Company Details
getcerebral
599
47,794
62133
cerebral.com
0
CER_2847871
In-progress


Cerebral Company CyberSecurity Posture
cerebral.comCerebral is increasing access to high-quality mental healthcare when you need it most. Now, getting the care you need is easier than ever with your complete mental healthcare partner. Your care team of expert clinicians work together to create a treatment plan of therapy, medication management or both, that’s tailored to your unique needs so you can reach all of your goals - big and small. And our client outcomes are the proof: as of March 2024, at least 72% of Cerebral clients with moderate to severe anxiety and/or depression reported feeling better within 12 weeks. With cost being the #1 barrier to access, we’re on a mission to make care more convenient and accessible for everyone. By combining our personalized, coordinated approach with in-network accessibility through partners like BlueCross, Cigna, UnitedHealth, and more, individuals only pay $30, on average, for copays. High-quality care can transform lives. Stop enduring life and start enjoying it. With more than 3 million appointments completed and 700,000 clients served, now is the time to experience a new era of care with Cerebral.
Company Details
getcerebral
599
47,794
62133
cerebral.com
0
CER_2847871
In-progress
Between 700 and 749

Cerebral Global Score (TPRM)XXXX

Description: The California Office of the Attorney General reported a data breach involving Cerebral, Inc. on March 6, 2023. The breach was identified on January 3, 2023, and involved the unauthorized disclosure of protected health information (PHI) to third-party platforms due to the use of tracking technologies since October 12, 2019. A total of 6,257 Rhode Island residents were affected by this incident.


No incidents recorded for Cerebral in 2026.
No incidents recorded for Cerebral in 2026.
No incidents recorded for Cerebral in 2026.
Cerebral cyber incidents detection timeline including parent company and subsidiaries

Cerebral is increasing access to high-quality mental healthcare when you need it most. Now, getting the care you need is easier than ever with your complete mental healthcare partner. Your care team of expert clinicians work together to create a treatment plan of therapy, medication management or both, that’s tailored to your unique needs so you can reach all of your goals - big and small. And our client outcomes are the proof: as of March 2024, at least 72% of Cerebral clients with moderate to severe anxiety and/or depression reported feeling better within 12 weeks. With cost being the #1 barrier to access, we’re on a mission to make care more convenient and accessible for everyone. By combining our personalized, coordinated approach with in-network accessibility through partners like BlueCross, Cigna, UnitedHealth, and more, individuals only pay $30, on average, for copays. High-quality care can transform lives. Stop enduring life and start enjoying it. With more than 3 million appointments completed and 700,000 clients served, now is the time to experience a new era of care with Cerebral.


Copper Springs provides behavioral healthcare at our hospital facilities in Avondale, AZ and Gilbert, AZ. Our mission is Changing People's Lives® by increasing access to mental health and addiction treatment in our local community. We offer specialized, compassionate care for adults (18+), seniors,

The science of ABA has developed from a large body of evidence-based research over the last several decades. Baer, Wolf, & Risley defined this science best in 1968: “Applied Behavior Analysis is the process of systematically applying interventions based upon the principles of learning theory to impr

The Nord Center is a private, non-profit agency providing comprehensive behavioral and mental health services to children, adolescents and adults in the greater Lorain County area. Our services include outpatient counseling; sexual assault / rape crisis services; drug and alcohol addiction; dual dia

First Alliance Healthcare of Ohio is a hospital & health care company located in Cleveland, Lorain, and Toledo, Ohio. First Alliance Healthcare provides therapeutic services to clients in a variety of settings, including in-home/community based programs and outpatient mental health clinics. Our dail

Who We Are At Foothill Family, we believe that healthy families are the basis of every child’s promise for a bright future. The strength and resiliency of these families provide the backbone of vibrant, thriving communities We are committed to improving infant, child, youth, and family development

The Family Counseling Center provides a broad range of high-quality mental health and social services, with particular attention to the needs of children and families. Founded in response to the need for counseling services in Fulton County, we are committed to fostering a safe, encouraging and pos

Onder de Bomen wil een beter toekomstperspectief bieden aan zoveel mogelijk mensen met vernieuwende zorg. We doen dit door zorg te organiseren gericht op eigen regie en groei. Hiervoor bieden we Gesteund Wonen (voor Gezinnen, Jongeren en Volwassenen), Wonen met begeleiding en Dagbesteding. Het draa

Orange County Health Psychologists offers behavioral health services for individuals, couples and families at multiple Southern California locations. Founded in 2014 by Dr. Kristin Kleppe, today OCHP provides almost 50,000 patient visits a year. We are committed to offering integrated therapies for

Each day, the Mental Health Association in Passaic County assists many families and individuals conquer the challenges of mental illness. For the last three decades, we have been helping people change their lives by providing high quality, free services to help our community in need, restore order,
.png)
In 2023, 725 data breaches were reported to OCR and across those breaches, more than 133 million records were exposed or impermissibly disclosed.
Settlements have received preliminary approval to resolve litigation against the mental health telehealth company Cerebral and the...
Neuralink is a neurotechnology company founded by Elon Musk developing an implantable, brain-computer interface (BCI) to help paralyzed...
CoMind has secured $102.5 million in Series A funding led by Plural, with participation from existing investors. - AIN.
Qualys upgrades its Enterprise TruRisk Management platform with AI-driven identity security, threat prioritisation, and exploit validation...
What seemed like a gadget to enhance his mental performance on the court may be hiding one of the biggest cyber surveillance scandals in...
As neurotech advances, hacking the brain is becoming a real possibility. Read on to learn more about neurotech, its capabilities,...
Over 1.2 million internet-connected medical devices worldwide are exposed to hackers due to misconfigurations, weak security,...
Nagpur: Next time a mosquito bites you, there's more to worry about than just malaria or dengue. Experts say that mosquitoes are spreading...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Cerebral is http://cerebral.com/.
According to Rankiteo, Cerebral’s AI-generated cybersecurity score is 740, reflecting their Moderate security posture.
According to Rankiteo, Cerebral currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Cerebral has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Cerebral is not certified under SOC 2 Type 1.
According to Rankiteo, Cerebral does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Cerebral is not listed as GDPR compliant.
According to Rankiteo, Cerebral does not currently maintain PCI DSS compliance.
According to Rankiteo, Cerebral is not compliant with HIPAA regulations.
According to Rankiteo,Cerebral is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Cerebral operates primarily in the Mental Health Care industry.
Cerebral employs approximately 599 people worldwide.
Cerebral presently has no subsidiaries across any sectors.
Cerebral’s official LinkedIn profile has approximately 47,794 followers.
Cerebral is classified under the NAICS code 62133, which corresponds to Offices of Mental Health Practitioners (except Physicians).
No, Cerebral does not have a profile on Crunchbase.
Yes, Cerebral maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/getcerebral.
As of January 22, 2026, Rankiteo reports that Cerebral has experienced 1 cybersecurity incidents.
Cerebral has an estimated 5,279 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Title: Cerebral, Inc. Data Breach
Description: The California Office of the Attorney General reported a data breach involving Cerebral, Inc. on March 6, 2023. The breach was identified on January 3, 2023, and involved the unauthorized disclosure of protected health information (PHI) to third-party platforms due to the use of tracking technologies since October 12, 2019. A total of 6,257 Rhode Island residents were affected by this incident.
Date Detected: 2023-01-03
Date Publicly Disclosed: 2023-03-06
Type: Data Breach
Attack Vector: Tracking Technologies
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Protected Health Information (PHI)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Protected Health Information (PHI).

Entity Name: Cerebral, Inc.
Entity Type: Company
Industry: Healthcare
Location: Rhode Island
Customers Affected: 6257

Type of Data Compromised: Protected Health Information (PHI)
Number of Records Exposed: 6257
Sensitivity of Data: High

Source: California Office of the Attorney General
Date Accessed: 2023-03-06
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney GeneralDate Accessed: 2023-03-06.
Most Recent Incident Detected: The most recent incident detected was on 2023-01-03.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2023-03-06.
Most Significant Data Compromised: The most significant data compromised in an incident was Protected Health Information (PHI).
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Protected Health Information (PHI).
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 632.0.
Most Recent Source: The most recent source of information about an incident is California Office of the Attorney General.
.png)
SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g., execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.