Company Details
options-recovery-services
108
1,028
621
optionsrecovery.org
0
OPT_1600704
In-progress


Options Recovery Services Company CyberSecurity Posture
optionsrecovery.orgOptions Recovery Services is a small non-profit substance abuse recovery center. Based in Berkeley, CA Options maintains a cutting edge out-patient treatment program which includes an integrated mental health clinic as well as their own toxicology lab on-site. Treatment includes acupuncture, Tai chi, and meditation within the curriculum. They also have 6 transitional houses providing low cost shelter for nearly 100 men and women. Options' mission is to provide treatment to anyone who walks in the door regardless of their ability to pay for service.
Company Details
options-recovery-services
108
1,028
621
optionsrecovery.org
0
OPT_1600704
In-progress
Between 750 and 799

ORS Global Score (TPRM)XXXX



No incidents recorded for Options Recovery Services in 2026.
No incidents recorded for Options Recovery Services in 2026.
No incidents recorded for Options Recovery Services in 2026.
ORS cyber incidents detection timeline including parent company and subsidiaries

Options Recovery Services is a small non-profit substance abuse recovery center. Based in Berkeley, CA Options maintains a cutting edge out-patient treatment program which includes an integrated mental health clinic as well as their own toxicology lab on-site. Treatment includes acupuncture, Tai chi, and meditation within the curriculum. They also have 6 transitional houses providing low cost shelter for nearly 100 men and women. Options' mission is to provide treatment to anyone who walks in the door regardless of their ability to pay for service.


Holistic Health for New Mexico Mesa Vista Wellness We at Mesa Vista Wellness take a holistic approach to the transformational and healing process. We offer the opportunity to explore personal growth through the mind, body, and spirit. We focus on mindfulness practices to guide individu

Psychoanalysis Today is dedicated to expanding awareness and interest in the field of psychoanalysis. This site provides information that is helpful to both the general public, as well as professionals in the field of mental health. Here you will find information on the current trends in psycho

Family Recovery Services opened their doors to serve Southern Ohio in 1983. Both FRS Counseling and FRS Transportation are part of the Family Recovery Services Agency. FRS Counseling is an outpatient counseling center for the residents of Southern Ohio with offices located in Highland and Adams

From the cradle to the grave, LGBTQIA+ people experience many forms of victimization and discrimination, in every facet of life. The mission of Riverbend Counseling Services is to BE a place where LGBTQIA+ (A includes our Straight Allies as well as other marginalized populations) can receive counse

Life Counseling Institute provides exceptional counseling services in the western suburbs of Chicago. We meet the needs of a highly educated, discerning client base and provide the most recent, evidence based forms of therapy to best meet their needs. We are best known for our work in providing coup

Binnen Europa is in 2008 CO-EUR opgericht, hét kennisplatform op het gebied van eetstoornissen aan het spectrum van de overgewicht/obesitas zijde. CO-EUR richt zich zowel op de multidisciplinaire behandeling van eetstoornissen en daaraan gerelateerde psychische en fysieke klachten als op het wetensc

The Center for Child and Family Services (CCFS), founded in 1943, is a nonprofit 501C3 community service organization focused on providing behavioral, mental health, and financial counseling services to families. Our mission is to deliver quality counseling programs and support services that empowe

The School Psychology training at USM prepares behavioral scientists who can apply their skills to the solution of a broad range of problems related to the processes of education. Our program is based on the scientist-practitioner model with an emphasis in applied behavior analysis. Generalized, emp

Employees are your company’s greatest asset. Your company’s success relies on how productive and creative your staff is. Providing an employee assistance program (EAP) will help you retain valued employees, promote a healthy work environment, and maximize workplace productivity. EAP Workforce Soluti
.png)
Looking for alternatives to LifeLock? See the top picks for 2026, how they compare on three-bureau monitoring, insurance, family plans,...
A lawsuit filed by Nebraska Attorney General Mike Hilgers over the 2024 Change Healthcare data breach has been allowed to proceed after...
Google uncovered the global 'Lighthouse' phishing network, a smishing-as-a-service scam that hit 1M+ victims across 120 countries.
Buy nowTry now · +1 202-601-3104Get as a managed service. Core capabilities. Acronis. Backup; Disaster recovery; Cybersecurity; Endpoint management
The best password recovery software is purpose built to help you regain access to accounts and hardware for which you have forgotten or lost...
Compare the top Identity Guard alternatives, including LifeLock, Aura, and IDShield, to find the best fit for your needs,...
Fortify your operations with cutting-edge backup and recovery solutions tailored to the manufacturing industry. Safeguard production workflows.
Acronis Backup for Google Workspace offers a comprehensive, agentless solution to secure data within Gmail, Google Drive, Google Contacts and Google...
Safeguard your data with the powerful Microsoft Azure Backup Solution. Secure, automated, and scalable, it ensures your data is protected at all times.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Options Recovery Services is http://www.optionsrecovery.org.
According to Rankiteo, Options Recovery Services’s AI-generated cybersecurity score is 755, reflecting their Fair security posture.
According to Rankiteo, Options Recovery Services currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Options Recovery Services has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Options Recovery Services is not certified under SOC 2 Type 1.
According to Rankiteo, Options Recovery Services does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Options Recovery Services is not listed as GDPR compliant.
According to Rankiteo, Options Recovery Services does not currently maintain PCI DSS compliance.
According to Rankiteo, Options Recovery Services is not compliant with HIPAA regulations.
According to Rankiteo,Options Recovery Services is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Options Recovery Services operates primarily in the Mental Health Care industry.
Options Recovery Services employs approximately 108 people worldwide.
Options Recovery Services presently has no subsidiaries across any sectors.
Options Recovery Services’s official LinkedIn profile has approximately 1,028 followers.
No, Options Recovery Services does not have a profile on Crunchbase.
Yes, Options Recovery Services maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/options-recovery-services.
As of January 22, 2026, Rankiteo reports that Options Recovery Services has not experienced any cybersecurity incidents.
Options Recovery Services has an estimated 5,283 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Options Recovery Services has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g., execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.