Company Details
olympus
5,032
106,993
3391
olympusamerica.com
0
OLY_6927803
In-progress

Olympus Corporation of the Americas Company CyberSecurity Posture
olympusamerica.comAt Olympus, we are committed to Our Purpose of making people’s lives healthier, safer and more fulfilling. As a global medical technology company, we partner with healthcare professionals to provide best-in-class solutions and services for early detection, diagnosis and minimally invasive treatment, aiming to improve patient outcomes by elevating the standard of care in targeted disease states. For more than 100 years, Olympus has pursued a goal of contributing to society by producing products designed with the purpose of delivering optimal outcomes for its customers around the world. Olympus Corporation of the Americas, a wholly owned subsidiary of Olympus Corporation, is headquartered in Center Valley, Pennsylvania, USA, and employs more than 4,500 employees throughout locations in North and South America.
Company Details
olympus
5,032
106,993
3391
olympusamerica.com
0
OLY_6927803
In-progress
Between 700 and 749

OCA Global Score (TPRM)XXXX

Description: The California Office of the Attorney General reported that Olympus Corporation of the Americas experienced a data breach on October 10, 2021. The breach involved unauthorized access to systems containing personal information, including names, addresses, and Social Security numbers, although there is no evidence that the data has been improperly accessed or disclosed. The incident was reported on November 15, 2021.
Description: The optical and digital reprography technology manufacturer Olympus was targeted by the BlackMatter ransomware group. The attack impacted its Europe, Middle East, and Africa servers and disrupted the operations in the areas. However, the attack was immediately contained and all data transfers in the suspected systems were suspended and servers were secured.
Description: Olympus, a leading medical technology company was forced to take down IT systems in the Americas (U.S., Canada, and Latin America) due to a cyberattack that hit its network in October 2021. They worked with appropriate third parties on this situation and continue to take all necessary measures to serve customers and business partners in a secure way," Olympus added. "Protecting customers and partners and maintaining their trust in us is their highest priority."


No incidents recorded for Olympus Corporation of the Americas in 2025.
No incidents recorded for Olympus Corporation of the Americas in 2025.
No incidents recorded for Olympus Corporation of the Americas in 2025.
OCA cyber incidents detection timeline including parent company and subsidiaries

At Olympus, we are committed to Our Purpose of making people’s lives healthier, safer and more fulfilling. As a global medical technology company, we partner with healthcare professionals to provide best-in-class solutions and services for early detection, diagnosis and minimally invasive treatment, aiming to improve patient outcomes by elevating the standard of care in targeted disease states. For more than 100 years, Olympus has pursued a goal of contributing to society by producing products designed with the purpose of delivering optimal outcomes for its customers around the world. Olympus Corporation of the Americas, a wholly owned subsidiary of Olympus Corporation, is headquartered in Center Valley, Pennsylvania, USA, and employs more than 4,500 employees throughout locations in North and South America.


Stryker is a global leader in medical technologies and, together with our customers, we are driven to make healthcare better. We offer innovative products and services in MedSurg, Neurotechnology and Orthopaedics that help improve patient and healthcare outcomes. Alongside its customers around the w

For nearly a century, we have delivered on our commitment to saving and sustaining the lives of patients, working alongside clinicians and providers around the world. We believe every person — regardless of who they are or where they are from — deserves a chance to live a healthy life, free from ill

Alcon helps people see brilliantly. As the global leader in eye care with a heritage spanning over 75 years, we offer the broadest portfolio of products to enhance sight and improve people’s lives. Our Surgical and Vision Care products touch the lives of more than 260 million people in over 140 coun

Medline is the largest provider of medical-surgical products and supply chain solutions serving all points of care. Through its unique offering of world-class products, supply chain resilience and clinical practice expertise, Medline delivers improved clinical, financial and operational outcomes. He
BD is one of the largest global medical technology companies in the world and is advancing the world of health™ by improving medical discovery, diagnostics and the delivery of care. The company supports the heroes on the frontlines of health care by developing innovative technology, services and sol

Danaher is a leading global life sciences and diagnostics innovator, committed to accelerating the power of science and technology to improve human health. We partner with customers across the globe to help them solve their most complex challenges, architecting solutions that bring the power of scie

Edwards Lifesciences (NYSE: EW), is the leading global structural heart innovation company, driven by a passion to improve patient lives. Through breakthrough technologies, world-class evidence and partnerships with clinicians and healthcare stakeholders, our employees are inspired by our patient-fo

Headquartered in Osaka, Japan, Nipro is a global leading international player in the healthcare industry, serving healthcare professionals, pharmaceutical companies and patients directly. For over 7 decades we have been doing what we do best! Develop, manufacture and deliver high-quality medical d

Olympus is passionate about creating customer-driven solutions for the medical industry. For more than 100 years, Olympus has focused on making people’s lives healthier, safer and more fulfilling by helping detect, prevent, and treat disease, furthering scientific research, and ensuring public safet
.png)
The global automotive cybersecurity market was valued at USD 3,370 million in 2024 and is expected to reach USD 12,601.67 million by 2032,...
Stefan Kaufmann, former CEO of Tokyo-based Olympus, stepped down in October after the company investigated an allegation that the executive...
Julien Sauvagnargues to the role of President and Chief Executive Officer (CEO), Olympus Corporation of the Americas (OCA), reporting to Olympus Chief Strategy...
After inspecting a Tokyo facility last fall, the FDA concluded that some of Olympus' devices are “adulterated” from improper manufacturing...
After days of swirling speculation, Olympus finally confirmed that it has agreed to sell off its scientific solutions business to Bain...
Olympus suffered a second cyber attack on their Americas operation a month after a suspected ransomware incident shut down its EMEA networks...
The Macaw malware is linked to the U.S.-sanctioned Evil Corp.
Japanese technology giant Olympus has confirmed it was hit by a cyberattack over the weekend that forced it to shut down its IT systems in the US, Canada and...
Olympus, a leading medical technology company, was forced to take down IT systems in the Americas (U.S., Canada and Latin America) following...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Olympus Corporation of the Americas is olympusamerica.com.
According to Rankiteo, Olympus Corporation of the Americas’s AI-generated cybersecurity score is 705, reflecting their Moderate security posture.
According to Rankiteo, Olympus Corporation of the Americas currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Olympus Corporation of the Americas is not certified under SOC 2 Type 1.
According to Rankiteo, Olympus Corporation of the Americas does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Olympus Corporation of the Americas is not listed as GDPR compliant.
According to Rankiteo, Olympus Corporation of the Americas does not currently maintain PCI DSS compliance.
According to Rankiteo, Olympus Corporation of the Americas is not compliant with HIPAA regulations.
According to Rankiteo,Olympus Corporation of the Americas is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Olympus Corporation of the Americas operates primarily in the Medical Equipment Manufacturing industry.
Olympus Corporation of the Americas employs approximately 5,032 people worldwide.
Olympus Corporation of the Americas presently has no subsidiaries across any sectors.
Olympus Corporation of the Americas’s official LinkedIn profile has approximately 106,993 followers.
Olympus Corporation of the Americas is classified under the NAICS code 3391, which corresponds to Medical Equipment and Supplies Manufacturing.
No, Olympus Corporation of the Americas does not have a profile on Crunchbase.
Yes, Olympus Corporation of the Americas maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/olympus.
As of December 05, 2025, Rankiteo reports that Olympus Corporation of the Americas has experienced 3 cybersecurity incidents.
Olympus Corporation of the Americas has an estimated 5,425 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack, Ransomware and Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with suspended all data transfers in the suspected systems, containment measures with secured servers, and third party assistance with appropriate third parties, and communication strategy with continue to take all necessary measures to serve customers and business partners in a secure way..
Title: BlackMatter Ransomware Attack on Olympus
Description: The optical and digital reprography technology manufacturer Olympus was targeted by the BlackMatter ransomware group. The attack impacted its Europe, Middle East, and Africa servers and disrupted the operations in the areas. However, the attack was immediately contained and all data transfers in the suspected systems were suspended and servers were secured.
Type: Ransomware
Threat Actor: BlackMatter
Title: Cyberattack on Olympus Medical Technology
Description: Olympus, a leading medical technology company was forced to take down IT systems in the Americas (U.S., Canada, and Latin America) due to a cyberattack that hit its network in October 2021. They worked with appropriate third parties on this situation and continue to take all necessary measures to serve customers and business partners in a secure way. Protecting customers and partners and maintaining their trust in us is their highest priority.
Date Detected: October 2021
Type: Cyberattack
Title: Olympus Corporation of the Americas Data Breach
Description: The California Office of the Attorney General reported that Olympus Corporation of the Americas experienced a data breach on October 10, 2021. The breach involved unauthorized access to systems containing personal information, including names, addresses, and Social Security numbers, although there is no evidence that the data has been improperly accessed or disclosed. The incident was reported on November 15, 2021.
Date Detected: 2021-10-10
Date Publicly Disclosed: 2021-11-15
Type: Data Breach
Attack Vector: Unauthorized Access
Common Attack Types: The most common types of attacks the company has faced is Breach.

Systems Affected: EuropeMiddle EastAfrica

Systems Affected: IT systems in the Americas (U.S., Canada, and Latin America)

Data Compromised: Names, Addresses, Social security numbers
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Addresses, Social Security Numbers and .

Entity Name: Olympus
Entity Type: Corporation
Industry: Optical and Digital Reprography Technology
Location: EuropeMiddle EastAfrica

Entity Name: Olympus
Entity Type: Medical Technology Company
Industry: Medical Technology
Location: U.S.CanadaLatin America

Entity Name: Olympus Corporation of the Americas
Entity Type: Corporation

Containment Measures: Suspended all data transfers in the suspected systemsSecured servers

Third Party Assistance: Appropriate third parties
Communication Strategy: Continue to take all necessary measures to serve customers and business partners in a secure way
Third-Party Assistance: The company involves third-party assistance in incident response through Appropriate third parties.

Type of Data Compromised: Names, Addresses, Social security numbers
Sensitivity of Data: High
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by suspended all data transfers in the suspected systems, secured servers and .

Ransomware Strain: BlackMatter

Source: California Office of the Attorney General
Date Accessed: 2021-11-15
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney GeneralDate Accessed: 2021-11-15.
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Continue To Take All Necessary Measures To Serve Customers And Business Partners In A Secure Way.
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Appropriate third parties.
Last Attacking Group: The attacking group in the last incident was an BlackMatter.
Most Recent Incident Detected: The most recent incident detected was on October 2021.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2021-11-15.
Most Significant Data Compromised: The most significant data compromised in an incident were Names, Addresses, Social Security numbers and .
Most Significant System Affected: The most significant system affected in an incident were EuropeMiddle EastAfrica and IT systems in the Americas (U.S., Canada, and Latin America).
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Appropriate third parties.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Suspended all data transfers in the suspected systemsSecured servers.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Names, Addresses and Social Security numbers.
Most Recent Source: The most recent source of information about an incident is California Office of the Attorney General.
.png)
Sigstore Timestamp Authority is a service for issuing RFC 3161 timestamps. Prior to 2.0.3, Function api.ParseJSONRequest currently splits (via a call to strings.Split) an optionally-provided OID (which is untrusted data) on periods. Similarly, function api.getContentType splits the Content-Type header (which is also untrusted data) on an application string. As a result, in the face of a malicious request with either an excessively long OID in the payload containing many period characters or a malformed Content-Type header, a call to api.ParseJSONRequest or api.getContentType incurs allocations of O(n) bytes (where n stands for the length of the function's argument). This vulnerability is fixed in 2.0.3.
Monkeytype is a minimalistic and customizable typing test. In 25.49.0 and earlier, there is improper handling of user input which allows an attacker to execute malicious javascript on anyone viewing a malicious quote submission. quote.text and quote.source are user input, and they're inserted straight into the DOM. If they contain HTML tags, they will be rendered (after some escaping using quotes and textarea tags).
SysReptor is a fully customizable pentest reporting platform. Prior to 2025.102, there is a Stored Cross-Site Scripting (XSS) vulnerability allows authenticated users to execute malicious JavaScript in the context of other logged-in users by uploading malicious JavaScript files in the web UI. This vulnerability is fixed in 2025.102.
Taiko Alethia is an Ethereum-equivalent, permissionless, based rollup designed to scale Ethereum without compromising its fundamental properties. In 2.3.1 and earlier, TaikoInbox._verifyBatches (packages/protocol/contracts/layer1/based/TaikoInbox.sol:627-678) advanced the local tid to whatever transition matched the current blockHash before knowing whether that batch would actually be verified. When the loop later broke (e.g., cooldown window not yet passed or transition invalidated), the function still wrote that newer tid into batches[lastVerifiedBatchId].verifiedTransitionId after decrementing batchId. Result: the last verified batch could end up pointing at a transition index from the next batch (often zeroed), corrupting the verified chain pointer.
A flaw has been found in youlaitech youlai-mall 1.0.0/2.0.0. Affected is the function getById/updateAddress/deleteAddress of the file /mall-ums/app-api/v1/addresses/. Executing manipulation can lead to improper control of dynamically-identified variables. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.