ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

PSafe Technology is a leader in cybersecurity solutions. We develop products and services to shield devices and data from online dangers like malware, viruses, and ever-evolving security weaknesses. With experience and reputation, the company keeps your systems and information safe. Our mobile product is dfndr security, focused on Android users. It safeguards your phone against malware, phishing scams, and identity theft with the most relevant security features. PSafe's apps use artificial intelligence and machine learning to protect what's most important to you. Beyond mobile security. PSafe's innovative applications provide valuable insights to strengthen your overall security posture. =================================================== Dfndr security https://play.google.com/store/apps/details?id=com.psafe.msuite&hl=en&gl=US ===================================================

PSafe US A.I CyberSecurity Scoring

PSafe US

Company Details

Linkedin ID:

psafeus

Employees number:

2

Number of followers:

0

NAICS:

5415

Industry Type:

IT Services and IT Consulting

Homepage:

psafe.com

IP Addresses:

0

Company ID:

PSA_3051448

Scan Status:

In-progress

AI scorePSafe US Risk Score (AI oriented)

Between 650 and 699

https://images.rankiteo.com/companyimages/psafeus.jpeg
PSafe US IT Services and IT Consulting
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscorePSafe US Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/psafeus.jpeg
PSafe US IT Services and IT Consulting
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

PSafe US Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
PSafe US: DroidLock malware locks you out of your Android device and demands ransomRansomware100512/2025
Rankiteo Explanation :
Attack threatening the organization's existence

Description: **New Android Ransomware Campaign Targets Spanish-Speaking Users with DroidLock Malware** Researchers have uncovered an active threat campaign distributing **DroidLock**, a sophisticated Android ransomware strain that hijacks devices and demands payment under threats of data destruction. While the campaign has primarily targeted **Spanish-speaking users**, experts warn it could expand to other regions. **How DroidLock Infects Devices** The malware spreads via **phishing sites** that impersonate trusted brands, such as telecom providers, tricking victims into downloading a malicious app. Once installed, the app acts as a **dropper**, exploiting **Device Admin and Accessibility Services permissions** to gain full control. After securing accessibility access, DroidLock autonomously approves additional permissions—including **SMS, call logs, contacts, and audio**—to strengthen its leverage for extortion. **Capabilities and Attack Tactics** DroidLock employs **Accessibility Services** to overlay fake screens, such as a fraudulent Android update prompt, while secretly capturing **device unlock patterns** and app credentials. Using **Virtual Network Computing (VNC)**, attackers gain **real-time remote control**, enabling them to: - **Change device PINs** to lock users out - **Intercept one-time passwords (OTPs)** - **Manipulate notifications, mute audio, or uninstall apps** - **Activate the camera** for surveillance - **Wipe the device** if ransom demands aren’t met Unlike traditional ransomware, DroidLock **does not encrypt files** but instead **blocks access** and threatens permanent data deletion unless payment is made within **24 hours**. Victims receive a ransom note with an email contact and device ID, accompanied by countdown timers and warnings against involving authorities or recovery tools. **Researchers’ Findings** Security firm **Zimperium** highlighted the malware’s ability to **bypass security measures** and escalate privileges rapidly. The campaign’s success in Spain may prompt its expansion to other markets, raising concerns about its potential global reach.

PSafe US: DroidLock malware locks you out of your Android device and demands ransom
Ransomware
Severity: 100
Impact: 5
Seen: 12/2025
Blog:
Rankiteo Explanation
Attack threatening the organization's existence

Description: **New Android Ransomware Campaign Targets Spanish-Speaking Users with DroidLock Malware** Researchers have uncovered an active threat campaign distributing **DroidLock**, a sophisticated Android ransomware strain that hijacks devices and demands payment under threats of data destruction. While the campaign has primarily targeted **Spanish-speaking users**, experts warn it could expand to other regions. **How DroidLock Infects Devices** The malware spreads via **phishing sites** that impersonate trusted brands, such as telecom providers, tricking victims into downloading a malicious app. Once installed, the app acts as a **dropper**, exploiting **Device Admin and Accessibility Services permissions** to gain full control. After securing accessibility access, DroidLock autonomously approves additional permissions—including **SMS, call logs, contacts, and audio**—to strengthen its leverage for extortion. **Capabilities and Attack Tactics** DroidLock employs **Accessibility Services** to overlay fake screens, such as a fraudulent Android update prompt, while secretly capturing **device unlock patterns** and app credentials. Using **Virtual Network Computing (VNC)**, attackers gain **real-time remote control**, enabling them to: - **Change device PINs** to lock users out - **Intercept one-time passwords (OTPs)** - **Manipulate notifications, mute audio, or uninstall apps** - **Activate the camera** for surveillance - **Wipe the device** if ransom demands aren’t met Unlike traditional ransomware, DroidLock **does not encrypt files** but instead **blocks access** and threatens permanent data deletion unless payment is made within **24 hours**. Victims receive a ransom note with an email contact and device ID, accompanied by countdown timers and warnings against involving authorities or recovery tools. **Researchers’ Findings** Security firm **Zimperium** highlighted the malware’s ability to **bypass security measures** and escalate privileges rapidly. The campaign’s success in Spain may prompt its expansion to other markets, raising concerns about its potential global reach.

Ailogo

PSafe US Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for PSafe US

Incidents vs IT Services and IT Consulting Industry Average (This Year)

PSafe US has 38.89% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

PSafe US has 29.87% more incidents than the average of all companies with at least one recorded incident.

Incident Types PSafe US vs IT Services and IT Consulting Industry Avg (This Year)

PSafe US reported 1 incidents this year: 0 cyber attacks, 1 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.

Incident History — PSafe US (X = Date, Y = Severity)

PSafe US cyber incidents detection timeline including parent company and subsidiaries

PSafe US Company Subsidiaries

SubsidiaryImage

PSafe Technology is a leader in cybersecurity solutions. We develop products and services to shield devices and data from online dangers like malware, viruses, and ever-evolving security weaknesses. With experience and reputation, the company keeps your systems and information safe. Our mobile product is dfndr security, focused on Android users. It safeguards your phone against malware, phishing scams, and identity theft with the most relevant security features. PSafe's apps use artificial intelligence and machine learning to protect what's most important to you. Beyond mobile security. PSafe's innovative applications provide valuable insights to strengthen your overall security posture. =================================================== Dfndr security https://play.google.com/store/apps/details?id=com.psafe.msuite&hl=en&gl=US ===================================================

Loading...
similarCompanies

PSafe US Similar Companies

A AeC é apontada consistentemente como a líder brasileira na entrega de soluções de experiência do cliente e gestão de processos terceirizados. Servindo as principais marcas do mercado nacional, conquistou nos três últimos anos a posição de Empresa do Ano de BPO pela conceituada Frost and Sullivan

UST is a global digital transformation solutions provider. For more than 20 years, UST has worked side by side with the world’s best companies to make a real impact through transformation. Powered by technology, inspired by people and led by purpose, UST partners with their clients from design to op

LexisNexis

LexisNexis Legal & Professional is a leading global provider of legal, regulatory and business information and analytics that help customers increase productivity, improve decision-making and outcomes, and advance the rule of law around the world. We help lawyers win cases, manage their work more e

NTT DATA Business Solutions

We Transform. SAP® solutions into Value We understand the business of our clients and know what it takes to transform it into the future. At NTT DATA Business Solutions, we drive innovation – from advisory and implementation to managed services and beyond. With SAP at our core and a powerful ecosys

General Dynamics Information Technology

GDIT is a global technology and professional services company that delivers solutions, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solut

Insights you can act on to achieve trusted outcomes. We are insights-driven and outcomes-focused to help accelerate returns on your investments. Across 21 industry sectors and 400 locations worldwide, we provide comprehensive, scalable and sustainable IT and business consulting services that are in

Inetum

Inetum is a European leader in digital services. Inetum’s team of 27,000 consultants and specialists strive every day to make a digital impact for businesses, public sector entities and society. Inetum’s solutions aim at contributing to its clients’ performance and innovation as well as the common g

Serco

We bring together the right people, the right technology and the right partners to create innovative solutions that make positive impact and address some of the most urgent and complex challenges facing the modern world. With a focus on serving governments globally, Serco’s services span justice,

Coforge

Coforge is a global digital services and solutions provider, that leverages emerging technologies and deep domain expertise to deliver real-world business impact for its clients. A focus on select industries, a deep domain understanding of the underlying processes of those industries and partners

newsone

PSafe US CyberSecurity News

December 11, 2024 08:00 AM
FBI warns about texting between iPhones and Android

The Federal Bureau of Investigation has warned that Chinese hackers have compromised the safety management software (SMS) systems that send text messages...

December 11, 2024 08:00 AM
FBI warns about texting between iPhones and Android

Are Chinese hackers spying on your text messages? Last week, ABC News reported a global cybersecurity attack occurred this summer in which...

