ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

OPEXUS + Casepoint offers a suite of powerful data discovery and workflow technologies that empower public and private sector professionals at more than 200 highly regulated enterprises to manage essential processes more efficiently, secure and discover mission-critical data, and reduce risk.

OPEXUS A.I CyberSecurity Scoring

OPEXUS

Company Details

Linkedin ID:

opexustech

Employees number:

157

Number of followers:

8,576

NAICS:

5112

Industry Type:

Software Development

Homepage:

opexustech.com

IP Addresses:

0

Company ID:

OPE_9041898

Scan Status:

In-progress

AI scoreOPEXUS Risk Score (AI oriented)

Between 650 and 699

https://images.rankiteo.com/companyimages/opexustech.jpeg
OPEXUS Software Development
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreOPEXUS Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/opexustech.jpeg
OPEXUS Software Development
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

OPEXUS Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
OPEXUS: Twins with hacking history charged in insider data breach affecting multiple federal agenciesBreach100512/2025
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Twin brothers Muneeb and Sohaib Akhter were arrested in Alexandria, Va., Wednesday for allegedly stealing and destroying government data held by a government contractor minutes after they were fired from the company earlier this year, the Justice Department said. Prosecutors accuse the 34-year-old brothers of the crimes during a weeklong spree in February, compromising data from multiple federal agencies including the Department of Homeland Security, Internal Revenue Service and the Equal Employment Opportunity Commission. Authorities did not name the federal government contractor, which provides services and hosts data for more than 45 federal agencies, but the company was previously identified as Washington-based Opexus in a Bloomberg report about the insider attack earlier this year. Opexus did not immediately respond to a request for comment. The brothers are no strangers to law enforcement, the hacking community and government contract work. They previously pleaded guilty in 2015 to wire fraud and conspiring to hack into the State Department and other crimes while they were employed as contractors for federal agencies. Muneeb Akhter was sentenced to 39 months in prison and Sohaib Akhter was sentenced to 24 months in prison at that time. Advertisement An investigation aided by more than 20 federal agencies and specialized units alleges the brothers were back at it a decade later, committing cybercrime with privileged access and technical expertise gained from their e

OPEXUS: Twins with hacking history charged in insider data breach affecting multiple federal agencies
Breach
Severity: 100
Impact: 5
Seen: 12/2025
Blog:
Rankiteo Explanation
Attack threatening the organization's existence

Description: Twin brothers Muneeb and Sohaib Akhter were arrested in Alexandria, Va., Wednesday for allegedly stealing and destroying government data held by a government contractor minutes after they were fired from the company earlier this year, the Justice Department said. Prosecutors accuse the 34-year-old brothers of the crimes during a weeklong spree in February, compromising data from multiple federal agencies including the Department of Homeland Security, Internal Revenue Service and the Equal Employment Opportunity Commission. Authorities did not name the federal government contractor, which provides services and hosts data for more than 45 federal agencies, but the company was previously identified as Washington-based Opexus in a Bloomberg report about the insider attack earlier this year. Opexus did not immediately respond to a request for comment. The brothers are no strangers to law enforcement, the hacking community and government contract work. They previously pleaded guilty in 2015 to wire fraud and conspiring to hack into the State Department and other crimes while they were employed as contractors for federal agencies. Muneeb Akhter was sentenced to 39 months in prison and Sohaib Akhter was sentenced to 24 months in prison at that time. Advertisement An investigation aided by more than 20 federal agencies and specialized units alleges the brothers were back at it a decade later, committing cybercrime with privileged access and technical expertise gained from their e

Ailogo

OPEXUS Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for OPEXUS

Incidents vs Software Development Industry Average (This Year)

OPEXUS has 132.56% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

OPEXUS has 56.25% more incidents than the average of all companies with at least one recorded incident.

Incident Types OPEXUS vs Software Development Industry Avg (This Year)

OPEXUS reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.

