ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Plex, by Rockwell Automation, is a leader in cloud-delivered smart manufacturing solutions, empowering the world's manufacturers to make awesome products. Our platform gives manufacturers the ability to connect, automate, track, and analyze every aspect of their business to drive transformation. The Plex Smart Manufacturing Platform™ includes solutions for manufacturing execution (MES), ERP, quality, supply chain planning and management, asset performance management, production monitoring, process automation and analytics to connect people, systems, machines and supply chains, enabling them to lead with precision, efficiency and agility. To learn more, visit www.plex.com.

Plex, by Rockwell Automation A.I CyberSecurity Scoring

PRA

Company Details

Linkedin ID:

plex-by-rockwell-automation

Employees number:

444

Number of followers:

26,989

NAICS:

5112

Industry Type:

Software Development

Homepage:

rockwellautomation.com

IP Addresses:

0

Company ID:

PLE_3058679

Scan Status:

In-progress

AI scorePRA Risk Score (AI oriented)

Between 700 and 749

https://images.rankiteo.com/companyimages/plex-by-rockwell-automation.jpeg
PRA Software Development
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscorePRA Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/plex-by-rockwell-automation.jpeg
PRA Software Development
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

PRA Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
PlexBreach8546/2022
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Plex confirmed a security breach where an unauthorized party accessed one of its databases, exposing a subset of customer data. The compromised information included **email addresses, usernames, and securely hashed passwords**, though Plex emphasized that passwords were hashed per industry standards (algorithm undisclosed). While payment card data was not at risk—since Plex does not store such details—the incident marks the company’s **second major breach in recent years**, following a similar 2022 attack. Plex contained the breach swiftly and mandated password resets for all users, advising additional precautions like enabling **two-factor authentication (2FA)** and logging out of active sessions. The company fixed the exploited vulnerability but did not disclose technical specifics or remediation steps. The exposure of **customer credentials** raises risks of credential-stuffing attacks or phishing attempts, despite the hashing protection.

Plex
Breach
Severity: 85
Impact: 4
Seen: 6/2022
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Plex confirmed a security breach where an unauthorized party accessed one of its databases, exposing a subset of customer data. The compromised information included **email addresses, usernames, and securely hashed passwords**, though Plex emphasized that passwords were hashed per industry standards (algorithm undisclosed). While payment card data was not at risk—since Plex does not store such details—the incident marks the company’s **second major breach in recent years**, following a similar 2022 attack. Plex contained the breach swiftly and mandated password resets for all users, advising additional precautions like enabling **two-factor authentication (2FA)** and logging out of active sessions. The company fixed the exploited vulnerability but did not disclose technical specifics or remediation steps. The exposure of **customer credentials** raises risks of credential-stuffing attacks or phishing attempts, despite the hashing protection.

Ailogo

PRA Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for PRA

Incidents vs Software Development Industry Average (This Year)

No incidents recorded for Plex, by Rockwell Automation in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Plex, by Rockwell Automation in 2025.

Incident Types PRA vs Software Development Industry Avg (This Year)

No incidents recorded for Plex, by Rockwell Automation in 2025.

Incident History — PRA (X = Date, Y = Severity)

PRA cyber incidents detection timeline including parent company and subsidiaries

PRA Company Subsidiaries

SubsidiaryImage

Plex, by Rockwell Automation, is a leader in cloud-delivered smart manufacturing solutions, empowering the world's manufacturers to make awesome products. Our platform gives manufacturers the ability to connect, automate, track, and analyze every aspect of their business to drive transformation. The Plex Smart Manufacturing Platform™ includes solutions for manufacturing execution (MES), ERP, quality, supply chain planning and management, asset performance management, production monitoring, process automation and analytics to connect people, systems, machines and supply chains, enabling them to lead with precision, efficiency and agility. To learn more, visit www.plex.com.

