ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

The Observer Research Foundation America (ORF America) is an independent, non-partisan, and nonprofit organization in Washington DC dedicated to addressing policy challenges facing the United States, India, and their partners in a rapidly changing world. ORF America produces research, curates diverse and inclusive platforms, and develops networks for cooperation between the developed and developing worlds based on common values and shared interests. Its areas of focus are international affairs and security, technology policy, energy and climate, and economic development. Established in 2020, ORF America is an overseas affiliate of the Observer Research Foundation (ORF), India’s premier non-government think tank.

Observer Research Foundation America A.I CyberSecurity Scoring

ORFA

Company Details

Linkedin ID:

observer-research-foundation-america

Employees number:

30

Number of followers:

8,040

NAICS:

54172

Industry Type:

Think Tanks

Homepage:

orfamerica.org

IP Addresses:

0

Company ID:

OBS_1053275

Scan Status:

In-progress

AI scoreORFA Risk Score (AI oriented)

Between 700 and 749

https://images.rankiteo.com/companyimages/observer-research-foundation-america.jpeg
ORFA Think Tanks
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreORFA Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/observer-research-foundation-america.jpeg
ORFA Think Tanks
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

ORFA Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Government entities and think tanks (targeted by Kimsuky)Cyber Attack100811/2025
Rankiteo Explanation :
Attack that could bring to a war

Description: Security researchers uncovered a **sophisticated multi-stage attack campaign** by **Kimsuky**, a North Korean state-sponsored threat group, targeting government agencies and think tanks. The attack leveraged **Visual Studio Code extensions, GitHub, and compromised subdomains (e.g., *iuh234.medianewsonline[.]com*)** as command-and-control (C2) infrastructure to deploy **ransomware and reconnaissance malware**. The infection chain began with a **JavaScript file (*Themes.js*)**, which downloaded secondary payloads to harvest **system details, running processes, and files from the *Users* directory**. Collected data was **exfiltrated via encoded cabinet files** using *certutil* (a Living-Off-The-Land Binary) to evade detection. Persistence was established via a **scheduled task (*Windows Theme Manager*)**, ensuring long-term access even after reboots. The campaign demonstrated **espionage-focused tactics**, with attackers conducting **extensive system reconnaissance** before potential ransomware deployment. The use of **legitimate platforms (GitHub, VS Code extensions) for C2** and **social engineering lures (e.g., *E-CARD.docx*)** highlights the group’s ability to bypass traditional defenses. The attack poses severe risks to **national security, sensitive government data, and critical infrastructure**, with implications for **geopolitical stability** if high-value intelligence is compromised.

Government entities and think tanks (targeted by Kimsuky)
Cyber Attack
Severity: 100
Impact: 8
Seen: 11/2025
Blog:
Rankiteo Explanation
Attack that could bring to a war

Description: Security researchers uncovered a **sophisticated multi-stage attack campaign** by **Kimsuky**, a North Korean state-sponsored threat group, targeting government agencies and think tanks. The attack leveraged **Visual Studio Code extensions, GitHub, and compromised subdomains (e.g., *iuh234.medianewsonline[.]com*)** as command-and-control (C2) infrastructure to deploy **ransomware and reconnaissance malware**. The infection chain began with a **JavaScript file (*Themes.js*)**, which downloaded secondary payloads to harvest **system details, running processes, and files from the *Users* directory**. Collected data was **exfiltrated via encoded cabinet files** using *certutil* (a Living-Off-The-Land Binary) to evade detection. Persistence was established via a **scheduled task (*Windows Theme Manager*)**, ensuring long-term access even after reboots. The campaign demonstrated **espionage-focused tactics**, with attackers conducting **extensive system reconnaissance** before potential ransomware deployment. The use of **legitimate platforms (GitHub, VS Code extensions) for C2** and **social engineering lures (e.g., *E-CARD.docx*)** highlights the group’s ability to bypass traditional defenses. The attack poses severe risks to **national security, sensitive government data, and critical infrastructure**, with implications for **geopolitical stability** if high-value intelligence is compromised.

Ailogo

ORFA Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for ORFA

Incidents vs Think Tanks Industry Average (This Year)

Observer Research Foundation America has 0.0% fewer incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

Observer Research Foundation America has 53.85% more incidents than the average of all companies with at least one recorded incident.

Incident Types ORFA vs Think Tanks Industry Avg (This Year)

Observer Research Foundation America reported 1 incidents this year: 1 cyber attacks, 0 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.

