Company Details
geek-squad
6,738
0
5415
geeksquad.com
0
GEE_3219964
In-progress

Geek Squad Company CyberSecurity Posture
geeksquad.comGeek Squad® Agents and Installers are ready to take the hassle out of your technology woes. They have the know-how and skill to set up and install your computer, network, home theater solution and car audio, video and navigation systems. Home Theater Advisors and Installers Can: * Help you design your entertainment system and layout * Help you determine which parts you need to complete your system * Install one component or your entire system * Set up your speaker system * Connect your components to work together properly * Calibrate your TV * Program your remote * Show you how to work your entire system Computer Agents Can: * Connect and secure home or office wireless networks * Repair crashed hard drives * Help you get on the Internet * Remove viruses and spyware from your computer * Install virus and spyware protection software * Show you how to use your digital camera, iPod, or other digital device * Help protect and back up important data * Perform system checkups and maintenance * Bring your computer up to date * Recommend hardware and software * Install hardware and software Car Electronics Installers Can: * Install a new audio, video, satellite radio or GPS navigation system in your vehicle. * Conceal wires and seamless, factory-installed appearance * Guarantee satisfaction and provide a lifetime workmanship warranty
Company Details
geek-squad
6,738
0
5415
geeksquad.com
0
GEE_3219964
In-progress
Between 800 and 849

Geek Squad Global Score (TPRM)XXXX

Description: During the holiday season, scammers impersonated **Best Buy’s Geek Squad** via fraudulent emails, tricking customers into believing they had an outstanding bill. The phishing scheme directed victims to call a fake support number, where scammers likely extracted personal and financial information, payment details, or even coerced victims into transferring funds (e.g., via cryptocurrency) under false pretenses. The attack leveraged urgency and the trusted Geek Squad brand to exploit shoppers’ heightened vulnerability during peak shopping periods. While the article does not confirm a large-scale data breach, the tactic aligns with credential harvesting or financial fraud, potentially leading to unauthorized transactions, identity theft, or secondary scams (e.g., warrant threats). The use of AI-generated voice cloning and deepfakes in parallel scams suggests escalating sophistication, increasing the risk of successful deception. Law enforcement flagged cryptocurrency demands as a red flag, indicating high-stakes financial manipulation.


Geek Squad has 81.82% more incidents than the average of same-industry companies with at least one recorded incident.
Geek Squad has 56.25% more incidents than the average of all companies with at least one recorded incident.
Geek Squad reported 1 incidents this year: 1 cyber attacks, 0 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
Geek Squad cyber incidents detection timeline including parent company and subsidiaries

Geek Squad® Agents and Installers are ready to take the hassle out of your technology woes. They have the know-how and skill to set up and install your computer, network, home theater solution and car audio, video and navigation systems. Home Theater Advisors and Installers Can: * Help you design your entertainment system and layout * Help you determine which parts you need to complete your system * Install one component or your entire system * Set up your speaker system * Connect your components to work together properly * Calibrate your TV * Program your remote * Show you how to work your entire system Computer Agents Can: * Connect and secure home or office wireless networks * Repair crashed hard drives * Help you get on the Internet * Remove viruses and spyware from your computer * Install virus and spyware protection software * Show you how to use your digital camera, iPod, or other digital device * Help protect and back up important data * Perform system checkups and maintenance * Bring your computer up to date * Recommend hardware and software * Install hardware and software Car Electronics Installers Can: * Install a new audio, video, satellite radio or GPS navigation system in your vehicle. * Conceal wires and seamless, factory-installed appearance * Guarantee satisfaction and provide a lifetime workmanship warranty


We’re a cloud technology company that provides organizations around the world with computing infrastructure and software to help them innovate, unlock efficiencies and become more effective. We also created the world’s first – and only – autonomous database to help organize and secure our customers’

We make the experience of travel better for everyone, everywhere by inspiring innovation, partnerships and responsibility to people, places and planet. Our technology powers the travel and tourism industry. We inspire more connected ways of thinking, centered around the traveler. Our platform c

NTT DATA, Inc. is a trusted global innovator of business and technology services. We're committed to helping clients innovate, optimize and transform for long-term success. Our R&D investments help organizations and society move confidently and sustainably into the digital future. As a Global Top Em

