Company Details
northeastern-university
17,530
500,780
6113
northeastern.edu
337
NOR_9976645
Completed


Northeastern University Company CyberSecurity Posture
northeastern.eduFounded in 1898, Northeastern is a global research university with a distinctive, experience-driven approach to education and discovery. The university is a leader in experiential learning, powered by the world’s most far-reaching cooperative education program. We integrate classroom study with opportunities for professional work, research, service, and global learning in more than 100 countries. The same spirit of collaboration guides a use-inspired research enterprise focused on solving global challenges in health, security, and sustainability. Northeastern offers a comprehensive array of undergraduate and graduate programs leading to degrees through the doctorate in nine colleges and schools, and select graduate programs at campuses in Boston, Charlotte, N.C., San Francisco Bay Area, Seattle, and Toronto. Campuses in Burlington, MA, and Nahant, MA, are home to research institutes for homeland security and coastal sustainability, respectively.
Company Details
northeastern-university
17,530
500,780
6113
northeastern.edu
337
NOR_9976645
Completed
Between 800 and 849

Northeastern University Global Score (TPRM)XXXX



No incidents recorded for Northeastern University in 2026.
No incidents recorded for Northeastern University in 2026.
No incidents recorded for Northeastern University in 2026.
Northeastern University cyber incidents detection timeline including parent company and subsidiaries

Founded in 1898, Northeastern is a global research university with a distinctive, experience-driven approach to education and discovery. The university is a leader in experiential learning, powered by the world’s most far-reaching cooperative education program. We integrate classroom study with opportunities for professional work, research, service, and global learning in more than 100 countries. The same spirit of collaboration guides a use-inspired research enterprise focused on solving global challenges in health, security, and sustainability. Northeastern offers a comprehensive array of undergraduate and graduate programs leading to degrees through the doctorate in nine colleges and schools, and select graduate programs at campuses in Boston, Charlotte, N.C., San Francisco Bay Area, Seattle, and Toronto. Campuses in Burlington, MA, and Nahant, MA, are home to research institutes for homeland security and coastal sustainability, respectively.


Stanford is a place of discovery, creativity and innovation located in the San Francisco Bay Area on the ancestral land of the Muwekma Ohlone Tribe. Dedicated to our founding mission—benefitting society through research and education—we are working toward a sustainable future, accelerating the impac

ETH Zurich – Where the future begins Freedom and individual responsibility, entrepreneurial spirit and open-mindedness: ETH Zurich stands on a bedrock of true Swiss values. Our university for science and technology dates back to the year 1855, when the founders of modern-day Switzerland created it

Université de Montréal and its two affiliated schools, Polytechnique Montréal and HEC Montréal, is Quebec's biggest university complex and one of the largest in North America. Its 450,000 graduates make their presence felt around the globe and in every sphere of activity. Since 2018, UdeM has consis

We are Mizzou! Our distinct mission, as Missouri's only state-supported member of the Association of American Universities, is to provide all Missourians the benefits of a world-class research university. We are stewards and builders of a priceless state resource, a unique physical infrastructure an

Washington University in St. Louis, a medium-sized, independent university, is dedicated to challenging its faculty and students alike to seek new knowledge and greater understanding of an ever-changing, multicultural world. The university has played an integral role in the history and continuing gr

School of Visual Arts has been a leader in the education of artists, designers, and creative professionals for more than seven decades. With a faculty of distinguished working professionals, a dynamic curriculum, and an emphasis on critical thinking, SVA is a catalyst for innovation and social respo

Welcome to the official LinkedIn page for the University of Birmingham . We have been challenging and developing great minds for more than a century. Characterised by a tradition of innovation, research at the University has broken new ground, pushed forward the boundaries of knowledge and made an i

Lund University has around 46 000 students and 8 600 staff based in Lund, Helsingborg and Malmö. We are united in our efforts to understand, explain and improve our world and the human condition. Lund is considered one of the most popular study locations in Sweden. The University offers one of the