October 03, 2024 10:50 AM
Bitdefender OEM Antimalware Rebranding - Private Label or White Label

Build your own branded cybersecurity product with Bitdefender Antimalware Rebranding Solutions. Private Label or White Label integrations are now easier...

June 24, 2024 07:00 AM
280 Million Google Chrome Users Installed Dangerous Extensions, Study Says

A new study reveals that a concerning number of Chrome users have installed browser extensions containing malware. Here's Google's advice on...

January 24, 2024 08:00 AM
Interview With Marco DeMello – PSafe

We recently had the pleasure of interviewing PSafe's CEO Marco DeMello. We asked him about his company's dfndr security application and enterprise.

December 18, 2022 08:00 AM
4 Things You Can Do To Keep Yourself Cyber Safe

Let's start with the basics of “cyber hygiene,” easy and common-sense ways to protect yourself online.

October 12, 2021 07:00 AM
7 breaches, hacks, and leaks you might have missed this year

Cybersecurity Awareness Month couldn't have kicked off in more dramatic fashion: Facebook, WhatsApp, and Instagram went offline,...

September 16, 2019 07:00 AM
PSafe Offers a Suite of Tools to Protect Online Daters From Malware, Chatbots, and Phishing Scams

Recent research from cybersecurity provider PSafe indicates that dating site and app users are still falling for simple scams that download...

May 31, 2018 07:00 AM
PSafe CEO Marco DeMello On Mobile Cybersecurity And Weaponized AI

For Marco Demello, CEO of mobile app security company PSafe, cybersecurity is a way of life. Demello spoke with Chief Executive about the...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

PSafe US CyberSecurity History Information

Official Website of PSafe US

The official website of PSafe US is http://www.psafe.com.

PSafe US’s AI-Generated Cybersecurity Score

According to Rankiteo, PSafe US’s AI-generated cybersecurity score is 696, reflecting their Weak security posture.

How many security badges does PSafe US’ have ?

According to Rankiteo, PSafe US currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does PSafe US have SOC 2 Type 1 certification ?

According to Rankiteo, PSafe US is not certified under SOC 2 Type 1.

Does PSafe US have SOC 2 Type 2 certification ?

According to Rankiteo, PSafe US does not hold a SOC 2 Type 2 certification.

Does PSafe US comply with GDPR ?

According to Rankiteo, PSafe US is not listed as GDPR compliant.

Does PSafe US have PCI DSS certification ?

According to Rankiteo, PSafe US does not currently maintain PCI DSS compliance.

Does PSafe US comply with HIPAA ?

According to Rankiteo, PSafe US is not compliant with HIPAA regulations.

Does PSafe US have ISO 27001 certification ?

According to Rankiteo,PSafe US is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of PSafe US

PSafe US operates primarily in the IT Services and IT Consulting industry.

Number of Employees at PSafe US

PSafe US employs approximately 2 people worldwide.

Subsidiaries Owned by PSafe US

PSafe US presently has no subsidiaries across any sectors.

PSafe US’s LinkedIn Followers

PSafe US’s official LinkedIn profile has approximately 0 followers.

NAICS Classification of PSafe US

PSafe US is classified under the NAICS code 5415, which corresponds to Computer Systems Design and Related Services.

PSafe US’s Presence on Crunchbase

No, PSafe US does not have a profile on Crunchbase.

PSafe US’s Presence on LinkedIn

Yes, PSafe US maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/psafeus.

Cybersecurity Incidents Involving PSafe US

As of December 12, 2025, Rankiteo reports that PSafe US has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

PSafe US has an estimated 37,613 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at PSafe US ?

Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.

How does PSafe US detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with uninstall malicious app, use anti-malware solutions (e.g., malwarebytes for android), reset device pin..

Incident Details

Can you provide details on each incident ?

Incident : Ransomware

Title: DroidLock Android Ransomware Campaign

Description: Researchers have analyzed a new threat campaign actively targeting Android users with malware named DroidLock. The malware takes over a device and holds it for ransom by abusing Device Admin and Accessibility Services permissions. The campaign primarily targets Spanish-speaking users but could spread globally.

Type: Ransomware

Attack Vector: Phishing (malicious app installation via fake telecom provider or brand impersonation)

Vulnerability Exploited: Abuse of Device Admin and Accessibility Services permissions

Motivation: Financial gain (ransom)

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Ransomware.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Phishing sites impersonating telecom providers or brands.

Impact of the Incidents

What was the impact of each incident ?

Incident : Ransomware PSA1765476395

Data Compromised: SMS, call logs, contacts, audio, device unlock patterns, app credentials, OTPs

Systems Affected: Android devices

Operational Impact: Device lockout, remote control by attackers, potential data destruction

Identity Theft Risk: High (OTP interception, credential theft)

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are SMS, call logs, contacts, audio, device unlock patterns, app credentials and OTPs.

Which entities were affected by each incident ?

Incident : Ransomware PSA1765476395

Entity Type: Individual users

Location: Primarily Spanish-speaking regions (potential global spread)

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Ransomware PSA1765476395

Remediation Measures: Uninstall malicious app, use anti-malware solutions (e.g., Malwarebytes for Android), reset device PIN

Data Breach Information

What type of data was compromised in each breach ?

Incident : Ransomware PSA1765476395

Type of Data Compromised: SMS, call logs, contacts, audio, device unlock patterns, app credentials, OTPs

Sensitivity of Data: High (personally identifiable information, authentication data)

Data Exfiltration: Possible (via remote control and VNC)

Data Encryption: No (files not encrypted, but device access is blocked)

Personally Identifiable Information: Yes (contacts, SMS, call logs, credentials, OTPs)

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Uninstall malicious app, use anti-malware solutions (e.g., Malwarebytes for Android), reset device PIN.

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : Ransomware PSA1765476395

Ransom Demanded: Yes (amount not specified)

Ransomware Strain: DroidLock

Data Encryption: No

Data Exfiltration: Possible (via remote control)

Lessons Learned and Recommendations

What lessons were learned from each incident ?

Incident : Ransomware PSA1765476395

Lessons Learned: Android users should avoid sideloading apps, scrutinize permissions (especially Accessibility Services), and use real-time anti-malware solutions. Keeping devices updated is critical to prevent exploitation of known vulnerabilities.

What recommendations were made to prevent future incidents ?

Incident : Ransomware PSA1765476395

Recommendations: Only install apps from official app stores (Google Play)., Avoid installing apps promoted via SMS, email, or messaging apps., Verify developer names, download counts, and user reviews before installing apps., Use up-to-date anti-malware solutions (e.g., Malwarebytes for Android)., Scrutinize app permissions, especially for Accessibility Services, SMS, or camera access., Keep Android, Google Play services, and apps updated for security fixes.Only install apps from official app stores (Google Play)., Avoid installing apps promoted via SMS, email, or messaging apps., Verify developer names, download counts, and user reviews before installing apps., Use up-to-date anti-malware solutions (e.g., Malwarebytes for Android)., Scrutinize app permissions, especially for Accessibility Services, SMS, or camera access., Keep Android, Google Play services, and apps updated for security fixes.Only install apps from official app stores (Google Play)., Avoid installing apps promoted via SMS, email, or messaging apps., Verify developer names, download counts, and user reviews before installing apps., Use up-to-date anti-malware solutions (e.g., Malwarebytes for Android)., Scrutinize app permissions, especially for Accessibility Services, SMS, or camera access., Keep Android, Google Play services, and apps updated for security fixes.Only install apps from official app stores (Google Play)., Avoid installing apps promoted via SMS, email, or messaging apps., Verify developer names, download counts, and user reviews before installing apps., Use up-to-date anti-malware solutions (e.g., Malwarebytes for Android)., Scrutinize app permissions, especially for Accessibility Services, SMS, or camera access., Keep Android, Google Play services, and apps updated for security fixes.Only install apps from official app stores (Google Play)., Avoid installing apps promoted via SMS, email, or messaging apps., Verify developer names, download counts, and user reviews before installing apps., Use up-to-date anti-malware solutions (e.g., Malwarebytes for Android)., Scrutinize app permissions, especially for Accessibility Services, SMS, or camera access., Keep Android, Google Play services, and apps updated for security fixes.Only install apps from official app stores (Google Play)., Avoid installing apps promoted via SMS, email, or messaging apps., Verify developer names, download counts, and user reviews before installing apps., Use up-to-date anti-malware solutions (e.g., Malwarebytes for Android)., Scrutinize app permissions, especially for Accessibility Services, SMS, or camera access., Keep Android, Google Play services, and apps updated for security fixes.

What are the key lessons learned from past incidents ?

Key Lessons Learned: The key lessons learned from past incidents are Android users should avoid sideloading apps, scrutinize permissions (especially Accessibility Services), and use real-time anti-malware solutions. Keeping devices updated is critical to prevent exploitation of known vulnerabilities.

