Company Details
opexustech
157
8,576
5112
opexustech.com
0
OPE_9041898
In-progress

OPEXUS Company CyberSecurity Posture
opexustech.comOPEXUS + Casepoint offers a suite of powerful data discovery and workflow technologies that empower public and private sector professionals at more than 200 highly regulated enterprises to manage essential processes more efficiently, secure and discover mission-critical data, and reduce risk.
Company Details
opexustech
157
8,576
5112
opexustech.com
0
OPE_9041898
In-progress
Between 650 and 699

OPEXUS Global Score (TPRM)XXXX

Description: Twin brothers Muneeb and Sohaib Akhter were arrested in Alexandria, Va., Wednesday for allegedly stealing and destroying government data held by a government contractor minutes after they were fired from the company earlier this year, the Justice Department said. Prosecutors accuse the 34-year-old brothers of the crimes during a weeklong spree in February, compromising data from multiple federal agencies including the Department of Homeland Security, Internal Revenue Service and the Equal Employment Opportunity Commission. Authorities did not name the federal government contractor, which provides services and hosts data for more than 45 federal agencies, but the company was previously identified as Washington-based Opexus in a Bloomberg report about the insider attack earlier this year. Opexus did not immediately respond to a request for comment. The brothers are no strangers to law enforcement, the hacking community and government contract work. They previously pleaded guilty in 2015 to wire fraud and conspiring to hack into the State Department and other crimes while they were employed as contractors for federal agencies. Muneeb Akhter was sentenced to 39 months in prison and Sohaib Akhter was sentenced to 24 months in prison at that time. Advertisement An investigation aided by more than 20 federal agencies and specialized units alleges the brothers were back at it a decade later, committing cybercrime with privileged access and technical expertise gained from their e


OPEXUS has 132.56% more incidents than the average of same-industry companies with at least one recorded incident.
OPEXUS has 56.25% more incidents than the average of all companies with at least one recorded incident.
OPEXUS reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.
OPEXUS cyber incidents detection timeline including parent company and subsidiaries

OPEXUS + Casepoint offers a suite of powerful data discovery and workflow technologies that empower public and private sector professionals at more than 200 highly regulated enterprises to manage essential processes more efficiently, secure and discover mission-critical data, and reduce risk.

SAP is the leading enterprise application and business AI company. We stand at the intersection of business and technology, where our innovations are designed to directly address real business challenges and produce real-world impacts. Our solutions are the backbone for the world’s most complex and

Dassault Systèmes is a catalyst for human progress. Since 1981, the company has pioneered virtual worlds to improve real life for consumers, patients and citizens. With Dassault Systèmes’ 3DEXPERIENCE platform, 370,000 customers of all sizes, in all industries, can collaborate, imagine and create

DiDi Global Inc. is a leading mobility technology platform. It offers a wide range of app-based services across Asia Pacific, Latin America, and other global markets, including ride hailing, taxi hailing, designated driving, hitch and other forms of shared mobility as well as certain energy and vehi

We’re the delivery market leader in Latin America. Our platform connects over 77.000 restaurants, supermarkets, pharmacies and stores with millions of users. Nowadays we operate in more than 500 cities in Latinamerica. And we are now over 3.400 employees. PedidosYa is available for iOS, Android and

With our unique ability to offer end-to-end solutions that connect the three pillars of IoT - Sensors, Software, and Services, we enable businesses to move from the traditional to the digital, or improve businesses by introducing a digital element in their products and processes. Now more than ever

OpenText is a leading Cloud and AI company that provides organizations around the world with a comprehensive suite of Business AI, Business Clouds, and Business Technology. We help organizations grow, innovate, become more efficient and effective, and do so in a trusted and secure way—through Inform
Starting our journey in 2011, today, bigbasket - a Tata Enterprise is India’s largest online supermarket with over 13 million customers and a presence in 60+ cities & towns. With our presence spanning the entire spectrum of consumer needs, we operate through a range of business lines - bigbasket, bb
The Bosch Group is a leading global supplier of technology and services. It employs roughly 417,900 associates worldwide (as of December 31, 2024). According to preliminary figures, the company generated sales of 90.5 billion euros in 2024. Its operations are divided into four business sectors: Mobi
As a global leader in business cloud software specialized by industry. Infor develops complete solutions for its focus industries, including industrial manufacturing, distribution, healthcare, food & beverage, automotive, aerospace & defense, hospitality, and high tech. Infor’s mission-critical ente
.png)
The Justice Department arrested Virginia-based twin brothers who formerly worked at a federal contractor on Wednesday for their alleged...
A major federal data breach is traced to twin brothers who were working at a government contractor, and had previously spent time in prison...
A software company that handles sensitive data for nearly every US federal agency was the victim of a cyber breach earlier this year due to a “major lapse” in...
The regulator responded to my FOIA request about a data breach at a software company it uses to manage its investigations and audits by...
FOIA requests at numerous federal agencies in February were “lost” by a government records contractor. It turns out, the “data failure” was...
Thoma Bravo takes an ownership stake in the combined company. The seller of process management software plans to integrate Casepoint's data...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of OPEXUS is https://www.opexustech.com.
According to Rankiteo, OPEXUS’s AI-generated cybersecurity score is 689, reflecting their Weak security posture.
According to Rankiteo, OPEXUS currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, OPEXUS is not certified under SOC 2 Type 1.
According to Rankiteo, OPEXUS does not hold a SOC 2 Type 2 certification.
According to Rankiteo, OPEXUS is not listed as GDPR compliant.
According to Rankiteo, OPEXUS does not currently maintain PCI DSS compliance.
According to Rankiteo, OPEXUS is not compliant with HIPAA regulations.
According to Rankiteo,OPEXUS is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
OPEXUS operates primarily in the Software Development industry.
OPEXUS employs approximately 157 people worldwide.
OPEXUS presently has no subsidiaries across any sectors.
OPEXUS’s official LinkedIn profile has approximately 8,576 followers.
OPEXUS is classified under the NAICS code 5112, which corresponds to Software Publishers.
No, OPEXUS does not have a profile on Crunchbase.
Yes, OPEXUS maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/opexustech.
As of December 04, 2025, Rankiteo reports that OPEXUS has experienced 1 cybersecurity incidents.
OPEXUS has an estimated 27,163 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-9 and 6.9.13-34, there is a vulnerability in ImageMagick’s Magick++ layer that manifests when Options::fontFamily is invoked with an empty string. Clearing a font family calls RelinquishMagickMemory on _drawInfo->font, freeing the font string but leaving _drawInfo->font pointing to freed memory while _drawInfo->family is set to that (now-invalid) pointer. Any later cleanup or reuse of _drawInfo->font re-frees or dereferences dangling memory. DestroyDrawInfo and other setters (Options::font, Image::font) assume _drawInfo->font remains valid, so destruction or subsequent updates trigger crashes or heap corruption. This vulnerability is fixed in 7.1.2-9 and 6.9.13-34.
FeehiCMS version 2.1.1 has a Remote Code Execution via Unrestricted File Upload in Ad Management. FeehiCMS version 2.1.1 allows authenticated remote attackers to upload files that the server later executes (or stores in an executable location) without sufficient validation, sanitization, or execution restrictions. An authenticated remote attacker can upload a crafted PHP file and cause the application or web server to execute it, resulting in remote code execution (RCE).
PHPGurukul Billing System 1.0 is vulnerable to SQL Injection in the admin/index.php endpoint. Specifically, the username parameter accepts unvalidated user input, which is then concatenated directly into a backend SQL query.
NMIS/BioDose software V22.02 and previous versions contain executable binaries with plain text hard-coded passwords. These hard-coded passwords could allow unauthorized access to both the application and database.
NMIS/BioDose V22.02 and previous versions' installation directory paths by default have insecure file permissions, which in certain deployment scenarios can enable users on client workstations to modify the program executables and libraries.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.