Company Details
maks-geestelijke-gezondheidszorg
139
2,290
62133
buromaks.nl
0
MAK_6467150
In-progress


MAKS Company CyberSecurity Posture
buromaks.nlMAKS is er voor kinderen, jongeren en volwassenen met psychosociale en/of psychiatrische problemen. En voor de mensen in hun nabijheid. Wij bieden specialistische begeleiding en behandeling in Noord-Brabant en Rivierenland. Wij ondersteunen je bij het omgaan met de problemen die je ervaart. Zodat je zoveel mogelijk zelf je leven kan vormgeven en mee kan doen in de samenleving. We komen bij je thuis of ergens waar jij je thuis voelt. Wij geloven dat je in je eigen omgeving de beste resultaten bereikt. Wij combineren onze specialistische kennis met menselijkheid, nabijheid en lef. Zo kom jij verder.
Company Details
maks-geestelijke-gezondheidszorg
139
2,290
62133
buromaks.nl
0
MAK_6467150
In-progress
Between 750 and 799

MAKS Global Score (TPRM)XXXX



No incidents recorded for MAKS in 2026.
No incidents recorded for MAKS in 2026.
No incidents recorded for MAKS in 2026.
MAKS cyber incidents detection timeline including parent company and subsidiaries

MAKS is er voor kinderen, jongeren en volwassenen met psychosociale en/of psychiatrische problemen. En voor de mensen in hun nabijheid. Wij bieden specialistische begeleiding en behandeling in Noord-Brabant en Rivierenland. Wij ondersteunen je bij het omgaan met de problemen die je ervaart. Zodat je zoveel mogelijk zelf je leven kan vormgeven en mee kan doen in de samenleving. We komen bij je thuis of ergens waar jij je thuis voelt. Wij geloven dat je in je eigen omgeving de beste resultaten bereikt. Wij combineren onze specialistische kennis met menselijkheid, nabijheid en lef. Zo kom jij verder.

Established and incorporated in 1966, Crittenton Services is a nonprofit organization that seeks a world where every person is connected to safe and healthy relationships. Crittenton offers behavioral health care, safe shelter, and individualized support to help people in need heal from trauma an

Pure Psychiatry of Michigan is a family-owned practice striving to improve the standard of care for mental health; including access to care. Pure Psychiatry strives to break the stigma associated with mental health care and has established a "judgment-free" environment with a focus on providing psyc

Beginning your substance abuse rehabilitation at Resurgence Tampa Bay is easy and so very important for long-term success. Our experts are professionals who have travelled through their own journey of recovery, allowing them to have an intimate knowledge of the lonely road of active addiction. Our e

DiscoveryMD is opening avenues of access to people with chronic depression previously resistant to conventional treatment methods and to those with chronic substance use unwilling or unable to take part in traditional programs. With virtual and in-person programs from expert psychiatrists – includin

Located in Central Florida, La Amistad Behavioral Health Services offers Residential Treatment, Partial Hospitalization Programs (PHP) and Intensive Outpatient Programs (IOP) for adolescents and adults. Through evidence-based treatment, patients will find a place of healing and support for mental il

Welcome to Healthwise, a Behavioral Health Clinic located in Maple Grove, Minnesota. As a team of experienced licensed psychologists, therapists and psychiatrists, we offer a wide range of specialties and approaches to care for individuals of all ages. We believe that true emotional, physical, and

Cornerstone Montgomery empowers people living with mental health and co-occurring substance use disorders to live, work, and integrate successfully within the community. : Cornerstone Montgomery envisions that each person we serve will have a meaningful life of their choosing. • We care for a

Sequoia Mental Health Services, Inc. (SMHS) is dedicated to providing assistance to people with psychiatric, emotional and developmental impairments. The support provided is aimed at maximizing self-sufficiency and productivity and offered with compassion, integrity and a profound respect for each i

Mindjurny is an evidence-based emotional wellbeing support tool for schools, safe and easy to use. Features include, essential resources and recorded video workshops tailored for young people and parents/carers, providing valuable guidance and support. Mindjurny can help to increase awareness and
.png)
Making Science Group sells its Cloud and Cybersecurity business unit in Spain to Lutech S.p.A to focus on digital marketing, adtech, and AI.
Russia mandates state-controlled messaging app Max for officials by September 2025, increasing digital surveillance and replacing foreign...
For Minecraft Gamers: MaxCoffe masquerading as a Minecraft performance enhancer! MaksStealer is an information-stealing trojan targeting...
MICHAEL A. ECHOLS CEO, Max Cybersecurity LLC Creator of AiM FRAME™ OT AI Maturity Framework Former DHS Critical Infrastructure Leader.
The increasing integration of cars with advanced technologies such as artificial intelligence (AI) means fully autonomous vehicles (AVs)...
Dawid Moczadło has interviewed purported job seekers only to discover that these "software developers" were scammers using AI-based tools.
The YouTube video shows that the iPhone 17 Pro Max will look nothing like its predecessors, according to the rumors that this mock-up is based on.
Max Žagar's journey from an International Business graduate at RIT Croatia to co-founding CoreX, a rapidly growing business process outsourcing (BPO) company.
ISACA announces 2024 slate of virtual and in-person learning, focused on emerging technologies at the enterprise level.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of MAKS is http://www.buromaks.nl.
According to Rankiteo, MAKS’s AI-generated cybersecurity score is 755, reflecting their Fair security posture.
According to Rankiteo, MAKS currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, MAKS has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, MAKS is not certified under SOC 2 Type 1.
According to Rankiteo, MAKS does not hold a SOC 2 Type 2 certification.
According to Rankiteo, MAKS is not listed as GDPR compliant.
According to Rankiteo, MAKS does not currently maintain PCI DSS compliance.
According to Rankiteo, MAKS is not compliant with HIPAA regulations.
According to Rankiteo,MAKS is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
MAKS operates primarily in the Mental Health Care industry.
MAKS employs approximately 139 people worldwide.
MAKS presently has no subsidiaries across any sectors.
MAKS’s official LinkedIn profile has approximately 2,290 followers.
MAKS is classified under the NAICS code 62133, which corresponds to Offices of Mental Health Practitioners (except Physicians).
No, MAKS does not have a profile on Crunchbase.
Yes, MAKS maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/maks-geestelijke-gezondheidszorg.
As of January 22, 2026, Rankiteo reports that MAKS has not experienced any cybersecurity incidents.
MAKS has an estimated 5,280 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, MAKS has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g., execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.