For 50 years, our nation’s federal Medicaid program has worked to improve the health, safety and well-being of America’s most vulnerable populations: low-income families, women and children, seniors, and those with disabilities. With positive health and cost outcomes that pierce inequities and impac

At Ricoh, we bring people, processes, and technology together to make information work for you. We unlock the power of information so organizations can unlock the full potential of their people. We're a leader in information management and digital services, creating competitive advantage for over 1.
As No. 1, we inspire people in the connected world. With the latest technologies and innovations, together we have the opportunity to shape the future. To do this, we are and act trustworthy, committed and curious. Are you with us? Join us on this exciting journey and work with us or in one of the

We’re TD SYNNEX (NYSE: SNX), a leading distributor and solutions aggregator for the IT ecosystem. We’re 23,000 of the IT industry’s best and brightest, who share an unwavering passion for bringing compelling technology products, services and solutions to the world. We’re an innovative partner that
Dimension Data is a leading African born technology provider operating in the Middle East and Africa, offering a portfolio of services including systems integration, managed services infrastructure, cloud solutions, business applications, customer experience, and intelligent security solutions. We p

HCLTech is a global technology company, home to more than 220,000 people across 60 countries, delivering industry-leading capabilities centered around digital, engineering, cloud and AI, powered by a broad portfolio of technology services and products. We work with clients across all major verticals
.png)
Fake Geek Squad invoice emails are targeting users with convincing charges and urgent phone numbers to steal personal information and money.
Texas Border Business. - Advertisement -. By Joey Gomez. McALLEN, Texas – From fixing computers as a teenager to planning a career in cyber...
Mohali: In a high-stakes midnight crackdown, the Enforcement Directorate (ED) raided multiple fake call centres across Chandigarh and the...
Zurich nonprofit Radix hit by Sarcoma ramsomware group, resulting in theft of 1.3TB of data, Google issues fix for active zero-day...
Tekie Geek, an Eltingville-based IT company, has been ranked #48 on the 2025 Channel Futures MSP 501 list, an industry ranking.
Cybercriminals have significantly escalated their use of PDF attachments as attack vectors, leveraging the trusted document format to impersonate major brands.
Beware of the TOAD, that's the advice from Cisco Talos, a well-respected threat intelligence research team in the world of cybersecurity and...
Cybersecurity researchers are calling attention to phishing campaigns that impersonate popular brands and trick targets into calling phone...
Cisco has released a significant update to its brand impersonation detection engine, primarily targeting malicious emails.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Geek Squad is http://www.geeksquad.com.
According to Rankiteo, Geek Squad’s AI-generated cybersecurity score is 826, reflecting their Good security posture.
According to Rankiteo, Geek Squad currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Geek Squad is not certified under SOC 2 Type 1.
According to Rankiteo, Geek Squad does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Geek Squad is not listed as GDPR compliant.
According to Rankiteo, Geek Squad does not currently maintain PCI DSS compliance.
According to Rankiteo, Geek Squad is not compliant with HIPAA regulations.
According to Rankiteo,Geek Squad is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Geek Squad operates primarily in the IT Services and IT Consulting industry.
Geek Squad employs approximately 6,738 people worldwide.
Geek Squad presently has no subsidiaries across any sectors.
Geek Squad’s official LinkedIn profile has approximately 0 followers.
Geek Squad is classified under the NAICS code 5415, which corresponds to Computer Systems Design and Related Services.
No, Geek Squad does not have a profile on Crunchbase.
Yes, Geek Squad maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/geek-squad.
As of November 27, 2025, Rankiteo reports that Geek Squad has experienced 1 cybersecurity incidents.
Geek Squad has an estimated 36,262 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.
Total Financial Loss: The total financial loss from these incidents is estimated to be $12.50 billion.
Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with law enforcement advisories (e.g., prince george’s county police, maryland ag), incident response plan activated with public awareness campaigns, and and containment measures with public warnings, containment measures with media coverage (e.g., 7news), containment measures with social media alerts, and remediation measures with consumer education on scam recognition, remediation measures with encouragement to report scams to ftc, remediation measures with advice to verify requests via official channels, and communication strategy with press releases, communication strategy with interviews with law enforcement (e.g., sgt. john quarless), communication strategy with holiday shopping safety guides..
Title: Holiday Season Scams and Fraudulent Activities Targeting Consumers (2024)
Description: Scammers are leveraging the holiday season to exploit consumers through sophisticated tactics, including phishing emails (e.g., fake Best Buy Geek Squad notices), warrant scams, AI-generated deepfakes, and voice-cloning tools. The Federal Trade Commission reported a 25% spike in financial losses ($12.5 billion) from 2023, with law enforcement warning of increased fraud during the 'season of giving.' Tactics include fake breach pop-ups, impersonation scams, and demands for cryptocurrency payments. Authorities urge vigilance, advising consumers to verify requests, avoid rushed payments, and consult trusted sources before sharing information or money.
Date Publicly Disclosed: 2024-11-27
Type: phishing
Attack Vector: email phishingmalicious pop-upsAI-generated voice cloningdeepfake impersonationphone scams (warrant threats)cryptocurrency extortion
Vulnerability Exploited: human trustholiday distractionlack of multi-factor verificationpublicly available personal data (for voice cloning)
Threat Actor: organized cybercriminal groupsopportunistic scammers
Motivation: financial gainidentity theftfraudulent transactions
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through phishing emailsmalicious pop-upsspoofed calls.