Incident History — ORFA (X = Date, Y = Severity)

ORFA cyber incidents detection timeline including parent company and subsidiaries

ORFA Company Subsidiaries

SubsidiaryImage

The Observer Research Foundation America (ORF America) is an independent, non-partisan, and nonprofit organization in Washington DC dedicated to addressing policy challenges facing the United States, India, and their partners in a rapidly changing world. ORF America produces research, curates diverse and inclusive platforms, and develops networks for cooperation between the developed and developing worlds based on common values and shared interests. Its areas of focus are international affairs and security, technology policy, energy and climate, and economic development. Established in 2020, ORF America is an overseas affiliate of the Observer Research Foundation (ORF), India’s premier non-government think tank.

Loading...
similarCompanies

ORFA Similar Companies

Asset Leadership Network

The Asset Leadership Network is an industry organization focused on impacting asset management across all industries, markets and sectors that are dependent on physical assets and non-tangible assets to achieve strategic organizational objectives. Simply stated, asset management helps organizations

Policymaking should be driven by those with the most at stake in our policy decisions. Next100 is trying to make that happen. Next100 is a startup think tank created for—and by—the next generation of policy leaders. We envision a future in which the policy space is inclusive of and driven by a diver

ProdigyWorks

Innovation is critical in today’s environment. But true innovation is often elusive, expensive or too slow. What if you had exclusive access to the world’s smartest minds, extraordinary creative talent and a global network of industry experts? How would you look if you could deliver meaningful resu

Resources for the Future

Resources for the Future improves environmental, energy, and natural resource decisions through impartial economic research and policy engagement. RFF is committed to being the most widely trusted source of research insights and policy solutions leading to a healthy environment and a thriving econo

Jain Family Institute

The Jain Family Institute is a nonpartisan applied research organization in the social sciences. We work to bring research and policy from conception in theory to implementation in society. A 501(c)(3) nonprofit based in NYC, we were founded in 2014 by Bob Jain, Co-Chief Investment Officer of Mille

American Growth Project

The United States is home not to one, but more than 100 distinct economies. Our cities, towns, suburbs and rural communities hold the key to understanding both current and forecasted national trends – but for far too long, our nation’s microeconomic data has been lacking. The American Growth Projec

newsone

ORFA CyberSecurity News

October 28, 2025 07:00 AM
Private Power and the Future of Cyber Conflict

As private firms enter cyber geopolitics, state dominance online is eroding—reshaping power, legality, and the ethics of modern cyber...

October 15, 2025 07:00 AM
‘Time to rethink safety’: Cybersecurity leaders stress urgent action against expanding digital risks at WEF forum

https://arab.news/rjk9m. Forum's Global Cybersecurity Outlook identifies geopolitical tensions, AI and digital supply chain as key factors...

September 17, 2025 07:00 AM
Deterrence, Trade, and Vulnerability: Re-imagining America’s Port-Led Architecture in the Trump Era

America's Port-Led Architecture balances commerce, security, and Indo-Pacific partnerships in the Trump era.

September 10, 2025 07:00 AM
Indo-Pacific Responses to Chinese Cyber Hegemony

Beijing's cyber offensives are redrawing Indo-Pacific fault lines. States are striking back with varied strategies, and India can no longer...

August 01, 2025 07:00 AM
Security of Energy Infrastructure on the Frontline

With drones, cyberattacks, and geopolitical flashpoints converging, India's energy grid is under a multidimensional threat.

July 17, 2025 07:00 AM
Securing Indian Ports: Cybersecurity Vulnerabilities and the Road Ahead

India's drive to modernise and digitise its port infrastructure demands the urgent integration of robust cybersecurity measures,...

June 23, 2025 07:00 AM
Quantum Communication and Encryption: Significance, Global Progress, and Implications

India advances quantum communication to secure data beyond classical encryption through its National Quantum Mission.

May 28, 2025 07:00 AM
Operation Sindoor and India’s Cyber Threat Landscape

As India launched Operation Sindoor, cyberspace turned into a war theatre—with malware, disinformation, and digital offensives—marking a new...

May 17, 2025 07:00 AM
Rethinking India’s Cyber Readiness in the Age of Information Warfare

As cyber operations blur with psychological warfare, India must build resilience not just in systems, but in narratives, perception,...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

ORFA CyberSecurity History Information

Official Website of Observer Research Foundation America

The official website of Observer Research Foundation America is https://orfamerica.org.

