Company Details
minnesota-zoo
197
2,345
712
mnzoo.org
0
MIN_3301966
In-progress

Minnesota Zoo Company CyberSecurity Posture
mnzoo.orgCreated by the State of Minnesota, the Minnesota Zoo opened in 1978 with a mission to connect people, animals, and the natural world to save wildlife. Cutting-edge exhibits provide exciting experiences with animals and their habitats introducing guests to species from around the globe. Education programs engage audiences at the Zoo, throughout the region, and around world. Conservation programs protect endangered species and preserve critical ecosystems. Learn more about the Minnesota Zoo—our mission, leadership, and history.
Company Details
minnesota-zoo
197
2,345
712
mnzoo.org
0
MIN_3301966
In-progress
Between 750 and 799

Minnesota Zoo Global Score (TPRM)XXXX

Description: The Maine Office of the Attorney General reported a data breach involving the Metropolitan Council on December 6, 2024. The breach occurred between March 27, 2024, and May 27, 2024, affecting 16,935 individuals, including 14 residents of Maine. The compromised information potentially included names, addresses, phone numbers, and social security numbers. The organization is offering 12 months of credit monitoring through IDX.
Description: Minnesota Department of Human Services suffered a data breach through an employee’s e-mail account. The attack exposed the personal information of about 11,000 people. The hackers were immediately detected and the servers were secured.
Description: Minnesota Department of Human Services (DHS) suffered a data breach incident after a DHS employee accidentally emailed the parent billing statements of 4,307 individuals involved in the program. The billing statements included first and last names, addresses, DHS-generated billing account numbers, and parental fee account activity. DHS implemented new procedures to address the error that led to the incident, and communicated these procedure changes to staff.
Description: The Minnesota Department of Human Services (DHS) failed to conduct mandatory security reviews of its Supplemental Nutrition Assistance Program (SNAP) computer system in **2020 and 2023**, as revealed by federal audits. This system stores highly sensitive personal data of over **440,000 SNAP beneficiaries**, including private financial and identification details. The omission of these reviews was attributed to **resource constraints**, leaving the system vulnerable to **un detected security gaps, breaches, or fraud risks**. While the agency claimed compliance in **March 2024** under the new oversight of the Department of Children, Youth and Families (DCYF), beneficiaries expressed deep concerns over **data privacy and trust erosion** in public assistance programs. The exposed vulnerabilities could enable unauthorized access to confidential records, potentially leading to **identity theft, financial fraud, or misuse of personal information**. The audits explicitly warned that such negligence **heightens the likelihood of a breach**, though no confirmed incident was reported. The failure underscores systemic weaknesses in safeguarding critical welfare infrastructure, risking long-term reputational and operational damage.
Description: In August 2021, the University of Minnesota experienced a data breach involving its **Legacy Data Warehouse**, where unauthorized third parties accessed or acquired personal information of individuals associated with the university from **1989 to August 2021**. The compromised data included records of **prospective students, current/former students, employees, and program participants**, potentially exposing their sensitive details on the dark web. The breach led to a **$5 million class-action settlement**, with affected individuals eligible for a **$30 cash payout and 24 months of dark web monitoring**. The university denied negligence but settled to avoid prolonged litigation. The incident highlighted failures in safeguarding long-term stored data, impacting **decades’ worth of personal records** and prompting legal repercussions. The settlement fund covers administrative costs, attorney fees (up to **$1.67M**), service awards, and claimant payouts, with distributions expected **105 days post-final court approval (January 2026)**. The breach underscored vulnerabilities in legacy systems and the far-reaching consequences of historical data exposure.
Description: The University of Minnesota confirms that it has contacted law enforcement and is investigating a claimed data breach that officials became aware on July 2021. According to the statement, the "U" hired outside forensics specialists from around the world to investigate reports of a breach and make sure the University's computer systems were safe. The University of Minnesota will provide options to help prevent the exploitation of personal information as well as alert anyone who has been impacted by the alleged breach.


No incidents recorded for Minnesota Zoo in 2025.
No incidents recorded for Minnesota Zoo in 2025.
No incidents recorded for Minnesota Zoo in 2025.
Minnesota Zoo cyber incidents detection timeline including parent company and subsidiaries

Created by the State of Minnesota, the Minnesota Zoo opened in 1978 with a mission to connect people, animals, and the natural world to save wildlife. Cutting-edge exhibits provide exciting experiences with animals and their habitats introducing guests to species from around the globe. Education programs engage audiences at the Zoo, throughout the region, and around world. Conservation programs protect endangered species and preserve critical ecosystems. Learn more about the Minnesota Zoo—our mission, leadership, and history.


