Company Details
national-heritage-board
413
10,520
712
nhb.gov.sg
0
NAT_1971328
In-progress

National Heritage Board Company CyberSecurity Posture
nhb.gov.sgAs the custodian of Singapore’s heritage, the National Heritage Board (NHB) is responsible for telling the Singapore story, sharing the Singaporean experience and imparting our Singapore spirit. NHB’s mission is to preserve and celebrate the shared heritage of our diverse communities, for the purpose of education, nation-building and cultural understanding. It manages the national museums and heritage institutions, and sets policies relating to heritage sites, monuments and the National Collection. Through the National Collection, NHB curates heritage programmes and presents exhibitions to connect the past, present and future generations of Singaporeans. NHB was formed on 1 August 1993, and is a statutory board under the Ministry of Culture, Community and Youth.
Company Details
national-heritage-board
413
10,520
712
nhb.gov.sg
0
NAT_1971328
In-progress
Between 750 and 799

NHB Global Score (TPRM)XXXX



No incidents recorded for National Heritage Board in 2025.
No incidents recorded for National Heritage Board in 2025.
No incidents recorded for National Heritage Board in 2025.
NHB cyber incidents detection timeline including parent company and subsidiaries

As the custodian of Singapore’s heritage, the National Heritage Board (NHB) is responsible for telling the Singapore story, sharing the Singaporean experience and imparting our Singapore spirit. NHB’s mission is to preserve and celebrate the shared heritage of our diverse communities, for the purpose of education, nation-building and cultural understanding. It manages the national museums and heritage institutions, and sets policies relating to heritage sites, monuments and the National Collection. Through the National Collection, NHB curates heritage programmes and presents exhibitions to connect the past, present and future generations of Singaporeans. NHB was formed on 1 August 1993, and is a statutory board under the Ministry of Culture, Community and Youth.


Museum Hours TuesdayFriday 10am5:00pm Saturday 12:00pm5:00pm special showings can be arranged by appointment Admission $5 for adults $3 for children under 12 Our Mission The mission of the Evansville African American Museum is to continually develop a resource and cultural center to collect, preser

Overzicht van een veelkleurig feest Het museum is gehuisvest in het herbouwde poortgebouw van het middeleeuwse Zusters van Orthenklooster. Een idyllische plek gelegen aan het gerestaureerde binnenstadsriviertje "De Binnendieze". Het museum stelt een vaste collectie ten toon bestaande uit all

Located in Canton, Ohio, the birthplace of the National Football League, the Pro Football Hall of Fame is a 501(c)(3) not-for-profit institution with a Mission to Honor the Greatest of the Game, Preserve its History, Promote its Values, & Celebrate Excellence Together! Hundreds of thousands of fan

One of the world’s most significant botanic and sculpture experiences, Frederik Meijer Gardens & Sculpture Park serves more than 750,000 visitors annually. The 158-acre grounds feature Michigan’s largest tropical conservatory; one of the largest children’s gardens in the country; arid and Victorian

For over 90 years, the Seattle Art Museum (SAM) has been a leading visual arts institution in the Pacific Northwest. Through its three locations — the Seattle Art Museum in downtown Seattle, the Seattle Asian Art Museum in Volunteer Park, and the Olympic Sculpture Park on the downtown waterfront — S