Incident History — OPEXUS (X = Date, Y = Severity)

OPEXUS cyber incidents detection timeline including parent company and subsidiaries

OPEXUS Company Subsidiaries

SubsidiaryImage

OPEXUS + Casepoint offers a suite of powerful data discovery and workflow technologies that empower public and private sector professionals at more than 200 highly regulated enterprises to manage essential processes more efficiently, secure and discover mission-critical data, and reduce risk.

Loading...
similarCompanies

OPEXUS Similar Companies

SAP is the leading enterprise application and business AI company. We stand at the intersection of business and technology, where our innovations are designed to directly address real business challenges and produce real-world impacts. Our solutions are the backbone for the world’s most complex and

Dassault Systèmes

Dassault Systèmes is a catalyst for human progress. Since 1981, the company has pioneered virtual worlds to improve real life for consumers, patients and citizens. With Dassault Systèmes’ 3DEXPERIENCE platform, 370,000 customers of all sizes, in all industries, can collaborate, imagine and create

DiDi Global Inc. is a leading mobility technology platform. It offers a wide range of app-based services across Asia Pacific, Latin America, and other global markets, including ride hailing, taxi hailing, designated driving, hitch and other forms of shared mobility as well as certain energy and vehi

PedidosYa

We’re  the delivery market leader in Latin America. Our platform connects over 77.000 restaurants, supermarkets, pharmacies and stores with millions of users. Nowadays we operate in more than 500 cities in Latinamerica. And we are now over 3.400 employees. PedidosYa is available for iOS, Android and

Bosch Global Software Technologies

With our unique ability to offer end-to-end solutions that connect the three pillars of IoT - Sensors, Software, and Services, we enable businesses to move from the traditional to the digital, or improve businesses by introducing a digital element in their products and processes. Now more than ever

OpenText

OpenText is a leading Cloud and AI company that provides organizations around the world with a comprehensive suite of Business AI, Business Clouds, and Business Technology. We help organizations grow, innovate, become more efficient and effective, and do so in a trusted and secure way—through Inform

bigbasket

Starting our journey in 2011, today, bigbasket - a Tata Enterprise is India’s largest online supermarket with over 13 million customers and a presence in 60+ cities & towns. With our presence spanning the entire spectrum of consumer needs, we operate through a range of business lines - bigbasket, bb

Bosch

The Bosch Group is a leading global supplier of technology and services. It employs roughly 417,900 associates worldwide (as of December 31, 2024). According to preliminary figures, the company generated sales of 90.5 billion euros in 2024. Its operations are divided into four business sectors: Mobi

Infor

As a global leader in business cloud software specialized by industry. Infor develops complete solutions for its focus industries, including industrial manufacturing, distribution, healthcare, food & beverage, automotive, aerospace & defense, hospitality, and high tech. Infor’s mission-critical ente

newsone

OPEXUS CyberSecurity News

December 04, 2025 12:00 AM
Feds arrest twin brothers for allegedly deleting government data

The Justice Department arrested Virginia-based twin brothers who formerly worked at a federal contractor on Wednesday for their alleged...

June 19, 2025 07:00 AM
Contractor’s Background Checks Under Scrutiny after Massive Breach Traced to Twin Brothers Previously Convicted of Hacking

A major federal data breach is traced to twin brothers who were working at a government contractor, and had previously spent time in prison...

June 10, 2025 07:00 AM
Hack of Contractor Was at Root of Massive Federal Data Breach

A software company that handles sensitive data for nearly every US federal agency was the victim of a cyber breach earlier this year due to a “major lapse” in...

June 06, 2025 07:00 AM
FDIC Points to Covert CIA Project to Justify Denial of Records

The regulator responded to my FOIA request about a data breach at a software company it uses to manage its investigations and audits by...

May 21, 2025 07:00 AM
The Case of the ‘Lost’ FOIA Requests

FOIA requests at numerous federal agencies in February were “lost” by a government records contractor. It turns out, the “data failure” was...

