Company Details
mohu-inc
18
1,224
334
gomohu.com
0
MOH_3583058
In-progress

Mohu TV Antennas Company CyberSecurity Posture
gomohu.comMohu, The Cord Cutting Company, is a consumer electronics manufacturer dedicated to leading the TV cord cutting revolution, bridging OTA and OTT devices and content to give consumers access to the TV they want at a cost they can control. To help consumers identify which cord cutting options are best for them, Mohu created Untangle.TV, the first cord cutting recommendation tool that shows users what they need to cut the cord. The company’s approach to TV is founded on the motto “Be Set Free," making its products simple to use and enabling consumers to have an exceptional experience without burdensome costs or constraints. Since introducing the world’s first paper-thin Leaf HDTV Indoor Antenna in 2011, Mohu has helped its customers save over $1 billion by reducing or eliminating costly monthly cable and satellite bills. Mohu offers a full line of high-quality, easy-to-install and cost-effective HDTV antenna and cord cutting products.
Company Details
mohu-inc
18
1,224
334
gomohu.com
0
MOH_3583058
In-progress
Between 700 and 749

MTA Global Score (TPRM)XXXX

Description: US consumer electronics company Mohu suffered a data breach in the month of June and July 2015. Its website was injected with malicious code that resulted in the exposure of details of about 2,500 customers. The compromised data included names, addresses, emails, and phone numbers, credit card details like the card number, expiration date, and CVV code. Mohu informed the police and notified the affected customers and asked them to take precautionary steps to prevent any fraudulent activities.


No incidents recorded for Mohu TV Antennas in 2025.
No incidents recorded for Mohu TV Antennas in 2025.
No incidents recorded for Mohu TV Antennas in 2025.
MTA cyber incidents detection timeline including parent company and subsidiaries

Mohu, The Cord Cutting Company, is a consumer electronics manufacturer dedicated to leading the TV cord cutting revolution, bridging OTA and OTT devices and content to give consumers access to the TV they want at a cost they can control. To help consumers identify which cord cutting options are best for them, Mohu created Untangle.TV, the first cord cutting recommendation tool that shows users what they need to cut the cord. The company’s approach to TV is founded on the motto “Be Set Free," making its products simple to use and enabling consumers to have an exceptional experience without burdensome costs or constraints. Since introducing the world’s first paper-thin Leaf HDTV Indoor Antenna in 2011, Mohu has helped its customers save over $1 billion by reducing or eliminating costly monthly cable and satellite bills. Mohu offers a full line of high-quality, easy-to-install and cost-effective HDTV antenna and cord cutting products.


As part of the Lenovo family, Motorola Mobility is creating innovative smartphones and accessories designed with the consumer in mind. That’s why we’re looking for the thinkers, innovators and problem solvers who believe in working together to challenge the status quo. If you share our commitment to

We’re a diverse collective of thinkers and doers, continually reimagining what’s possible to help us all do what we love in new ways. And the same innovation that goes into our products also applies to our practices — strengthening our commitment to leave the world better than we found it. This is w

Samsung Electronics is a global leader in technology, opening new possibilities for people everywhere. Through relentless innovation and discovery, we are transforming the worlds of TVs, smartphones, wearable devices, tablets, digital appliances, network systems, medical devices, semiconductors and
Step into the innovative world of LG Electronics. As a global leader in technology, LG Electronics is dedicated to creating innovative solutions for a better life. Our brand promise, 'Life's Good', embodies our commitment to ensuring a happier, better life for all. With a rich history spanning ov
Voltas is the No. 1* Room Air Conditioner Brand in India. Apart from ACs, Voltas offers a wide range of cooling products including Air Coolers, Commercial Refrigeration, Water Coolers and Water Dispensers. Apart from being the leaders in consumer products, Voltas is also one of the world's premier e