Financial Loss: $12.5 billion (2023 U.S. reported losses, 25% increase from prior year)
Data Compromised: Personal information (via phishing), Payment details (if shared with scammers), Voice recordings (for cloning)
Customer Complaints: ['increased reports to FTC and local law enforcement']
Brand Reputation Impact: eroded trust in legitimate brands (e.g., Best Buy, Amazon, PayPal) due to impersonation
Identity Theft Risk: ['high (due to phishing and data sharing with scammers)']
Payment Information Risk: ['high (cryptocurrency transactions are irreversible)']
Average Financial Loss: The average financial loss per incident is $12.50 billion.
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Identifiable Information (Pii) Shared Voluntarily, Voice Recordings (For Cloning), Payment Details (If Provided To Scammers) and .

Entity Name: U.S. Consumers
Entity Type: individuals
Location: United States (nationwide)
Customers Affected: millions (based on FTC reports)

Entity Name: Best Buy (Geek Squad brand impersonated)
Entity Type: retail corporation
Industry: consumer electronics
Location: United States
Size: large

Entity Name: Amazon (brand impersonated)
Entity Type: e-commerce corporation
Industry: retail
Location: United States
Size: large

Entity Name: PayPal (brand impersonated)
Entity Type: financial services
Industry: payments
Location: United States
Size: large

Incident Response Plan Activated: ['law enforcement advisories (e.g., Prince George’s County Police, Maryland AG)', 'public awareness campaigns']
Containment Measures: public warningsmedia coverage (e.g., 7News)social media alerts
Remediation Measures: consumer education on scam recognitionencouragement to report scams to FTCadvice to verify requests via official channels
Communication Strategy: press releasesinterviews with law enforcement (e.g., Sgt. John Quarless)holiday shopping safety guides
Incident Response Plan: The company's incident response plan is described as law enforcement advisories (e.g., Prince George’s County Police, Maryland AG), public awareness campaigns, .

Type of Data Compromised: Personal identifiable information (pii) shared voluntarily, Voice recordings (for cloning), Payment details (if provided to scammers)
Sensitivity of Data: high (financial and personal data)
Personally Identifiable Information: namesphone numbersemail addressespayment card detailsvoice biometrics
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: consumer education on scam recognition, encouragement to report scams to FTC, advice to verify requests via official channels, .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by public warnings, media coverage (e.g., 7news), social media alerts and .

Legal Actions: potential investigations into scam operations,
Regulatory Notifications: FTC consumer alertsstate AG warnings (e.g., Maryland)
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through potential investigations into scam operations, .

Lessons Learned: Scammers exploit seasonal distractions (e.g., holidays) to increase success rates., AI tools (deepfakes, voice cloning) lower the barrier for sophisticated impersonation., Cryptocurrency demands are a red flag for fraud., Public-private collaboration is critical for rapid consumer education.

