Company Details
inotiv
1,799
10,559
5417
inotiv.com
0
INO_1925094
In-progress

Inotiv Company CyberSecurity Posture
inotiv.comWHERE INSIGHTS LEAD TO ANSWERS Expect More In choosing a partner for discovery, development and research models, expect more: more attention, more insight, and a superlative experience. You’ve worked hard to get this far, and you deserve a provider seamlessly aligned to your needs and goals. Through scientific leadership and ongoing investments, Inotiv delivers a comprehensive range of services and products that will exceed your expectations. Benefit from our long and impeccable regulatory history, world class team of scientists, and track record of providing attentive, decisive service. Answering the right questions on time and with high-quality data is the key to achieving your objectives. At Inotiv, that is our focus: to provide you with both the broad scope and right-size solutions essential to your success. Gain the insights you deserve to get the answers you need. Expect more — with Inotiv. Inotiv is a Top Workplaces 2023 Winner.
Company Details
inotiv
1,799
10,559
5417
inotiv.com
0
INO_1925094
In-progress
Between 0 and 549

Inotiv Global Score (TPRM)XXXX

Description: Inotiv, a pharmaceutical R&D company, fell victim to a ransomware attack where cybercriminals encrypted critical parts of its network, forcing systems offline and halting operations. The attackers claimed to have exfiltrated and publicly leaked over **170 GB of sensitive data**, including proprietary research, clinical trial information, and potentially patient or employee records. The disruption threatened ongoing drug development, compromised data integrity, and risked delays in life-saving treatments. The attack’s scale and targeting of high-value pharmaceutical IP—combined with operational shutdowns—posed severe financial, reputational, and regulatory repercussions. Given the sector’s reliance on precise data for drug approvals and patient safety, the breach’s cascading effects could extend to partners, trials, and ultimately public health. Recovery efforts likely involved costly system restoration, forensic investigations, and potential regulatory fines under frameworks like **HIPAA** or **GDPR** for mishandled sensitive data.
Description: **Inotiv Hit by Ransomware Attack, Exposing Sensitive Data of Nearly 10,000 Individuals** Inotiv, a leading research organization, disclosed a ransomware attack that compromised the personal information of 9,542 individuals. The breach, which involved unauthorized access to the company’s systems, exposed highly sensitive data, including names, addresses, Social Security numbers, and financial and medical records. The attack underscores the growing threat of ransomware, particularly against organizations handling confidential information. Cybercriminals successfully infiltrated Inotiv’s infrastructure, demonstrating that even well-established entities remain vulnerable to sophisticated cyber threats. The stolen data poses significant risks, including identity theft and financial fraud, with potential long-term consequences for affected individuals. In response, Inotiv launched an investigation in collaboration with cybersecurity experts to assess the full extent of the breach and prevent future incidents. Affected individuals are being notified, and mitigation efforts are underway to address the fallout. This incident reflects a broader trend of ransomware attacks targeting sectors with sensitive data, highlighting the need for enhanced cybersecurity measures. While Inotiv works to strengthen its defenses, the breach serves as a reminder of the persistent and evolving nature of cyber threats.
Description: Inotiv, an American pharmaceutical company specializing in drug development, drug discovery, safety assessment, and live animal research, suffered a **ransomware attack** on **August 8, 2025**. The **Qilin ransomware gang** encrypted critical systems and data, stealing approximately **162,000 files (176GB)** and publishing samples on their leak site. The attack disrupted **business operations**, including databases and internal applications essential for core processes. While Inotiv initiated containment measures, migrated some operations offline, and engaged external security experts, the **outages persist with no estimated recovery timeline**. The incident has caused **significant operational disruptions**, affecting a company with **2,000 employees and $500M+ annual revenue**. The long-term financial, reputational, and operational impacts remain unclear as investigations continue.