The University of Utah, located in Salt Lake City in the foothills of the Wasatch Mountains, is the flagship institution of higher learning in Utah. Founded in 1850, it serves over 31,000 students from across the U.S. and the world. With over 72 major subjects at the undergraduate level and more tha
.png)
Iran's internet blackout continues. Experts explain how the government has the power to shut down the internet countrywide.
Session 7D: ML Security Authors, Creators & Presenters: Ruyi Ding (Northeastern University), Tong Zhou (Northeastern University),...
TAHLEQUAH, Okla.— Northeastern State University's cybersecurity program is now ranked second-best in Oklahoma. FOX23 visited NSU on Monday...
Northeastern University graduate student Sai Neeharika Eddula wants to be a chief information security officer by the time she's 40.
Army Green to Gold is a program where active-duty enlisted soldiers can earn their degree and become a commissioned officer.
This Northeastern University grad helps develop guidance to keep cloud-based services safe, for companies and their customers.
David Choffnes says the AWS outage is yet another example of the fragility of our internet infrastructure.
The Country to Country (C2C) Capture the Flag (CTF) contest is an international competition that issues challenges to code, decrypt, search,...
Northeastern State University has teamed up with the University of Tulsa to host a cybersecutiy camp for middle-schoolers in the Tulsa area.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Northeastern University is http://northeastern.edu.
According to Rankiteo, Northeastern University’s AI-generated cybersecurity score is 806, reflecting their Good security posture.
According to Rankiteo, Northeastern University currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Northeastern University has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Northeastern University is not certified under SOC 2 Type 1.
According to Rankiteo, Northeastern University does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Northeastern University is not listed as GDPR compliant.
According to Rankiteo, Northeastern University does not currently maintain PCI DSS compliance.
According to Rankiteo, Northeastern University is not compliant with HIPAA regulations.
According to Rankiteo,Northeastern University is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Northeastern University operates primarily in the Higher Education industry.
Northeastern University employs approximately 17,530 people worldwide.
Northeastern University presently has no subsidiaries across any sectors.
Northeastern University’s official LinkedIn profile has approximately 500,780 followers.
Northeastern University is classified under the NAICS code 6113, which corresponds to Colleges, Universities, and Professional Schools.
No, Northeastern University does not have a profile on Crunchbase.
Yes, Northeastern University maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/northeastern-university.
As of January 23, 2026, Rankiteo reports that Northeastern University has not experienced any cybersecurity incidents.
Northeastern University has an estimated 15,179 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Northeastern University has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Improper validation of specified type of input in M365 Copilot allows an unauthorized attacker to disclose information over a network.
Improper access control in Azure Front Door (AFD) allows an unauthorized attacker to elevate privileges over a network.
Azure Entra ID Elevation of Privilege Vulnerability
Moonraker is a Python web server providing API access to Klipper 3D printing firmware. In versions 0.9.3 and below, instances configured with the "ldap" component enabled are vulnerable to LDAP search filter injection techniques via the login endpoint. The 401 error response message can be used to determine whether or not a search was successful, allowing for brute force methods to discover LDAP entries on the server such as user IDs and user attributes. This issue has been fixed in version 0.10.0.
Runtipi is a Docker-based, personal homeserver orchestrator that facilitates multiple services on a single server. Versions 3.7.0 and above allow an authenticated user to execute arbitrary system commands on the host server by injecting shell metacharacters into backup filenames. The BackupManager fails to sanitize the filenames of uploaded backups. The system persists user-uploaded files directly to the host filesystem using the raw originalname provided in the request. This allows an attacker to stage a file containing shell metacharacters (e.g., $(id).tar.gz) at a predictable path, which is later referenced during the restore process. The successful storage of the file is what allows the subsequent restore command to reference and execute it. This issue has been fixed in version 4.7.0.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.