Recommendations: Verify unsolicited requests via official contact channels (e.g., company websites, not email/phone links)., Never share personal or financial information in response to urgent threats (e.g., warrants, overdue bills)., Use multi-factor authentication (MFA) for accounts to mitigate phishing risks., Report scams to the FTC (ReportFraud.ftc.gov) and local law enforcement., Educate vulnerable populations (e.g., elderly) on recognizing deepfake and voice-cloning scams., Avoid cryptocurrency transactions with unverified parties., Monitor financial accounts for unauthorized activity during high-risk periods.Verify unsolicited requests via official contact channels (e.g., company websites, not email/phone links)., Never share personal or financial information in response to urgent threats (e.g., warrants, overdue bills)., Use multi-factor authentication (MFA) for accounts to mitigate phishing risks., Report scams to the FTC (ReportFraud.ftc.gov) and local law enforcement., Educate vulnerable populations (e.g., elderly) on recognizing deepfake and voice-cloning scams., Avoid cryptocurrency transactions with unverified parties., Monitor financial accounts for unauthorized activity during high-risk periods.Verify unsolicited requests via official contact channels (e.g., company websites, not email/phone links)., Never share personal or financial information in response to urgent threats (e.g., warrants, overdue bills)., Use multi-factor authentication (MFA) for accounts to mitigate phishing risks., Report scams to the FTC (ReportFraud.ftc.gov) and local law enforcement., Educate vulnerable populations (e.g., elderly) on recognizing deepfake and voice-cloning scams., Avoid cryptocurrency transactions with unverified parties., Monitor financial accounts for unauthorized activity during high-risk periods.Verify unsolicited requests via official contact channels (e.g., company websites, not email/phone links)., Never share personal or financial information in response to urgent threats (e.g., warrants, overdue bills)., Use multi-factor authentication (MFA) for accounts to mitigate phishing risks., Report scams to the FTC (ReportFraud.ftc.gov) and local law enforcement., Educate vulnerable populations (e.g., elderly) on recognizing deepfake and voice-cloning scams., Avoid cryptocurrency transactions with unverified parties., Monitor financial accounts for unauthorized activity during high-risk periods.Verify unsolicited requests via official contact channels (e.g., company websites, not email/phone links)., Never share personal or financial information in response to urgent threats (e.g., warrants, overdue bills)., Use multi-factor authentication (MFA) for accounts to mitigate phishing risks., Report scams to the FTC (ReportFraud.ftc.gov) and local law enforcement., Educate vulnerable populations (e.g., elderly) on recognizing deepfake and voice-cloning scams., Avoid cryptocurrency transactions with unverified parties., Monitor financial accounts for unauthorized activity during high-risk periods.Verify unsolicited requests via official contact channels (e.g., company websites, not email/phone links)., Never share personal or financial information in response to urgent threats (e.g., warrants, overdue bills)., Use multi-factor authentication (MFA) for accounts to mitigate phishing risks., Report scams to the FTC (ReportFraud.ftc.gov) and local law enforcement., Educate vulnerable populations (e.g., elderly) on recognizing deepfake and voice-cloning scams., Avoid cryptocurrency transactions with unverified parties., Monitor financial accounts for unauthorized activity during high-risk periods.Verify unsolicited requests via official contact channels (e.g., company websites, not email/phone links)., Never share personal or financial information in response to urgent threats (e.g., warrants, overdue bills)., Use multi-factor authentication (MFA) for accounts to mitigate phishing risks., Report scams to the FTC (ReportFraud.ftc.gov) and local law enforcement., Educate vulnerable populations (e.g., elderly) on recognizing deepfake and voice-cloning scams., Avoid cryptocurrency transactions with unverified parties., Monitor financial accounts for unauthorized activity during high-risk periods.
Key Lessons Learned: The key lessons learned from past incidents are Scammers exploit seasonal distractions (e.g., holidays) to increase success rates.,AI tools (deepfakes, voice cloning) lower the barrier for sophisticated impersonation.,Cryptocurrency demands are a red flag for fraud.,Public-private collaboration is critical for rapid consumer education.

Source: Federal Trade Commission (FTC)
URL: https://www.ftc.gov
Date Accessed: 2024-11-27

Source: Maryland Attorney General Press Release
Date Accessed: 2024-11-27
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: 7News (WJLA)Url: https://wjla.com/news/local/holiday-scams-geek-squad-ai-deepfake-voice-cloning-maryland-attorney-general-warnings-ftc-losses-porch-pirates-phishingDate Accessed: 2024-11-27, and Source: Federal Trade Commission (FTC)Url: https://www.ftc.govDate Accessed: 2024-11-27, and Source: Maryland Attorney General Press ReleaseDate Accessed: 2024-11-27.

Investigation Status: ongoing (law enforcement tracking scam operations)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Press Releases, Interviews With Law Enforcement (E.G., Sgt. John Quarless) and Holiday Shopping Safety Guides.

Stakeholder Advisories: Ftc Consumer Alerts, Maryland Ag Holiday Scam Warnings, Prince George’S County Police Department Advisories.
Customer Advisories: Slow down and verify before acting on urgent requests.Never pay with cryptocurrency in response to threats.Contact local police if unsure about a scam attempt.Check FTC resources for updated scam tactics.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Ftc Consumer Alerts, Maryland Ag Holiday Scam Warnings, Prince George’S County Police Department Advisories, Slow Down And Verify Before Acting On Urgent Requests., Never Pay With Cryptocurrency In Response To Threats., Contact Local Police If Unsure About A Scam Attempt., Check Ftc Resources For Updated Scam Tactics. and .

Entry Point: Phishing Emails, Malicious Pop-Ups, Spoofed Calls,
Reconnaissance Period: ['short (opportunistic attacks)', 'longer for targeted deepfake/voice-cloning scams']
High Value Targets: Elderly Individuals, Online Shoppers, Cryptocurrency Users,
Data Sold on Dark Web: Elderly Individuals, Online Shoppers, Cryptocurrency Users,

Root Causes: Lack Of Consumer Awareness About Evolving Scam Tactics (E.G., Ai Tools)., Over-Reliance On Email/Phone Communication For Verification., Seasonal Increase In Online Transactions And Distractions., Difficulty In Tracing Cryptocurrency Payments.,
Corrective Actions: Enhanced Public-Private Partnerships For Real-Time Scam Reporting., Development Of Ai Detection Tools To Identify Deepfake Scams., Legislative Measures To Regulate Cryptocurrency Transactions Linked To Fraud., Expanded Consumer Education Programs During High-Risk Periods (E.G., Holidays).,
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Enhanced Public-Private Partnerships For Real-Time Scam Reporting., Development Of Ai Detection Tools To Identify Deepfake Scams., Legislative Measures To Regulate Cryptocurrency Transactions Linked To Fraud., Expanded Consumer Education Programs During High-Risk Periods (E.G., Holidays)., .
Last Attacking Group: The attacking group in the last incident was an organized cybercriminal groupsopportunistic scammers.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-11-27.
Highest Financial Loss: The highest financial loss from an incident was $12.5 billion (2023 U.S. reported losses, 25% increase from prior year).
Most Significant Data Compromised: The most significant data compromised in an incident were personal information (via phishing), payment details (if shared with scammers), voice recordings (for cloning) and .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were public warningsmedia coverage (e.g. and 7News)social media alerts.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were personal information (via phishing), voice recordings (for cloning) and payment details (if shared with scammers).
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was potential investigations into scam operations, .
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Public-private collaboration is critical for rapid consumer education.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Report scams to the FTC (ReportFraud.ftc.gov) and local law enforcement., Educate vulnerable populations (e.g., elderly) on recognizing deepfake and voice-cloning scams., Monitor financial accounts for unauthorized activity during high-risk periods., Never share personal or financial information in response to urgent threats (e.g., warrants, overdue bills)., Verify unsolicited requests via official contact channels (e.g., company websites, not email/phone links)., Avoid cryptocurrency transactions with unverified parties. and Use multi-factor authentication (MFA) for accounts to mitigate phishing risks..
Most Recent Source: The most recent source of information about an incident are 7News (WJLA), Maryland Attorney General Press Release and Federal Trade Commission (FTC).
Most Recent URL for Additional Resources: The most recent URL for additional resources on cybersecurity best practices is https://wjla.com/news/local/holiday-scams-geek-squad-ai-deepfake-voice-cloning-maryland-attorney-general-warnings-ftc-losses-porch-pirates-phishing, https://www.ftc.gov .
Current Status of Most Recent Investigation: The current status of the most recent investigation is ongoing (law enforcement tracking scam operations).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was FTC consumer alerts, Maryland AG holiday scam warnings, Prince George’s County Police Department advisories, .
Most Recent Customer Advisory: The most recent customer advisory issued was an Slow down and verify before acting on urgent requests.Never pay with cryptocurrency in response to threats.Contact local police if unsure about a scam attempt.Check FTC resources for updated scam tactics.
Most Recent Reconnaissance Period: The most recent reconnaissance period for an incident was short (opportunistic attacks)longer for targeted deepfake/voice-cloning scams.
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.