Badge
11,371 badges added since 01 January 2025
ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Cerebral is increasing access to high-quality mental healthcare when you need it most. Now, getting the care you need is easier than ever with your complete mental healthcare partner. Your care team of expert clinicians work together to create a treatment plan of therapy, medication management or both, that’s tailored to your unique needs so you can reach all of your goals - big and small. And our client outcomes are the proof: as of March 2024, at least 72% of Cerebral clients with moderate to severe anxiety and/or depression reported feeling better within 12 weeks. With cost being the #1 barrier to access, we’re on a mission to make care more convenient and accessible for everyone. By combining our personalized, coordinated approach with in-network accessibility through partners like BlueCross, Cigna, UnitedHealth, and more, individuals only pay $30, on average, for copays. High-quality care can transform lives. Stop enduring life and start enjoying it. With more than 3 million appointments completed and 700,000 clients served, now is the time to experience a new era of care with Cerebral.

Cerebral A.I CyberSecurity Scoring

Cerebral

Company Details

Linkedin ID:

getcerebral

Employees number:

599

Number of followers:

47,794

NAICS:

62133

Industry Type:

Mental Health Care

Homepage:

cerebral.com

IP Addresses:

0

Company ID:

CER_2847871

Scan Status:

In-progress

AI scoreCerebral Risk Score (AI oriented)

Between 700 and 749

https://images.rankiteo.com/companyimages/getcerebral.jpeg
Cerebral Mental Health Care
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreCerebral Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/getcerebral.jpeg
Cerebral Mental Health Care
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Cerebral Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
CerebralBreach25110/2019NA
Rankiteo Explanation :
Attack without any consequences

Description: The California Office of the Attorney General reported a data breach involving Cerebral, Inc. on March 6, 2023. The breach was identified on January 3, 2023, and involved the unauthorized disclosure of protected health information (PHI) to third-party platforms due to the use of tracking technologies since October 12, 2019. A total of 6,257 Rhode Island residents were affected by this incident.

Cerebral, Inc.
Breach
Severity: 25
Impact: 1
Seen: 10/2019
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack without any consequences

Description: The California Office of the Attorney General reported a data breach involving Cerebral, Inc. on March 6, 2023. The breach was identified on January 3, 2023, and involved the unauthorized disclosure of protected health information (PHI) to third-party platforms due to the use of tracking technologies since October 12, 2019. A total of 6,257 Rhode Island residents were affected by this incident.

Ailogo

Cerebral Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Cerebral

Incidents vs Mental Health Care Industry Average (This Year)

No incidents recorded for Cerebral in 2026.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Cerebral in 2026.

Incident Types Cerebral vs Mental Health Care Industry Avg (This Year)

No incidents recorded for Cerebral in 2026.

Incident History — Cerebral (X = Date, Y = Severity)

Cerebral cyber incidents detection timeline including parent company and subsidiaries

Cerebral Company Subsidiaries

SubsidiaryImage

Cerebral is increasing access to high-quality mental healthcare when you need it most. Now, getting the care you need is easier than ever with your complete mental healthcare partner. Your care team of expert clinicians work together to create a treatment plan of therapy, medication management or both, that’s tailored to your unique needs so you can reach all of your goals - big and small. And our client outcomes are the proof: as of March 2024, at least 72% of Cerebral clients with moderate to severe anxiety and/or depression reported feeling better within 12 weeks. With cost being the #1 barrier to access, we’re on a mission to make care more convenient and accessible for everyone. By combining our personalized, coordinated approach with in-network accessibility through partners like BlueCross, Cigna, UnitedHealth, and more, individuals only pay $30, on average, for copays. High-quality care can transform lives. Stop enduring life and start enjoying it. With more than 3 million appointments completed and 700,000 clients served, now is the time to experience a new era of care with Cerebral.

Loading...
similarCompanies

Cerebral Similar Companies

Copper Springs Behavioral Health

Copper Springs provides behavioral healthcare at our hospital facilities in Avondale, AZ and Gilbert, AZ. Our mission is Changing People's Lives® by increasing access to mental health and addiction treatment in our local community. We offer specialized, compassionate care for adults (18+), seniors,

ABA THERAPY SOLUTIONS, LLC

The science of ABA has developed from a large body of evidence-based research over the last several decades. Baer, Wolf, & Risley defined this science best in 1968: “Applied Behavior Analysis is the process of systematically applying interventions based upon the principles of learning theory to impr

The Nord Center

The Nord Center is a private, non-profit agency providing comprehensive behavioral and mental health services to children, adolescents and adults in the greater Lorain County area. Our services include outpatient counseling; sexual assault / rape crisis services; drug and alcohol addiction; dual dia

First Alliance Healthcare of Ohio

First Alliance Healthcare of Ohio is a hospital & health care company located in Cleveland, Lorain, and Toledo, Ohio. First Alliance Healthcare provides therapeutic services to clients in a variety of settings, including in-home/community based programs and outpatient mental health clinics. Our dail

Foothill Family

Who We Are At Foothill Family, we believe that healthy families are the basis of every child’s promise for a bright future. The strength and resiliency of these families provide the backbone of vibrant, thriving communities We are committed to improving infant, child, youth, and family development

The Family Counseling Center

The Family Counseling Center provides a broad range of high-quality mental health and social services, with particular attention to the needs of children and families. Founded in response to the need for counseling services in Fulton County, we are committed to fostering a safe, encouraging and pos

Onder de Bomen

Onder de Bomen wil een beter toekomstperspectief bieden aan zoveel mogelijk mensen met vernieuwende zorg. We doen dit door zorg te organiseren gericht op eigen regie en groei. Hiervoor bieden we Gesteund Wonen (voor Gezinnen, Jongeren en Volwassenen), Wonen met begeleiding en Dagbesteding. Het draa

Orange County Health Psychologists

Orange County Health Psychologists offers behavioral health services for individuals, couples and families at multiple Southern California locations. Founded in 2014 by Dr. Kristin Kleppe, today OCHP provides almost 50,000 patient visits a year. We are committed to offering integrated therapies for

Mental Health Association in Passaic County

Each day, the Mental Health Association in Passaic County assists many families and individuals conquer the challenges of mental illness. For the last three decades, we have been helping people change their lives by providing high quality, free services to help our community in need, restore order,

newsone

Cerebral CyberSecurity News

January 04, 2026 08:00 AM
Healthcare Data Breach Statistics

In 2023, 725 data breaches were reported to OCR and across those breaches, more than 133 million records were exposed or impermissibly disclosed.

December 16, 2025 08:00 AM
Cerebral & RAYUS Radiology Settle Pixel Lawsuits

Settlements have received preliminary approval to resolve litigation against the mental health telehealth company Cerebral and the...

October 27, 2025 07:00 AM
What Is Neuralink? What We Know So Far.

Neuralink is a neurotechnology company founded by Elon Musk developing an implantable, brain-computer interface (BCI) to help paralyzed...

October 20, 2025 07:00 AM
UK medtech startup CoMind raises $102.5M led by Plural to advance AI-powered brain monitoring

CoMind has secured $102.5 million in Series A funding led by Plural, with participation from existing investors. - AIN.

October 16, 2025 07:00 AM
Qualys upgrades ETM platform with AI identity & threat tools

Qualys upgrades its Enterprise TruRisk Management platform with AI-driven identity security, threat prioritisation, and exploit validation...

September 19, 2025 07:00 AM
Jannik Sinner victim of brain data theft by a company linked to the Chinese military?

What seemed like a gadget to enhance his mental performance on the court may be hiding one of the biggest cyber surveillance scandals in...

September 19, 2025 07:00 AM
Can Neurotech Hack Your Mind? Exploring Technology and Its Dangers

As neurotech advances, hacking the brain is becoming a real possibility. Read on to learn more about neurotech, its capabilities,...

August 07, 2025 07:00 AM
Hackers can access MRI scans and more: 1.2M medical devices are leaking data

Over 1.2 million internet-connected medical devices worldwide are exposed to hackers due to misconfigurations, weak security,...

July 25, 2025 07:00 AM
Mind The Bite: Mosquitoes Can Wreck Brain, Not Just Cause Dengue, Malaria

Nagpur: Next time a mosquito bites you, there's more to worry about than just malaria or dengue. Experts say that mosquitoes are spreading...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Cerebral CyberSecurity History Information

Official Website of Cerebral

The official website of Cerebral is http://cerebral.com/.

Cerebral’s AI-Generated Cybersecurity Score

According to Rankiteo, Cerebral’s AI-generated cybersecurity score is 740, reflecting their Moderate security posture.

How many security badges does Cerebral’ have ?

According to Rankiteo, Cerebral currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has Cerebral been affected by any supply chain cyber incidents ?

According to Rankiteo, Cerebral has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.

Does Cerebral have SOC 2 Type 1 certification ?

According to Rankiteo, Cerebral is not certified under SOC 2 Type 1.

Does Cerebral have SOC 2 Type 2 certification ?

According to Rankiteo, Cerebral does not hold a SOC 2 Type 2 certification.

Does Cerebral comply with GDPR ?

According to Rankiteo, Cerebral is not listed as GDPR compliant.

Does Cerebral have PCI DSS certification ?

According to Rankiteo, Cerebral does not currently maintain PCI DSS compliance.

Does Cerebral comply with HIPAA ?

According to Rankiteo, Cerebral is not compliant with HIPAA regulations.

Does Cerebral have ISO 27001 certification ?

According to Rankiteo,Cerebral is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Cerebral

Cerebral operates primarily in the Mental Health Care industry.

Number of Employees at Cerebral

Cerebral employs approximately 599 people worldwide.

Subsidiaries Owned by Cerebral

Cerebral presently has no subsidiaries across any sectors.

Cerebral’s LinkedIn Followers

Cerebral’s official LinkedIn profile has approximately 47,794 followers.

NAICS Classification of Cerebral

Cerebral is classified under the NAICS code 62133, which corresponds to Offices of Mental Health Practitioners (except Physicians).

Cerebral’s Presence on Crunchbase

No, Cerebral does not have a profile on Crunchbase.

Cerebral’s Presence on LinkedIn

Yes, Cerebral maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/getcerebral.

Cybersecurity Incidents Involving Cerebral

As of January 22, 2026, Rankiteo reports that Cerebral has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Cerebral has an estimated 5,279 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Cerebral ?

Incident Types: The types of cybersecurity incidents that have occurred include Breach.

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Cerebral, Inc. Data Breach

Description: The California Office of the Attorney General reported a data breach involving Cerebral, Inc. on March 6, 2023. The breach was identified on January 3, 2023, and involved the unauthorized disclosure of protected health information (PHI) to third-party platforms due to the use of tracking technologies since October 12, 2019. A total of 6,257 Rhode Island residents were affected by this incident.

Date Detected: 2023-01-03

Date Publicly Disclosed: 2023-03-06

Type: Data Breach

Attack Vector: Tracking Technologies

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach GET137072625

Data Compromised: Protected Health Information (PHI)

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Protected Health Information (PHI).

Which entities were affected by each incident ?

Incident : Data Breach GET137072625

Entity Name: Cerebral, Inc.

Entity Type: Company

Industry: Healthcare

Location: Rhode Island

Customers Affected: 6257

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach GET137072625

Type of Data Compromised: Protected Health Information (PHI)

Number of Records Exposed: 6257

Sensitivity of Data: High

References

Where can I find more information about each incident ?

Incident : Data Breach GET137072625

Source: California Office of the Attorney General

Date Accessed: 2023-03-06

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney GeneralDate Accessed: 2023-03-06.

Additional Questions

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2023-01-03.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2023-03-06.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident was Protected Health Information (PHI).

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Protected Health Information (PHI).

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 632.0.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is California Office of the Attorney General.

cve

Latest Global CVEs (Not Company-Specific)

Description

SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g.,  execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).

Risk Information
cvss3
Base: 8.1
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=getcerebral' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge