Company Details
maryland-department-of-labor
573
17,506
92
maryland.gov
0
MAR_6213997
In-progress

Maryland Department of Labor Company CyberSecurity Posture
maryland.govThe Maryland Department of Labor strives to create an equitable and inclusive Maryland where all residents have the opportunities and resources to attain financial stability, reach their career potential, and contribute to their communities; where businesses have access to capital and the skilled workforce they need to succeed; where workplaces are safe and well-regulated; and where the economy is resilient and growing. See our social media guidelines at https://labor.maryland.gov/aboutdllr/social-media-guidelines.shtml.
Company Details
maryland-department-of-labor
573
17,506
92
maryland.gov
0
MAR_6213997
In-progress
Between 750 and 799

MDL Global Score (TPRM)XXXX

Description: The names and Social Security numbers of 78,000 Marylanders were accessed by hackers who breached Maryland Department of Labor databases and the breach happened in April and involved data files from 2009, 2010, 2013 and 2014. State investigators have found no evidence that the personal information was downloaded. The files breached were stored on the Literacy Works Information System and an old unemployment insurance service database. Working with the Department of Labor, Maryland DoIT also notified law enforcement and retained an independent expert to investigate how the information was accessed. They worked with the Department of Labor to minimize the impact of this breach, and to prevent future misuse of state systems.


No incidents recorded for Maryland Department of Labor in 2025.
No incidents recorded for Maryland Department of Labor in 2025.
No incidents recorded for Maryland Department of Labor in 2025.
MDL cyber incidents detection timeline including parent company and subsidiaries

The Maryland Department of Labor strives to create an equitable and inclusive Maryland where all residents have the opportunities and resources to attain financial stability, reach their career potential, and contribute to their communities; where businesses have access to capital and the skilled workforce they need to succeed; where workplaces are safe and well-regulated; and where the economy is resilient and growing. See our social media guidelines at https://labor.maryland.gov/aboutdllr/social-media-guidelines.shtml.


Si necesitas información general y especializada sobre los servicios públicos madrileños puedes llamar al teléfono de Atención al Ciudadano 012. En la Comunidad de Madrid estamos encantados de recibir comentarios y favorecer el diálogo, por eso te proponemos unas normas básicas de participación:

Il Ministero dell'Agricoltura, della Sovranità alimentare e delle Foreste (Masaf) si occupa dell'elaborazione e del coordinamento delle linee politiche agricole, agroalimentari, forestali, della pesca e dell’ippica a livello nazionale e internazionale. Rappresenta l'Italia in sede europea nelle cont

De organisatie bestaat uit diverse onderdelen, waaronder de Belastingdienst, Douane, Toeslagen, FIOD en enkele facilitaire organisaties. Met ruim 30.000 medewerkers werken we in kantoren die verspreid zijn over het hele land. Gezamenlijk heffen, innen en controleren we belastingen. Daarnaast zorgen

Nav er en viktig del av sikkerhetsnettet i velferdsstaten. Vi skal bidra til at flere kommer i arbeid og færre går på stønad, og samtidig sørge for at de som trenger det er sikra inntekt og økonomisk trygghet gjennom rett pengestøtte til rett tid. For å løse dette samfunnsoppdraget forvalter Nav om

Bij UWV werken we aan een samenleving waarin iedereen mee kan doen. We helpen mensen op weg bij het vinden of behouden van werk. In geval van ziekte kijken we wat iemand nog wél kan. En als werken niet mogelijk is, zorgt UWV snel voor inkomen. We geven op deskundige en efficiënte wijze uitvoering a

MINISTRY of ENVIRONMENT and URBANISM (MEU) MAIN SERVICE UNITS ================== 1) General Directorate of Construction Works 2) General Directorate of Spatial Planning 3) General Directorate of Environmental Management 4) General Directorate of EIA, Permits and Control 5) General Directo

Help us achieve world-class education, training and care for everyone, whatever their background. Whether you're just starting out, or an experienced professional, we have what you are looking for. Jobs include administration, policy advisers, digital, finance, commercial specialists and many more

Welcome to the official WA Government page where you can stay up to date on the latest information about Western Australia and WA government initiatives. Questions relating to a specific activity within the WA Government should be referred to the relevant Department or Minister’s Office for a re

