Company Details
primesourcex
81
3,175
623
primesourcex.com
0
PRI_2765183
In-progress

Prime Source Company CyberSecurity Posture
primesourcex.comPrime Source Expense Experts is a purchasing solution for many healthcare providers and facilities, including Skilled Nursing, Assisted Living Centers and Hospitals. By utilizing our managed services, you will take advantage of our wide selection of GPO contracts offered to maximize your savings. Through the power of our network of vendors, manufacturers and affiliates, Prime Source GPO members receive the best prices every day. You will find double-digit savings on a wide range of products and services for every department in your facility, including Nursing, Dietary, Housekeeping, Maintenance, Office and more. Prime Source’s highly trained and dedicated team of purchasing specialists constantly monitor market trends and work with vendors and affiliates to provide lower pricing and better service. By taking advantage of the Prime Source's contracts your facility will see an increase in the quality of products while enjoying a reduction in cost.
Company Details
primesourcex
81
3,175
623
primesourcex.com
0
PRI_2765183
In-progress
Between 750 and 799

Prime Source Global Score (TPRM)XXXX



No incidents recorded for Prime Source in 2025.
No incidents recorded for Prime Source in 2025.
No incidents recorded for Prime Source in 2025.
Prime Source cyber incidents detection timeline including parent company and subsidiaries

Prime Source Expense Experts is a purchasing solution for many healthcare providers and facilities, including Skilled Nursing, Assisted Living Centers and Hospitals. By utilizing our managed services, you will take advantage of our wide selection of GPO contracts offered to maximize your savings. Through the power of our network of vendors, manufacturers and affiliates, Prime Source GPO members receive the best prices every day. You will find double-digit savings on a wide range of products and services for every department in your facility, including Nursing, Dietary, Housekeeping, Maintenance, Office and more. Prime Source’s highly trained and dedicated team of purchasing specialists constantly monitor market trends and work with vendors and affiliates to provide lower pricing and better service. By taking advantage of the Prime Source's contracts your facility will see an increase in the quality of products while enjoying a reduction in cost.


Evergreen Healthcare Group is proud to provide management consulting and other services to skilled nursing homes and assisted living communities located in the North West United States. The teams at each community provide a broad spectrum of healthcare and related services including but not limited

When Pacific Care was founded in 1998 our key priority was to provide a level of care that we ourselves would want to receive and to create an environment where we would be happy to work. These guiding principals are at the heart of everything we do. Pacific Care is a care home group based out of G

MealSuite is a fully integrated, end to end, dietary, food production, inventory, kitchen management and point of sale solution on a mission to revolutionize the continuum of care through food service technology. Since 1989, our industry leading innovations have empowered food service operators ac

We provide the very best in residential care, nursing care and dementia care for those who need help and support, through an amazing portfolio of some 50 homes located in England, Scotland and Jersey. We are passionate about the individual care for our residents. Understanding their rich and colour

When you join Oakland Care you are joining a company that is creating an exciting new generation of luxurious care homes in the UK – all backed by a wealth of experience in delivering excellent care. We believe every team member becomes part of our family. Like any family, we are all reliant on eac

