Company Details
massachusetts-department-of-revenue
567
4,698
92
mass.gov
0
MAS_2833857
In-progress

Massachusetts Department of Revenue Company CyberSecurity Posture
mass.govThe mission of the Massachusetts Department of Revenue is to achieve maximum compliance with the tax, child support and municipal finance laws of the Commonwealth. In meeting its mission, the Department is dedicated to enforcing these laws in a fair, impartial and consistent manner by providing professional and courteous service to all its customers.
Company Details
massachusetts-department-of-revenue
567
4,698
92
mass.gov
0
MAS_2833857
In-progress
Between 750 and 799

MDR Global Score (TPRM)XXXX

Description: A data mix-up on a state tax portal inadvertently made private data from about 16,500 business taxpayers viewable to other companies, potentially even competitors. The breach lasted from Aug. 7, 2017, through Jan. 23, 2018. It allowed some companies to view other business’s names, federal employer identification numbers, tax payments, and other data. No individual employee information, such as Social Security numbers or wage data, was accessible to unauthorized people as a result.


No incidents recorded for Massachusetts Department of Revenue in 2025.
No incidents recorded for Massachusetts Department of Revenue in 2025.
No incidents recorded for Massachusetts Department of Revenue in 2025.
MDR cyber incidents detection timeline including parent company and subsidiaries

The mission of the Massachusetts Department of Revenue is to achieve maximum compliance with the tax, child support and municipal finance laws of the Commonwealth. In meeting its mission, the Department is dedicated to enforcing these laws in a fair, impartial and consistent manner by providing professional and courteous service to all its customers.


Maryland is on the path to becoming the best state in the nation. Referred to as “America in Miniature”, Maryland embodies the very spirit of the United States. Maryland is home to ethnic groups of every origin, just about every natural feature, and much like our country, opportunity! If you are

Overview The Texas Health and Human Services Commission (HHSC) is an agency within the Texas Health and Human Services System. In September 2016, Texas began transforming how it delivers health and human services to qualified Texans, with a goal of making the Health and Human Services System more ef

State government is more than senators, representatives, and elected officials. We build highways, provide drivers licenses, protect our children and vulnerable populations, create jobs, connect Hoosiers to job opportunities, maintain state parks, train law enforcement officers, and we run museums

Employment with the State of Ohio is more than ‘just a job’ – it is a privilege to serve our families, friends and neighbors who rely on us throughout our great state. We are a team of dedicated public servants committed to high performance, innovative thinking, and delivering excellent and efficien

Der Arbeitgeber Niedersachsen vereint über 2000 Dienststellen mit einem gemeinsamen Ziel: Wir gestalten das Leben in Niedersachsen verantwortungsvoll und zukunftsorientiert. Als der größte Arbeitgeber im Land Niedersachsen bieten wir sichere Arbeitsplätze, sinnstiftende Aufgaben und vielfältige Ei

CDC works 24/7 keeping America safe from health, safety and security threats, both foreign and domestic. Whether diseases start at home or abroad, are chronic or acute, curable or preventable, human error or deliberate attack, CDC fights it and supports communities and citizens to prevent it. CDC is

Nav er en viktig del av sikkerhetsnettet i velferdsstaten. Vi skal bidra til at flere kommer i arbeid og færre går på stønad, og samtidig sørge for at de som trenger det er sikra inntekt og økonomisk trygghet gjennom rett pengestøtte til rett tid. For å løse dette samfunnsoppdraget forvalter Nav om

The Census Bureau serves as the nation’s leading provider of quality data about its people and economy. We have been headquartered in Suitland, Maryland since 1942, and currently employ about 4,285 staff members. We are part of the U.S. Department of Commerce and overseen by the Economics and Statis

As the United States Postal Service continues its evolution as a forward-thinking, fast-acting company capable of providing quality products and services for its customers, it continues to remember and celebrate its roots as the first national network of communications that literally bound a nation
.png)
Non-resident sellers of Massachusetts real estate with a gross sales price of $1 million or may may soon be subject to withholding at a 4%...
The HIPAA Journal has compiled healthcare data breach statistics from October 2009, when the Department of Health and Human Services (HHS)...
The Massachusetts Department of Revenue has finalized amendments to its regulation concerning the application of P.L. 86-272.
Appeals court rules that a nonresident's capital gain from the sale of stock is subject to Massachusetts income tax.
Federal contractor Mitre, which has dual headquarters in McLean and Massachusetts, expected Wednesday to lose the federal funding needed to operate and...
The Department of Justice (DOJ) initiated its Civil Cyber-Fraud Initiative focused on using the False Claims Act (FCA) to combat new and emerging cyber threats.
Scoop News Group is pleased to announce the winners of the 2025 StateScoop 50 Awards. The awards, now in their 12th year, honor the most influential people...
Massachusetts is losing $12.2 million in federal money that had been earmarked for Bay State schools to buy food from local farms.
A Massachusetts cannabis retailer challenging municipal "community impact fees" owes the state more than $400000 in sales taxes.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Massachusetts Department of Revenue is http://www.mass.gov/dor.
According to Rankiteo, Massachusetts Department of Revenue’s AI-generated cybersecurity score is 750, reflecting their Fair security posture.
According to Rankiteo, Massachusetts Department of Revenue currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Massachusetts Department of Revenue is not certified under SOC 2 Type 1.
According to Rankiteo, Massachusetts Department of Revenue does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Massachusetts Department of Revenue is not listed as GDPR compliant.
According to Rankiteo, Massachusetts Department of Revenue does not currently maintain PCI DSS compliance.
According to Rankiteo, Massachusetts Department of Revenue is not compliant with HIPAA regulations.
According to Rankiteo,Massachusetts Department of Revenue is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Massachusetts Department of Revenue operates primarily in the Government Administration industry.
Massachusetts Department of Revenue employs approximately 567 people worldwide.
Massachusetts Department of Revenue presently has no subsidiaries across any sectors.
Massachusetts Department of Revenue’s official LinkedIn profile has approximately 4,698 followers.
Massachusetts Department of Revenue is classified under the NAICS code 92, which corresponds to Public Administration.
No, Massachusetts Department of Revenue does not have a profile on Crunchbase.
Yes, Massachusetts Department of Revenue maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/massachusetts-department-of-revenue.
As of December 03, 2025, Rankiteo reports that Massachusetts Department of Revenue has experienced 1 cybersecurity incidents.
Massachusetts Department of Revenue has an estimated 11,271 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Title: State Tax Portal Data Mix-Up
Description: A data mix-up on a state tax portal inadvertently made private data from about 16,500 business taxpayers viewable to other companies, potentially even competitors. The breach lasted from Aug. 7, 2017, through Jan. 23, 2018. It allowed some companies to view other business’s names, federal employer identification numbers, tax payments, and other data. No individual employee information, such as Social Security numbers or wage data, was accessible to unauthorized people as a result.
Date Detected: 2018-01-23
Type: Data Breach
Attack Vector: Data Mix-Up
Motivation: Unintentional
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Business names, Federal employer identification numbers, Tax payments
Systems Affected: State Tax Portal
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Business Names, Federal Employer Identification Numbers, Tax Payments and .

Entity Type: Government
Industry: Public Administration
Customers Affected: 16500

Type of Data Compromised: Business names, Federal employer identification numbers, Tax payments
Number of Records Exposed: 16500
Sensitivity of Data: High
Most Recent Incident Detected: The most recent incident detected was on 2018-01-23.
Most Significant Data Compromised: The most significant data compromised in an incident were Business names, Federal employer identification numbers, Tax payments and .
Most Significant System Affected: The most significant system affected in an incident was State Tax Portal.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Tax payments, Business names and Federal employer identification numbers.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 165.0.
.png)
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-9 and 6.9.13-34, there is a vulnerability in ImageMagick’s Magick++ layer that manifests when Options::fontFamily is invoked with an empty string. Clearing a font family calls RelinquishMagickMemory on _drawInfo->font, freeing the font string but leaving _drawInfo->font pointing to freed memory while _drawInfo->family is set to that (now-invalid) pointer. Any later cleanup or reuse of _drawInfo->font re-frees or dereferences dangling memory. DestroyDrawInfo and other setters (Options::font, Image::font) assume _drawInfo->font remains valid, so destruction or subsequent updates trigger crashes or heap corruption. This vulnerability is fixed in 7.1.2-9 and 6.9.13-34.
FeehiCMS version 2.1.1 has a Remote Code Execution via Unrestricted File Upload in Ad Management. FeehiCMS version 2.1.1 allows authenticated remote attackers to upload files that the server later executes (or stores in an executable location) without sufficient validation, sanitization, or execution restrictions. An authenticated remote attacker can upload a crafted PHP file and cause the application or web server to execute it, resulting in remote code execution (RCE).
PHPGurukul Billing System 1.0 is vulnerable to SQL Injection in the admin/index.php endpoint. Specifically, the username parameter accepts unvalidated user input, which is then concatenated directly into a backend SQL query.
NMIS/BioDose software V22.02 and previous versions contain executable binaries with plain text hard-coded passwords. These hard-coded passwords could allow unauthorized access to both the application and database.
NMIS/BioDose V22.02 and previous versions' installation directory paths by default have insecure file permissions, which in certain deployment scenarios can enable users on client workstations to modify the program executables and libraries.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.