The City of Toronto is committed to fostering a positive and progressive workplace culture, and strives to build a workforce that reflects the citizens it serves. We are committed to building a high performing public service, with strong and effective leaders to enable service excellence, through hi
.png)
State and district leaders predict further complications when the Labor Department starts managing $28 billion in K-12 funds.
Some Maryland employees will use Anthropic's AI tools in an effort to reduce child poverty, improve housing access and streamline processes.
Maryland has implemented a cybersecurity program giving security researchers a legal pathway to report cybersecurity vulnerabilities.
Maryland Department of Labor MDOL reissues proposed regulations to implement the Family and Medical Leave Insurance FAMLI program,...
The state's higher education commission and department of labor announced a partnership to expand tech career pathways.
Through a new partnership, Maryland is working to grow its tech workforce. The Maryland Higher Education Commission and the Maryland...
ANNAPOLIS, MD—Governor Wes Moore this week announced a nearly $4 million investment in the Employment Advancement Right Now (EARN) Maryland...
Maryland Higher Education Commission and Maryland Department of Labor Facilitate New Opportunity for Students. Bowie State University...
ANNAPOLIS, Md. — Governor Wes Moore today announced nearly $4 million in awards to help upskill Maryland's workforce for in-demand careers...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Maryland Department of Labor is http://www.labor.maryland.gov/.
According to Rankiteo, Maryland Department of Labor’s AI-generated cybersecurity score is 761, reflecting their Fair security posture.
According to Rankiteo, Maryland Department of Labor currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Maryland Department of Labor is not certified under SOC 2 Type 1.
According to Rankiteo, Maryland Department of Labor does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Maryland Department of Labor is not listed as GDPR compliant.
According to Rankiteo, Maryland Department of Labor does not currently maintain PCI DSS compliance.
According to Rankiteo, Maryland Department of Labor is not compliant with HIPAA regulations.
According to Rankiteo,Maryland Department of Labor is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Maryland Department of Labor operates primarily in the Government Administration industry.
Maryland Department of Labor employs approximately 573 people worldwide.
Maryland Department of Labor presently has no subsidiaries across any sectors.
Maryland Department of Labor’s official LinkedIn profile has approximately 17,506 followers.
Maryland Department of Labor is classified under the NAICS code 92, which corresponds to Public Administration.
No, Maryland Department of Labor does not have a profile on Crunchbase.
Yes, Maryland Department of Labor maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/maryland-department-of-labor.
As of December 08, 2025, Rankiteo reports that Maryland Department of Labor has experienced 1 cybersecurity incidents.
Maryland Department of Labor has an estimated 11,418 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Data Leak.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with independent expert, and .
Title: Maryland Department of Labor Data Breach
Description: Hackers accessed the names and Social Security numbers of 78,000 Marylanders by breaching Maryland Department of Labor databases. The breach occurred in April and involved data files from 2009, 2010, 2013, and 2014. State investigators found no evidence that the personal information was downloaded. The files breached were stored on the Literacy Works Information System and an old unemployment insurance service database.
Date Detected: 2023-04-01
Type: Data Breach
Attack Vector: Database Breach
Threat Actor: Hackers
Common Attack Types: The most common types of attacks the company has faced is Data Leak.

Data Compromised: Names, Social security numbers
Systems Affected: Literacy Works Information SystemUnemployment Insurance Service Database
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Social Security Numbers and .

Entity Name: Maryland Department of Labor
Entity Type: Government
Industry: Public Administration
Location: Maryland, USA
Customers Affected: 78000

Third Party Assistance: Independent expert
Third-Party Assistance: The company involves third-party assistance in incident response through Independent expert.

Type of Data Compromised: Names, Social security numbers
Number of Records Exposed: 78000
Sensitivity of Data: High

Investigation Status: Ongoing
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Independent expert.
Last Attacking Group: The attacking group in the last incident was an Hackers.
Most Recent Incident Detected: The most recent incident detected was on 2023-04-01.
Most Significant Data Compromised: The most significant data compromised in an incident were Names, Social Security numbers and .
Most Significant System Affected: The most significant system affected in an incident was Literacy Works Information SystemUnemployment Insurance Service Database.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Independent expert.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Social Security numbers and Names.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 780.0.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
.png)
A vulnerability has been found in TykoDev cherry-studio-TykoFork 0.1. This issue affects the function redirectToAuthorization of the file /.well-known/oauth-authorization-server of the component OAuth Server Discovery. Such manipulation of the argument authorizationUrl leads to os command injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.
A flaw has been found in code-projects Question Paper Generator up to 1.0. This vulnerability affects unknown code of the file /selectquestionuser.php. This manipulation of the argument subid causes sql injection. Remote exploitation of the attack is possible. The exploit has been published and may be used.
A vulnerability was found in alokjaiswal Hotel-Management-services-using-MYSQL-and-php up to 5f8b60a7aa6c06a5632de569d4e3f6a8cd82f76f. Affected by this vulnerability is an unknown functionality of the file /dishsub.php. The manipulation of the argument item.name results in cross site scripting. It is possible to launch the attack remotely. The exploit has been made public and could be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability has been found in alokjaiswal Hotel-Management-services-using-MYSQL-and-php up to 5f8b60a7aa6c06a5632de569d4e3f6a8cd82f76f. Affected is an unknown function of the file /usersub.php of the component Request Pending Page. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
A flaw has been found in Verysync 微力同步 up to 2.21.3. This impacts an unknown function of the file /rest/f/api/resources/f96956469e7be39d/tmp/text.txt?override=false of the component Web Administration Module. Executing manipulation can lead to unrestricted upload. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.