Company Details
government-of-canada
162,692
858,448
92
canada.ca
0
GOV_3007032
In-progress

Government of Canada Company CyberSecurity Posture
canada.caThe Government of Canada works on behalf of Canadians, both at home and abroad. Visit www.Canada.ca to learn more. Canada’s professional, non-partisan public service is among the best in the world, and many of its departments and agencies place in Canada’s Top 100 Employers year after year. If you are interested in joining our diverse and innovative team, visit www.jobs.gc.ca for information and opportunities. Terms: https://www.canada.ca/en/transparency/terms.html Le gouvernement du Canada œuvre au nom des Canadiens, tant au pays qu’à l’étranger. Consultez le site www.canada.ca pour en savoir plus. Impartiale et professionnelle, la fonction publique du Canada fait partie de l’élite mondiale. Bon nombre de ses ministères et organismes figurent parmi les 100 meilleurs employeurs du pays année après année. Vous aimeriez intégrer notre équipe diversifiée et innovante? Rendez-vous au www.emplois.gc.ca pour obtenir des informations et connaître les possibilités qui s’offrent à vous. Avis : https://www.canada.ca/fr/transparence/avis.html
Company Details
government-of-canada
162,692
858,448
92
canada.ca
0
GOV_3007032
In-progress
Between 800 and 849

GC Global Score (TPRM)XXXX

Description: Canada Border Services Agency suffered a data breach incident after a contractor led to the unauthorised access of up to 1.38 million licence plates and related information. The investigation found that the contract lacked clauses with respect to security safeguards, including for the protection and retention of personal information. Bad actors were able to break into the third-party contractors’ systems through an unpatched and decommissioned server, where they were able to access, copy, and remove files from the network, before posting some of the data on the dark web. The breach exposed around 9,000 licence plate photos of travellers crossing into Canada from the border crossing in Cornwall, Ontario.
Description: Canada Revenue Agency logs 2,338 privacy breaches in just under 2 years. The personal, confidential information of over 80,000 individual Canadians held by the Canada Revenue Agency may have been accessed without authorization over the last 21 months. But only a handful affected a large number of Canadians.
Description: Several Canadian government websites and servers were targeted in a cyberattack by the hacking group Anonymous. The attack affected several websites for government services, including canada.ca, as well as the site of Canada’s spy agency, the Canadian Security Intelligence Service (CSIS). The attack was aimed to show their retaliation for a new anti-terrorism law passed by Canada’s politicians.
Description: The governments of Canada was exposed to the entire internet details of software bugs and security plans, as well as passwords for servers, official internet domains, conference calls, and an event-planning system by misconfiguring pages on Trello, a project management website. 25 Canadian government trello boards had sensitive information, such as remote file access, or FTP, credentials, and login details for the Eventbrite event-planning platform. The government of Canada said, Departments and agencies of the Government of Canada must apply adequate security controls to protect their users, information, and assets. Employees are being reminded of their obligation never to communicate or store sensitive information on Trello boards or any other unauthorized digital tool or service.
Description: A data breach at Tiffany & Co. is under investigation by the **Office of the Privacy Commissioner of Canada** after the company reported the incident. The breach, which occurred in **May** but was only discovered in **September**, has impacted Canadian and U.S. customers, though the exact number of affected accounts remains unclear. The privacy commissioner is reviewing Tiffany & Co.’s response to ensure adequate measures are taken to protect the compromised personal information of Canadians. A formal breach report was submitted to the **Maine attorney general**, indicating potential exposure of customer data. The nature of the breach suggests unauthorized access to personal information, though specific details—such as whether financial data, contact information, or other sensitive records were leaked—have not been disclosed. The incident is still under regulatory scrutiny, with authorities assessing compliance and next steps to mitigate risks for affected individuals.
Description: A significant data breach happened in the federal government after a device was stolen from Public Services and Procurement Canada. PSPC is Infrastructure Canada’s service provider for pay, pension and benefits. All 227 employees were affected are at Infrastructure Canada No banking or social insurance information was affected. Name, person record identifier (PRI), date of birth, home address and salary range may have been compromised.
Description: A device was stolen from Public Services and Procurement Canada. PSPC is Infrastructure Canada’s service provider for pay, pension and benefits. All 227 employees affected are at Infrastructure Canada. The device in question was stolen on Aug 20 and affected employees were informed on Sept 7. No banking or social insurance information was affected. Name, person record identifier (PRI), date of birth, home address and salary range have been compromised. Ottawa police have been made aware of the incident.
Description: Transport Canada experienced a cybersecurity incident involving a **local breach in a cloud-based software provider** used by the agency. While the breach was contained, it prompted a collaborative response with federal security partners, including law enforcement, to assess potential risks. The agency emphasized that **no direct impacts were reported on airport operations, safety, or security**, suggesting the breach did not compromise critical transportation systems or sensitive data. However, the incident raised concerns about operational efficiency and the need for proactive mitigation against future cyber threats. Transport Canada is actively working with air operators to strengthen defenses against similar incidents, whether cyber-related or otherwise, to ensure uninterrupted transportation safety and security. The breach appears to have been isolated, with no evidence of data theft, financial loss, or reputational damage beyond internal investigations and preventive measures.


No incidents recorded for Government of Canada in 2025.
No incidents recorded for Government of Canada in 2025.
No incidents recorded for Government of Canada in 2025.
GC cyber incidents detection timeline including parent company and subsidiaries

The Government of Canada works on behalf of Canadians, both at home and abroad. Visit www.Canada.ca to learn more. Canada’s professional, non-partisan public service is among the best in the world, and many of its departments and agencies place in Canada’s Top 100 Employers year after year. If you are interested in joining our diverse and innovative team, visit www.jobs.gc.ca for information and opportunities. Terms: https://www.canada.ca/en/transparency/terms.html Le gouvernement du Canada œuvre au nom des Canadiens, tant au pays qu’à l’étranger. Consultez le site www.canada.ca pour en savoir plus. Impartiale et professionnelle, la fonction publique du Canada fait partie de l’élite mondiale. Bon nombre de ses ministères et organismes figurent parmi les 100 meilleurs employeurs du pays année après année. Vous aimeriez intégrer notre équipe diversifiée et innovante? Rendez-vous au www.emplois.gc.ca pour obtenir des informations et connaître les possibilités qui s’offrent à vous. Avis : https://www.canada.ca/fr/transparence/avis.html


For more information about GAO, please visit www.gao.gov. General Information The U.S. Government Accountability Office (GAO) is an independent, nonpartisan agency that works for Congress. Often called the "congressional watchdog," GAO investigates how the federal government spends taxpayer dolla

The Department of Education is responsible for delivering the Victorian Government’s commitment to making Victoria the Education State, where all Victorians have the best learning and development experience, regardless of their background, postcode or circumstances. Education remains a cornerstone f
Year after year, the Commonwealth of Massachusetts has continued to pioneer bold legislative actions and programs, some of which have been embraced on a national scale. We are always looking for talented individuals to help us maintain this momentum and improve the services that millions of people d

The County of Santa Clara is located at the southern end of the San Francisco Bay and encompasses 1,312 square miles. It has one of the highest median family incomes in the country, and a wide diversity of cultures, backgrounds and talents. The County of Santa Clara continues to attract people fro

We are the largest and most diverse organisation in our state. We have more than 90 government departments and organisations providing essential services across 4000+ locations—from the Torres Strait to the Gold Coast; Mount Isa to Brisbane. We are passionate about making Queensland better through

State government is more than senators, representatives, and elected officials. We build highways, provide drivers licenses, protect our children and vulnerable populations, create jobs, connect Hoosiers to job opportunities, maintain state parks, train law enforcement officers, and we run museums

MINISTRY of ENVIRONMENT and URBANISM (MEU) MAIN SERVICE UNITS ================== 1) General Directorate of Construction Works 2) General Directorate of Spatial Planning 3) General Directorate of Environmental Management 4) General Directorate of EIA, Permits and Control 5) General Directo

Working for Switzerland Seven departments, the Federal Chancellery and around 70 administrative units make up the Federal Administration. With around 38,000 employees, it is one of the largest employers in Switzerland. People from all regions of the country work in the Federal Administration un

Every young Queenslander deserves a strong education and a fulfilling future. The Queensland Department of Education is committed to realising the potential of every student through the power of quality education, support and teamwork. With a workforce of over 95,000 people across regional, remote,
.png)
Chinese-linked hackers used sophisticated malware to penetrate and maintain long-term access to unnamed government and information...
A Canadian company left for dead in 2016 is now advancing Ottawa's regional interests more effectively than many government initiatives.
A research team led by Waterloo Engineering professors received $2 million in new federal funding to safeguard Canada's critical...
Learn about Canada's investment in BlackBerry to bolster cyber defenses in Southeast Asia and promote international collaboration.
New funding to train ASEAN cyber-defenders at the Malaysia CCoE, expanding Canada's Indo-Pacific commitment to strengthen regional cyber...
Ted Rogers School of Management professor Atefeh (Atty) Mashatan and Faculty of Engineering and Architectural Science professor Reza Arani...
Check against delivery Mr. Speaker, as Canada's digital landscape continues to evolve, so too do the threats to critical infrastructure,...
OTTAWA — The federal auditor found "significant gaps" in the government's cybersecurity services, monitoring efforts and responses to active...
Auditor General Karen Hogan said the federal government must continually bolster its defences as cyberattacks become more sophisticated,...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Government of Canada is http://canada.ca.
According to Rankiteo, Government of Canada’s AI-generated cybersecurity score is 807, reflecting their Good security posture.
According to Rankiteo, Government of Canada currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Government of Canada is not certified under SOC 2 Type 1.
According to Rankiteo, Government of Canada does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Government of Canada is not listed as GDPR compliant.
According to Rankiteo, Government of Canada does not currently maintain PCI DSS compliance.
According to Rankiteo, Government of Canada is not compliant with HIPAA regulations.
According to Rankiteo,Government of Canada is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Government of Canada operates primarily in the Government Administration industry.
Government of Canada employs approximately 162,692 people worldwide.
Government of Canada presently has no subsidiaries across any sectors.
Government of Canada’s official LinkedIn profile has approximately 858,448 followers.
Government of Canada is classified under the NAICS code 92, which corresponds to Public Administration.
No, Government of Canada does not have a profile on Crunchbase.
Yes, Government of Canada maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/government-of-canada.
As of December 19, 2025, Rankiteo reports that Government of Canada has experienced 8 cybersecurity incidents.
Government of Canada has an estimated 11,745 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack, Data Leak and Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an law enforcement notified with ottawa police, and remediation measures with employees reminded of their obligation not to communicate or store sensitive information on trello boards or any other unauthorized digital tool or service., and and remediation measures with under review by the office of the privacy commissioner of canada, and and third party assistance with federal security partners, and and remediation measures with collaboration with air operators to mitigate consequences..
Title: Cyberattack on Canadian Government Websites
Description: Several Canadian government websites and servers were targeted in a cyberattack by the hacking group Anonymous. The attack affected several websites for government services, including canada.ca, as well as the site of Canada’s spy agency, the Canadian Security Intelligence Service (CSIS). The attack was aimed to show their retaliation for a new anti-terrorism law passed by Canada’s politicians.
Type: Cyberattack
Threat Actor: Anonymous
Motivation: Retaliation for a new anti-terrorism law
Title: Canada Revenue Agency Privacy Breaches
Description: The personal, confidential information of over 80,000 individual Canadians held by the Canada Revenue Agency may have been accessed without authorization over the last 21 months.
Type: Data Breach
Title: Device Theft at Public Services and Procurement Canada
Description: A device was stolen from Public Services and Procurement Canada, compromising personal information of 227 employees at Infrastructure Canada.
Date Detected: 2023-08-20
Date Publicly Disclosed: 2023-09-07
Type: Data Breach
Attack Vector: Physical Theft
Title: Data Breach at Infrastructure Canada
Description: A significant data breach happened in the federal government after a device was stolen from Public Services and Procurement Canada (PSPC). PSPC is Infrastructure Canada’s service provider for pay, pension, and benefits. All 227 employees were affected at Infrastructure Canada. No banking or social insurance information was affected. Name, person record identifier (PRI), date of birth, home address, and salary range may have been compromised.
Type: Data Breach
Attack Vector: Device Theft
Title: Canadian Government Data Exposure via Trello
Description: The government of Canada exposed sensitive information including software bugs, security plans, server passwords, official internet domains, conference calls, and event-planning system details due to misconfigured Trello boards.
Type: Data Exposure
Attack Vector: Misconfiguration
Vulnerability Exploited: Misconfigured third-party service
Title: Canada Border Services Agency Data Breach
Description: Canada Border Services Agency suffered a data breach incident after a contractor led to the unauthorised access of up to 1.38 million licence plates and related information.
Type: Data Breach
Attack Vector: Unpatched and decommissioned server
Vulnerability Exploited: Lack of security safeguards in the contract
Threat Actor: Unspecified bad actors
Title: Data Breach at Tiffany & Co.
Description: A data breach at Tiffany & Co. is under review by the Office of the Privacy Commissioner of Canada (OPC). The OPC is ensuring the jewelry company is taking adequate steps to address the breach and protect the personal information of Canadians. The breach was reported to the OPC, and a letter filed with the Maine attorney general indicates it occurred in May 2025 and was discovered in September 2025. The breach also appears to have affected the United States, though the number of impacted Canadian accounts remains unclear.
Date Detected: 2025-09
Date Publicly Disclosed: 2025-09-17
Type: Data Breach
Title: None
Description: A cyber incident involving a breach at a cloud-based software provider impacted Transport Canada. The agency is working with federal security partners, including law enforcement, to ensure no impacts on airport operations' safety and security. Mitigation efforts are underway to prevent future disruptions.
Type: Cyber Breach (Third-Party Cloud Provider)
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Unpatched and decommissioned server.

Systems Affected: canada.caCSIS website

Data Compromised: Personal, Confidential

Data Compromised: Name, Person record identifier (pri), Date of birth, Home address, Salary range

Data Compromised: Name, Person record identifier (pri), Date of birth, Home address, Salary range

Data Compromised: Software bugs, Security plans, Server passwords, Official internet domains, Conference calls, Event-planning system details
Systems Affected: Trello boards

Data Compromised: Licence plates, Related information

Brand Reputation Impact: Potential (under review)
Legal Liabilities: Under review by the Office of the Privacy Commissioner of Canada and Maine attorney general
Identity Theft Risk: Potential (personal information of Canadians affected)

Systems Affected: Cloud-based software provider (third-party)
Operational Impact: Potential disruption to transportation safety, security, and operational efficiency (mitigated)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal, Confidential, , Personal Information, , Name, Person Record Identifier (Pri), Date Of Birth, Home Address, Salary Range, , Software Bugs, Security Plans, Server Passwords, Official Internet Domains, Conference Calls, Event-Planning System Details, , Licence Plates, Related Information, and Personal information (details unspecified).

Entity Name: Canadian Government
Entity Type: Government
Industry: Public Sector
Location: Canada

Entity Name: Canada Revenue Agency
Entity Type: Government
Industry: Public Sector
Location: Canada
Customers Affected: 80000

Entity Name: Infrastructure Canada
Entity Type: Government Agency
Industry: Public Services
Location: Canada
Size: 227 employees affected

Entity Name: Infrastructure Canada
Entity Type: Government Agency
Industry: Government
Size: 227 employees

Entity Name: Government of Canada
Entity Type: Government
Industry: Public Sector
Location: Canada

Entity Name: Canada Border Services Agency
Entity Type: Government Agency
Industry: Government
Location: Canada

Entity Name: Tiffany & Co.
Entity Type: Corporation
Industry: Luxury Jewelry/Retail
Location: CanadaUnited States

Entity Name: Transport Canada
Entity Type: Government Agency
Industry: Transportation / Aviation
Location: Canada

Entity Type: Cloud-Based Software Provider
Industry: Technology / Cloud Services

Law Enforcement Notified: Ottawa Police

Remediation Measures: Employees reminded of their obligation not to communicate or store sensitive information on Trello boards or any other unauthorized digital tool or service.

Incident Response Plan Activated: True
Remediation Measures: Under review by the Office of the Privacy Commissioner of Canada

Incident Response Plan Activated: True
Third Party Assistance: Federal Security Partners.
Remediation Measures: Collaboration with air operators to mitigate consequences
Third-Party Assistance: The company involves third-party assistance in incident response through Federal security partners, .

Type of Data Compromised: Personal, Confidential
Number of Records Exposed: 80000
Sensitivity of Data: High

Type of Data Compromised: Personal information
Number of Records Exposed: 227
Sensitivity of Data: Medium
Personally Identifiable Information: NamePerson Record Identifier (PRI)Date of BirthHome AddressSalary Range

Type of Data Compromised: Name, Person record identifier (pri), Date of birth, Home address, Salary range
Number of Records Exposed: 227
Sensitivity of Data: High
Personally Identifiable Information: NamePerson Record Identifier (PRI)Date of BirthHome Address

Type of Data Compromised: Software bugs, Security plans, Server passwords, Official internet domains, Conference calls, Event-planning system details
Sensitivity of Data: High

Type of Data Compromised: Licence plates, Related information
Number of Records Exposed: 1.38 million
Data Exfiltration: Yes
Personally Identifiable Information: Licence plate photos

Type of Data Compromised: Personal information (details unspecified)
Sensitivity of Data: High (personal information)
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Employees reminded of their obligation not to communicate or store sensitive information on Trello boards or any other unauthorized digital tool or service., , Under review by the Office of the Privacy Commissioner of Canada, Collaboration with air operators to mitigate consequences.

Legal Actions: Under review by the Office of the Privacy Commissioner of Canada and Maine attorney general
Regulatory Notifications: Office of the Privacy Commissioner of CanadaMaine attorney general
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Under review by the Office of the Privacy Commissioner of Canada and Maine attorney general.

Lessons Learned: Importance of applying adequate security controls to protect information and assets, and the need to avoid using unauthorized digital tools for sensitive information.

Lessons Learned: Ensure contracts include security safeguards for the protection and retention of personal information.

Recommendations: Ensure that all employees are trained on proper handling of sensitive information and that only authorized tools are used for communication and storage.
Key Lessons Learned: The key lessons learned from past incidents are Importance of applying adequate security controls to protect information and assets, and the need to avoid using unauthorized digital tools for sensitive information.Ensure contracts include security safeguards for the protection and retention of personal information.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Ensure that all employees are trained on proper handling of sensitive information and that only authorized tools are used for communication and storage..

Source: Public Disclosure

Source: Office of the Privacy Commissioner of Canada (OPC) Breach Report

Source: Maine Attorney General Breach Letter
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Public Disclosure, and Source: The Canadian PressDate Accessed: 2025-09-17, and Source: Winnipeg Free PressDate Accessed: 2025-09-17, and Source: Office of the Privacy Commissioner of Canada (OPC) Breach Report, and Source: Maine Attorney General Breach Letter.

Investigation Status: Under review by the Office of the Privacy Commissioner of Canada

Investigation Status: Ongoing (collaboration with federal security partners and law enforcement)

Stakeholder Advisories: Transport Canada is working with air operators to mitigate potential consequences.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Transport Canada is working with air operators to mitigate potential consequences..

Entry Point: Unpatched and decommissioned server

Root Causes: Misconfiguration of Trello boards leading to exposure of sensitive information.
Corrective Actions: Remind employees of their obligation not to communicate or store sensitive information on unauthorized digital tools.

Root Causes: Lack of security safeguards in the contract; Unpatched and decommissioned server

Corrective Actions: Mitigation efforts to prevent similar incidents in the future
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Federal Security Partners, .
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Remind employees of their obligation not to communicate or store sensitive information on unauthorized digital tools., Mitigation efforts to prevent similar incidents in the future.
Last Attacking Group: The attacking group in the last incident were an Anonymous and Unspecified bad actors.
Most Recent Incident Detected: The most recent incident detected was on 2023-08-20.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-09-17.
Most Significant Data Compromised: The most significant data compromised in an incident were Personal, Confidential, , Name, Person Record Identifier (PRI), Date of Birth, Home Address, Salary Range, , Name, Person Record Identifier (PRI), Date of Birth, Home Address, Salary Range, , software bugs, security plans, server passwords, official internet domains, conference calls, event-planning system details, , Licence plates, Related information, and .
Most Significant System Affected: The most significant system affected in an incident was canada.caCSIS website and Trello boards and Cloud-based software provider (third-party).
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was federal security partners, .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Date of Birth, official internet domains, software bugs, security plans, conference calls, Confidential, Personal, Name, Home Address, Related information, event-planning system details, Licence plates, Salary Range, server passwords and Person Record Identifier (PRI).
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 1.4M.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Under review by the Office of the Privacy Commissioner of Canada and Maine attorney general.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Importance of applying adequate security controls to protect information and assets, and the need to avoid using unauthorized digital tools for sensitive information., Ensure contracts include security safeguards for the protection and retention of personal information.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Ensure that all employees are trained on proper handling of sensitive information and that only authorized tools are used for communication and storage..
Most Recent Source: The most recent source of information about an incident are Maine Attorney General Breach Letter, Public Disclosure, Office of the Privacy Commissioner of Canada (OPC) Breach Report, The Canadian Press and Winnipeg Free Press.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Under review by the Office of the Privacy Commissioner of Canada.
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Transport Canada is working with air operators to mitigate potential consequences., .
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Unpatched and decommissioned server.
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Misconfiguration of Trello boards leading to exposure of sensitive information., Lack of security safeguards in the contract; Unpatched and decommissioned server.
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Remind employees of their obligation not to communicate or store sensitive information on unauthorized digital tools., Mitigation efforts to prevent similar incidents in the future.
.png)
Improper Authorization (CWE-285) in Kibana can lead to privilege escalation (CAPEC-233) by allowing an authenticated user to bypass intended permission restrictions via a crafted HTTP request. This allows an attacker who lacks the live queries - read permission to successfully retrieve the list of live queries.
Weblate is a web based localization tool. In versions prior to 5.15.1, it was possible to overwrite Git configuration remotely and override some of its behavior. Version 5.15.1 fixes the issue.
Allocation of Resources Without Limits or Throttling (CWE-770) in Elasticsearch can allow an authenticated user with snapshot restore privileges to cause Excessive Allocation (CAPEC-130) of memory and a denial of service (DoS) via crafted HTTP request.
Allocation of Resources Without Limits or Throttling (CWE-770) in Kibana can allow a low-privileged authenticated user to cause Excessive Allocation (CAPEC-130) of computing resources and a denial of service (DoS) of the Kibana process via a crafted HTTP request.
Improper neutralization of input during web page generation ('Cross-site Scripting') (CWE-79) allows an unauthenticated user to embed a malicious script in content that will be served to web browsers causing cross-site scripting (XSS) (CAPEC-63) via a vulnerability a function handler in the Vega AST evaluator.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.