Company Details
koha.life
6
239
561499
kohafundraising.com
0
KOH_1523093
In-progress

KOHA Company CyberSecurity Posture
kohafundraising.comKOHA was founded with the vision of strengthening communities by supporting local business. Our team witnessed first-hand that genuine partnership between local businesses and the people they serve is critical for communities to thrive and support small businesses sustainability. This led to our development a model that facilitates true reciprocity between businesses and their customers – a way to drive revenue for local businesses, while rewarding loyal customers and supporting community initiatives. KOHA is an app that helps support small businesses while giving back to local schools and nonprofit organizations. It promotes small businesses to school and nonprofit audiences and increases foot traffic and sales. In turn, small business owners give back a small percentage of every transaction completed through KOHA that goes back to the school or nonprofit that the customer chooses. No extra work for the owner, everything is automated on the app: snap a pic of your receipt and a donation is made to the organization the user chooses.
Company Details
koha.life
6
239
561499
kohafundraising.com
0
KOH_1523093
In-progress
Between 750 and 799

KOHA Global Score (TPRM)XXXX



No incidents recorded for KOHA in 2025.
No incidents recorded for KOHA in 2025.
No incidents recorded for KOHA in 2025.
KOHA cyber incidents detection timeline including parent company and subsidiaries

KOHA was founded with the vision of strengthening communities by supporting local business. Our team witnessed first-hand that genuine partnership between local businesses and the people they serve is critical for communities to thrive and support small businesses sustainability. This led to our development a model that facilitates true reciprocity between businesses and their customers – a way to drive revenue for local businesses, while rewarding loyal customers and supporting community initiatives. KOHA is an app that helps support small businesses while giving back to local schools and nonprofit organizations. It promotes small businesses to school and nonprofit audiences and increases foot traffic and sales. In turn, small business owners give back a small percentage of every transaction completed through KOHA that goes back to the school or nonprofit that the customer chooses. No extra work for the owner, everything is automated on the app: snap a pic of your receipt and a donation is made to the organization the user chooses.


Donately is a cause leader’s best friend. We love our customers because they are dedicated risk-takers, change makers, and problem-solvers. After building hundreds of websites, we understand that simplicity is the key to how causes tell their stories that people rally around. We saw that our client

The Carmel High School Foundation is committed to supporting academic excellence and the educational pursuits of its student through grants, fundraising, and public campaigns. The Foundation raises its money through the generous support of the community and works to build strong, sustainable relatio

The Hermitage Museum Foundation (USA) contributes to the preservation and promotion of the rich cultural heritage of the Hermitage Museum in St. Petersburg, Russia, its more than three million objects and the Museum’s historic buildings. The HMF raises funds for restoration and conservation projects

Produzioni dal Basso è una delle prime piattaforme di crowdfunding nate in Europa, è una piattaforma storica ed è una della più grandi comunità italiane di autoproduzione on line. È una piattaforma reward/donation-based cioè predisposta sia per progetti che prevedano donazioni in cambio di ricomp

The zoo provides comprehensive care for the animals. Donations from individuals and organizations elevate that care – giving the zoo’s veterinarians, keepers and wildlife experts the resources they need where they’re needed most. Every animal you’ll see at the zoo, and many of their wild counterpart

The Foundationâs short-term goal is to raise funds to help offset the cost of building a new McAuliffe Branch Library. Its long-term goal is to create an endowment fund that will supplement, but not replace, funds received from the Town of Framingham. As the Foundation is a 501(c)(3) organization,
.png)
IPKO Telecommunications, in collaboration with Telekom Slovenije, successfully organized the Third Cybersecurity Conference,...
IPKO Telecommunications has signed a cooperation agreement with the international cybersecurity company Whalebone, bringing for the first...
A new specialized cybersecurity unit has been formed within the Ministry of Internal Affairs. It will be responsible for the protection and.
The Minister of Digital Transformation, Stefan Andonovski, and the CEO of Telecom Macedonia, Goran Markovic, signed the Memorandum of...
This series tackles critical topics of cybersecurity and the impact of technology on our daily lives, bringing true stories, tangible risks, and practical...
Cybersecurity experts have said that these attacks originated in Serbia and Russia and that the goal was to block access to websites by overloading them with...
The public enterprise Kosovo Railways "Trainkos" announced on Thursday that its official website is facing successive external cyber attacks.
Driart Elshani, a cybersecurity expert, said that there is a need for the defense sector in Kosovo to increase its capacities in terms of cybersecurity.
This is a major risk to the security of systems and users at the national level. This situation requires urgent measures to prevent the spread...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of KOHA is https://www.kohafundraising.com.
According to Rankiteo, KOHA’s AI-generated cybersecurity score is 757, reflecting their Fair security posture.
According to Rankiteo, KOHA currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, KOHA is not certified under SOC 2 Type 1.
According to Rankiteo, KOHA does not hold a SOC 2 Type 2 certification.
According to Rankiteo, KOHA is not listed as GDPR compliant.
According to Rankiteo, KOHA does not currently maintain PCI DSS compliance.
According to Rankiteo, KOHA is not compliant with HIPAA regulations.
According to Rankiteo,KOHA is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
KOHA operates primarily in the Fundraising industry.
KOHA employs approximately 6 people worldwide.
KOHA presently has no subsidiaries across any sectors.
KOHA’s official LinkedIn profile has approximately 239 followers.
KOHA is classified under the NAICS code 561499, which corresponds to All Other Business Support Services.
No, KOHA does not have a profile on Crunchbase.
Yes, KOHA maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/koha.life.
As of December 21, 2025, Rankiteo reports that KOHA has not experienced any cybersecurity incidents.
KOHA has an estimated 1,146 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, KOHA has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Versa SASE Client for Windows versions released between 7.8.7 and 7.9.4 contain a local privilege escalation vulnerability in the audit log export functionality. The client communicates user-controlled file paths to a privileged service, which performs file system operations without impersonating the requesting user. Due to improper privilege handling and a time-of-check time-of-use race condition combined with symbolic link and mount point manipulation, a local authenticated attacker can coerce the service into deleting arbitrary directories with SYSTEM privileges. This can be exploited to delete protected system folders such as C:\\Config.msi and subsequently achieve execution as NT AUTHORITY\\SYSTEM via MSI rollback techniques.
The WP JobHunt plugin for WordPress, used by the JobCareer theme, is vulnerable to unauthorized modification of data due to a missing capability check on the 'cs_update_application_status_callback' function in all versions up to, and including, 7.7. This makes it possible for authenticated attackers, with Candidate-level access and above, to inject cross-site scripting into the 'status' parameter of applied jobs for any user.
The WP JobHunt plugin for WordPress, used by the JobCareer theme, is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 7.7 via the 'cs_update_application_status_callback' due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Candidate-level access and above, to send a site-generated email with injected HTML to any user.
The FiboSearch – Ajax Search for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `thegem_te_search` shortcode in all versions up to, and including, 1.32.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This vulnerability requires TheGem theme (premium) to be installed with Header Builder mode enabled, and the FiboSearch "Replace search bars" option enabled for TheGem integration.
The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.11.0 via the ajax_get_members function. This is due to the use of a predictable low-entropy token (5 hex characters derived from md5 of post ID) to identify member directories and insufficient authorization checks on the unauthenticated AJAX endpoint. This makes it possible for unauthenticated attackers to extract sensitive data including usernames, display names, user roles (including administrator accounts), profile URLs, and user IDs by enumerating predictable directory_id values or brute-forcing the small 16^5 token space.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.