Company Details
observer-research-foundation
264
90,315
541
orfonline.org
0
OBS_1018225
In-progress

Observer Research Foundation Company CyberSecurity Posture
orfonline.orgSet up in 1990, ORF seeks to lead and aid policy thinking towards building a strong and prosperous India in a fair and equitable world. It helps discover and inform India’s choices, and carries Indian voices and ideas to forums shaping global debates. ORF provides non-partisan, independent analyses and inputs on matters of security, strategy, economy, development, energy, resources and global governance to diverse decision-makers (governments, business communities, academia, civil society). ORF’s mandate is to conduct in-depth research, provide inclusive platforms and invest in tomorrow’s thought leaders today.
Company Details
observer-research-foundation
264
90,315
541
orfonline.org
0
OBS_1018225
In-progress
Between 750 and 799

ORF Global Score (TPRM)XXXX



No incidents recorded for Observer Research Foundation in 2025.
No incidents recorded for Observer Research Foundation in 2025.
No incidents recorded for Observer Research Foundation in 2025.
ORF cyber incidents detection timeline including parent company and subsidiaries

Set up in 1990, ORF seeks to lead and aid policy thinking towards building a strong and prosperous India in a fair and equitable world. It helps discover and inform India’s choices, and carries Indian voices and ideas to forums shaping global debates. ORF provides non-partisan, independent analyses and inputs on matters of security, strategy, economy, development, energy, resources and global governance to diverse decision-makers (governments, business communities, academia, civil society). ORF’s mandate is to conduct in-depth research, provide inclusive platforms and invest in tomorrow’s thought leaders today.


CAS Grow – Die Ideenschmiede der CAS Software AG. Wir verstehen uns innerhalb der Unternehmensgruppe, zwischen Spezialisten für Beziehungsmanagement und digitale Souveränität, als Inkubator und Pionier auf neuen Wegen. Hier wird gefeilt und experimentiert – die Arbeit bei CAS Grow ähnelt der in ei

New Buildings Institute (NBI) is a nonprofit organization working to improve the energy performance of commercial buildings. We work collaboratively with commercial building market players—governments, utilities, energy efficiency advocates and building professionals—to remove barriers to energy eff

Aluminium is our passion. We have always been committed to improve the research and management of such an eclectic and fascinating material. For this reason, we have decided to bring together under one single name the experience, relationships and know-how that the Rota Family has gained in the alum

Bangladeshi companies are yet to fully realize the benefits of wielding brand power. In contrast, a brand mindset always focuses on offering more value and not on price only; it is all about standing for something unique in the minds of the consumer. In this light, Bangladesh Brand Forum (BBF) envis

Founded in the San Francisco Bay Area in 1996, the Alliance of Chief Executives has become a uniquely impactful community of business leaders around the world. Alliance members lead companies in virtually every industry and market sector ranging from early-stage ventures to multi-billion dollar glob

Founded in 1996, the International Institute for Counter-Terrorism (ICT) is one of the leading academic institute for counter-terrorism in the world, facilitating international cooperation in the global struggle against terrorism. ICT is an independent think tank providing expertise in terrorism, co
.png)
As private firms enter cyber geopolitics, state dominance online is eroding—reshaping power, legality, and the ethics of modern cyber...
https://arab.news/rjk9m. Forum's Global Cybersecurity Outlook identifies geopolitical tensions, AI and digital supply chain as key factors...
APT36's targeting of India's BOSS Linux system reveals the expanding scope of Pakistan's cyber-espionage operations, underscoring the urgent...
Beijing's cyber offensives are redrawing Indo-Pacific fault lines. States are striking back with varied strategies, and India can no longer...
Discover the growth, challenges, and future roadmap of the Digital India Mission in transforming governance and public services.
India's drive to modernise and digitise its port infrastructure demands the urgent integration of robust cybersecurity measures,...
India advances quantum communication to secure data beyond classical encryption through its National Quantum Mission.
As India launched Operation Sindoor, cyberspace turned into a war theatre—with malware, disinformation, and digital offensives—marking a new...
As cyber operations blur with psychological warfare, India must build resilience not just in systems, but in narratives, perception,...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Observer Research Foundation is http://www.orfonline.org.
According to Rankiteo, Observer Research Foundation’s AI-generated cybersecurity score is 754, reflecting their Fair security posture.
According to Rankiteo, Observer Research Foundation currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Observer Research Foundation is not certified under SOC 2 Type 1.
According to Rankiteo, Observer Research Foundation does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Observer Research Foundation is not listed as GDPR compliant.
According to Rankiteo, Observer Research Foundation does not currently maintain PCI DSS compliance.
According to Rankiteo, Observer Research Foundation is not compliant with HIPAA regulations.
According to Rankiteo,Observer Research Foundation is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Observer Research Foundation operates primarily in the Think Tanks industry.
Observer Research Foundation employs approximately 264 people worldwide.
Observer Research Foundation presently has no subsidiaries across any sectors.
Observer Research Foundation’s official LinkedIn profile has approximately 90,315 followers.
No, Observer Research Foundation does not have a profile on Crunchbase.
Yes, Observer Research Foundation maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/observer-research-foundation.
As of December 06, 2025, Rankiteo reports that Observer Research Foundation has not experienced any cybersecurity incidents.
Observer Research Foundation has an estimated 817 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Observer Research Foundation has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Sigstore Timestamp Authority is a service for issuing RFC 3161 timestamps. Prior to 2.0.3, Function api.ParseJSONRequest currently splits (via a call to strings.Split) an optionally-provided OID (which is untrusted data) on periods. Similarly, function api.getContentType splits the Content-Type header (which is also untrusted data) on an application string. As a result, in the face of a malicious request with either an excessively long OID in the payload containing many period characters or a malformed Content-Type header, a call to api.ParseJSONRequest or api.getContentType incurs allocations of O(n) bytes (where n stands for the length of the function's argument). This vulnerability is fixed in 2.0.3.
Monkeytype is a minimalistic and customizable typing test. In 25.49.0 and earlier, there is improper handling of user input which allows an attacker to execute malicious javascript on anyone viewing a malicious quote submission. quote.text and quote.source are user input, and they're inserted straight into the DOM. If they contain HTML tags, they will be rendered (after some escaping using quotes and textarea tags).
SysReptor is a fully customizable pentest reporting platform. Prior to 2025.102, there is a Stored Cross-Site Scripting (XSS) vulnerability allows authenticated users to execute malicious JavaScript in the context of other logged-in users by uploading malicious JavaScript files in the web UI. This vulnerability is fixed in 2025.102.
Taiko Alethia is an Ethereum-equivalent, permissionless, based rollup designed to scale Ethereum without compromising its fundamental properties. In 2.3.1 and earlier, TaikoInbox._verifyBatches (packages/protocol/contracts/layer1/based/TaikoInbox.sol:627-678) advanced the local tid to whatever transition matched the current blockHash before knowing whether that batch would actually be verified. When the loop later broke (e.g., cooldown window not yet passed or transition invalidated), the function still wrote that newer tid into batches[lastVerifiedBatchId].verifiedTransitionId after decrementing batchId. Result: the last verified batch could end up pointing at a transition index from the next batch (often zeroed), corrupting the verified chain pointer.
A flaw has been found in youlaitech youlai-mall 1.0.0/2.0.0. Affected is the function getById/updateAddress/deleteAddress of the file /mall-ums/app-api/v1/addresses/. Executing manipulation can lead to improper control of dynamically-identified variables. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.