Our residents know that they come first from the minute they walk through the doors of Lewisville Estates. We love them as they are our own family! Our assisted and independent senior living community is Award Winning. At Lewisville Estates, we offer a resort style retirement unlike any other. Our
.png)
The tech layoff wave is still kicking in 2025. Last year saw more than 150,000 job cuts across 549 companies, according to independent...
Apple does not plan to comply with a mandate to preload its smartphones with a state-owned cyber safety app and will convey its concerns to...
As a cybersecurity major, you'll learn how to identify and defend against cyberthreats and attacks as you put your skills to work in...
Stay ahead of threats with the latest Cybersecurity Trends. Discover cutting-edge strategies and technologies shaping the future of...
Plus: State-sponsored AI hacking is here, Google hosts a CBP face recognition app, and more of the week's top security news.
Top Cyber Security Projects: 1. Cybersecurity Incident Response Simulation Tool 2. Biometric Authentication System 3.
In 2023, 725 data breaches were reported to OCR and across those breaches, more than 133 million records were exposed or impermissibly disclosed.
A catastrophic cyberattack at Jaguar Land Rover is forcing governments and industrial leaders to address urgent demands for business...
Officials warned that attackers could exploit the vulnerabilities to steal credentials, move laterally through networks, and potentially...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Prime Source is http://www.primesourcex.com.
According to Rankiteo, Prime Source’s AI-generated cybersecurity score is 754, reflecting their Fair security posture.
According to Rankiteo, Prime Source currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Prime Source is not certified under SOC 2 Type 1.
According to Rankiteo, Prime Source does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Prime Source is not listed as GDPR compliant.
According to Rankiteo, Prime Source does not currently maintain PCI DSS compliance.
According to Rankiteo, Prime Source is not compliant with HIPAA regulations.
According to Rankiteo,Prime Source is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Prime Source operates primarily in the Nursing Homes and Residential Care Facilities industry.
Prime Source employs approximately 81 people worldwide.
Prime Source presently has no subsidiaries across any sectors.
Prime Source’s official LinkedIn profile has approximately 3,175 followers.
Prime Source is classified under the NAICS code 623, which corresponds to Nursing Homes and Residential Care Facilities.
No, Prime Source does not have a profile on Crunchbase.
Yes, Prime Source maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/primesourcex.
As of December 24, 2025, Rankiteo reports that Prime Source has not experienced any cybersecurity incidents.
Prime Source has an estimated 100 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Prime Source has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
httparty is an API tool. In versions 0.23.2 and prior, httparty is vulnerable to SSRF. This issue can pose a risk of leaking API keys, and it can also allow third parties to issue requests to internal servers. This issue has been patched via commit 0529bcd.
5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. In versions 0.15.2 and prior, an RCE vulnerability exists in useMarkdown.ts, where the markdown-it-mermaid plugin is initialized with securityLevel: 'loose'. This configuration explicitly permits the rendering of HTML tags within Mermaid diagram nodes. This issue has not been patched at time of publication.
continuwuity is a Matrix homeserver written in Rust. Prior to version 0.5.0, this vulnerability allows a remote, unauthenticated attacker to force the target server to cryptographically sign arbitrary membership events. The flaw exists because the server fails to validate the origin of a signing request, provided the event's state_key is a valid user ID belonging to the target server. This issue has been patched in version 0.5.0. A workaround for this issue involves blocking access to the PUT /_matrix/federation/v2/invite/{roomId}/{eventId} endpoint using the reverse proxy.
LangChain is a framework for building LLM-powered applications. Prior to @langchain/core versions 0.3.80 and 1.1.8, and prior to langchain versions 0.3.37 and 1.2.3, a serialization injection vulnerability exists in LangChain JS's toJSON() method (and subsequently when string-ifying objects using JSON.stringify(). The method did not escape objects with 'lc' keys when serializing free-form data in kwargs. The 'lc' key is used internally by LangChain to mark serialized objects. When user-controlled data contains this key structure, it is treated as a legitimate LangChain object during deserialization rather than plain user data. This issue has been patched in @langchain/core versions 0.3.80 and 1.1.8, and langchain versions 0.3.37 and 1.2.3
LangChain is a framework for building agents and LLM-powered applications. Prior to versions 0.3.81 and 1.2.5, a serialization injection vulnerability exists in LangChain's dumps() and dumpd() functions. The functions do not escape dictionaries with 'lc' keys when serializing free-form dictionaries. The 'lc' key is used internally by LangChain to mark serialized objects. When user-controlled data contains this key structure, it is treated as a legitimate LangChain object during deserialization rather than plain user data. This issue has been patched in versions 0.3.81 and 1.2.5.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.