MISSION Throughout all 50 states and around the world, the Navy Reserve force delivers real-world capabilities and expertise to support the Navy mission — building a more lethal, warfighting culture focused on great power competition. VISION The Navy Reserve provides essential naval warfighting cap

The Army Act was enacted in parliament on the 10th of October 1949 which is recognized as the day, the Ceylon Army was raised. The Army was to be comprised of a Regular and a Volunteer force. In May 1972, when Ceylon became the Republic of Sri Lanka, all Army units were renamed accordingly Regime

The U.S. Army Reserve's mission, under Title 10 of the U.S. code, is to provide trained and ready Soldiers and units with the critical combat service support and combat support capabilities necessary to support nation strategy during peacetime, contingencies and war. The Army Reserve is a key elemen

A career in the Canadian Armed Forces is more than a way to make a living. It’s a passport to a whole-life experience that will change you and allow you to change the lives of others. Join an organization that offers more than 100 different trades and professions. Obtain world-class qualification

This is the Official LinkedIn Page of Marine Corps Recruiting. We make Marines. We win our nation's battles. We develop quality citizens. These are the promises the Marine Corps makes to our nation and to our Marines. The core values that guide us, and the leadership skills that enable us, not on

The United States Marine Corps (USMC) is a branch of the United States Armed Forces responsible for providing power projection, using the mobility of the United States Navy, by Congressional mandate, to deliver rapidly, combined-arms task forces on land, at sea, and in the air. The U.S. Marine Corps
.png)
A new pack of young gray wolves moved into their newly renovated home this week at the Minnesota Zoo in Apple Valley.
A Minnesota zoo announced the recent birth of a cotton-top tamarin, a critically-endangered species of monkey native to the tropical forests...
Snooki's journey—from beach rescue to lifelong care—highlights the importance of partnerships between wildlife rehabilitation centers and...
The annual event features a path decorated with thousands of hand-carved jack-o'-lanterns.
AZA honors collaborative efforts to prevent extinction of the Poweshiek skipperling through innovative breeding, reintroduction,...
For years, pet goldfish released into US waterways have been wreaking havoc by ballooning to gargantuan sizes and outcompeting native...
Gov. Tim Walz has activated the Minnesota National Guard to assist St. Paul in responding to a cyberattack on the capital city on Tuesday.
The 13-year-old female tiger was born at the zoo in 2012 and gave birth to six cubs there.
A 6-year-old, two-toed sloth named Sago unexpectedly went into labor on Wednesday, April 2, Minnesota's Como Park Zoo & Conservatory said in a statement.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Minnesota Zoo is http://mnzoo.org/.
According to Rankiteo, Minnesota Zoo’s AI-generated cybersecurity score is 764, reflecting their Fair security posture.
According to Rankiteo, Minnesota Zoo currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Minnesota Zoo is not certified under SOC 2 Type 1.
According to Rankiteo, Minnesota Zoo does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Minnesota Zoo is not listed as GDPR compliant.
According to Rankiteo, Minnesota Zoo does not currently maintain PCI DSS compliance.
According to Rankiteo, Minnesota Zoo is not compliant with HIPAA regulations.
According to Rankiteo,Minnesota Zoo is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Minnesota Zoo operates primarily in the Museums, Historical Sites, and Zoos industry.
Minnesota Zoo employs approximately 197 people worldwide.
Minnesota Zoo presently has no subsidiaries across any sectors.
Minnesota Zoo’s official LinkedIn profile has approximately 2,345 followers.
Minnesota Zoo is classified under the NAICS code 712, which corresponds to Museums, Historical Sites, and Similar Institutions.
No, Minnesota Zoo does not have a profile on Crunchbase.
Yes, Minnesota Zoo maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/minnesota-zoo.
As of December 03, 2025, Rankiteo reports that Minnesota Zoo has experienced 6 cybersecurity incidents.
Minnesota Zoo has an estimated 2,134 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability, Data Leak and Breach.
Total Financial Loss: The total financial loss from these incidents is estimated to be $5 million.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with secured servers, and remediation measures with implemented new procedures to address the error, remediation measures with communicated procedure changes to staff, and third party assistance with outside forensics specialists, and and communication strategy with providing options to prevent exploitation of personal information and alerting impacted individuals, and third party assistance with kroll settlement administration llc (settlement administration), and recovery measures with $5 million settlement fund for affected individuals, and communication strategy with direct notices sent to affected individuals in september 2023, communication strategy with public settlement claim process, and remediation measures with security plan review and certification (march 2024), remediation measures with ongoing certification process for 2025, and communication strategy with public statements by dcyf commissioner tikki brown, communication strategy with media coverage via 5 investigates..
Title: Minnesota Department of Human Services Data Breach
Description: Minnesota Department of Human Services suffered a data breach through an employee’s e-mail account. The attack exposed the personal information of about 11,000 people. The hackers were immediately detected and the servers were secured.
Type: Data Breach
Attack Vector: Email Compromise
Vulnerability Exploited: Compromised Email Account
Title: Minnesota DHS Data Breach
Description: Minnesota Department of Human Services (DHS) suffered a data breach incident after a DHS employee accidentally emailed the parent billing statements of 4,307 individuals involved in the program. The billing statements included first and last names, addresses, DHS-generated billing account numbers, and parental fee account activity.
Type: Data Breach
Attack Vector: Human Error
Vulnerability Exploited: Human Error
Title: University of Minnesota Data Breach
Description: The University of Minnesota confirms that it has contacted law enforcement and is investigating a claimed data breach that officials became aware on July 2021. According to the statement, the 'U' hired outside forensics specialists from around the world to investigate reports of a breach and make sure the University's computer systems were safe. The University of Minnesota will provide options to help prevent the exploitation of personal information as well as alert anyone who has been impacted by the alleged breach.
Date Detected: July 2021
Type: Data Breach
Title: Data Breach at Metropolitan Council
Description: The Maine Office of the Attorney General reported a data breach involving the Metropolitan Council on December 6, 2024. The breach occurred between March 27, 2024, and May 27, 2024, affecting 16,935 individuals, including 14 residents of Maine. The compromised information potentially included names, addresses, phone numbers, and social security numbers, and the organization is offering 12 months of credit monitoring through IDX.
Date Detected: 2024-12-06
Date Publicly Disclosed: 2024-12-06
Type: Data Breach
Title: University of Minnesota Legacy Data Warehouse Data Breach (August 2021)
Description: Unauthorized third parties accessed or obtained personal data from the University of Minnesota’s Legacy Data Warehouse in August 2021, potentially affecting students, employees, and program participants from 1989 through August 2021. The breach led to a $5 million class action settlement, offering affected individuals a $30 cash payment and 24 months of dark web monitoring. Personal data may have been posted on the dark web.
Date Detected: 2021-08-10
Date Publicly Disclosed: 2023-09
Type: Data Breach
Threat Actor: Unauthorized third parties
Title: Lack of Security Reviews Left Minnesota SNAP System Vulnerable to Breaches and Fraud
Description: The Minnesota Department of Human Services (DHS) failed to perform required security reviews of the computer system critical to the Supplemental Nutrition Assistance Program (SNAP) in 2020 and 2023. This oversight, attributed to a lack of resources, left the system—containing personal data of over 440,000 Minnesotans—vulnerable to potential breaches or fraud. The system determines eligibility for SNAP benefits and holds sensitive personal information. Audits warned that undetected security gaps could increase risks. The issue was addressed in 2024 by the newly formed Department of Children, Youth and Families (DCYF), which certified its security plan in March 2024 and is preparing for 2025 certification. Public trust in the program has been impacted, with beneficiaries expressing concerns over the security of their sensitive data.
Date Publicly Disclosed: 2024-09-16
Type: Security Oversight
Vulnerability Exploited: Lack of Security ReviewsUnpatched Security GapsResource Constraints in DHS
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Compromised Email Account and Legacy Data Warehouse.

Data Compromised: Personal information
Systems Affected: Email Servers

Data Compromised: First and last names, Addresses, Dhs-generated billing account numbers, Parental fee account activity

Data Compromised: Names, Addresses, Phone numbers, Social security numbers

Financial Loss: $5,000,000 (settlement fund)
Systems Affected: Legacy Data Warehouse
Brand Reputation Impact: Negative (class action lawsuit and public disclosure)
Legal Liabilities: $5,000,000 settlement, attorneys' fees up to $1,666,666.67
Identity Theft Risk: High (personal data exposed, dark web monitoring offered)

Systems Affected: SNAP Eligibility Determination System
Operational Impact: Increased Risk of BreachesPotential FraudErosion of Public Trust
Customer Complaints: ['Concerns from SNAP Beneficiaries Over Data Security']
Brand Reputation Impact: Loss of Trust in Public Assistance Programs
Identity Theft Risk: ['Potential Risk Due to Unsecured Personal Data']
Average Financial Loss: The average financial loss per incident is $833.33 thousand.
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information, Personal Information, Account Information, , Names, Addresses, Phone Numbers, Social Security Numbers, , Personal Information and .

Entity Name: Minnesota Department of Human Services
Entity Type: Government Agency
Industry: Public Administration
Location: Minnesota, USA
Customers Affected: 11000

Entity Name: Minnesota Department of Human Services
Entity Type: Government Agency
Industry: Public Sector
Location: Minnesota, USA
Customers Affected: 4307

Entity Name: University of Minnesota
Entity Type: Educational Institution
Industry: Education
Location: Minnesota, USA

Entity Name: Metropolitan Council
Entity Type: Government
Industry: Public Administration
Customers Affected: 16935

Entity Name: Regents of the University of Minnesota
Entity Type: Educational Institution
Industry: Higher Education
Location: Minnesota, USA
Customers Affected: Students, employees, and program participants from 1989 to August 2021

Entity Name: Minnesota Department of Human Services (DHS)
Entity Type: Government Agency
Industry: Public Welfare
Location: Minnesota, USA
Customers Affected: 440,000+ (SNAP Beneficiaries)

Entity Name: Minnesota Department of Children, Youth and Families (DCYF)
Entity Type: Government Agency
Industry: Public Welfare
Location: Minnesota, USA
Customers Affected: 440,000+ (SNAP Beneficiaries)

Containment Measures: Secured Servers

Remediation Measures: Implemented new procedures to address the errorCommunicated procedure changes to staff

Third Party Assistance: Outside Forensics Specialists.
Communication Strategy: Providing options to prevent exploitation of personal information and alerting impacted individuals

Third Party Assistance: Kroll Settlement Administration Llc (Settlement Administration).
Recovery Measures: $5 million settlement fund for affected individuals
Communication Strategy: Direct notices sent to affected individuals in September 2023Public settlement claim process

Remediation Measures: Security Plan Review and Certification (March 2024)Ongoing Certification Process for 2025
Communication Strategy: Public Statements by DCYF Commissioner Tikki BrownMedia Coverage via 5 INVESTIGATES
Third-Party Assistance: The company involves third-party assistance in incident response through Outside forensics specialists, , Kroll Settlement Administration LLC (settlement administration), .

Type of Data Compromised: Personal Information
Number of Records Exposed: 11000

Type of Data Compromised: Personal information, Account information
Number of Records Exposed: 4307
Sensitivity of Data: Medium
Personally Identifiable Information: first and last namesaddresses

Type of Data Compromised: Names, Addresses, Phone numbers, Social security numbers
Number of Records Exposed: 16935
Sensitivity of Data: High

Type of Data Compromised: Personal information
Sensitivity of Data: High (includes personally identifiable information)

Sensitivity of Data: Personal Data of SNAP Beneficiaries (High)
Personally Identifiable Information: Potential Exposure (Names, Addresses, Financial Data, etc.)
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Implemented new procedures to address the error, Communicated procedure changes to staff, , Security Plan Review and Certification (March 2024), Ongoing Certification Process for 2025, .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by secured servers and .

Data Exfiltration: True
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through $5 million settlement fund for affected individuals, .

Legal Actions: Class action lawsuit settled for $5 million,

Regulations Violated: Federal Single Audit Requirements for Information System Security Reviews,
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Class action lawsuit settled for $5 million, .

Lessons Learned: Regular security reviews and resource allocation are critical to preventing vulnerabilities in systems handling sensitive public welfare data. Delays in compliance can erode public trust and increase risks of fraud or breaches.