The Frontier Culture Museum is the biggest open-air living history museum in the Shenandoah Valley, as well as one of the highest rated family-friendly attractions and one of the top tourist destinations in Virginia. Costumed historical interpreters show the life and customs of the indigenous Native
.png)
The National Heritage Academies® online school is helping students prepare for life after graduation. GRAND RAPIDS, Mich., Nov.
For the first time ever, at Bras Basah MRT station, commuters will come face-to-face with archaeological artefacts unearthed in Singapore.
Another member of the conservative Heritage Foundation has resigned following a video posted by the organization's president defending...
Forced evictions began in the spring in the neighborhood adjacent to the modest al-Maturidi mausoleum. Then the demolition began.
Egypt's former tourism and antiquities minister Khaled El-Enany is set to be confirmed as head of UNESCO on Thursday, despite criticism from...
Singapore's government said on Monday it plans to gazette the site of the home of the city-state's first prime minister as a national...
The Heritage Foundation sought to contain the damage after its president precipitated a crisis on the right by defending Tucker Carlson's...
Heritage Foundation President Kevin Roberts announced staff reassignments on Friday in the wake of the conservative uproar over his...
Maharashtra Cyber identified seven APT groups, primarily Pakistan-allied, responsible for over 1.5 million cyber attacks targeting critical Indian...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of National Heritage Board is http://www.nhb.gov.sg.
According to Rankiteo, National Heritage Board’s AI-generated cybersecurity score is 765, reflecting their Fair security posture.
According to Rankiteo, National Heritage Board currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, National Heritage Board is not certified under SOC 2 Type 1.
According to Rankiteo, National Heritage Board does not hold a SOC 2 Type 2 certification.
According to Rankiteo, National Heritage Board is not listed as GDPR compliant.
According to Rankiteo, National Heritage Board does not currently maintain PCI DSS compliance.
According to Rankiteo, National Heritage Board is not compliant with HIPAA regulations.
According to Rankiteo,National Heritage Board is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
National Heritage Board operates primarily in the Museums, Historical Sites, and Zoos industry.
National Heritage Board employs approximately 413 people worldwide.
National Heritage Board presently has no subsidiaries across any sectors.
National Heritage Board’s official LinkedIn profile has approximately 10,520 followers.
National Heritage Board is classified under the NAICS code 712, which corresponds to Museums, Historical Sites, and Similar Institutions.
No, National Heritage Board does not have a profile on Crunchbase.
Yes, National Heritage Board maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/national-heritage-board.
As of December 03, 2025, Rankiteo reports that National Heritage Board has not experienced any cybersecurity incidents.
National Heritage Board has an estimated 2,134 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, National Heritage Board has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
vLLM is an inference and serving engine for large language models (LLMs). Prior to 0.11.1, vllm has a critical remote code execution vector in a config class named Nemotron_Nano_VL_Config. When vllm loads a model config that contains an auto_map entry, the config class resolves that mapping with get_class_from_dynamic_module(...) and immediately instantiates the returned class. This fetches and executes Python from the remote repository referenced in the auto_map string. Crucially, this happens even when the caller explicitly sets trust_remote_code=False in vllm.transformers_utils.config.get_config. In practice, an attacker can publish a benign-looking frontend repo whose config.json points via auto_map to a separate malicious backend repo; loading the frontend will silently run the backend’s code on the victim host. This vulnerability is fixed in 0.11.1.
fastify-reply-from is a Fastify plugin to forward the current HTTP request to another server. Prior to 12.5.0, by crafting a malicious URL, an attacker could access routes that are not allowed, even though the reply.from is defined for specific routes in @fastify/reply-from. This vulnerability is fixed in 12.5.0.
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to 21.0.2, 20.3.15, and 19.2.17, A Stored Cross-Site Scripting (XSS) vulnerability has been identified in the Angular Template Compiler. It occurs because the compiler's internal security schema is incomplete, allowing attackers to bypass Angular's built-in security sanitization. Specifically, the schema fails to classify certain URL-holding attributes (e.g., those that could contain javascript: URLs) as requiring strict URL security, enabling the injection of malicious scripts. This vulnerability is fixed in 21.0.2, 20.3.15, and 19.2.17.
Gin-vue-admin is a backstage management system based on vue and gin. In 2.8.6 and earlier, attackers can delete any file on the server at will, causing damage or unavailability of server resources. Attackers can control the 'FileMd5' parameter to delete any file and folder.
Portkey.ai Gateway is a blazing fast AI Gateway with integrated guardrails. Prior to 1.14.0, the gateway determined the destination baseURL by prioritizing the value in the x-portkey-custom-host request header. The proxy route then appends the client-specified path to perform an external fetch. This can be maliciously used by users for SSRF attacks. This vulnerability is fixed in 1.14.0.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.