Observer Research Foundation America’s AI-Generated Cybersecurity Score

According to Rankiteo, Observer Research Foundation America’s AI-generated cybersecurity score is 732, reflecting their Moderate security posture.

How many security badges does Observer Research Foundation America’ have ?

According to Rankiteo, Observer Research Foundation America currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Observer Research Foundation America have SOC 2 Type 1 certification ?

According to Rankiteo, Observer Research Foundation America is not certified under SOC 2 Type 1.

Does Observer Research Foundation America have SOC 2 Type 2 certification ?

According to Rankiteo, Observer Research Foundation America does not hold a SOC 2 Type 2 certification.

Does Observer Research Foundation America comply with GDPR ?

According to Rankiteo, Observer Research Foundation America is not listed as GDPR compliant.

Does Observer Research Foundation America have PCI DSS certification ?

According to Rankiteo, Observer Research Foundation America does not currently maintain PCI DSS compliance.

Does Observer Research Foundation America comply with HIPAA ?

According to Rankiteo, Observer Research Foundation America is not compliant with HIPAA regulations.

Does Observer Research Foundation America have ISO 27001 certification ?

According to Rankiteo,Observer Research Foundation America is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Observer Research Foundation America

Observer Research Foundation America operates primarily in the Think Tanks industry.

Number of Employees at Observer Research Foundation America

Observer Research Foundation America employs approximately 30 people worldwide.

Subsidiaries Owned by Observer Research Foundation America

Observer Research Foundation America presently has no subsidiaries across any sectors.

Observer Research Foundation America’s LinkedIn Followers

Observer Research Foundation America’s official LinkedIn profile has approximately 8,040 followers.

NAICS Classification of Observer Research Foundation America

Observer Research Foundation America is classified under the NAICS code 54172, which corresponds to Research and Development in the Social Sciences and Humanities.

Observer Research Foundation America’s Presence on Crunchbase

No, Observer Research Foundation America does not have a profile on Crunchbase.

Observer Research Foundation America’s Presence on LinkedIn

Yes, Observer Research Foundation America maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/observer-research-foundation-america.

Cybersecurity Incidents Involving Observer Research Foundation America

As of December 05, 2025, Rankiteo reports that Observer Research Foundation America has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Observer Research Foundation America has an estimated 812 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Observer Research Foundation America ?

Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.

How does Observer Research Foundation America detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an enhanced monitoring with monitor suspicious javascript execution, enhanced monitoring with track unusual scheduled task creation, enhanced monitoring with detect unexpected network communications to legitimate services..

Incident Details

Can you provide details on each incident ?

Incident : Espionage

Title: Kimsuky Multi-Stage Malware Campaign Leveraging VS Code Extensions and GitHub for C2

Description: Security researchers uncovered a sophisticated attack campaign by Kimsuky, a North Korean-backed threat group, using Visual Studio Code extensions and GitHub as command-and-control (C2) infrastructure. The campaign delivers multi-stage malware capable of deploying ransomware and conducting system reconnaissance. The initial infection vector is a JavaScript file (Themes.js) that downloads additional payloads from adversary-controlled domains (e.g., iuh234[.]medianewsonline[.]com). The malware collects system details, enumerates processes, and exfiltrates data via POST requests, using certutil for encoding. Persistence is achieved through a scheduled task named 'Windows Theme Manager,' and a decoy Word document (E-CARD.docx) suggests social engineering testing. The campaign highlights Kimsuky’s use of legitimate services for evasion and multi-stage payload delivery.

Type: Espionage

Attack Vector: Malicious JavaScript (Themes.js)Legitimate Services Abuse (GitHub, Median News subdomains)Scheduled Task PersistenceSocial Engineering (E-CARD.docx decoy)

Threat Actor: Kimsuky (North Korean-backed APT group)

Motivation: EspionagePotential Ransomware DeploymentHigh-Value Target Reconnaissance

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Themes.js (JavaScript file).

Impact of the Incidents

What was the impact of each incident ?

Incident : Espionage OBS1093010110625

Data Compromised: System details, Running processes, Files in users directory, Computer name

Operational Impact: Persistent access via scheduled tasksData exfiltrationPotential follow-on ransomware/espionage

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are System Metadata, Process Lists, User Directory Files and .

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Espionage OBS1093010110625

Enhanced Monitoring: Monitor suspicious JavaScript executionTrack unusual scheduled task creationDetect unexpected network communications to legitimate services

Data Breach Information

What type of data was compromised in each breach ?