Recommendations: Prioritize and fund mandatory security reviews for systems handling sensitive data., Implement continuous monitoring and third-party audits to ensure compliance., Enhance transparency with beneficiaries regarding data security measures., Allocate dedicated resources for cybersecurity within public welfare agencies.Prioritize and fund mandatory security reviews for systems handling sensitive data., Implement continuous monitoring and third-party audits to ensure compliance., Enhance transparency with beneficiaries regarding data security measures., Allocate dedicated resources for cybersecurity within public welfare agencies.Prioritize and fund mandatory security reviews for systems handling sensitive data., Implement continuous monitoring and third-party audits to ensure compliance., Enhance transparency with beneficiaries regarding data security measures., Allocate dedicated resources for cybersecurity within public welfare agencies.Prioritize and fund mandatory security reviews for systems handling sensitive data., Implement continuous monitoring and third-party audits to ensure compliance., Enhance transparency with beneficiaries regarding data security measures., Allocate dedicated resources for cybersecurity within public welfare agencies.
Key Lessons Learned: The key lessons learned from past incidents are Regular security reviews and resource allocation are critical to preventing vulnerabilities in systems handling sensitive public welfare data. Delays in compliance can erode public trust and increase risks of fraud or breaches.

Source: University of Minnesota

Source: Maine Office of the Attorney General
Date Accessed: 2024-12-06

Source: Class Action Settlement Notice

Source: Kroll Settlement Administration LLC

Source: 5 INVESTIGATES (KSTP)
Date Accessed: 2024-09-16
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: University of Minnesota, and Source: Maine Office of the Attorney GeneralDate Accessed: 2024-12-06, and Source: Class Action Settlement Notice, and Source: Kroll Settlement Administration LLC, and Source: 5 INVESTIGATES (KSTP)Url: https://kstp.com/5-investigates/lack-of-security-reviews-left-minnesota-snap-system-vulnerable-to-breaches-fraud/Date Accessed: 2024-09-16.

Investigation Status: Ongoing

Investigation Status: Settled (class action lawsuit resolved)

Investigation Status: Ongoing (Media Investigation by 5 INVESTIGATES; DCYF Claims Remediation Underway)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Providing options to prevent exploitation of personal information and alerting impacted individuals, Direct Notices Sent To Affected Individuals In September 2023, Public Settlement Claim Process, Public Statements By Dcyf Commissioner Tikki Brown and Media Coverage Via 5 Investigates.

Stakeholder Advisories: Direct Notices To Affected Individuals (September 2023), Public Settlement Claim Process.
Customer Advisories: $30 cash payment and 24 months of dark web monitoring offered to affected individuals

Customer Advisories: Public Statements by DCYF Commissioner Addressing Concerns
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Direct Notices To Affected Individuals (September 2023), Public Settlement Claim Process, $30 Cash Payment And 24 Months Of Dark Web Monitoring Offered To Affected Individuals, , Public Statements By Dcyf Commissioner Addressing Concerns and .

Entry Point: Compromised Email Account

Entry Point: Legacy Data Warehouse,
High Value Targets: Personal Data Of Students, Employees, And Program Participants (1989–2021),
Data Sold on Dark Web: Personal Data Of Students, Employees, And Program Participants (1989–2021),

High Value Targets: Snap Eligibility System Database,
Data Sold on Dark Web: Snap Eligibility System Database,

Root Causes: Human Error
Corrective Actions: Implemented New Procedures To Address The Error, Communicated Procedure Changes To Staff,

Root Causes: Failure To Adequately Protect Personal Information In Legacy Data Warehouse,
Corrective Actions: $5 Million Settlement Fund, Dark Web Monitoring For Affected Individuals,

Root Causes: Lack Of Resources In Dhs For Security Reviews, Failure To Comply With Federal Audit Requirements, Inadequate Oversight Of Critical Public Welfare Systems,
Corrective Actions: Security Plan Certification (March 2024) By Dcyf, Ongoing Certification Process For 2025, Media Engagement To Rebuild Public Trust,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Outside Forensics Specialists, , Kroll Settlement Administration Llc (Settlement Administration), .
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Implemented New Procedures To Address The Error, Communicated Procedure Changes To Staff, , $5 Million Settlement Fund, Dark Web Monitoring For Affected Individuals, , Security Plan Certification (March 2024) By Dcyf, Ongoing Certification Process For 2025, Media Engagement To Rebuild Public Trust, .
Last Attacking Group: The attacking group in the last incident was an Unauthorized third parties.
Most Recent Incident Detected: The most recent incident detected was on July 2021.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-09-16.
Highest Financial Loss: The highest financial loss from an incident was $5,000,000 (settlement fund).
Most Significant Data Compromised: The most significant data compromised in an incident were Personal Information, , first and last names, addresses, DHS-generated billing account numbers, parental fee account activity, , names, addresses, phone numbers, social security numbers, and .
Most Significant System Affected: The most significant system affected in an incident was Email Servers and Legacy Data Warehouse and SNAP Eligibility Determination System.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was outside forensics specialists, , kroll settlement administration llc (settlement administration), .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Secured Servers.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were social security numbers, first and last names, names, parental fee account activity, Personal Information, addresses, DHS-generated billing account numbers and phone numbers.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 751.0.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Class action lawsuit settled for $5 million, .
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Regular security reviews and resource allocation are critical to preventing vulnerabilities in systems handling sensitive public welfare data. Delays in compliance can erode public trust and increase risks of fraud or breaches.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Allocate dedicated resources for cybersecurity within public welfare agencies., Enhance transparency with beneficiaries regarding data security measures., Prioritize and fund mandatory security reviews for systems handling sensitive data. and Implement continuous monitoring and third-party audits to ensure compliance..
Most Recent Source: The most recent source of information about an incident are University of Minnesota, 5 INVESTIGATES (KSTP), Maine Office of the Attorney General, Class Action Settlement Notice and Kroll Settlement Administration LLC.
Most Recent URL for Additional Resources: The most recent URL for additional resources on cybersecurity best practices is https://kstp.com/5-investigates/lack-of-security-reviews-left-minnesota-snap-system-vulnerable-to-breaches-fraud/ .
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Direct notices to affected individuals (September 2023), Public settlement claim process, .
Most Recent Customer Advisory: The most recent customer advisory issued were an $30 cash payment and 24 months of dark web monitoring offered to affected individuals and Public Statements by DCYF Commissioner Addressing Concerns.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Compromised Email Account.
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Human Error, Failure to adequately protect personal information in Legacy Data Warehouse, Lack of Resources in DHS for Security ReviewsFailure to Comply with Federal Audit RequirementsInadequate Oversight of Critical Public Welfare Systems.
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Implemented new procedures to address the errorCommunicated procedure changes to staff, $5 million settlement fundDark web monitoring for affected individuals, Security Plan Certification (March 2024) by DCYFOngoing Certification Process for 2025Media Engagement to Rebuild Public Trust.
.png)
vLLM is an inference and serving engine for large language models (LLMs). Prior to 0.11.1, vllm has a critical remote code execution vector in a config class named Nemotron_Nano_VL_Config. When vllm loads a model config that contains an auto_map entry, the config class resolves that mapping with get_class_from_dynamic_module(...) and immediately instantiates the returned class. This fetches and executes Python from the remote repository referenced in the auto_map string. Crucially, this happens even when the caller explicitly sets trust_remote_code=False in vllm.transformers_utils.config.get_config. In practice, an attacker can publish a benign-looking frontend repo whose config.json points via auto_map to a separate malicious backend repo; loading the frontend will silently run the backend’s code on the victim host. This vulnerability is fixed in 0.11.1.
fastify-reply-from is a Fastify plugin to forward the current HTTP request to another server. Prior to 12.5.0, by crafting a malicious URL, an attacker could access routes that are not allowed, even though the reply.from is defined for specific routes in @fastify/reply-from. This vulnerability is fixed in 12.5.0.
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to 21.0.2, 20.3.15, and 19.2.17, A Stored Cross-Site Scripting (XSS) vulnerability has been identified in the Angular Template Compiler. It occurs because the compiler's internal security schema is incomplete, allowing attackers to bypass Angular's built-in security sanitization. Specifically, the schema fails to classify certain URL-holding attributes (e.g., those that could contain javascript: URLs) as requiring strict URL security, enabling the injection of malicious scripts. This vulnerability is fixed in 21.0.2, 20.3.15, and 19.2.17.
Gin-vue-admin is a backstage management system based on vue and gin. In 2.8.6 and earlier, attackers can delete any file on the server at will, causing damage or unavailability of server resources. Attackers can control the 'FileMd5' parameter to delete any file and folder.
Portkey.ai Gateway is a blazing fast AI Gateway with integrated guardrails. Prior to 1.14.0, the gateway determined the destination baseURL by prioritizing the value in the x-portkey-custom-host request header. The proxy route then appends the client-specified path to perform an external fetch. This can be maliciously used by users for SSRF attacks. This vulnerability is fixed in 1.14.0.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.