January 27, 2025 08:00 AM
Opexus Merges With Casepoint and Wins Big PE Investment

Thoma Bravo takes an ownership stake in the combined company. The seller of process management software plans to integrate Casepoint's data...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

OPEXUS CyberSecurity History Information

Official Website of OPEXUS

The official website of OPEXUS is https://www.opexustech.com.

OPEXUS’s AI-Generated Cybersecurity Score

According to Rankiteo, OPEXUS’s AI-generated cybersecurity score is 689, reflecting their Weak security posture.

How many security badges does OPEXUS’ have ?

According to Rankiteo, OPEXUS currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does OPEXUS have SOC 2 Type 1 certification ?

According to Rankiteo, OPEXUS is not certified under SOC 2 Type 1.

Does OPEXUS have SOC 2 Type 2 certification ?

According to Rankiteo, OPEXUS does not hold a SOC 2 Type 2 certification.

Does OPEXUS comply with GDPR ?

According to Rankiteo, OPEXUS is not listed as GDPR compliant.

Does OPEXUS have PCI DSS certification ?

According to Rankiteo, OPEXUS does not currently maintain PCI DSS compliance.

Does OPEXUS comply with HIPAA ?

According to Rankiteo, OPEXUS is not compliant with HIPAA regulations.

Does OPEXUS have ISO 27001 certification ?

According to Rankiteo,OPEXUS is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of OPEXUS

OPEXUS operates primarily in the Software Development industry.

Number of Employees at OPEXUS

OPEXUS employs approximately 157 people worldwide.

Subsidiaries Owned by OPEXUS

OPEXUS presently has no subsidiaries across any sectors.

OPEXUS’s LinkedIn Followers

OPEXUS’s official LinkedIn profile has approximately 8,576 followers.

NAICS Classification of OPEXUS

OPEXUS is classified under the NAICS code 5112, which corresponds to Software Publishers.

OPEXUS’s Presence on Crunchbase

No, OPEXUS does not have a profile on Crunchbase.

OPEXUS’s Presence on LinkedIn

Yes, OPEXUS maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/opexustech.

Cybersecurity Incidents Involving OPEXUS

As of December 04, 2025, Rankiteo reports that OPEXUS has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

OPEXUS has an estimated 27,163 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at OPEXUS ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-9 and 6.9.13-34, there is a vulnerability in ImageMagick’s Magick++ layer that manifests when Options::fontFamily is invoked with an empty string. Clearing a font family calls RelinquishMagickMemory on _drawInfo->font, freeing the font string but leaving _drawInfo->font pointing to freed memory while _drawInfo->family is set to that (now-invalid) pointer. Any later cleanup or reuse of _drawInfo->font re-frees or dereferences dangling memory. DestroyDrawInfo and other setters (Options::font, Image::font) assume _drawInfo->font remains valid, so destruction or subsequent updates trigger crashes or heap corruption. This vulnerability is fixed in 7.1.2-9 and 6.9.13-34.

Risk Information
cvss3
Base: 4.9
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
Description

FeehiCMS version 2.1.1 has a Remote Code Execution via Unrestricted File Upload in Ad Management. FeehiCMS version 2.1.1 allows authenticated remote attackers to upload files that the server later executes (or stores in an executable location) without sufficient validation, sanitization, or execution restrictions. An authenticated remote attacker can upload a crafted PHP file and cause the application or web server to execute it, resulting in remote code execution (RCE).

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Description

PHPGurukul Billing System 1.0 is vulnerable to SQL Injection in the admin/index.php endpoint. Specifically, the username parameter accepts unvalidated user input, which is then concatenated directly into a backend SQL query.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Description

NMIS/BioDose software V22.02 and previous versions contain executable binaries with plain text hard-coded passwords. These hard-coded passwords could allow unauthorized access to both the application and database.

Risk Information
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

NMIS/BioDose V22.02 and previous versions' installation directory paths by default have insecure file permissions, which in certain deployment scenarios can enable users on client workstations to modify the program executables and libraries.

Risk Information
cvss3
Base: 8.0
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
cvss4
Base: 7.1
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=opexustech' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge