Company Details
larimer-county
1,668
11,711
92
larimer.org
0
LAR_1157166
In-progress

Larimer County Company CyberSecurity Posture
larimer.orgLarimer County government serves all residents and businesses through stewardship of numerous community resources, infrastructure improvement and maintenance, planning services, transparent public records, human and economic health initiatives and broad community-wide public safety services. The County has a rich agricultural and western heritage that is reflected in our commitment to a high quality of life and preservation of our natural areas. Larimer County is located in north central Colorado. It is the seventh largest county in Colorado based on population. The county extends to the Continental Divide and includes several mountain communities and Rocky Mountain National Park. The County encompasses 2,640 square miles that include some of the finest irrigated farmland in the state, as well as vast stretches of scenic ranch lands, forests and high mountain peaks. Over 50% of Larimer County is publicly owned, most of which is land within Roosevelt National Forest and Rocky Mountain National Park. In addition to these federal lands, Colorado State Parks and Recreation Area, Larimer County Parks and local parks within urban areas combine to provide a wide spectrum of recreational opportunities that are enjoyed by both residents and visitors.
Company Details
larimer-county
1,668
11,711
92
larimer.org
0
LAR_1157166
In-progress
Between 700 and 749

Larimer County Global Score (TPRM)XXXX

Description: **Weld County’s Emergency Alert System Restored After Cyber Attack Disrupts CodeRED** Weld County, Colorado, has restored its emergency notification system following a cyber attack that disabled its previous platform, CodeRED. The incident, detected on **November 10**, prompted the county’s Public Safety Communications Department to rely on a backup agreement with the **Larimer Emergency Telephone Authority** for critical alerts. CodeRED’s parent company, **GardaWorld**, confirmed the attack was contained to its platform and did not affect other systems. Subscribers were automatically transferred to a new system, with those registered as of **March** already migrated. GardaWorld advised users to update passwords for any accounts sharing the same credentials. While the new system has undergone a **security audit**, Weld County continues to evaluate long-term solutions for emergency alerts. For now, the **Integrated Public Alert and Warning System (IPAWS)**—which sends notifications to all cellphones in targeted areas—will be managed through Larimer’s authority. Residents can still register for alerts via **accountportal.onsolve.net/weldcountyco**. The incident highlights vulnerabilities in critical public safety infrastructure and the importance of redundant notification systems.


Larimer County has 17.65% more incidents than the average of same-industry companies with at least one recorded incident.
Larimer County has 28.21% more incidents than the average of all companies with at least one recorded incident.
Larimer County reported 1 incidents this year: 1 cyber attacks, 0 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
Larimer County cyber incidents detection timeline including parent company and subsidiaries

Larimer County government serves all residents and businesses through stewardship of numerous community resources, infrastructure improvement and maintenance, planning services, transparent public records, human and economic health initiatives and broad community-wide public safety services. The County has a rich agricultural and western heritage that is reflected in our commitment to a high quality of life and preservation of our natural areas. Larimer County is located in north central Colorado. It is the seventh largest county in Colorado based on population. The county extends to the Continental Divide and includes several mountain communities and Rocky Mountain National Park. The County encompasses 2,640 square miles that include some of the finest irrigated farmland in the state, as well as vast stretches of scenic ranch lands, forests and high mountain peaks. Over 50% of Larimer County is publicly owned, most of which is land within Roosevelt National Forest and Rocky Mountain National Park. In addition to these federal lands, Colorado State Parks and Recreation Area, Larimer County Parks and local parks within urban areas combine to provide a wide spectrum of recreational opportunities that are enjoyed by both residents and visitors.


The Food and Drug Administration is an agency within the Department of Health and Human Services. The FDA is responsible for protecting the public health by ensuring the safety, efficacy, and security of human and veterinary drugs, biological products, and medical devices; and by ensuring the safet

Travailler dans la fonction publique du Québec, c'est plus qu'une carrière! Réparti(e)s dans une vingtaine de ministères et une soixantaine d'organismes à travers le Québec, tous les gestes posés par les employé(e)s de la fonction publique façonnent l’avenir de la société et contribuent à améliorer

Page officielle du ministère de l'Éducation nationale. Retrouvez toute l'information sur www.education.gouv.fr, twitter.com/education_gouv, facebook.com/education.gouv et dans nos lettres d'informations (bulletin hebdo et lettre education.gouv.fr). --------------------------------------------------

MISIÓN/PROPÓSITO: La SEP tiene como propósito esencial crear condiciones que permitan asegurar el acceso de todas las mexicanas y mexicanos a una educación de calidad, en el nivel y modalidad que la requieran y en el lugar donde la demanden. VISIÓN: En el año 2025, México cuenta con un sistema

With a workforce of 30,000 people, and opportunities in 1,000 different job categories, the City of Philadelphia is one of the largest employers in Southeastern Pennsylvania. As an employer, we operate through the guiding principles of service, integrity, respect, accountability, collaboration, dive

Københavns Kommune er Danmarks største arbejdsplads med ca. 45.000 medarbejdere. Vi udvikler hovedstaden og servicerer over 500.000 københavnere. Vores mål er at fastholde og udvikle København som en af verdens bedste byer at bo i – og skabe øget vækst gennem viden, innovation og beskæftigelse. Fi

Il ministero dell'Interno è una struttura complessa il cui assetto organizzativo è disciplinato dal D.L.vo n. 300/99 e dai provvedimenti attuativi. A livello centrale, si articola in uffici di diretta collaborazione con il ministro (D.P.R. n. 98/2002) e cinque dipartimenti (D.P.R. n. 398/2001 e succ

The Commission represents and upholds the interests of the EU as a whole, and is independent of national governments. The European Commission prepares legislation for adoption by the Council (representing the member countries) and the Parliament (representing the citizens). It administers the budge

El Consejo Nacional de Investigaciones Científicas y Técnicas (CONICET) es el principal organismo dedicado a la promoción de la ciencia y la tecnología en la Argentina. Su actividad se desarrolla en cuatro grandes áreas: • Ciencias agrarias, ingeniería y de materiales • Ciencias biológicas y de la s
.png)
Shane Atkinson, Larimer County's legislative affairs coordinator, hopes to become District 1's next commissioner.
Fort Collins attorney Dan Sapienza has announced he is running for the Larimer County commissioner District 1 seat currently held by John...
Learn about Larimer County Veterans and Operation Green Light, an initiative recognizing their service from November 4–11, 2025.
Discover the details behind the Larimer County Justice Center bomb incident, including the suspicious device that led to evacuations.
We asked Larimer County Clerk and Recorder Tina Harris what to expect for the timing of election results in 2025. Here's what she said.
Larimer County released its final round of unofficial results Nov. 13. More than 134,000 ballots were cast in the county this election,...
Find out how the Larimer County tax lien sale supports local services and addresses unpaid property taxes each year.
Conservation easement preserves working lands, wildlife habitat, and Northern Colorado's rural heritage. LOVELAND, Colo. — Larimer County...
Interested in inspiring curiosity for the natural world in children and adults? Larimer County Natural Resources is seeking volunteer educators to help...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Larimer County is http://www.larimer.org.
According to Rankiteo, Larimer County’s AI-generated cybersecurity score is 740, reflecting their Moderate security posture.
According to Rankiteo, Larimer County currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Larimer County is not certified under SOC 2 Type 1.
According to Rankiteo, Larimer County does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Larimer County is not listed as GDPR compliant.
According to Rankiteo, Larimer County does not currently maintain PCI DSS compliance.
According to Rankiteo, Larimer County is not compliant with HIPAA regulations.
According to Rankiteo,Larimer County is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Larimer County operates primarily in the Government Administration industry.
Larimer County employs approximately 1,668 people worldwide.
Larimer County presently has no subsidiaries across any sectors.
Larimer County’s official LinkedIn profile has approximately 11,711 followers.
Larimer County is classified under the NAICS code 92, which corresponds to Public Administration.
Yes, Larimer County has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/larimer-county.
Yes, Larimer County maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/larimer-county.
As of December 20, 2025, Rankiteo reports that Larimer County has experienced 1 cybersecurity incidents.
Larimer County has an estimated 11,757 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with codered platform taken offline; attack contained to the platform, and remediation measures with subscribers migrated to a new system; comprehensive security audit conducted on the new system, and recovery measures with backup system (larimer emergency telephone authority) used for emergency notifications; new system implemented, and communication strategy with county news release; statement from gardaworld; advisory to change passwords..
Title: Cyber Attack on CodeRED Emergency Notification System
Description: Weld County’s emergency notification system (CodeRED) went offline due to a cyber attack. The system was transferred to a new platform after the incident, and subscribers were migrated. The attack was contained to the CodeRED platform, and affected users were advised to change passwords for other accounts using the same credentials.
Date Detected: 2023-11-11
Type: Cyber Attack
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Systems Affected: CodeRED emergency notification system
Downtime: Since 2023-11-10
Operational Impact: Emergency notifications were disrupted; backup system (Larimer Emergency Telephone Authority) was used
Identity Theft Risk: Users advised to change passwords due to potential credential reuse

Entity Name: Weld County Public Safety Communications Department
Entity Type: Government
Industry: Public Safety/Emergency Services
Location: Weld County, Colorado, USA
Customers Affected: Subscribers to CodeRED emergency notification system

Entity Name: Crisis24 (CodeRED)
Entity Type: Private Company
Industry: Emergency Notification Services
Customers Affected: Subscribers as of March 2023

Entity Name: GardaWorld
Entity Type: Private Company
Industry: Security Services

Containment Measures: CodeRED platform taken offline; attack contained to the platform
Remediation Measures: Subscribers migrated to a new system; comprehensive security audit conducted on the new system
Recovery Measures: Backup system (Larimer Emergency Telephone Authority) used for emergency notifications; new system implemented
Communication Strategy: County news release; statement from GardaWorld; advisory to change passwords

Personally Identifiable Information: Potential credential exposure due to password reuse advisory
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Subscribers migrated to a new system; comprehensive security audit conducted on the new system.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by codered platform taken offline; attack contained to the platform.
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Backup system (Larimer Emergency Telephone Authority) used for emergency notifications; new system implemented.

Recommendations: Users advised to change passwords for other accounts where the same credentials were used
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Users advised to change passwords for other accounts where the same credentials were used.

Source: GardaWorld Statement

Source: Weld County News Release
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: GardaWorld Statement, and Source: Weld County News Release.
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through County news release; statement from GardaWorld; advisory to change passwords.

Stakeholder Advisories: Advisory to change passwords due to potential credential exposure
Customer Advisories: Residents encouraged to register for the new emergency alert system at accountportal.onsolve.net/weldcountyco
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Advisory to change passwords due to potential credential exposure and Residents encouraged to register for the new emergency alert system at accountportal.onsolve.net/weldcountyco.

Corrective Actions: Comprehensive security audit of the new system; backup notification system used during downtime
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Comprehensive security audit of the new system; backup notification system used during downtime.
Most Recent Incident Detected: The most recent incident detected was on 2023-11-11.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was CodeRED platform taken offline; attack contained to the platform.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Users advised to change passwords for other accounts where the same credentials were used.
Most Recent Source: The most recent source of information about an incident are Weld County News Release and GardaWorld Statement.
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Advisory to change passwords due to potential credential exposure, .
Most Recent Customer Advisory: The most recent customer advisory issued was an Residents encouraged to register for the new emergency alert system at accountportal.onsolve.net/weldcountyco.
.png)
n8n is an open source workflow automation platform. Versions starting with 0.211.0 and prior to 1.120.4, 1.121.1, and 1.122.0 contain a critical Remote Code Execution (RCE) vulnerability in their workflow expression evaluation system. Under certain conditions, expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n process. Successful exploitation may lead to full compromise of the affected instance, including unauthorized access to sensitive data, modification of workflows, and execution of system-level operations. This issue has been fixed in versions 1.120.4, 1.121.1, and 1.122.0. Users are strongly advised to upgrade to a patched version, which introduces additional safeguards to restrict expression evaluation. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Limit workflow creation and editing permissions to fully trusted users only; and/or deploy n8n in a hardened environment with restricted operating system privileges and network access to reduce the impact of potential exploitation. These workarounds do not fully eliminate the risk and should only be used as short-term measures.
FastAPI Users allows users to quickly add a registration and authentication system to their FastAPI project. Prior to version 15.0.2, the OAuth login state tokens are completely stateless and carry no per-request entropy or any data that could link them to the session that initiated the OAuth flow. `generate_state_token()` is always called with an empty `state_data` dict, so the resulting JWT only contains the fixed audience claim plus an expiration timestamp. On callback, the library merely checks that the JWT verifies under `state_secret` and is unexpired; there is no attempt to match the state value to the browser that initiated the OAuth request, no correlation cookie, and no server-side cache. Any attacker can hit `/authorize`, capture the server-generated state, finish the upstream OAuth flow with their own provider account, and then trick a victim into loading `.../callback?code=<attacker_code>&state=<attacker_state>`. Because the state JWT is valid for any client for \~1 hour, the victim’s browser will complete the flow. This leads to login CSRF. Depending on the app’s logic, the login CSRF can lead to an account takeover of the victim account or to the victim user getting logged in to the attacker's account. Version 15.0.2 contains a patch for the issue.
FileZilla Client 3.63.1 contains a DLL hijacking vulnerability that allows attackers to execute malicious code by placing a crafted TextShaping.dll in the application directory. Attackers can generate a reverse shell payload using msfvenom and replace the missing DLL to achieve remote code execution when the application launches.
LDAP Tool Box Self Service Password 1.5.2 contains a password reset vulnerability that allows attackers to manipulate HTTP Host headers during token generation. Attackers can craft malicious password reset requests that generate tokens sent to a controlled server, enabling potential account takeover by intercepting and using stolen reset tokens.
Kimai 1.30.10 contains a SameSite cookie vulnerability that allows attackers to steal user session cookies through malicious exploitation. Attackers can trick victims into executing a crafted PHP script that captures and writes session cookie information to a file, enabling potential session hijacking.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.