforce of approximately 1,700 City employees and strives to be a diverse, equitable, and inclusive employer. SFO’s mission is to provide an exceptional airport in service to our communities and our core values are Safety and Security, Teamwork, Excellence, Care and Equity. https://www.flysfo.com/social-media-policy


When JetBlue first took flight in February 2000, our founding goal was to bring humanity back to air travel, and over two decades later, we still put our customers, crewmembers and communities at the center of everything we do. Before we even had aircraft to fly, our founders selected five values

At Saudia Group, we're on a mission to inspire people to go beyond borders. Our purpose is rooted in unlocking human potential and connecting the world in ways never thought possible. We are committed to reshaping the aviation ecosystem in our region and beyond, by embracing innovation and a custome

We’re on a mission to make low-cost travel easy. Whatever your role, you’ll connect millions of people to what they love using Europe’s best airline network, great value fares, and friendly service. And to help us get there we’ll give you everything you need to make a personal impact on our growing

Welcome aboard Singapore Airlines on LinkedIn. Discover travel inspirations, business travel tips, cultural insights, our latest updates, and more. Singapore Airlines is a global company dedicated to providing air transportation services of the highest quality and to maximising returns for the ben

Welcome to our LinkedIn page! To learn how we can assist you, please check: http://klmf.ly/ContactCentre. KLM was founded in 1919 and is the oldest airline in the world. With a vast network of European and intercontinental destinations, KLM can offer direct flights to major cities and economic cen
The Lufthansa Group is an aviation company with operations worldwide. It plays a leading role in its European home market. With 109,509 employees, the Lufthansa Group generated revenue of EUR 32.770m in the financial year 2022. The Passenger Airlines segment includes, on the one hand, the network a

Delta Air Lines (NYSE: DAL) is the U.S. global airline leader in safety, innovation, reliability and customer experience. Powered by our employees around the world, Delta has for a decade led the airline industry in operational excellence while maintaining our reputation for award-winning customer s

Based in Dubai, the Emirates Group employs over 103,363 staff from more than 160 nationalities. The Emirates Group’s extensive and diverse international portfolio includes the world’s largest international airline, Emirates, and one of the largest combined air services provider in the world, dnata.

Somos a maior Companhia Aérea do País e estamos entre as que mais crescem no mundo. A nossa história começou em 2001 e, desde então, somos responsáveis por inovar o mercado da aviação no Brasil. Tudo isso graças à dedicação do nosso Time para garantir o nosso Valor número 1, a Segurança, entregand
.png)
The Airline Reporting Corporation, a data broker owned by leading airlines, will discontinue its Travel Intelligence Program,...
Leveraging technology to enable net zero for the Bay Area's largest airport.
San Francisco International Airport (SFO) has announced that is has begun offering a free commute option to any essential federal workers.
US News: The ongoing US government shutdown is severely impacting air travel, with widespread delays and staffing shortages plaguing air...
US News: British Muslim journalist Sami Hamdi was detained by ICE at San Francisco International Airport after his visa was revoked.
New Jersey, California, and Florida can be hit hard by Thanksgiving Day chaos in 2025 and it was happened in 2024, with waiting lists...
American, Delta, United, Southwest, and Alaska Airlines soared above the chaos while KLM and Iberia crumbled under significant disruptions.
United Airlines temporarily grounded all flights in the U.S. and Canada due to a connectivity issue, causing brief but widespread delays.
Waymo has announced it has reached an agreement with San Francisco SFO airport to carry passengers for money. The pilot will be quite modest...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of San Francisco International Airport is http://www.flysfo.com/careers.
According to Rankiteo, San Francisco International Airport’s AI-generated cybersecurity score is 727, reflecting their Moderate security posture.
According to Rankiteo, San Francisco International Airport currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, San Francisco International Airport is not certified under SOC 2 Type 1.
According to Rankiteo, San Francisco International Airport does not hold a SOC 2 Type 2 certification.
According to Rankiteo, San Francisco International Airport is not listed as GDPR compliant.
According to Rankiteo, San Francisco International Airport does not currently maintain PCI DSS compliance.
According to Rankiteo, San Francisco International Airport is not compliant with HIPAA regulations.
According to Rankiteo,San Francisco International Airport is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
San Francisco International Airport operates primarily in the Airlines and Aviation industry.
San Francisco International Airport employs approximately 1,247 people worldwide.
San Francisco International Airport presently has no subsidiaries across any sectors.
San Francisco International Airport’s official LinkedIn profile has approximately 21,939 followers.
San Francisco International Airport is classified under the NAICS code 481, which corresponds to Air Transportation.
No, San Francisco International Airport does not have a profile on Crunchbase.
Yes, San Francisco International Airport maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/flysfo.
As of December 06, 2025, Rankiteo reports that San Francisco International Airport has experienced 2 cybersecurity incidents.
San Francisco International Airport has an estimated 3,430 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with reset all email and network passwords, and containment measures with removal of malicious code, and remediation measures with forced password reset..
Title: San Francisco International Airport Data Breach
Description: San Francisco International Airport (SFO) disclosed a data breach after two of its websites, SFOConnect.com and SFOConstruction.com were hacked in March 2020. The attackers gained access to the login credentials of users registered on the two breached sites. Attackers injected malicious code to steal credentials. Airport reseted all email and network passwords.
Date Detected: March 2020
Type: Data Breach
Attack Vector: Malicious Code Injection
Motivation: Credential Theft
Title: SFO Data Breach
Description: The California Office of the Attorney General reported a data breach involving SFO, which occurred on March 5, 2020. The breach affected usernames and passwords for users of SFOConnect.com and SFOConstruction.com, potentially impacting multiple users, although the exact number is unknown. The breach was reported on May 27, 2020, and actions taken included the removal of malicious code and a forced password reset on March 23, 2020.
Date Detected: 2020-03-05
Date Publicly Disclosed: 2020-05-27
Date Resolved: 2020-03-23
Type: Data Breach
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Login credentials
Systems Affected: SFOConnect.comSFOConstruction.com

Data Compromised: Usernames, Passwords
Systems Affected: SFOConnect.comSFOConstruction.com
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Login Credentials, , Usernames, Passwords and .

Entity Name: San Francisco International Airport
Entity Type: Airport
Industry: Aviation
Location: San Francisco, CA

Entity Name: SFO
Entity Type: Government
Industry: Transportation
Location: California

Containment Measures: Reset all email and network passwords

Containment Measures: removal of malicious code
Remediation Measures: forced password reset

Type of Data Compromised: Login credentials

Type of Data Compromised: Usernames, Passwords
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: forced password reset, .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by reset all email and network passwords, , removal of malicious code and .

Source: California Office of the Attorney General
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney General.
Most Recent Incident Detected: The most recent incident detected was on March 2020.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2020-05-27.
Most Recent Incident Resolved: The most recent incident resolved was on 2020-03-23.
Most Significant Data Compromised: The most significant data compromised in an incident were Login Credentials, , usernames, passwords and .
Most Significant System Affected: The most significant system affected in an incident was SFOConnect.comSFOConstruction.com and SFOConnect.comSFOConstruction.com.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Reset all email and network passwords and removal of malicious code.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were usernames, passwords and Login Credentials.
Most Recent Source: The most recent source of information about an incident is California Office of the Attorney General.
.png)
HedgeDoc is an open source, real-time, collaborative, markdown notes application. Prior to 1.10.4, some of HedgeDoc's OAuth2 endpoints for social login providers such as Google, GitHub, GitLab, Facebook or Dropbox lack CSRF protection, since they don't send a state parameter and verify the response using this parameter. This vulnerability is fixed in 1.10.4.
Langflow versions up to and including 1.6.9 contain a chained vulnerability that enables account takeover and remote code execution. An overly permissive CORS configuration (allow_origins='*' with allow_credentials=True) combined with a refresh token cookie configured as SameSite=None allows a malicious webpage to perform cross-origin requests that include credentials and successfully call the refresh endpoint. An attacker-controlled origin can therefore obtain fresh access_token / refresh_token pairs for a victim session. Obtained tokens permit access to authenticated endpoints — including built-in code-execution functionality — allowing the attacker to execute arbitrary code and achieve full system compromise.
A vulnerability was detected in xerrors Yuxi-Know up to 0.4.0. This vulnerability affects the function OtherEmbedding.aencode of the file /src/models/embed.py. Performing manipulation of the argument health_url results in server-side request forgery. The attack can be initiated remotely. The exploit is now public and may be used. The patch is named 0ff771dc1933d5a6b78f804115e78a7d8625c3f3. To fix this issue, it is recommended to deploy a patch. The vendor responded with a vulnerability confirmation and a list of security measures they have established already (e.g. disabled URL parsing, disabled URL upload mode, removed URL-to-markdown conversion).
A security vulnerability has been detected in Rarlab RAR App up to 7.11 Build 127 on Android. This affects an unknown part of the component com.rarlab.rar. Such manipulation leads to path traversal. It is possible to launch the attack remotely. Attacks of this nature are highly complex. It is indicated that the exploitability is difficult. The exploit has been disclosed publicly and may be used. Upgrading to version 7.20 build 128 is able to mitigate this issue. You should upgrade the affected component. The vendor responded very professional: "This is the real vulnerability affecting RAR for Android only. WinRAR and Unix RAR versions are not affected. We already fixed it in RAR for Android 7.20 build 128 and we publicly mentioned it in that version changelog. (...) To avoid confusion among users, it would be useful if such disclosure emphasizes that it is RAR for Android only issue and WinRAR isn't affected."
A weakness has been identified in ZSPACE Q2C NAS up to 1.1.0210050. Affected by this issue is the function zfilev2_api.OpenSafe of the file /v2/file/safe/open of the component HTTP POST Request Handler. This manipulation of the argument safe_dir causes command injection. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.