Inotiv has 476.92% more incidents than the average of same-industry companies with at least one recorded incident.
Inotiv has 361.54% more incidents than the average of all companies with at least one recorded incident.
Inotiv reported 3 incidents this year: 0 cyber attacks, 3 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
Inotiv cyber incidents detection timeline including parent company and subsidiaries

WHERE INSIGHTS LEAD TO ANSWERS Expect More In choosing a partner for discovery, development and research models, expect more: more attention, more insight, and a superlative experience. You’ve worked hard to get this far, and you deserve a provider seamlessly aligned to your needs and goals. Through scientific leadership and ongoing investments, Inotiv delivers a comprehensive range of services and products that will exceed your expectations. Benefit from our long and impeccable regulatory history, world class team of scientists, and track record of providing attentive, decisive service. Answering the right questions on time and with high-quality data is the key to achieving your objectives. At Inotiv, that is our focus: to provide you with both the broad scope and right-size solutions essential to your success. Gain the insights you deserve to get the answers you need. Expect more — with Inotiv. Inotiv is a Top Workplaces 2023 Winner.


The CEA is the French Alternative Energies and Atomic Energy Commission ("Commissariat à l'énergie atomique et aux énergies alternatives"). It is a public body established in October 1945 by General de Gaulle. A leader in research, development and innovation, the CEA mission statement has two main

The French National Centre for Scientific Research is among the world's leading research institutions. Its scientists explore the living world, matter, the Universe, and the functioning of human societies in order to meet the major challenges of today and tomorrow. Internationally recognised for the
Los Alamos National Laboratory is one of the world’s most innovative multidisciplinary research institutions. We're engaged in strategic science on behalf of national security to ensure the safety and reliability of the U.S. nuclear stockpile. Our workforce specializes in a wide range of progressive

The Chinese Academy of Sciences (CAS) is the lead national scientific institution in natural sciences and high technology development in China and the country's supreme scientific advisory body. It incorporates three major parts: a comprehensive research and development network consisting of 104 res

The University of Cambridge is one of the world's foremost research universities. The University is made up of 31 Colleges and over 150 departments, faculties, schools and other institutions. Its mission is 'to contribute to society through the pursuit of education, learning, and research at the hi

At Utrecht University (UU), we are working towards a better world. We do this by researching complex issues beyond the borders of disciplines. We put thinkers in contact with doers, so new insights can be applied. We give students the space to develop themselves. In so doing, we make substantial con

UCL (University College London) is London's leading multidisciplinary university, ranked 9th in the QS World University Rankings. Established in 1826 UCL opened up education in England for the first time to students of any race, class or religion and was also the first university to welcome female

Consistently rated in the top 10 universities in the world, Imperial College London is the only university in the UK to focus exclusively on science, medicine, engineering and business. At Imperial we bring together people, disciplines, industries and sectors to further our understanding of the n

Imagine what you could do at a world-leading university that is globally recognised for its teaching, research and innovation. The University of Edinburgh has been providing students with world-class teaching for more than 425 years, unlocking the potential of some of the world's leading thinkers
.png)
Inotiv, Inc. will release fiscal 2025 Q4 and full year results on December 3, 2025, followed by a co.
WEST LAFAYETTE, Ind., Nov. 21, 2025 (GLOBE NEWSWIRE) -- Inotiv, Inc. (NASDAQ: NOTV) (the 'Company”, or 'Inotiv”), a leading contract...
INOTIV: 2025 CYBERSECURITY INCIDENT IS EXPECTED TO CONTINUE TO CAUSE, DISRUPTIONS TO CERTAIN BUSINESS OPERATIONS OF CO -SEC FILING.
Inotiv ( ($NOTV) ) has provided an announcement. On September 25, 2025, Inotiv, Inc. agreed to settle a securities class action and two...
Pharma companies face growing cybersecurity risks that threaten clinical trial data, patient records, and proprietary drug formulas.
Discover the impact of Inotiv's data breach involving 161967 files and 176 GB of sensitive drug development data. Learn how to protect your...
R&D data is snatched from Nissan and Kaseya Labs dives into a critical WinRAR vulnerability.
A ransomware attack has forced drug research firm Inotiv to shut down critical systems, resulting in operational disruptions.
Inotiv, a prominent U.S. pharmaceutical company, has reportedly been attacked by the Qilin Ransomware group. The attack, which occurred on August 8, 2025, led...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Inotiv is https://www.inotiv.com/.
According to Rankiteo, Inotiv’s AI-generated cybersecurity score is 100, reflecting their Critical security posture.
According to Rankiteo, Inotiv currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Inotiv is not certified under SOC 2 Type 1.
According to Rankiteo, Inotiv does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Inotiv is not listed as GDPR compliant.
According to Rankiteo, Inotiv does not currently maintain PCI DSS compliance.
According to Rankiteo, Inotiv is not compliant with HIPAA regulations.
According to Rankiteo,Inotiv is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Inotiv operates primarily in the Research Services industry.
Inotiv employs approximately 1,799 people worldwide.
Inotiv presently has no subsidiaries across any sectors.
Inotiv’s official LinkedIn profile has approximately 10,559 followers.
Inotiv is classified under the NAICS code 5417, which corresponds to Scientific Research and Development Services.
Yes, Inotiv has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/inotiv.
Yes, Inotiv maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/inotiv.
As of December 09, 2025, Rankiteo reports that Inotiv has experienced 3 cybersecurity incidents.
Inotiv has an estimated 5,002 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.
Total Financial Loss: The total financial loss from these incidents is estimated to be $4.61 million.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with external security experts, and and containment measures with isolation of affected systems, containment measures with migration to offline alternatives, and remediation measures with system restoration efforts, and recovery measures with partial migration to offline operations, and communication strategy with sec filing, communication strategy with media statements (via bleepingcomputer), and remediation measures with risk assessments, remediation measures with iot device inventory and patch management, remediation measures with vendor risk assessments, remediation measures with employee training (phishing awareness), and incident response plan activated with yes, and third party assistance with cybersecurity experts, and communication strategy with affected individuals are being notified..
Title: Ransomware Attack on Inotiv Encrypts Systems and Disrupts Business Operations
Description: American pharmaceutical company Inotiv disclosed a ransomware attack on August 8, 2025, where a threat actor (Qilin ransomware gang) gained unauthorized access and encrypted certain systems and data. The attack disrupted business operations, including databases and internal applications. The gang claims to have stolen ~162,000 files (176GB) and published samples on their leak site. Inotiv is investigating with external experts, notified law enforcement, and is working to restore systems while migrating some operations offline. The financial and operational impacts are ongoing, with no estimated timeline for full recovery.
Date Detected: 2025-08-08
Date Publicly Disclosed: 2025-08-08
Type: Ransomware Attack
Threat Actor: Qilin Ransomware Gang
Motivation: Financial GainData TheftExtortion
Title: Cyberattacks Targeting the Pharmaceutical Industry
Description: In the pharmaceutical industry, clinical trial data, patient records, and proprietary drug formulas are prime targets for cybercriminals. These high-value assets make the sector a constant focus for attacks. Disruptions to research or medicine distribution can have life-threatening consequences. During global health crises like the COVID-19 pandemic, cyber attackers exploited vulnerabilities, including a fivefold increase in phishing attempts targeting the WHO. Ransomware and data breaches are major concerns, with incidents affecting companies like Inotiv, AEP, and Cencora, leading to financial losses, operational disruptions, and regulatory fines.
Type: Data Breach
Attack Vector: PhishingRansomwareThird-Party VulnerabilitiesIoT Device Exploitation
Vulnerability Exploited: Human Error (Phishing)Unpatched IoT DevicesThird-Party Supply Chain Weaknesses
Motivation: Financial GainData Theft (Intellectual Property, Patient Data)Disruption of Operations
Title: Inotiv Ransomware Attack and Data Breach
Description: Inotiv, a prominent research organization, recently reported a significant ransomware attack resulting in the theft of sensitive personal information of 9,542 individuals. The breach exposed confidential data, including names, addresses, Social Security numbers, financial and medical records.
Type: Ransomware
Common Attack Types: The most common types of attacks the company has faced is Ransomware.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Phishing emails (most common).

Data Compromised: 162,000 files (176gb), Data samples published on leak site
Systems Affected: DatabasesInternal applicationsNetworks
Downtime: ['Ongoing (no estimated recovery time)', 'Disruptions to business operations']
Operational Impact: Migration to offline alternativesPartial restoration efforts
Brand Reputation Impact: Potential reputational damage due to data breach and operational disruptions

Financial Loss: $4.61 million (average cost per breach, IBM 2025); $40 million (Cencora settlement)
Data Compromised: Clinical trial data, Patient records (prescriptions, treatments), Proprietary drug formulas, 170 gb of sensitive data (inotiv)
Systems Affected: Network encryption (Inotiv, AEP)IT systems (AEP, Cencora)Production systems (potential drug quality compromise)IoT devices (lab sensors, medical devices)
Downtime: ['Operations forced offline (Inotiv)', 'Medicine deliveries at risk (AEP, 6,000+ pharmacies affected)', 'Research and production delays']
Operational Impact: Stalled researchSlowed productionDelayed shipmentsCompromised drug qualityDelayed new drug approvals
Brand Reputation Impact: Strained relationships with partners; loss of trust
Legal Liabilities: Class-action litigation (Cencora, $40 million settlement)Regulatory fines (HIPAA, GDPR violations)
Identity Theft Risk: High (patient records exposed in Cencora breach)

Data Compromised: Sensitive personal information of 9,542 individuals, including names, addresses, Social Security numbers, financial and medical records
Brand Reputation Impact: Potential long-term consequences for brand reputation due to exposure of sensitive data
Identity Theft Risk: High risk of identity theft or fraud for affected individuals
Average Financial Loss: The average financial loss per incident is $1.54 million.
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Corporate Data (Unspecified), Potentially Sensitive Research Or Operational Data, , Patient Personal And Health Information (Cencora), Prescription And Treatment Records, Proprietary Drug Formulas, Clinical Trial Data, , Names, Addresses, Social Security Numbers, Financial Records, Medical Records and .

Entity Name: Inotiv, Inc.
Entity Type: Pharmaceutical Company, Contract Research Organization (CRO)
Industry: Drug Development, Drug Discovery, Safety Assessment, Live Animal Research Modeling
Location: Indiana, USA
Size: ~2,000 employees

Entity Name: Inotiv
Entity Type: Pharmaceutical R&D Company
Industry: Pharmaceutical

Entity Name: AEP (Pharmaceutical Wholesaler)
Entity Type: Pharmaceutical Distributor
Industry: Pharmaceutical
Location: Germany
Customers Affected: 6,000+ pharmacies

Entity Name: Cencora
Entity Type: Pharmaceutical Distributor
Industry: Pharmaceutical
Location: US
Size: Large (one of the largest in the US)
Customers Affected: Patients tied to 27+ pharmaceutical and biotechnology companies

Entity Name: The Lash Group (Cencora Subsidiary)
Entity Type: Subsidiary
Industry: Pharmaceutical
Location: US

Entity Name: World Health Organization (WHO)
Entity Type: International Health Agency
Industry: Healthcare
Location: Global

Entity Name: Inotiv
Entity Type: Research Organization
Industry: Research
Customers Affected: 9,542 individuals

Incident Response Plan Activated: True
Third Party Assistance: External Security Experts.
Containment Measures: Isolation of affected systemsMigration to offline alternatives
Remediation Measures: System restoration efforts
Recovery Measures: Partial migration to offline operations
Communication Strategy: SEC filingMedia statements (via BleepingComputer)

Remediation Measures: Risk assessmentsIoT device inventory and patch managementVendor risk assessmentsEmployee training (phishing awareness)

Incident Response Plan Activated: Yes
Third Party Assistance: Cybersecurity experts
Communication Strategy: Affected individuals are being notified
Incident Response Plan: The company's incident response plan is described as Yes.
Third-Party Assistance: The company involves third-party assistance in incident response through External security experts, , Cybersecurity experts.