Loading...
similarCompanies

PRA Similar Companies

Microsoft

Every company has a mission. What's ours? To empower every person and every organization to achieve more. We believe technology can and should be a force for good and that meaningful innovation contributes to a brighter world in the future and today. Our culture doesn’t just encourage curiosity; it

Synopsys Inc

Catalyzing the era of pervasive intelligence, Synopsys delivers trusted and comprehensive silicon to systems design solutions, from electronic design automation to silicon IP and system verification and validation. We partner closely with semiconductor and systems customers across a wide range of

Intuit

Intuit is a global technology platform that helps our customers and communities overcome their most important financial challenges. Serving millions of customers worldwide with TurboTax, QuickBooks, Credit Karma and Mailchimp, we believe that everyone should have the opportunity to prosper and we wo

DiDi Global Inc. is a leading mobility technology platform. It offers a wide range of app-based services across Asia Pacific, Latin America, and other global markets, including ride hailing, taxi hailing, designated driving, hitch and other forms of shared mobility as well as certain energy and vehi

Amazon Fulfillment Technologies & Robotics

On the Fulfillment Technologies & Robotics Team, we build dynamic partnerships between people and intelligent machines. This intricate collaboration helps Amazon fulfill orders with unmatched accuracy. Since we began working with robotics, we've added over a million new jobs worldwide. Working in s

Snowflake

**Snowflake is proud to be the Official Data Collaboration Provider for LA28 and Team USA.** Snowflake delivers the AI Data Cloud — a global network where thousands of organizations mobilize data with near-unlimited scale, concurrency, and performance. Inside the AI Data Cloud, organizations unite

Workday

Workday is a leading provider of enterprise cloud applications for finance and human resources, helping customers adapt and thrive in a changing world. Workday applications for financial management, human resources, planning, spend management, and analytics are built with artificial intelligence and

LinkedIn

Founded in 2003, LinkedIn connects the world's professionals to make them more productive and successful. With more than 1 billion members worldwide, including executives from every Fortune 500 company, LinkedIn is the world's largest professional network. The company has a diversified business mode

Instacart

Instacart, the leading grocery technology company in North America, works with grocers and retailers to transform how people shop. The company partners with more than 1,500 national, regional, and local retail banners to facilitate online shopping, delivery and pickup services from more than 85,000

newsone

PRA CyberSecurity News

November 10, 2025 04:53 PM
How one manufacturer gained live inventory control - November 2025 - Rockwell Automation

Challenge. Embodying the motto “Customer Success is Our Success,” the company recognised the need for a more advanced ERP system after relying on the same...

August 31, 2025 07:00 AM
Week in review: 300k+ Plex Media Server instances still vulnerable to attack, exploited Git RCE flaw

Here's an overview of some of last week's most interesting news, articles, interviews and videos: 300k+ Plex Media Server instances still...

June 06, 2025 07:00 AM
Key Insights from Rockwell Automation’s 2025 Report

Rockwell Automation's 2025 Smart Manufacturing Report reveals that 95% of manufacturers are investing in AI to boost efficiency.

May 21, 2025 07:00 AM
Top 10: Cloud-based ERP Systems

From giants like Oracle NetSuite and SAP to specialists like Sage Intacct, here are Technology Magazine's top 10 cloud ERPs for 2025.

October 02, 2024 07:00 AM
Tackling the Workforce Crisis in Manufacturing: Rockwell Automation’s Connected Worker Plex Solution

Manufacturers are facing a critical labor shortage. Rockwell Automation has launched Connected Worker Plex to tackle this workforce crisis.

March 11, 2024 07:00 AM
Rockwell Automation partners with Tasti for digital transformation

Tasti has selected Plex, a Rockwell Automation smart manufacturing and business process solution, to conduct its end-to-end digital transformation.

March 05, 2024 08:00 AM
Case Study: Plex Marks the Spot – Tasti's Recipe for Success

Snack bar and wholefood ball manufacturer Tasti Products Limited has chosen the platform Plex by Rockwell Automation, as its new integrated...

February 26, 2024 08:00 AM
Tasti's recipe for healthy growth with smart manufacturing solution

Plex, by Rockwell Automation, has been selected by snack food manufacturer Tasti New Zealand to provide it with an end-to-end digital...

June 25, 2021 07:00 AM
Francisco Partners Sells Plex Systems to Rockwell Automation for $2.22 Billion

Francisco Partners has agreed to sell Plex Systems, a cloud-native smart manufacturing platform, to Rockwell Automation (NYSE: ROK) for...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

PRA CyberSecurity History Information

Official Website of Plex, by Rockwell Automation

The official website of Plex, by Rockwell Automation is http://www.plex.com.