Headquartered in Stamford, Connecticut, HARMAN (harman.com) designs and engineers connected products and solutions for automakers, consumers, and enterprises worldwide, including connected car systems, audio and visual products, enterprise automation solutions; and services supporting the Internet o
.png)
Get free TV by watching over-the-air channels. Here are our recommendations for the best indoor OTA TV antennas for 2025.
The best indoor TV antennas let you receive free over-the-air broadcast TV channels without having to install a large outdoor antenna on the roof of your home.
My pick for the best indoor TV antenna overall is the Mohu Gateway Plus. It simply did the best job of any antenna I tested, pulling in distant, hard-to-reach...
The Mohu Vibe has a gray fabric front panel. (Image credit: Future). The Mohu Vibe indoor TV antenna is unlike most other TV antennas in...
The Mohu Arc is a reasonably compact antenna design with impressive signal-pulling abilities. It's small enough to be placed on a stand behind a TV, or mounted...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Mohu TV Antennas is http://www.gomohu.com.
According to Rankiteo, Mohu TV Antennas’s AI-generated cybersecurity score is 745, reflecting their Moderate security posture.
According to Rankiteo, Mohu TV Antennas currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Mohu TV Antennas is not certified under SOC 2 Type 1.
According to Rankiteo, Mohu TV Antennas does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Mohu TV Antennas is not listed as GDPR compliant.
According to Rankiteo, Mohu TV Antennas does not currently maintain PCI DSS compliance.
According to Rankiteo, Mohu TV Antennas is not compliant with HIPAA regulations.
According to Rankiteo,Mohu TV Antennas is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Mohu TV Antennas operates primarily in the Computers and Electronics Manufacturing industry.
Mohu TV Antennas employs approximately 18 people worldwide.
Mohu TV Antennas presently has no subsidiaries across any sectors.
Mohu TV Antennas’s official LinkedIn profile has approximately 1,224 followers.
Mohu TV Antennas is classified under the NAICS code 334, which corresponds to Computer and Electronic Product Manufacturing.
No, Mohu TV Antennas does not have a profile on Crunchbase.
Yes, Mohu TV Antennas maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/mohu-inc.
As of December 22, 2025, Rankiteo reports that Mohu TV Antennas has experienced 1 cybersecurity incidents.
Mohu TV Antennas has an estimated 1,929 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an communication strategy with notified affected customers, communication strategy with asked customers to take precautionary steps..
Title: Mohu Data Breach
Description: US consumer electronics company Mohu suffered a data breach in June and July 2015. Its website was injected with malicious code that resulted in the exposure of details of about 2,500 customers. The compromised data included names, addresses, emails, and phone numbers, credit card details like the card number, expiration date, and CVV code. Mohu informed the police and notified the affected customers and asked them to take precautionary steps to prevent any fraudulent activities.
Type: Data Breach
Attack Vector: Malicious Code Injection
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Names, Addresses, Emails, Phone numbers, Credit card details (card number, expiration date, cvv code)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personally Identifiable Information, Payment Information and .

Entity Name: Mohu
Entity Type: Company
Industry: Consumer Electronics
Location: United States
Customers Affected: 2500

Communication Strategy: Notified affected customersAsked customers to take precautionary steps

Type of Data Compromised: Personally identifiable information, Payment information
Number of Records Exposed: 2500
Sensitivity of Data: High
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notified Affected Customers and Asked Customers To Take Precautionary Steps.
Most Significant Data Compromised: The most significant data compromised in an incident were names, addresses, emails, phone numbers, credit card details (card number, expiration date, CVV code) and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were addresses, emails, credit card details (card number, expiration date, CVV code), names and phone numbers.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 250.0.
.png)
Versa SASE Client for Windows versions released between 7.8.7 and 7.9.4 contain a local privilege escalation vulnerability in the audit log export functionality. The client communicates user-controlled file paths to a privileged service, which performs file system operations without impersonating the requesting user. Due to improper privilege handling and a time-of-check time-of-use race condition combined with symbolic link and mount point manipulation, a local authenticated attacker can coerce the service into deleting arbitrary directories with SYSTEM privileges. This can be exploited to delete protected system folders such as C:\\Config.msi and subsequently achieve execution as NT AUTHORITY\\SYSTEM via MSI rollback techniques.
The WP JobHunt plugin for WordPress, used by the JobCareer theme, is vulnerable to unauthorized modification of data due to a missing capability check on the 'cs_update_application_status_callback' function in all versions up to, and including, 7.7. This makes it possible for authenticated attackers, with Candidate-level access and above, to inject cross-site scripting into the 'status' parameter of applied jobs for any user.
The WP JobHunt plugin for WordPress, used by the JobCareer theme, is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 7.7 via the 'cs_update_application_status_callback' due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Candidate-level access and above, to send a site-generated email with injected HTML to any user.
The FiboSearch – Ajax Search for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `thegem_te_search` shortcode in all versions up to, and including, 1.32.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This vulnerability requires TheGem theme (premium) to be installed with Header Builder mode enabled, and the FiboSearch "Replace search bars" option enabled for TheGem integration.
The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.11.0 via the ajax_get_members function. This is due to the use of a predictable low-entropy token (5 hex characters derived from md5 of post ID) to identify member directories and insufficient authorization checks on the unauthenticated AJAX endpoint. This makes it possible for unauthenticated attackers to extract sensitive data including usernames, display names, user roles (including administrator accounts), profile URLs, and user IDs by enumerating predictable directory_id values or brute-forcing the small 16^5 token space.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.