Type of Data Compromised: Corporate data (unspecified), Potentially sensitive research or operational data
Number of Records Exposed: 162,000 files
Sensitivity of Data: High (potential inclusion of proprietary research or operational data)
Data Encryption: True

Type of Data Compromised: Patient personal and health information (cencora), Prescription and treatment records, Proprietary drug formulas, Clinical trial data
Sensitivity of Data: High (patient health data, intellectual property)
Data Exfiltration: Yes (170 GB stolen in Inotiv breach; Cencora breach extended to 27+ companies)
Data Encryption: Yes (ransomware encryption in Inotiv, AEP)
Personally Identifiable Information: Yes (patient records in Cencora breach)

Type of Data Compromised: Names, Addresses, Social security numbers, Financial records, Medical records
Number of Records Exposed: 9,542
Sensitivity of Data: High
Data Exfiltration: Yes
Personally Identifiable Information: Yes
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: System restoration efforts, , Risk assessments, IoT device inventory and patch management, Vendor risk assessments, Employee training (phishing awareness), .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by isolation of affected systems, migration to offline alternatives and .

Ransomware Strain: Qilin
Data Encryption: True
Data Exfiltration: True

Data Encryption: Yes (Inotiv, AEP)
Data Exfiltration: Yes (Inotiv: 170 GB posted)

Data Exfiltration: Yes
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Partial migration to offline operations, .

Regulatory Notifications: U.S. Securities and Exchange Commission (SEC) filing

Regulations Violated: HIPAA (Health Insurance Portability and Accountability Act), GDPR (General Data Protection Regulation),
Fines Imposed: $40 million (Cencora settlement)
Legal Actions: Class-action litigation (Cencora)
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Class-action litigation (Cencora).

Lessons Learned: Phishing remains the most common and effective attack vector in healthcare., Third-party ecosystem breaches are a significant risk (87% of companies affected)., IoT devices are a critical vulnerability in pharmaceutical environments., Supply chain attacks can bypass internal security measures., Regulatory non-compliance leads to severe financial and operational consequences.

Lessons Learned: The incident highlights the critical need for vigilant cybersecurity practices and the vulnerability of well-established organizations to sophisticated attacks.

Recommendations: Conduct regular risk assessments to detect threats early., Maintain an inventory of IoT devices and enforce authentication/encryption., Collaborate with industry peers to share threat intelligence., Perform vendor risk assessments to mitigate supply chain attacks., Train employees to recognize phishing and social engineering tactics., Include IoT devices in patch management strategies.Conduct regular risk assessments to detect threats early., Maintain an inventory of IoT devices and enforce authentication/encryption., Collaborate with industry peers to share threat intelligence., Perform vendor risk assessments to mitigate supply chain attacks., Train employees to recognize phishing and social engineering tactics., Include IoT devices in patch management strategies.Conduct regular risk assessments to detect threats early., Maintain an inventory of IoT devices and enforce authentication/encryption., Collaborate with industry peers to share threat intelligence., Perform vendor risk assessments to mitigate supply chain attacks., Train employees to recognize phishing and social engineering tactics., Include IoT devices in patch management strategies.Conduct regular risk assessments to detect threats early., Maintain an inventory of IoT devices and enforce authentication/encryption., Collaborate with industry peers to share threat intelligence., Perform vendor risk assessments to mitigate supply chain attacks., Train employees to recognize phishing and social engineering tactics., Include IoT devices in patch management strategies.Conduct regular risk assessments to detect threats early., Maintain an inventory of IoT devices and enforce authentication/encryption., Collaborate with industry peers to share threat intelligence., Perform vendor risk assessments to mitigate supply chain attacks., Train employees to recognize phishing and social engineering tactics., Include IoT devices in patch management strategies.Conduct regular risk assessments to detect threats early., Maintain an inventory of IoT devices and enforce authentication/encryption., Collaborate with industry peers to share threat intelligence., Perform vendor risk assessments to mitigate supply chain attacks., Train employees to recognize phishing and social engineering tactics., Include IoT devices in patch management strategies.

Recommendations: Ensuring regular updates and patches to software and systems., Implementing strong access controls and encrypting sensitive data., Educating employees about phishing risks and safe online practices., Maintaining frequent data backups to facilitate recovery in case of an attack.Ensuring regular updates and patches to software and systems., Implementing strong access controls and encrypting sensitive data., Educating employees about phishing risks and safe online practices., Maintaining frequent data backups to facilitate recovery in case of an attack.Ensuring regular updates and patches to software and systems., Implementing strong access controls and encrypting sensitive data., Educating employees about phishing risks and safe online practices., Maintaining frequent data backups to facilitate recovery in case of an attack.Ensuring regular updates and patches to software and systems., Implementing strong access controls and encrypting sensitive data., Educating employees about phishing risks and safe online practices., Maintaining frequent data backups to facilitate recovery in case of an attack.
Key Lessons Learned: The key lessons learned from past incidents are Phishing remains the most common and effective attack vector in healthcare.,Third-party ecosystem breaches are a significant risk (87% of companies affected).,IoT devices are a critical vulnerability in pharmaceutical environments.,Supply chain attacks can bypass internal security measures.,Regulatory non-compliance leads to severe financial and operational consequences.The incident highlights the critical need for vigilant cybersecurity practices and the vulnerability of well-established organizations to sophisticated attacks.

Source: BleepingComputer

Source: U.S. Securities and Exchange Commission (SEC) Filing

Source: IBM Cost of a Data Breach Report 2025

Source: World Health Organization (WHO) statement by Flavio Aggio, CISO

Source: Madaket Health (Eric Demers, CEO)

Source: Cencora data breach settlement announcement
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: BleepingComputerUrl: https://www.bleepingcomputer.com, and Source: U.S. Securities and Exchange Commission (SEC) Filing, and Source: IBM Cost of a Data Breach Report 2025, and Source: World Health Organization (WHO) statement by Flavio Aggio, CISO, and Source: Madaket Health (Eric Demers, CEO), and Source: Cencora data breach settlement announcement.

Investigation Status: Ongoing (with external security experts)

Investigation Status: Ongoing
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Sec Filing, Media Statements (Via Bleepingcomputer) and Affected individuals are being notified.

Stakeholder Advisories: Sec Filing, Media Communication.

Customer Advisories: Affected individuals are being notified
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Sec Filing, Media Communication and Affected individuals are being notified.

High Value Targets: Databases, Internal Applications,
Data Sold on Dark Web: Databases, Internal Applications,

Entry Point: Phishing emails (most common)
High Value Targets: Clinical Trial Data, Patient Records, Proprietary Drug Formulas, It/Ot Systems,
Data Sold on Dark Web: Clinical Trial Data, Patient Records, Proprietary Drug Formulas, It/Ot Systems,

Root Causes: Human Error (Falling For Phishing Attacks), Unpatched Iot And Medical Devices, Weak Third-Party Security Controls, Insufficient Employee Training,
Corrective Actions: Enhanced Phishing Awareness Training, Iot Device Security Hardening, Third-Party Vendor Risk Management, Regular Risk Assessments And Patch Management,

Corrective Actions: Reinforcing security infrastructure to avoid similar incidents in the future
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as External Security Experts, , Cybersecurity experts.
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Enhanced Phishing Awareness Training, Iot Device Security Hardening, Third-Party Vendor Risk Management, Regular Risk Assessments And Patch Management, , Reinforcing security infrastructure to avoid similar incidents in the future.
Last Attacking Group: The attacking group in the last incident was an Qilin Ransomware Gang.
Most Recent Incident Detected: The most recent incident detected was on 2025-08-08.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-08-08.
Highest Financial Loss: The highest financial loss from an incident was $4.61 million (average cost per breach, IBM 2025); $40 million (Cencora settlement).
Most Significant Data Compromised: The most significant data compromised in an incident were 162,000 files (176GB), Data samples published on leak site, , Clinical trial data, Patient records (prescriptions, treatments), Proprietary drug formulas, 170 GB of sensitive data (Inotiv), , Sensitive personal information of 9,542 individuals, including names, addresses, Social Security numbers and financial and medical records.
Most Significant System Affected: The most significant system affected in an incident were DatabasesInternal applicationsNetworks and Network encryption (Inotiv, AEP)IT systems (AEP, Cencora)Production systems (potential drug quality compromise)IoT devices (lab sensors, medical devices).
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was external security experts, , Cybersecurity experts.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Isolation of affected systemsMigration to offline alternatives.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were 170 GB of sensitive data (Inotiv), Sensitive personal information of 9,542 individuals, including names, addresses, Social Security numbers, financial and medical records, Patient records (prescriptions, treatments), 162,000 files (176GB), Clinical trial data, Data samples published on leak site and Proprietary drug formulas.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 171.5K.
Highest Fine Imposed: The highest fine imposed for a regulatory violation was $40 million (Cencora settlement).
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Class-action litigation (Cencora).
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Regulatory non-compliance leads to severe financial and operational consequences., The incident highlights the critical need for vigilant cybersecurity practices and the vulnerability of well-established organizations to sophisticated attacks.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Include IoT devices in patch management strategies., Perform vendor risk assessments to mitigate supply chain attacks., Ensuring regular updates and patches to software and systems., Collaborate with industry peers to share threat intelligence., Implementing strong access controls and encrypting sensitive data., Educating employees about phishing risks and safe online practices., Maintaining frequent data backups to facilitate recovery in case of an attack., Maintain an inventory of IoT devices and enforce authentication/encryption., Conduct regular risk assessments to detect threats early. and Train employees to recognize phishing and social engineering tactics..
Most Recent Source: The most recent source of information about an incident are Madaket Health (Eric Demers, CEO), IBM Cost of a Data Breach Report 2025, World Health Organization (WHO) statement by Flavio Aggio, CISO, U.S. Securities and Exchange Commission (SEC) Filing, Cencora data breach settlement announcement and BleepingComputer.
Most Recent URL for Additional Resources: The most recent URL for additional resources on cybersecurity best practices is https://www.bleepingcomputer.com .
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (with external security experts).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was SEC filing, Media communication, .
Most Recent Customer Advisory: The most recent customer advisory issued was an Affected individuals are being notified.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Phishing emails (most common).
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Human error (falling for phishing attacks)Unpatched IoT and medical devicesWeak third-party security controlsInsufficient employee training.
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Enhanced phishing awareness trainingIoT device security hardeningThird-party vendor risk managementRegular risk assessments and patch management, Reinforcing security infrastructure to avoid similar incidents in the future.
.png)
Tuleap is a free and open source suite for management of software development and collaboration. Versions of Tuleap Community Edition prior to 17.0.99.1763126988 and Tuleap Enterprise Edition prior to 17.0-3 and 16.13-8 have missing CSRF protections which allow attackers to create or remove tracker triggers. This issue is fixed in Tuleap Community Edition version 17.0.99.1763126988 and Tuleap Enterprise Edition versions 17.0-3 and 16.13-8.
Tuleap is a free and open source suite for management of software development and collaboration. Tuleap Community Editon versions prior to 17.0.99.1762456922 and Tuleap Enterprise Edition versions prior to 17.0-2, 16.13-7 and 16.12-10 are vulnerable to CSRF attacks through planning management API. Attackers have access to create, edit or remove plans. This issue is fixed in Tuleap Community Edition version 17.0.99.1762456922 and Tuleap Enterprise Edtion versions 17.0-2, 16.13-7 and 16.12-10.
Tuleap is an Open Source Suite for management of software development and collaboration. Tuleap Community Edition versions below 17.0.99.1762444754 and Tuleap Enterprise Edition versions prior to 17.0-2, 16.13-7 and 16.12-10 allow attackers trick victims into changing tracker general settings. This issue is fixed in version Tuleap Community Edition version 17.0.99.1762444754 and Tuleap Enterprise Edition versions 17.0-2, 16.13-7 and 16.12-10.
Tuleap is an Open Source Suite for management of software development and collaboration. Versions below 17.0.99.1762431347 of Tuleap Community Edition and Tuleap Enterprise Edition below 17.0-2, 16.13-7 and 16.12-10 allow attackers to access file release system information in projects they do not have access to. This issue is fixed in version 17.0.99.1762431347 of the Tuleap Community Edition and versions 17.0-2, 16.13-7 and 16.12-10 of Tuleap Enterprise Edition.
IBM watsonx.data 2.2 through 2.2.1 could allow an authenticated user to cause a denial of service through ingestion pods due to improper allocation of resources without limits.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.