Incident : Espionage OBS1093010110625

Type of Data Compromised: System metadata, Process lists, User directory files

Sensitivity of Data: Moderate to High (system reconnaissance data)

Data Encryption: ['Certutil (LOLBIN) for cabinet file encoding']

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : Espionage OBS1093010110625

Data Exfiltration: True

Lessons Learned and Recommendations

What lessons were learned from each incident ?

Incident : Espionage OBS1093010110625

Lessons Learned: State-sponsored actors exploit legitimate platforms (GitHub, VS Code extensions) for C2 infrastructure., Multi-stage JavaScript payloads with LOLBINs (e.g., certutil) evade traditional detection., Persistence via scheduled tasks and decoy documents (e.g., E-CARD.docx) enhances stealth., Reconnaissance precedes potential ransomware/espionage, requiring proactive monitoring of early-stage indicators.

What recommendations were made to prevent future incidents ?

Incident : Espionage OBS1093010110625

Recommendations: Monitor for suspicious JavaScript execution (e.g., Themes.js) and unusual child processes of wscript.exe., Audit scheduled tasks for anomalies (e.g., 'Windows Theme Manager')., Inspect network traffic to legitimate services (e.g., Median News subdomains) for C2 patterns., Restrict execution of scripts from untrusted sources, including VS Code extensions., Deploy behavioral detection for LOLBIN abuse (e.g., certutil encoding)., Educate users on social engineering lures (e.g., decoy documents like E-CARD.docx).Monitor for suspicious JavaScript execution (e.g., Themes.js) and unusual child processes of wscript.exe., Audit scheduled tasks for anomalies (e.g., 'Windows Theme Manager')., Inspect network traffic to legitimate services (e.g., Median News subdomains) for C2 patterns., Restrict execution of scripts from untrusted sources, including VS Code extensions., Deploy behavioral detection for LOLBIN abuse (e.g., certutil encoding)., Educate users on social engineering lures (e.g., decoy documents like E-CARD.docx).Monitor for suspicious JavaScript execution (e.g., Themes.js) and unusual child processes of wscript.exe., Audit scheduled tasks for anomalies (e.g., 'Windows Theme Manager')., Inspect network traffic to legitimate services (e.g., Median News subdomains) for C2 patterns., Restrict execution of scripts from untrusted sources, including VS Code extensions., Deploy behavioral detection for LOLBIN abuse (e.g., certutil encoding)., Educate users on social engineering lures (e.g., decoy documents like E-CARD.docx).Monitor for suspicious JavaScript execution (e.g., Themes.js) and unusual child processes of wscript.exe., Audit scheduled tasks for anomalies (e.g., 'Windows Theme Manager')., Inspect network traffic to legitimate services (e.g., Median News subdomains) for C2 patterns., Restrict execution of scripts from untrusted sources, including VS Code extensions., Deploy behavioral detection for LOLBIN abuse (e.g., certutil encoding)., Educate users on social engineering lures (e.g., decoy documents like E-CARD.docx).Monitor for suspicious JavaScript execution (e.g., Themes.js) and unusual child processes of wscript.exe., Audit scheduled tasks for anomalies (e.g., 'Windows Theme Manager')., Inspect network traffic to legitimate services (e.g., Median News subdomains) for C2 patterns., Restrict execution of scripts from untrusted sources, including VS Code extensions., Deploy behavioral detection for LOLBIN abuse (e.g., certutil encoding)., Educate users on social engineering lures (e.g., decoy documents like E-CARD.docx).Monitor for suspicious JavaScript execution (e.g., Themes.js) and unusual child processes of wscript.exe., Audit scheduled tasks for anomalies (e.g., 'Windows Theme Manager')., Inspect network traffic to legitimate services (e.g., Median News subdomains) for C2 patterns., Restrict execution of scripts from untrusted sources, including VS Code extensions., Deploy behavioral detection for LOLBIN abuse (e.g., certutil encoding)., Educate users on social engineering lures (e.g., decoy documents like E-CARD.docx).

What are the key lessons learned from past incidents ?

Key Lessons Learned: The key lessons learned from past incidents are State-sponsored actors exploit legitimate platforms (GitHub, VS Code extensions) for C2 infrastructure.,Multi-stage JavaScript payloads with LOLBINs (e.g., certutil) evade traditional detection.,Persistence via scheduled tasks and decoy documents (e.g., E-CARD.docx) enhances stealth.,Reconnaissance precedes potential ransomware/espionage, requiring proactive monitoring of early-stage indicators.

References

Where can I find more information about each incident ?

Incident : Espionage OBS1093010110625

Source: Security Researcher Social Media Posts

Incident : Espionage OBS1093010110625

Source: Sandbox Analysis Reports

Incident : Espionage OBS1093010110625

Source: GBHackers (GBH) Article

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Security Researcher Social Media Posts, and Source: Sandbox Analysis Reports, and Source: GBHackers (GBH) Article.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Espionage OBS1093010110625

Investigation Status: Ongoing (analysis based on public research)

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Espionage OBS1093010110625

Entry Point: Themes.js (JavaScript file)

Reconnaissance Period: Extensive (system profiling before payload deployment)

Backdoors Established: ["Scheduled task ('Windows Theme Manager')"]

High Value Targets: Government Entities, Think Tanks,

Data Sold on Dark Web: Government Entities, Think Tanks,

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Espionage OBS1093010110625

Root Causes: Abuse Of Legitimate Services (Github, Median News) For C2 Infrastructure., Lack Of Behavioral Detection For Multi-Stage Javascript Payloads., Insufficient Monitoring Of Lolbin Abuse (E.G., Certutil)., Gaps In Scheduled Task Auditing.,

Corrective Actions: Implement Stricter Controls For Script Execution From Untrusted Sources., Enhance Network Traffic Analysis For C2 Patterns In Legitimate Services., Deploy Endpoint Detection For Javascript-Based Reconnaissance., Conduct Regular Audits Of Scheduled Tasks And Persistence Mechanisms.,

What is the company's process for conducting post-incident analysis ?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Monitor Suspicious Javascript Execution, Track Unusual Scheduled Task Creation, Detect Unexpected Network Communications To Legitimate Services, .

What corrective actions has the company taken based on post-incident analysis ?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Implement Stricter Controls For Script Execution From Untrusted Sources., Enhance Network Traffic Analysis For C2 Patterns In Legitimate Services., Deploy Endpoint Detection For Javascript-Based Reconnaissance., Conduct Regular Audits Of Scheduled Tasks And Persistence Mechanisms., .

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident was an Kimsuky (North Korean-backed APT group).

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were System details, Running processes, Files in Users directory, Computer name and .

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Files in Users directory, Running processes, System details and Computer name.

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents ?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was Reconnaissance precedes potential ransomware/espionage, requiring proactive monitoring of early-stage indicators.

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Deploy behavioral detection for LOLBIN abuse (e.g., certutil encoding)., Audit scheduled tasks for anomalies (e.g., 'Windows Theme Manager')., Monitor for suspicious JavaScript execution (e.g., Themes.js) and unusual child processes of wscript.exe., Educate users on social engineering lures (e.g., decoy documents like E-CARD.docx)., Inspect network traffic to legitimate services (e.g., Median News subdomains) for C2 patterns., Restrict execution of scripts from untrusted sources and including VS Code extensions..

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are GBHackers (GBH) Article, Security Researcher Social Media Posts and Sandbox Analysis Reports.

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (analysis based on public research).

Initial Access Broker

What was the most recent entry point used by an initial access broker ?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an Themes.js (JavaScript file).

What was the most recent reconnaissance period for an incident ?

Most Recent Reconnaissance Period: The most recent reconnaissance period for an incident was Extensive (system profiling before payload deployment).

cve

Latest Global CVEs (Not Company-Specific)

Description

MCP Server Kubernetes is an MCP Server that can connect to a Kubernetes cluster and manage it. Prior to 2.9.8, there is a security issue exists in the exec_in_pod tool of the mcp-server-kubernetes MCP Server. The tool accepts user-provided commands in both array and string formats. When a string format is provided, it is passed directly to shell interpretation (sh -c) without input validation, allowing shell metacharacters to be interpreted. This vulnerability can be exploited through direct command injection or indirect prompt injection attacks, where AI agents may execute commands without explicit user intent. This vulnerability is fixed in 2.9.8.

Risk Information
cvss3
Base: 6.4
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
Description

XML external entity (XXE) injection in eyoucms v1.7.1 allows remote attackers to cause a denial of service via crafted body of a POST request.

Description

An issue was discovered in Fanvil x210 V2 2.12.20 allowing unauthenticated attackers on the local network to access administrative functions of the device (e.g. file upload, firmware update, reboot...) via a crafted authentication bypass.

Description

Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.

Risk Information
cvss4
Base: 9.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.

Risk Information
cvss4
Base: 5.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=observer-research-foundation-america' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge