Company Details
nord-vpn
98
17,953
541514
nordvpn.com
0
NOR_6734650
In-progress

NordVPN Company CyberSecurity Posture
nordvpn.comEnsure your privacy online — NordVPN protects you from any third-party snoopers, including your ISP or advertisers. Secure your traffic and connect to public Wi-Fi hotspots without worrying about hackers stealing your data. Surf the net without restrictions — connect to any of our 5600+ servers available in 60 countries.
Company Details
nord-vpn
98
17,953
541514
nordvpn.com
0
NOR_6734650
In-progress
Between 650 and 699

NordVPN Global Score (TPRM)XXXX

Description: One of the most well-known VPN service providers, NordVPN, stated that the Finnish data centre provider, where the server was housed, was to blame for the security breach. NordVPN was not aware that the provider of the data centre employed an unsecure remote administration method. According to NordVPN, the stolen TLS key was no longer valid, making it impossible to decipher VPN communications. According to NordVPN and TorGuard, no user credentials were captured, and no servers outside from the one in question were accessed.
Description: In October 2024, NordVPN received a warrant from the Panamanian government to provide user data as part of a criminal investigation. NordVPN only disclosed payment-related information and confirmed the presence of an account associated with the provided email address, due to its no-logs policy. The incident highlights potential vulnerabilities in data privacy, despite strong security measures and the company's commitment to user privacy.
Description: NordVPN were exposed to vulnerabilities that could have allowed hackers to execute arbitrary code with administrator privileges on computers running Windows. The bugs, CVE-2018-395 were discovered by Cisco Talos security researchers which is similar to another security flaw discovered in March by security consulting firm VerSprite. NordVPN had released patches to fix the original vulnerability. It was still possible to execute code as an administrator albeit through a exploit. The initial vulnerability was due to OpenVPN being able to select a malicious file when choosing a VPN configuration. They use OpenVPN's open-source software to set up secure connections from one point to another. The vulnerability had already been fixed.


No incidents recorded for NordVPN in 2025.
No incidents recorded for NordVPN in 2025.
No incidents recorded for NordVPN in 2025.
NordVPN cyber incidents detection timeline including parent company and subsidiaries

Ensure your privacy online — NordVPN protects you from any third-party snoopers, including your ISP or advertisers. Secure your traffic and connect to public Wi-Fi hotspots without worrying about hackers stealing your data. Surf the net without restrictions — connect to any of our 5600+ servers available in 60 countries.

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate. Our mission is to be the cybersecurity partner of choice, protecting our digital way of life. We help address the world's greatest s

CrowdStrike (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk — endpoints and cloud workloads, identity and data. Powered by the CrowdStrike Security Cloud and world-clas