Plex, by Rockwell Automation’s AI-Generated Cybersecurity Score

According to Rankiteo, Plex, by Rockwell Automation’s AI-generated cybersecurity score is 728, reflecting their Moderate security posture.

How many security badges does Plex, by Rockwell Automation’ have ?

According to Rankiteo, Plex, by Rockwell Automation currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Plex, by Rockwell Automation have SOC 2 Type 1 certification ?

According to Rankiteo, Plex, by Rockwell Automation is not certified under SOC 2 Type 1.

Does Plex, by Rockwell Automation have SOC 2 Type 2 certification ?

According to Rankiteo, Plex, by Rockwell Automation does not hold a SOC 2 Type 2 certification.

Does Plex, by Rockwell Automation comply with GDPR ?

According to Rankiteo, Plex, by Rockwell Automation is not listed as GDPR compliant.

Does Plex, by Rockwell Automation have PCI DSS certification ?

According to Rankiteo, Plex, by Rockwell Automation does not currently maintain PCI DSS compliance.

Does Plex, by Rockwell Automation comply with HIPAA ?

According to Rankiteo, Plex, by Rockwell Automation is not compliant with HIPAA regulations.

Does Plex, by Rockwell Automation have ISO 27001 certification ?

According to Rankiteo,Plex, by Rockwell Automation is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Plex, by Rockwell Automation

Plex, by Rockwell Automation operates primarily in the Software Development industry.

Number of Employees at Plex, by Rockwell Automation

Plex, by Rockwell Automation employs approximately 444 people worldwide.

Subsidiaries Owned by Plex, by Rockwell Automation

Plex, by Rockwell Automation presently has no subsidiaries across any sectors.

Plex, by Rockwell Automation’s LinkedIn Followers

Plex, by Rockwell Automation’s official LinkedIn profile has approximately 26,989 followers.

NAICS Classification of Plex, by Rockwell Automation

Plex, by Rockwell Automation is classified under the NAICS code 5112, which corresponds to Software Publishers.

Plex, by Rockwell Automation’s Presence on Crunchbase

No, Plex, by Rockwell Automation does not have a profile on Crunchbase.

Plex, by Rockwell Automation’s Presence on LinkedIn

Yes, Plex, by Rockwell Automation maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/plex-by-rockwell-automation.

Cybersecurity Incidents Involving Plex, by Rockwell Automation

As of November 28, 2025, Rankiteo reports that Plex, by Rockwell Automation has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Plex, by Rockwell Automation has an estimated 26,620 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Plex, by Rockwell Automation ?

Incident Types: The types of cybersecurity incidents that have occurred include Breach.

How does Plex, by Rockwell Automation detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with breach was quickly contained, and remediation measures with fixed the exploited vulnerability (technical details not disclosed), remediation measures with mandatory password reset for all users, and communication strategy with public notification, communication strategy with user advisories for password reset and 2fa enablement, communication strategy with clarification that payment data was not at risk..

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Plex Database Breach Exposes Customer Data

Description: Plex confirmed a security incident where an unauthorized party accessed one of its databases, exposing a subset of customer data including email addresses, usernames, and securely hashed passwords. The breach was quickly contained, and Plex advised all users to reset their passwords. This marks the second major security issue for Plex in recent years, following a similar 2022 breach.

Type: Data Breach

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach PLE3792537090925

Data Compromised: Email addresses, Usernames, Securely hashed passwords

Systems Affected: One of Plex's databases

Brand Reputation Impact: Potential reputational damage due to second breach in recent years

Identity Theft Risk: Low (passwords were hashed, but algorithm not disclosed; brute-force risk remains)

Payment Information Risk: None (Plex does not store payment card information)

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Email Addresses, Usernames, Securely Hashed Passwords and .

Which entities were affected by each incident ?

Incident : Data Breach PLE3792537090925

Entity Name: Plex

Entity Type: Company

Industry: Media/Streaming Services

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Data Breach PLE3792537090925

Incident Response Plan Activated: True

Containment Measures: Breach was quickly contained

Remediation Measures: Fixed the exploited vulnerability (technical details not disclosed)Mandatory password reset for all users

Communication Strategy: Public notificationUser advisories for password reset and 2FA enablementClarification that payment data was not at risk

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach PLE3792537090925

Type of Data Compromised: Email addresses, Usernames, Securely hashed passwords

Sensitivity of Data: Moderate (no payment data; passwords hashed but algorithm undisclosed)

Data Encryption: Partially (passwords were hashed; other data likely unencrypted)

Personally Identifiable Information: Email addressesUsernames

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Fixed the exploited vulnerability (technical details not disclosed), Mandatory password reset for all users, .

How does the company handle incidents involving personally identifiable information (PII) ?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by breach was quickly contained and .

Lessons Learned and Recommendations

What recommendations were made to prevent future incidents ?

Incident : Data Breach PLE3792537090925

Recommendations: Users should reset passwords via plex.tv/reset and select 'Sign out connected devices after password change'., Single Sign-On (SSO) users should log out of all sessions via plex.tv/security and reauthenticate., Enable two-factor authentication (2FA) for added security., Remain vigilant against phishing attempts (Plex will never request passwords or payment details via email).Users should reset passwords via plex.tv/reset and select 'Sign out connected devices after password change'., Single Sign-On (SSO) users should log out of all sessions via plex.tv/security and reauthenticate., Enable two-factor authentication (2FA) for added security., Remain vigilant against phishing attempts (Plex will never request passwords or payment details via email).Users should reset passwords via plex.tv/reset and select 'Sign out connected devices after password change'., Single Sign-On (SSO) users should log out of all sessions via plex.tv/security and reauthenticate., Enable two-factor authentication (2FA) for added security., Remain vigilant against phishing attempts (Plex will never request passwords or payment details via email).Users should reset passwords via plex.tv/reset and select 'Sign out connected devices after password change'., Single Sign-On (SSO) users should log out of all sessions via plex.tv/security and reauthenticate., Enable two-factor authentication (2FA) for added security., Remain vigilant against phishing attempts (Plex will never request passwords or payment details via email).

References

Where can I find more information about each incident ?

Incident : Data Breach PLE3792537090925

Source: Plex Official Notification

URL: https://plex.tv/reset

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Plex Official NotificationUrl: https://plex.tv/reset.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Data Breach PLE3792537090925

Investigation Status: Ongoing (vulnerability fixed; technical details not disclosed)

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public Notification, User Advisories For Password Reset And 2Fa Enablement and Clarification That Payment Data Was Not At Risk.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Data Breach PLE3792537090925

Customer Advisories: Mandatory password reset for all users.Enable 2FA for enhanced security.Log out of all sessions for SSO users.Plex will not request sensitive information via email.

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Mandatory Password Reset For All Users., Enable 2Fa For Enhanced Security., Log Out Of All Sessions For Sso Users., Plex Will Not Request Sensitive Information Via Email. and .

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Data Breach PLE3792537090925

Corrective Actions: Fixed The Exploited Vulnerability, Enforced Password Resets And 2Fa Recommendations,

What corrective actions has the company taken based on post-incident analysis ?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Fixed The Exploited Vulnerability, Enforced Password Resets And 2Fa Recommendations, .

Additional Questions

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Email addresses, Usernames, Securely hashed passwords and .

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident was One of Plex's databases.

Response to the Incidents

What containment measures were taken in the most recent incident ?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Breach was quickly contained.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Email addresses, Securely hashed passwords and Usernames.

Lessons Learned and Recommendations

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Remain vigilant against phishing attempts (Plex will never request passwords or payment details via email)., Users should reset passwords via plex.tv/reset and select 'Sign out connected devices after password change'., Enable two-factor authentication (2FA) for added security. and Single Sign-On (SSO) users should log out of all sessions via plex.tv/security and reauthenticate..

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is Plex Official Notification.

What is the most recent URL for additional resources on cybersecurity best practices ?

Most Recent URL for Additional Resources: The most recent URL for additional resources on cybersecurity best practices is https://plex.tv/reset .

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (vulnerability fixed; technical details not disclosed).

Stakeholder and Customer Advisories

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued was an Mandatory password reset for all users.Enable 2FA for enhanced security.Log out of all sessions for SSO users.Plex will not request sensitive information via email.

cve

Latest Global CVEs (Not Company-Specific)

Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=plex-by-rockwell-automation' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge