Company Details
nakivo
176
8,548
5112
nakivo.com
0
NAK_1929798
In-progress

NAKIVO Company CyberSecurity Posture
nakivo.comNAKIVO is a US-based corporation dedicated to delivering the ultimate backup, ransomware protection and disaster recovery solution for virtual, physical, cloud and SaaS environments. As one of the fastest-growing backup and ransomware recovery software vendors in the industry, NAKIVO boasts 24 consecutive quarters of double-digit growth, 5-star online community reviews, 98% customer satisfaction with support and a network of over 8000 partners worldwide. Over 30,000 active customers in 183 countries trust NAKIVO with protecting their data, including major companies like Honda, Cisco, Coca-Cola and Siemens.
Company Details
nakivo
176
8,548
5112
nakivo.com
0
NAK_1929798
In-progress
Between 750 and 799

NAKIVO Global Score (TPRM)XXXX

Description: A critical vulnerability identified as CVE-2024-48248 in Nakivo Backup & Replication allows for unauthenticated arbitrary file reads, potentially leading to sensitive data exposure. Despite the severity, Nakivo was initially unresponsive and later resolved the issue silently, compromising transparency. The lack of a public advisory continued to leave many systems at risk. Discovered by watchTowr Labs, this flaw affects numerous versions and has been found in over 200 instances globally, with significant concentrations in France and the United States. The vulnerability provides attackers access to crucial system files and backup data, posing a high risk of data breach and infrastructure compromise.
Description: The critical vulnerability identified in NAKIVO Backup and Replication solutions, labeled as CVE-2024-48248, can result in unauthorized arbitrary file reads from vulnerable systems. This vulnerability was actively exploited, thereby allowing attackers to access sensitive files that could include credentials and configuration data. Impact of this vulnerability could extend to sensitive data exposure, and potentially be leveraged in ransomware attacks that could disable recovery options and extract valuable data such as database credentials, AWS keys, and SSH keys. Organizations using the affected versions were urged to update to patch the flaw and secure their backup infrastructure.


No incidents recorded for NAKIVO in 2025.
No incidents recorded for NAKIVO in 2025.
No incidents recorded for NAKIVO in 2025.
NAKIVO cyber incidents detection timeline including parent company and subsidiaries

NAKIVO is a US-based corporation dedicated to delivering the ultimate backup, ransomware protection and disaster recovery solution for virtual, physical, cloud and SaaS environments. As one of the fastest-growing backup and ransomware recovery software vendors in the industry, NAKIVO boasts 24 consecutive quarters of double-digit growth, 5-star online community reviews, 98% customer satisfaction with support and a network of over 8000 partners worldwide. Over 30,000 active customers in 183 countries trust NAKIVO with protecting their data, including major companies like Honda, Cisco, Coca-Cola and Siemens.

Atlassian powers the collaboration that helps teams accomplish what would otherwise be impossible alone. From space missions and motor racing to bugs in code and IT requests, no task is too large or too small with the right team, the right tools, and the right practices. Over 300,000 global compa

HubSpot is a leading CRM platform that provides software and support to help businesses grow better. Our platform includes marketing, sales, service, and website management products that start free and scale to meet our customers’ needs at any stage of growth. Today, thousands of customers around th

Grab is Southeast Asia’s leading superapp, offering a suite of services consisting of deliveries, mobility, financial services, enterprise and others. Grabbers come from all over the world, and we are united by a common mission: to drive Southeast Asia forward by creating economic empowerment for ev

Olá, somos a TOTVS! A maior empresa de tecnologia do Brasil. 🤓 Líder absoluta em sistemas e plataformas para empresas, a TOTVS possui mais de 70 mil clientes. Indo muito além do ERP, oferece tecnologia completa para digitalização dos negócios por meio de 3 unidades de negócio: - Gestão: ERPs, sol

The Bosch Group’s strategic objective is to create solutions for a connected life. Bosch improves quality of life worldwide with innovative products and services that are "Invented for life" and spark enthusiasm. Podcast: http://bit.ly/beyondbosch Imprint: https://www.bosch.us/corporate-informatio

Dassault Systèmes is a catalyst for human progress. Since 1981, the company has pioneered virtual worlds to improve real life for consumers, patients and citizens. With Dassault Systèmes’ 3DEXPERIENCE platform, 370,000 customers of all sizes, in all industries, can collaborate, imagine and create

NiCE is transforming the world with AI that puts people first. Our purpose-built AI-powered platforms automate engagements into proactive, safe, intelligent actions, empowering individuals and organizations to innovate and act, from interaction to resolution. Trusted by organizations throughout 150
PhonePe Group is India’s leading fintech company, proudly recognized as India’s #1 Trusted Digital Payments* Brand for three consecutive years. Our flagship product, the PhonePe app was launched in August 2016, has rapidly become the preferred consumer payments app in India. In just eight years, Pho

Just Eat Takeaway.com is a leading global online delivery marketplace, connecting consumers and restaurants through our platform in 19 countries. Like a dinner table, working at JET brings our office employees and couriers together. From coding to customer service to couriers, JET is a
.png)
Channel-based firms continue to report growth and new alliances with technology partners to help tackle emerging markets.
NAKIVO Backup & Replication v11.1 expands disaster recovery with real-time replication, enhanced Proxmox VE support, and granular physical...
Palo Alto Networks, a leading American cybersecurity company, is pioneering the integration of Artificial Intelligence (AI) in the realm of network and...
The newest version includes five additional languages, introduces more Proxmox VE backup and recovery functions, automates real-time replication,...
This latest update adds 5 new languages to the interface, more Proxmox VE backup and recovery options, automated real-time replication, enhanced MSP direct...
NAKIVO has announced v11.1 of its Backup & Replication software and so we thought it would be. a good time to take a look at the company.
Rubrik and NinjaOne have struck channel technology deals with CrowdStrike. First, Rubrik has announced an expanded integration with the...
UK-based IT services provider Celerity has acquired cyber firm Silverstring. Founded in 2002, Celerity focuses on cybersecurity and hybrid cloud systems.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a high-severity security flaw impacting NAKIVO Backup...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of NAKIVO is https://www.nakivo.com.
According to Rankiteo, NAKIVO’s AI-generated cybersecurity score is 750, reflecting their Fair security posture.
According to Rankiteo, NAKIVO currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, NAKIVO is not certified under SOC 2 Type 1.
According to Rankiteo, NAKIVO does not hold a SOC 2 Type 2 certification.
According to Rankiteo, NAKIVO is not listed as GDPR compliant.
According to Rankiteo, NAKIVO does not currently maintain PCI DSS compliance.
According to Rankiteo, NAKIVO is not compliant with HIPAA regulations.
According to Rankiteo,NAKIVO is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
NAKIVO operates primarily in the Software Development industry.
NAKIVO employs approximately 176 people worldwide.
NAKIVO presently has no subsidiaries across any sectors.
NAKIVO’s official LinkedIn profile has approximately 8,548 followers.
NAKIVO is classified under the NAICS code 5112, which corresponds to Software Publishers.
No, NAKIVO does not have a profile on Crunchbase.
Yes, NAKIVO maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/nakivo.
As of November 29, 2025, Rankiteo reports that NAKIVO has experienced 2 cybersecurity incidents.
NAKIVO has an estimated 26,782 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with update to patch the flaw..
Title: CVE-2024-48248 Vulnerability in Nakivo Backup & Replication
Description: A critical vulnerability identified as CVE-2024-48248 in Nakivo Backup & Replication allows for unauthenticated arbitrary file reads, potentially leading to sensitive data exposure. Despite the severity, Nakivo was initially unresponsive and later resolved the issue silently, compromising transparency. The lack of a public advisory continued to leave many systems at risk. Discovered by watchTowr Labs, this flaw affects numerous versions and has been found in over 200 instances globally, with significant concentrations in France and the United States. The vulnerability provides attackers access to crucial system files and backup data, posing a high risk of data breach and infrastructure compromise.
Type: Vulnerability Exploitation
Attack Vector: Unauthenticated Arbitrary File Reads
Vulnerability Exploited: CVE-2024-48248
Title: NAKIVO Backup and Replication Vulnerability (CVE-2024-48248)
Description: The critical vulnerability identified in NAKIVO Backup and Replication solutions, labeled as CVE-2024-48248, can result in unauthorized arbitrary file reads from vulnerable systems. This vulnerability was actively exploited, thereby allowing attackers to access sensitive files that could include credentials and configuration data. Impact of this vulnerability could extend to sensitive data exposure, and potentially be leveraged in ransomware attacks that could disable recovery options and extract valuable data such as database credentials, AWS keys, and SSH keys. Organizations using the affected versions were urged to update to patch the flaw and secure their backup infrastructure.
Type: Vulnerability Exploitation
Attack Vector: Unauthorized Arbitrary File Reads
Vulnerability Exploited: CVE-2024-48248
Motivation: Data ExfiltrationPotential Ransomware
Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

Data Compromised: System files, Backup data
Systems Affected: Nakivo Backup & Replication

Data Compromised: Credentials, Configuration data, Database credentials, Aws keys, Ssh keys
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are System Files, Backup Data, , Credentials, Configuration Data, Database Credentials, Aws Keys, Ssh Keys and .

Entity Name: Nakivo
Entity Type: Software Company
Industry: Technology
Location: FranceUnited States

Entity Name: NAKIVO
Entity Type: Software Vendor
Industry: Technology

Remediation Measures: Update to patch the flaw

Type of Data Compromised: System files, Backup data
Sensitivity of Data: High

Type of Data Compromised: Credentials, Configuration data, Database credentials, Aws keys, Ssh keys
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Update to patch the flaw, .

Data Exfiltration: True

Recommendations: Update to patch the flaw, Secure backup infrastructureUpdate to patch the flaw, Secure backup infrastructure

Source: watchTowr Labs
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: watchTowr Labs.
Most Significant Data Compromised: The most significant data compromised in an incident were System files, Backup data, , Credentials, Configuration Data, Database Credentials, AWS Keys, SSH Keys and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Database Credentials, AWS Keys, SSH Keys, System files, Backup data, Credentials and Configuration Data.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Secure backup infrastructure and Update to patch the flaw.
Most Recent Source: The most recent source of information about an incident is watchTowr Labs.
.png)
Exposure of credentials in unintended requests in Devolutions Server, Remote Desktop Manager on Windows.This issue affects Devolutions Server: through 2025.3.8.0; Remote Desktop Manager: through 2025.3.23.0.
Out-of-bounds memory operations in org.lz4:lz4-java 1.8.0 and earlier allow remote attackers to cause denial of service and read adjacent memory via untrusted compressed input.
Reveals plaintext credentials in the MONITOR command vulnerability in Apache Kvrocks. This issue affects Apache Kvrocks: from 1.0.0 through 2.13.0. Users are recommended to upgrade to version 2.14.0, which fixes the issue.
Improper Privilege Management vulnerability in Apache Kvrocks. This issue affects Apache Kvrocks: from v2.9.0 through v2.13.0. Users are recommended to upgrade to version 2.14.0, which fixes the issue.
File upload vulnerability in HCL Technologies Ltd. Unica 12.0.0.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.