## Our core business We manage linux / unix server infrastructures and build the efficient and secure networking environments using hardware cutting edge technologies suited to the needs of the project and the client. We believe in quality, opposed to quantity. Our company consists of highly
.png)
Get the NordVPN Black Friday deals and get 3 extra months free on every plan — available for a limited time only.
Discover the top VPN Black Friday 2025 deals from NordVPN, Surfshark, and Proton VPN — with huge discounts, free months, and unbeatable...
NordVPN earns top marks in 2025 West Coast Labs testing, showing industry-leading speed, leak protection, and performance across all...
These days, the best VPNs don't just offer a secure connection: they're bundled with a growing list of cybersecurity features.
With companies releasing Black Friday weeks ahead of time, cybersecurity specialists are sounding the alarm over the rise in scamming...
New York, NY, Nov. 26, 2025 (GLOBE NEWSWIRE) -- Cyber Advice, a leading online resource dedicated to helping regular people with...
The feature extends digital security beyond internet browsing to combat scam callsNEW YORK, Nov. 24, 2025 (GLOBE NEWSWIRE) -- In July,...
Aura delivers full-spectrum security with built-in antivirus, while NordProtect focuses on cybersecurity and automated protection.
NordVPN aimed to drive awareness with a live hacking stunt that educated consumers on just how vulnerable their personal information can be.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of NordVPN is https://nordvpn.com.
According to Rankiteo, NordVPN’s AI-generated cybersecurity score is 686, reflecting their Weak security posture.
According to Rankiteo, NordVPN currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, NordVPN is not certified under SOC 2 Type 1.
According to Rankiteo, NordVPN does not hold a SOC 2 Type 2 certification.
According to Rankiteo, NordVPN is not listed as GDPR compliant.
According to Rankiteo, NordVPN does not currently maintain PCI DSS compliance.
According to Rankiteo, NordVPN is not compliant with HIPAA regulations.
According to Rankiteo,NordVPN is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
NordVPN operates primarily in the Computer and Network Security industry.
NordVPN employs approximately 98 people worldwide.
NordVPN presently has no subsidiaries across any sectors.
NordVPN’s official LinkedIn profile has approximately 17,953 followers.
NordVPN is classified under the NAICS code 541514, which corresponds to Others.
No, NordVPN does not have a profile on Crunchbase.
Yes, NordVPN maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/nord-vpn.
As of December 15, 2025, Rankiteo reports that NordVPN has experienced 3 cybersecurity incidents.
NordVPN has an estimated 3,090 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability and Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with released patches to fix the vulnerability..
Title: NordVPN Vulnerability Exploit
Description: NordVPN was exposed to vulnerabilities that could allow hackers to execute arbitrary code with administrator privileges on computers running Windows.
Type: Vulnerability Exploit
Attack Vector: Exploiting OpenVPN configuration
Vulnerability Exploited: CVE-2018-3952
Title: NordVPN Security Breach
Description: A security breach at NordVPN involved an unsecure remote administration method used by their Finnish data centre provider. A stolen TLS key was reported as expired and no user credentials were compromised.
Type: Security Breach
Attack Vector: Unsecure remote administration method
Vulnerability Exploited: Insecure remote administration access
Title: NordVPN Data Disclosure Incident
Description: In October 2024, NordVPN received a warrant from the Panamanian government to provide user data as part of a criminal investigation. NordVPN only disclosed payment-related information and confirmed the presence of an account associated with the provided email address, due to its no-logs policy. The incident highlights potential vulnerabilities in data privacy, despite strong security measures and the company's commitment to user privacy.
Date Detected: October 2024
Type: Data Disclosure
Vulnerability Exploited: Data Privacy Policy
Threat Actor: Panamanian Government
Motivation: Criminal Investigation
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through OpenVPN configuration and Unsecure remote administration method.

Systems Affected: Windows computers

Systems Affected: One server in Finnish data centre

Data Compromised: Payment-related information, Account presence confirmation
Payment Information Risk: High
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Payment-Related Information, Account Presence Confirmation and .

Entity Name: NordVPN
Entity Type: Company
Industry: Cybersecurity

Entity Name: NordVPN
Entity Type: VPN Service Provider
Industry: Cybersecurity

Entity Name: NordVPN
Entity Type: Company
Industry: VPN Services
Location: Panama

Remediation Measures: Released patches to fix the vulnerability

Data Encryption: TLS key

Type of Data Compromised: Payment-related information, Account presence confirmation
Sensitivity of Data: High
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Released patches to fix the vulnerability, .

Lessons Learned: Potential vulnerabilities in data privacy, despite strong security measures and the company's commitment to user privacy.
Key Lessons Learned: The key lessons learned from past incidents are Potential vulnerabilities in data privacy, despite strong security measures and the company's commitment to user privacy.

Source: Cisco Talos

Source: VerSprite
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Cisco Talos, and Source: VerSprite.

Entry Point: OpenVPN configuration

Entry Point: Unsecure remote administration method

Root Causes: OpenVPN being able to select a malicious file when choosing a VPN configuration
Corrective Actions: Released patches to fix the vulnerability

Root Causes: Insecure remote administration access by data centre provider

Root Causes: Data privacy policy limitations
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Released patches to fix the vulnerability.
Last Attacking Group: The attacking group in the last incident was an Panamanian Government.
Most Recent Incident Detected: The most recent incident detected was on October 2024.
Most Significant Data Compromised: The most significant data compromised in an incident were Payment-related information, Account presence confirmation and .
Most Significant System Affected: The most significant system affected in an incident was One server in Finnish data centre.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Account presence confirmation and Payment-related information.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Potential vulnerabilities in data privacy, despite strong security measures and the company's commitment to user privacy.
Most Recent Source: The most recent source of information about an incident are Cisco Talos and VerSprite.
Most Recent Entry Point: The most recent entry point used by an initial access broker were an Unsecure remote administration method and OpenVPN configuration.
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was OpenVPN being able to select a malicious file when choosing a VPN configuration, Insecure remote administration access by data centre provider, Data privacy policy limitations.
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Released patches to fix the vulnerability.
.png)
NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.
uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.
A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."
MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.
A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.