Company Details
global-linking-solutions-charlotte-north-carolina
252
8,129
5415
gls.com
3
GLO_1760471
Completed

Global Linking Solutions, Charlotte, North Carolina Company CyberSecurity Posture
gls.comGLS is a managed network and security services provider founded in 1998. We currently do business in 122 countries across the globe. Our focus has been on the deployment of optimized network designs that improve security, drive high availability and improve performance. We manager over 100,000+ globally managed devices and 30,000+ SOC surveilled assets. Customers who partner with GLS are more secure, their IT operations are more efficient, their performance provides for the expectation of a smooth transition to the Cloud and SDWAN technologies.
Company Details
global-linking-solutions-charlotte-north-carolina
252
8,129
5415
gls.com
3
GLO_1760471
Completed
Between 750 and 799

GLSCNC Global Score (TPRM)XXXX

Description: Electronic lockers commonly found in gyms, offices, and schools are susceptible to hacking due to vulnerabilities in the lock systems. Expert researchers demonstrated potential exploits at the Defcon security conference that could enable criminals to access administrative keys, clone them, and gain unauthorized access to any locker within the system. This exposes personal possessions and possibly sensitive information to theft. Fixes have been issued by Digilock, but Schulte-Schlagbaum did not respond to the findings.


No incidents recorded for Global Linking Solutions, Charlotte, North Carolina in 2025.
No incidents recorded for Global Linking Solutions, Charlotte, North Carolina in 2025.
No incidents recorded for Global Linking Solutions, Charlotte, North Carolina in 2025.
GLSCNC cyber incidents detection timeline including parent company and subsidiaries

GLS is a managed network and security services provider founded in 1998. We currently do business in 122 countries across the globe. Our focus has been on the deployment of optimized network designs that improve security, drive high availability and improve performance. We manager over 100,000+ globally managed devices and 30,000+ SOC surveilled assets. Customers who partner with GLS are more secure, their IT operations are more efficient, their performance provides for the expectation of a smooth transition to the Cloud and SDWAN technologies.


IGT Solutions is a next-gen customer experience (CX) company, defining and delivering AI-led transformative experiences for the global and most innovative brands using digital technologies. With the combination of Digital and Human Intelligence, IGT becomes the preferred partner for managing end-to-

Nagarro helps future-proof your business through a forward-thinking, fluidic, and CARING mindset. We excel at digital engineering and help our clients become human-centric, digital-first organizations, augmenting their ability to be responsive, efficient, intimate, creative, and sustainable. Today,
Conduent delivers digital business solutions and services spanning the commercial, government and transportation spectrum – creating valuable outcomes for its clients and the millions of people who count on them. We leverage cloud computing, artificial intelligence, machine learning, automation and

Atos Group is a global leader in digital transformation with c. 70,000 employees and annual revenue of c. € 10 billion, operating in 67 countries under two brands — Atos for services and Eviden for products. European number one in cybersecurity, cloud and high-performance computing, Atos Group is c
Ingram Micro is a leading technology company for the global information technology ecosystem. With the ability to reach nearly 90% of the global population, we play a vital role in the worldwide IT sales channel, bringing products and services from technology manufacturers and cloud providers to a h

Sopra Steria, a major Tech player in Europe with 51,000 employees in nearly 30 countries, is recognised for its consulting, digital services and solutions. It helps its clients drive their digital transformation and obtain tangible and sustainable benefits. The Group provides end-to-end solutions to

We make the experience of travel better for everyone, everywhere by inspiring innovation, partnerships and responsibility to people, places and planet. Our technology powers the travel and tourism industry. We inspire more connected ways of thinking, centered around the traveler. Our platform c

A global leader in optimizing the customer experience lifecycle, digital transformation, and business process management, HGS is helping its clients become more competitive every day. HGS combines automation, analytics, and artificial intelligence with deep domain expertise focusing on digital custo

GlobalLogic, una empresa del grupo Hitachi, es líder en ingeniería digital en Latinoamérica. Ayudamos a diferentes marcas a diseñar y crear productos, plataformas y experiencias digitales innovadoras para el mundo moderno. Al integrar el diseño de experiencia, la ingeniería compleja y la exper
.png)
This AI survey shows how AI investments are turning into business productivity gains and significant financial performance.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Global Linking Solutions, Charlotte, North Carolina is http://www.gls.com.
According to Rankiteo, Global Linking Solutions, Charlotte, North Carolina’s AI-generated cybersecurity score is 753, reflecting their Fair security posture.
According to Rankiteo, Global Linking Solutions, Charlotte, North Carolina currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Global Linking Solutions, Charlotte, North Carolina is not certified under SOC 2 Type 1.
According to Rankiteo, Global Linking Solutions, Charlotte, North Carolina does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Global Linking Solutions, Charlotte, North Carolina is not listed as GDPR compliant.
According to Rankiteo, Global Linking Solutions, Charlotte, North Carolina does not currently maintain PCI DSS compliance.
According to Rankiteo, Global Linking Solutions, Charlotte, North Carolina is not compliant with HIPAA regulations.
According to Rankiteo,Global Linking Solutions, Charlotte, North Carolina is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Global Linking Solutions, Charlotte, North Carolina operates primarily in the IT Services and IT Consulting industry.
Global Linking Solutions, Charlotte, North Carolina employs approximately 252 people worldwide.
Global Linking Solutions, Charlotte, North Carolina presently has no subsidiaries across any sectors.
Global Linking Solutions, Charlotte, North Carolina’s official LinkedIn profile has approximately 8,129 followers.
Global Linking Solutions, Charlotte, North Carolina is classified under the NAICS code 5415, which corresponds to Computer Systems Design and Related Services.
No, Global Linking Solutions, Charlotte, North Carolina does not have a profile on Crunchbase.
Yes, Global Linking Solutions, Charlotte, North Carolina maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/global-linking-solutions-charlotte-north-carolina.
As of December 25, 2025, Rankiteo reports that Global Linking Solutions, Charlotte, North Carolina has experienced 1 cybersecurity incidents.
Global Linking Solutions, Charlotte, North Carolina has an estimated 38,083 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.
Title: Vulnerabilities in Electronic Lockers
Description: Electronic lockers commonly found in gyms, offices, and schools are susceptible to hacking due to vulnerabilities in the lock systems. Expert researchers demonstrated potential exploits at the Defcon security conference that could enable criminals to access administrative keys, clone them, and gain unauthorized access to any locker within the system. This exposes personal possessions and possibly sensitive information to theft. Fixes have been issued by Digilock, but Schulte-Schlagbaum did not respond to the findings.
Type: Hardware vulnerability
Attack Vector: Exploit of administrative keys
Vulnerability Exploited: Weaknesses in lock systems
Motivation: Theft of personal possessions and sensitive information
Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

Systems Affected: Electronic lockers

Entity Name: Digilock
Entity Type: Company
Industry: Security Systems

Entity Name: Schulte-Schlagbaum
Entity Type: Company
Industry: Security Systems

Source: Defcon security conference
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Defcon security conference.
Most Significant System Affected: The most significant system affected in an incident was Electronic lockers.
Most Recent Source: The most recent source of information about an incident is Defcon security conference.
.png)
httparty is an API tool. In versions 0.23.2 and prior, httparty is vulnerable to SSRF. This issue can pose a risk of leaking API keys, and it can also allow third parties to issue requests to internal servers. This issue has been patched via commit 0529bcd.
5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. In versions 0.15.2 and prior, an RCE vulnerability exists in useMarkdown.ts, where the markdown-it-mermaid plugin is initialized with securityLevel: 'loose'. This configuration explicitly permits the rendering of HTML tags within Mermaid diagram nodes. This issue has not been patched at time of publication.
continuwuity is a Matrix homeserver written in Rust. Prior to version 0.5.0, this vulnerability allows a remote, unauthenticated attacker to force the target server to cryptographically sign arbitrary membership events. The flaw exists because the server fails to validate the origin of a signing request, provided the event's state_key is a valid user ID belonging to the target server. This issue has been patched in version 0.5.0. A workaround for this issue involves blocking access to the PUT /_matrix/federation/v2/invite/{roomId}/{eventId} endpoint using the reverse proxy.
LangChain is a framework for building LLM-powered applications. Prior to @langchain/core versions 0.3.80 and 1.1.8, and prior to langchain versions 0.3.37 and 1.2.3, a serialization injection vulnerability exists in LangChain JS's toJSON() method (and subsequently when string-ifying objects using JSON.stringify(). The method did not escape objects with 'lc' keys when serializing free-form data in kwargs. The 'lc' key is used internally by LangChain to mark serialized objects. When user-controlled data contains this key structure, it is treated as a legitimate LangChain object during deserialization rather than plain user data. This issue has been patched in @langchain/core versions 0.3.80 and 1.1.8, and langchain versions 0.3.37 and 1.2.3
LangChain is a framework for building agents and LLM-powered applications. Prior to versions 0.3.81 and 1.2.5, a serialization injection vulnerability exists in LangChain's dumps() and dumpd() functions. The functions do not escape dictionaries with 'lc' keys when serializing free-form dictionaries. The 'lc' key is used internally by LangChain to mark serialized objects. When user-controlled data contains this key structure, it is treated as a legitimate LangChain object during deserialization rather than plain user data. This issue has been patched in versions 0.3.81 and 1.2.5.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.