Company Details
horizon-healthcare-inc-
153
438
62133
horizonhealthcareinc.com
0
HOR_6305953
In-progress


Horizon Healthcare, Inc. Company CyberSecurity Posture
horizonhealthcareinc.comHorizon Healthcare, Inc. is a provider of AODA (Alcohol and Other Drug Abuse), Mental Health, Case Management, Peer Specialist, and other related Correctional Services. Our mission is to help individuals recover from the devastating effects of mental illness and drug dependency; to reclaim their emotional, psychological and physical health; to reintegrate with their families; and to become productive members of society. Operating out of multiple outpatient locations in southern Wisconsin as well as dozens of Department of Corrections centers throughout the State of WI, our professional and dedicated staff of physicians, clinical psychologists, employment specialists, social workers, addictionologists, case managers, outreach specialists, peer specialists and AODA professionals provide individualized and compassionate care and treatment one client at a time. In addition to outpatient services, we also provide services in residential settings through our sister company, Matt Talbot Recovery Center, Inc. - www.MTRCInc.com. MTRC also provides a variety of correctional, transportation, and other related services throughout the State of WI. To learn more, or to check out or current job openings, please visit our website at: www.horizonhealthcareinc.com Formerly known as: ARO Behavioral Healthcare
Company Details
horizon-healthcare-inc-
153
438
62133
horizonhealthcareinc.com
0
HOR_6305953
In-progress
Between 750 and 799

HHI Global Score (TPRM)XXXX



No incidents recorded for Horizon Healthcare, Inc. in 2026.
No incidents recorded for Horizon Healthcare, Inc. in 2026.
No incidents recorded for Horizon Healthcare, Inc. in 2026.
HHI cyber incidents detection timeline including parent company and subsidiaries

Horizon Healthcare, Inc. is a provider of AODA (Alcohol and Other Drug Abuse), Mental Health, Case Management, Peer Specialist, and other related Correctional Services. Our mission is to help individuals recover from the devastating effects of mental illness and drug dependency; to reclaim their emotional, psychological and physical health; to reintegrate with their families; and to become productive members of society. Operating out of multiple outpatient locations in southern Wisconsin as well as dozens of Department of Corrections centers throughout the State of WI, our professional and dedicated staff of physicians, clinical psychologists, employment specialists, social workers, addictionologists, case managers, outreach specialists, peer specialists and AODA professionals provide individualized and compassionate care and treatment one client at a time. In addition to outpatient services, we also provide services in residential settings through our sister company, Matt Talbot Recovery Center, Inc. - www.MTRCInc.com. MTRC also provides a variety of correctional, transportation, and other related services throughout the State of WI. To learn more, or to check out or current job openings, please visit our website at: www.horizonhealthcareinc.com Formerly known as: ARO Behavioral Healthcare


Catholic Charities of Shiawassee & Genesee Counties has been Providing Help and Creating Hope for those in need since 1941. Offering more than 30 human services and community services program including: the North End Soup Kitchen and Holy Angels Soup Kitchen, serving more than 151,000 meals an

Allies in Change is a non-profit psychological services center. We offer individual and couples counseling for men and women for a variety of issues including: managing emotions such as anger, depression, stress, and anxiety; building greater intimacy and connection in relationships with others incl

Synod Community Services is the leading provider of support services for individuals with mental illness, disabilities, and vulnerabilities in southeastern Michigan. Our compassion, range of services, and approach to care help provide our clients with the safety net they need to maintain independ

Buddies Not Bullies strengthens the lives of children and their families through interventions and life skills that build relationships that are healthy and harmonious and that create a community of acceptance and inclusion. Our mission is: To reduce the incidence of physical, verbal, and emotio

Synaeda biedt geestelijke gezondheidszorg in heel Friesland,. We behandelen kort waar het kan en langer als dat nodig is. Met 8 vestigingen in Friesland zijn we altijd in de buurt. Onze digitale poli loopt voorop in zorg-op-afstand, onze wetenschappers zetten breinonderzoek op zijn kop en op dependa

Mind Body Co-op is Chicago’s only space for individuals to discover, explore, and heal what is occurring internally at the cognitive, emotional, and physical levels. This unique, holistic approach to treatment and wellness is born out of the belief that examining the cognitive, emotional, and physic

Our Mission: To provide quality care with compassion, respect and dignity. For more than 40 years, we have been "Caring for Our Community" by providing affordable evidence-based behavioral healthcare services to children, adolescents, adults, seniors and their families who struggle with mental h

The Mind Study Center is an independent organization offering evidence-based psychiatric and psychological services in the Los Angeles area. We strive for the highest standards of care, integrating evidence-based clinical approaches with practical experiences in an empathic, trusting, and collaborat

People Encouraging People is a non-profit behavioral healthcare corporation dedicated to providing life-transforming rehabilitation and support services to people who are disabled or disadvantaged. PEP services are values-based and designed specifically for each individual’s challenges. PEP is commi
.png)
New report highlights accelerating cyber incidents, emerging AI governance risks, and the growing importance of human-centered cybersecurity...
In 2023, 725 data breaches were reported to OCR and across those breaches, more than 133 million records were exposed or impermissibly disclosed.
These Top 100 cybersecurity leaders in the U.S. are not only tackling today's threats but also anticipating the challenges of tomorrow.
In the rapidly evolving landscape of technology, 2025 promises to be a pivotal year where artificial intelligence not only dominates but...
A sizable class action case appears to be on the horizon for Christian Dior, which was hit with a handful of individual lawsuits this...
Rubrik shows strong growth, rising margins, and solid FCF, though dilution and rich valuation temper near-term upside.
Horizon Healthcare RCM is the latest revenue cycle management software vendor to report a health data breach involving ransomware and data theft.
Between December 25 and December 27, 2024, Horizon Healthcare RCM, a revenue cycle management company serving healthcare providers, experienced a major data...
The European Commission announced Thursday it is allocating €145.5 million, or about US$170 million, to help public administrations and...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Horizon Healthcare, Inc. is http://www.horizonhealthcareinc.com.
According to Rankiteo, Horizon Healthcare, Inc.’s AI-generated cybersecurity score is 757, reflecting their Fair security posture.
According to Rankiteo, Horizon Healthcare, Inc. currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Horizon Healthcare, Inc. has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Horizon Healthcare, Inc. is not certified under SOC 2 Type 1.
According to Rankiteo, Horizon Healthcare, Inc. does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Horizon Healthcare, Inc. is not listed as GDPR compliant.
According to Rankiteo, Horizon Healthcare, Inc. does not currently maintain PCI DSS compliance.
According to Rankiteo, Horizon Healthcare, Inc. is not compliant with HIPAA regulations.
According to Rankiteo,Horizon Healthcare, Inc. is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Horizon Healthcare, Inc. operates primarily in the Mental Health Care industry.
Horizon Healthcare, Inc. employs approximately 153 people worldwide.
Horizon Healthcare, Inc. presently has no subsidiaries across any sectors.
Horizon Healthcare, Inc.’s official LinkedIn profile has approximately 438 followers.
Horizon Healthcare, Inc. is classified under the NAICS code 62133, which corresponds to Offices of Mental Health Practitioners (except Physicians).
No, Horizon Healthcare, Inc. does not have a profile on Crunchbase.
Yes, Horizon Healthcare, Inc. maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/horizon-healthcare-inc-.
As of January 22, 2026, Rankiteo reports that Horizon Healthcare, Inc. has not experienced any cybersecurity incidents.
Horizon Healthcare, Inc. has an estimated 5,280 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Horizon Healthcare, Inc. has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g., execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.