Company Details
hills-community-options-inc
61
167
621
hco.net.au
0
HCO_2508397
In-progress


HCO Company CyberSecurity Posture
hco.net.auHCO is an independent and not-for-profit specialist disability service provider. We’re built on genuine connections with the people we support and our community. Our highly skilled team work alongside people living with disability and families, to help them live their best life, the way they want. Help enable quality home and community life through: -Supported Independent Living -In-home Support -Short Term Accommodation -Community Access Programs -Support Coordination. We work with children, adults and young people living with disability and their families.
Company Details
hills-community-options-inc
61
167
621
hco.net.au
0
HCO_2508397
In-progress
Between 750 and 799

HCO Global Score (TPRM)XXXX



No incidents recorded for HCO in 2026.
No incidents recorded for HCO in 2026.
No incidents recorded for HCO in 2026.
HCO cyber incidents detection timeline including parent company and subsidiaries

HCO is an independent and not-for-profit specialist disability service provider. We’re built on genuine connections with the people we support and our community. Our highly skilled team work alongside people living with disability and families, to help them live their best life, the way they want. Help enable quality home and community life through: -Supported Independent Living -In-home Support -Short Term Accommodation -Community Access Programs -Support Coordination. We work with children, adults and young people living with disability and their families.


Since 1959, CareLink has provided individuals living with severe and persistent mental illness unique programs and support to help them achieve wellness, recovery, and self-determination. CareLink’s philosophy is that people with disabilities can live, work, and participate in their community with

Conway Behavioral Health Hospital, located just outside of Little Rock in Conway, Arkansas. Our convenient location provides a quiet, rural backdrop for healing, yet it is easily accessible from points throughout the greater Little Rock, Arkansas area. At our hospital, we embrace our Arkansas herita
Holmusk is a data analytics and health technology company on a mission to harness real-world evidence to transform both research and care for behavioral health. Combining a leading behavioral health database with AI-powered analytics and digital solutions designed to address the most pressing chal

Boulder Emotional Wellness seeks to promote and maintain the psychological health of the Boulder community. We treat every client with sensitivity, providing affirmative therapy that values diversity and respects the individual. Our services include individual adult counseling, couples counsel

Vinfen is one of the most dynamic and innovative health and human services organizations in the country. With over 200 locations in Massachusetts and Connecticut, we are a premier provider of comprehensive services for adolescents and adults with disabilities or life challenges. We provide a wide ra

The Milton H. Erickson Foundation, Inc., is a federal nonprofit corporation formed in 1979 to promote and advance the contributions made to the health sciences by the late Milton H. Erickson, MD, during his long and distinguished career. The Foundation is dedicated to training health and mental heal

Dilico Anishinabek Family Care provides a range of responsive individual, family and community programs and services for the complete life journey of all Anishinabek people. We care for the physical health, the mental health and the health of the communities where Anishinabek people live by promo

Team Coordinating Agency, Inc. is a private, nonprofit, social service agency that provides a wide range of services including prevention and treatment of addiction, children’s services, and mental health treatment in residential, outpatient and forensic settings. T.C.A. Inc. remains committed to

A community-based organization providing therapy (individual, family, couples, & groups), after-school programs, mental health assemblies, organizational workshops, juvenile detention centers, and more! We service California residents via insurance or cash pay. Services are provided via telehealth a
.png)
Traci DiMartini, stepping down from her role as chief human capital officer at the General Services Administration, will move to IRS at the...
HCO provides strategic human capital leadership and support to GAO managers and staff throughout their careers. The office develops and manages agency-wide...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of HCO is https://hco.net.au/.
According to Rankiteo, HCO’s AI-generated cybersecurity score is 757, reflecting their Fair security posture.
According to Rankiteo, HCO currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, HCO has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, HCO is not certified under SOC 2 Type 1.
According to Rankiteo, HCO does not hold a SOC 2 Type 2 certification.
According to Rankiteo, HCO is not listed as GDPR compliant.
According to Rankiteo, HCO does not currently maintain PCI DSS compliance.
According to Rankiteo, HCO is not compliant with HIPAA regulations.
According to Rankiteo,HCO is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
HCO operates primarily in the Mental Health Care industry.
HCO employs approximately 61 people worldwide.
HCO presently has no subsidiaries across any sectors.
HCO’s official LinkedIn profile has approximately 167 followers.
No, HCO does not have a profile on Crunchbase.
Yes, HCO maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/hills-community-options-inc.
As of January 22, 2026, Rankiteo reports that HCO has not experienced any cybersecurity incidents.
HCO has an estimated 5,280 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, HCO has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g., execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.