Company Details
pbrmc
498
1,565
62
linktr.ee
0
POP_1055409
In-progress

Poplar Bluff Regional Medical Center Company CyberSecurity Posture
linktr.eePoplar Bluff Regional Medical Center (PBRMC) is located in the heart of Southeast Missouri in Poplar Bluff and serves Butler County and seven other surrounding counties. PBRMC is committed to meeting our community’s healthcare needs by providing compassionate, quality patient care. The medical center offers a wide range of services, including oncology, cardiology, orthopedics, robotic surgery, women’s health and more. Learn more at PBRMC.com
Company Details
pbrmc
498
1,565
62
linktr.ee
0
POP_1055409
In-progress
Between 750 and 799

PBRMC Global Score (TPRM)XXXX

Description: A building leased by STAT Informatics Solutions, LLC (“STAT”) in Lebanon, Tennessee was struck down due to a tornado on March 3, 2020. It led to potentially inappropriate disclosure of personal information. STAT is based in Waupaca, Wisconsin, and provides various secure record services to healthcare entities. Poplar Bluff Regional Medical Center contracts with STAT to scan paper documents into the hospital’s electronic medical record system and for secure destruction of records. The records stored in the building damaged by the tornado contained medical records, which included personal information such as a patient’s full name, social security number, address, date of birth, medical record number, account number, images, diagnoses, nursing and physician documentation, test results, medications, and/or other types of information typically found in a medical record. STAT notified Poplar Bluff Regional Medical Center on March 3, 2020, of this incident. In an effort to prevent unauthorized access and disclosure of records involved, a tall fence was erected around the property and two security guards were posted 24 hours a day, seven days a week.


No incidents recorded for Poplar Bluff Regional Medical Center in 2025.
No incidents recorded for Poplar Bluff Regional Medical Center in 2025.
No incidents recorded for Poplar Bluff Regional Medical Center in 2025.
PBRMC cyber incidents detection timeline including parent company and subsidiaries

Poplar Bluff Regional Medical Center (PBRMC) is located in the heart of Southeast Missouri in Poplar Bluff and serves Butler County and seven other surrounding counties. PBRMC is committed to meeting our community’s healthcare needs by providing compassionate, quality patient care. The medical center offers a wide range of services, including oncology, cardiology, orthopedics, robotic surgery, women’s health and more. Learn more at PBRMC.com


With us by your side, there's no stopping you. It's why we're creating a new kind of healthcare at Baylor Scott & White. And we're just getting started. As the largest not-for-profit health system in the state of Texas, Baylor Scott & White promotes the health and well-being of every individual, fa

As a nationally ranked academic medical center and one of Alabama’s largest employers, UAB Medicine is about teamwork, support, mentorship, and collaboration. Employees are empowered to lead, learn, and innovate as they deliver world-class care to every patient, every family, every time. When you ar

Ramsay Health Care is a trusted provider of private hospital and healthcare services in Australia, Europe and the United Kingdom. Every year, millions of patients put their trust in Ramsay, confident in our ability to deliver safe, high-quality healthcare with outstanding clinical outcomes. We ope

We provide quality, compassionate health care at more than 40 hospitals and care centers that are serving communities across California, Arizona and Nevada every minute of every day. And while not everyone may live near a major medical facility, Dignity Health is making health care more accessible b

Formed in 1994, Brown University Health (Formerly Lifespan) is a not-for-profit health system based in Providence, RI comprising three teaching hospitals of The Warren Alpert Medical School of Brown University: Rhode Island Hospital and its Hasbro Children's; The Miriam Hospital; and Bradley Hospita

Emory Healthcare is the most comprehensive health care system in Georgia. We offer 11 hospitals, the Emory Clinic, more than 250 provider locations, and more than 2,800 physicians specializing in 70 different medical subspecialties. Meaning we can provide treatments and services that may not be avai
A Dasa é a maior rede de saúde integrada do Brasil. Faz parte da vida de mais de 20 milhões de pessoas por ano, com alta tecnologia, experiência intuitiva e atitude à frente do tempo. Com mais de 50 mil colaboradores e 250 mil médicos parceiros, existe para ser a saúde que as pessoas desejam e que
City of Hope's mission is to deliver the cures of tomorrow to the people who need them today. Founded in 1913, City of Hope has grown into one of the largest cancer research and treatment organizations in the U.S. and one of the leading research centers for diabetes and other life-threatening illnes

Zuellig Pharma is a leading integrated healthcare solutions company in Asia with experience spanning over a century in the region. Partnering with multinational pharmaceutical manufacturers, governments, healthcare providers, and professionals, we broaden access to pharmaceutical and healthcare prod
.png)
2010. January 18. Southeast Missouri State University announces the launch of a first new website for mobile users. May 2010. Inaugurated new summer faculty...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Poplar Bluff Regional Medical Center is https://linktr.ee/pbrmc.
According to Rankiteo, Poplar Bluff Regional Medical Center’s AI-generated cybersecurity score is 750, reflecting their Fair security posture.
According to Rankiteo, Poplar Bluff Regional Medical Center currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Poplar Bluff Regional Medical Center is not certified under SOC 2 Type 1.
According to Rankiteo, Poplar Bluff Regional Medical Center does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Poplar Bluff Regional Medical Center is not listed as GDPR compliant.
According to Rankiteo, Poplar Bluff Regional Medical Center does not currently maintain PCI DSS compliance.
According to Rankiteo, Poplar Bluff Regional Medical Center is not compliant with HIPAA regulations.
According to Rankiteo,Poplar Bluff Regional Medical Center is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Poplar Bluff Regional Medical Center operates primarily in the Hospitals and Health Care industry.
Poplar Bluff Regional Medical Center employs approximately 498 people worldwide.
Poplar Bluff Regional Medical Center presently has no subsidiaries across any sectors.
Poplar Bluff Regional Medical Center’s official LinkedIn profile has approximately 1,565 followers.
Poplar Bluff Regional Medical Center is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.
No, Poplar Bluff Regional Medical Center does not have a profile on Crunchbase.
Yes, Poplar Bluff Regional Medical Center maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/pbrmc.
As of December 18, 2025, Rankiteo reports that Poplar Bluff Regional Medical Center has experienced 1 cybersecurity incidents.
Poplar Bluff Regional Medical Center has an estimated 31,340 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Data Leak.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with a tall fence was erected around the property, containment measures with two security guards were posted 24 hours a day, seven days a week..
Title: Tornado Damage Leads to Potential Disclosure of Medical Records
Description: A building leased by STAT Informatics Solutions, LLC (“STAT”) in Lebanon, Tennessee was struck down due to a tornado on March 3, 2020. It led to potentially inappropriate disclosure of personal information.
Date Detected: 2020-03-03
Type: Natural Disaster
Attack Vector: Physical Damage
Threat Actor: Natural Disaster
Common Attack Types: The most common types of attacks the company has faced is Data Leak.

Data Compromised: Medical records, Personal information such as a patient’s full name, social security number, address, date of birth, medical record number, account number, images, diagnoses, nursing and physician documentation, test results, medications
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Medical Records, Personal Information and .

Entity Name: Poplar Bluff Regional Medical Center
Entity Type: Healthcare Entity
Industry: Healthcare
Location: Poplar Bluff

Containment Measures: A tall fence was erected around the propertyTwo security guards were posted 24 hours a day, seven days a week

Type of Data Compromised: Medical records, Personal information
Sensitivity of Data: High
Personally Identifiable Information: full namesocial security numberaddressdate of birthmedical record numberaccount numberimagesdiagnosesnursing and physician documentationtest resultsmedications
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by a tall fence was erected around the property, two security guards were posted 24 hours a day, seven days a week and .

Root Causes: Tornado Damage
Last Attacking Group: The attacking group in the last incident was an Natural Disaster.
Most Recent Incident Detected: The most recent incident detected was on 2020-03-03.
Most Significant Data Compromised: The most significant data compromised in an incident were medical records, personal information such as a patient’s full name, social security number, address, date of birth, medical record number, account number, images, diagnoses, nursing and physician documentation, test results, medications and .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were A tall fence was erected around the propertyTwo security guards were posted 24 hours a day and seven days a week.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were medical records, personal information such as a patient’s full name, social security number, address, date of birth, medical record number, account number, images, diagnoses, nursing and physician documentation, test results and medications.
.png)
Zerobyte is a backup automation tool Zerobyte versions prior to 0.18.5 and 0.19.0 contain an authentication bypass vulnerability where authentication middleware is not properly applied to API endpoints. This results in certain API endpoints being accessible without valid session credentials. This is dangerous for those who have exposed Zerobyte to be used outside of their internal network. A fix has been applied in both version 0.19.0 and 0.18.5. If immediate upgrade is not possible, restrict network access to the Zerobyte instance to trusted networks only using firewall rules or network segmentation. This is only a temporary mitigation; upgrading is strongly recommended.
Open Source Point of Sale (opensourcepos) is a web based point of sale application written in PHP using CodeIgniter framework. Starting in version 3.4.0 and prior to version 3.4.2, a Cross-Site Request Forgery (CSRF) vulnerability exists in the application's filter configuration. The CSRF protection mechanism was **explicitly disabled**, allowing the application to process state-changing requests (POST) without verifying a valid CSRF token. An unauthenticated remote attacker can exploit this by hosting a malicious web page. If a logged-in administrator visits this page, their browser is forced to send unauthorized requests to the application. A successful exploit allows the attacker to silently create a new Administrator account with full privileges, leading to a complete takeover of the system and loss of confidentiality, integrity, and availability. The vulnerability has been patched in version 3.4.2. The fix re-enables the CSRF filter in `app/Config/Filters.php` and resolves associated AJAX race conditions by adjusting token regeneration settings. As a workaround, administrators can manually re-enable the CSRF filter in `app/Config/Filters.php` by uncommenting the protection line. However, this is not recommended without applying the full patch, as it may cause functionality breakage in the Sales module due to token synchronization issues.
Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Model Context Protocol (MCP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious MCP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered automatically without any user interaction besides opening the project in the IDE. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.
Zed, a code editor, has an aribtrary code execution vulnerability in versions prior to 0.218.2-pre. The Zed IDE loads Language Server Protocol (LSP) configurations from the `settings.json` file located within a project’s `.zed` subdirectory. A malicious LSP configuration can contain arbitrary shell commands that run on the host system with the privileges of the user running the IDE. This can be triggered when a user opens project file for which there is an LSP entry. A concerted effort by an attacker to seed a project settings file (`./zed/settings.json`) with malicious language server configurations could result in arbitrary code execution with the user's privileges if the user opens the project in Zed without reviewing the contents. Version 0.218.2-pre fixes the issue by implementing worktree trust mechanism. As a workaround, users should carefully review the contents of project settings files (`./zed/settings.json`) before opening new projects in Zed.
Storybook is a frontend workshop for building user interface components and pages in isolation. A vulnerability present starting in versions 7.0.0 and prior to versions 7.6.21, 8.6.15, 9.1.17, and 10.1.10 relates to Storybook’s handling of environment variables defined in a `.env` file, which could, in specific circumstances, lead to those variables being unexpectedly bundled into the artifacts created by the `storybook build` command. When a built Storybook is published to the web, the bundle’s source is viewable, thus potentially exposing those variables to anyone with access. For a project to potentially be vulnerable to this issue, it must build the Storybook (i.e. run `storybook build` directly or indirectly) in a directory that contains a `.env` file (including variants like `.env.local`) and publish the built Storybook to the web. Storybooks built without a `.env` file at build time are not affected, including common CI-based builds where secrets are provided via platform environment variables rather than `.env` files. Storybook runtime environments (i.e. `storybook dev`) are not affected. Deployed applications that share a repo with your Storybook are not affected. Users should upgrade their Storybook—on both their local machines and CI environment—to version .6.21, 8.6.15, 9.1.17, or 10.1.10 as soon as possible. Maintainers additionally recommend that users audit for any sensitive secrets provided via `.env` files and rotate those keys. Some projects may have been relying on the undocumented behavior at the heart of this issue and will need to change how they reference environment variables after this update. If a project can no longer read necessary environmental variable values, either prefix the variables with `STORYBOOK_` or use the `env` property in Storybook’s configuration to manually specify values. In either case, do not include sensitive secrets as they will be included in the built bundle.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.