References

Where can I find more information about each incident ?

Incident : Ransomware PSA1765476395

Source: Zimperium

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Zimperium.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Ransomware PSA1765476395

Investigation Status: Ongoing (researchers actively analyzing the campaign)

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Ransomware PSA1765476395

Customer Advisories: Users are advised to avoid sideloading apps, verify app legitimacy, and use anti-malware tools. If infected, victims should contact security experts and avoid paying the ransom.

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Users are advised to avoid sideloading apps, verify app legitimacy, and use anti-malware tools. If infected and victims should contact security experts and avoid paying the ransom..

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Ransomware PSA1765476395

Entry Point: Phishing sites impersonating telecom providers or brands

Backdoors Established: Device Admin and Accessibility Services abuse

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Ransomware PSA1765476395

Root Causes: Abuse of Android permissions (Device Admin and Accessibility Services), lack of user awareness about sideloading risks, and delayed security updates.

Corrective Actions: Enhanced permission controls for Accessibility Services, stricter app store vetting, user education on phishing and sideloading risks, and real-time anti-malware adoption.

What corrective actions has the company taken based on post-incident analysis ?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Enhanced permission controls for Accessibility Services, stricter app store vetting, user education on phishing and sideloading risks, and real-time anti-malware adoption..

Additional Questions

General Information

What was the amount of the last ransom demanded ?

Last Ransom Demanded: The amount of the last ransom demanded was Yes (amount not specified).

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were SMS, call logs, contacts, audio, device unlock patterns, app credentials and OTPs.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were SMS, call logs, contacts, audio, device unlock patterns, app credentials and OTPs.

Ransomware Information

What was the highest ransom demanded in a ransomware incident ?

Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was Yes (amount not specified).

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents ?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was Android users should avoid sideloading apps, scrutinize permissions (especially Accessibility Services), and use real-time anti-malware solutions. Keeping devices updated is critical to prevent exploitation of known vulnerabilities.

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Avoid installing apps promoted via SMS, email, or messaging apps., Only install apps from official app stores (Google Play)., Scrutinize app permissions, especially for Accessibility Services, SMS, or camera access., Verify developer names, download counts, and user reviews before installing apps., Keep Android, Google Play services, and apps updated for security fixes., Use up-to-date anti-malware solutions (e.g. and Malwarebytes for Android)..

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is Zimperium.

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (researchers actively analyzing the campaign).

Stakeholder and Customer Advisories

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued were an Users are advised to avoid sideloading apps, verify app legitimacy, and use anti-malware tools. If infected and victims should contact security experts and avoid paying the ransom.

Initial Access Broker

What was the most recent entry point used by an initial access broker ?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an Phishing sites impersonating telecom providers or brands.

cve

Latest Global CVEs (Not Company-Specific)

Description

LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, there is no handler for JSON parsing errors; SyntaxError from express.json() includes user input in the error message, which gets reflected in responses. User input (including HTML/JavaScript) can be exposed in error responses, creating an XSS risk if Content-Type isn't strictly enforced. This issue does not have a fix at the time of publication.

Risk Information
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, when creating prompts, JSON requests are sent to define and modify the prompts via PATCH endpoint for prompt groups (/api/prompts/groups/:groupId). However, the request bodies are not sufficiently validated for proper input, enabling users to modify prompts in a way that was not intended as part of the front end system. The patchPromptGroup function passes req.body directly to updatePromptGroup() without filtering sensitive fields. This issue is fixed in version 0.8.1.

Risk Information
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, when a user posts a question, the iconURL parameter of the POST request can be modified by an attacker. The malicious code is then stored in the chat which can then be shared to other users. When sharing chats with a potentially malicious “tracker”, resources loaded can lead to loss of privacy for users who view the chat link that is sent to them. This issue is fixed in version 0.8.1.

Risk Information
cvss4
Base: 8.6
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

MaxKB is an open-source AI assistant for enterprise. Versions 2.3.1 and below have improper file permissions which allow attackers to overwrite the built-in dynamic linker and other critical files, potentially resulting in privilege escalation. This issue is fixed in version 2.4.0.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Description

MaxKB is an open-source AI assistant for enterprise. In versions 2.3.1 and below, the tool module allows an attacker to escape the sandbox environment and escalate privileges under certain concurrent conditions. This issue is fixed in version 2.4.0.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=psafeus' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge