Company Details
kansas-state-university
10,226
209,025
6113
k-state.edu
0
KAN_1353554
In-progress

Kansas State University Company CyberSecurity Posture
k-state.eduKansas State University, often referred to as K-State, is an institution of higher learning located in Manhattan, Kansas, in the United States. A branch campus, including the College of Technology and Aviation, is located in Salina, Kansas. A third campus, K-State Olathe, officially opened on April 26, 2011 and will be the academic research presence within the Kansas Bioscience Park. Kansas State has nearly 24,000 students from all 50 states and more than 100 countries. Social Media User Policy at https://www.k-state.edu/social.
Company Details
kansas-state-university
10,226
209,025
6113
k-state.edu
0
KAN_1353554
In-progress
Between 750 and 799

KSU Global Score (TPRM)XXXX



No incidents recorded for Kansas State University in 2025.
No incidents recorded for Kansas State University in 2025.
No incidents recorded for Kansas State University in 2025.
KSU cyber incidents detection timeline including parent company and subsidiaries

Kansas State University, often referred to as K-State, is an institution of higher learning located in Manhattan, Kansas, in the United States. A branch campus, including the College of Technology and Aviation, is located in Salina, Kansas. A third campus, K-State Olathe, officially opened on April 26, 2011 and will be the academic research presence within the Kansas Bioscience Park. Kansas State has nearly 24,000 students from all 50 states and more than 100 countries. Social Media User Policy at https://www.k-state.edu/social.


Recognized as one of the top 15 research universities worldwide, our culture of collaboration sparks discoveries that advance society and drive economic impact. Everything we do is dedicated to ensuring our students have the opportunity to become changemakers, equipped with the multidisciplinary too

UCLA offers a combination that’s rare, especially among public research universities. The breadth, depth and inspired excellence among academic programs—from the visual and performing arts to the humanities, social sciences, STEM disciplines and health sciences—add up to endless opportunity. The loc

Founded in 1927, the University of Houston is the leading public research university in the vibrant international city of Houston. Each year, we educate more than 47,000 students in more than 250 undergraduate and graduate academic programs, on campus and online. UH awards over 10,000 degrees annual

Founded in 1898, Northeastern is a global research university with a distinctive, experience-driven approach to education and discovery. The university is a leader in experiential learning, powered by the world’s most far-reaching cooperative education program. We integrate classroom study with opp

Monash University is Australia’s largest and most international university. Its extensive educational offering, delivered via our 10 faculties, includes undergraduate, postgraduate and research courses. Monash is a research-intensive university, known for some significant and lasting discoveries tha

Apollo Education Group, Inc. was founded in 1973 in response to a gradual shift in higher education demographics from a student population dominated by youth to one in which approximately half the students are adults and over 80 percent of whom work full-time. Apollo's founder, John Sperling, believ

The University of Connecticut (UConn), a Wall Street Journal top 10 public university, is home to more than 32,000 students, 1,500 faculty, 255,000 proud alumni, and a handsome husky named Jonathan. The University has fourteen schools and colleges: Agriculture and Natural Resources, Business, Denta

Northwestern is one of the nation’s premier research universities, combining innovative teaching and pioneering research in a highly collaborative, multidisciplinary, and diverse environment. Northwestern provides both students and faculty exceptional opportunities for intellectual, personal, and pr

The University of Alabama is a student-centered research university and an academic community committed to enhancing the quality of life for all through breakthrough research. Founded in 1831 as Alabama's first public college, The University of Alabama is dedicated to excellence in teaching, resea
.png)
The state has purchased a whole-of-state paid membership, records show, and all services are now available for agencies and organizations...
Angelo State University faculty members receive $740K grant to study 'skew zero forcing' for national cybersecurity applications.
A recent report by the Consortium for School Networking found that lawmakers in a handful of states have considered a total of 18 bills in...
Among the newest student organizations on campus, Kennesaw State University's Owl Cyber Team recently reached the semifinals in the CyberLLM...
More than 400 school district leaders from across the country signed onto a petition asking Congress and Donald Trump to reverse course on...
With its new electric vehicle battery plant now open in De Soto, University of Kansas Chancellor Douglas Girod hopes Panasonic's next Kansas...
Cybersecurity firm Knowmadics moves HQ from Virginia to Wichita, Kansas, citing talent pool and strategic partnerships in the emerging tech...
Every state university in Kansas is raising either tuition or fees, or both. Here's how much the increases are, and why the Regents...
Several groups and school districts this week said elimination of the Department of Education's Office of Educational Technology will weaken cybersecurity...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Kansas State University is http://www.k-state.edu.
According to Rankiteo, Kansas State University’s AI-generated cybersecurity score is 794, reflecting their Fair security posture.
According to Rankiteo, Kansas State University currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Kansas State University is not certified under SOC 2 Type 1.
According to Rankiteo, Kansas State University does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Kansas State University is not listed as GDPR compliant.
According to Rankiteo, Kansas State University does not currently maintain PCI DSS compliance.
According to Rankiteo, Kansas State University is not compliant with HIPAA regulations.
According to Rankiteo,Kansas State University is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Kansas State University operates primarily in the Higher Education industry.
Kansas State University employs approximately 10,226 people worldwide.
Kansas State University presently has no subsidiaries across any sectors.
Kansas State University’s official LinkedIn profile has approximately 209,025 followers.
Kansas State University is classified under the NAICS code 6113, which corresponds to Colleges, Universities, and Professional Schools.
No, Kansas State University does not have a profile on Crunchbase.
Yes, Kansas State University maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/kansas-state-university.
As of December 02, 2025, Rankiteo reports that Kansas State University has not experienced any cybersecurity incidents.
Kansas State University has an estimated 14,217 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Kansas State University has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
A weakness has been identified in codingWithElias School Management System up to f1ac334bfd89ae9067cc14dea12ec6ff3f078c01. Affected is an unknown function of the file /student-view.php of the component Edit Student Info Page. This manipulation of the argument First Name causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. Other parameters might be affected as well. The vendor was contacted early about this disclosure but did not respond in any way.
By providing a command-line argument starting with a semi-colon ; to an API endpoint created by the EnhancedCommandExecutor class of the HexStrike AI MCP server, the resultant composed command is executed directly in the context of the MCP server’s normal privilege; typically, this is root. There is no attempt to sanitize these arguments in the default configuration of this MCP server at the affected version (as of commit 2f3a5512 in September of 2025).
A weakness has been identified in winston-dsouza Ecommerce-Website up to 87734c043269baac0b4cfe9664784462138b1b2e. Affected by this issue is some unknown functionality of the file /includes/header_menu.php of the component GET Parameter Handler. Executing manipulation of the argument Error can lead to cross site scripting. The attack can be executed remotely. The exploit has been made available to the public and could be exploited. This product implements a rolling release for ongoing delivery, which means version information for affected or updated releases is unavailable. The vendor was contacted early about this disclosure but did not respond in any way.
A security flaw has been discovered in Qualitor 8.20/8.24. Affected by this vulnerability is the function eval of the file /html/st/stdeslocamento/request/getResumo.php. Performing manipulation of the argument passageiros results in code injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was identified in Scada-LTS up to 2.7.8.1. Affected is the function Common.getHomeDir of the file br/org/scadabr/vo/exporter/ZIPProjectManager.java of the component Project Import. Such manipulation leads to path traversal. The attack may be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.