Company Details
queensland-museum-network
274
5,090
712
museum.qld.gov.au
0
QUE_1688889
In-progress

Queensland Museum Company CyberSecurity Posture
museum.qld.gov.auQueensland Museum is custodian of the state’s natural and cultural heritage, caring for more than a million items and specimens in collections that tell the changing story of Queensland. We deliver museum services across the state, through a network of public museums: Queensland Museum, Brisbane Queensland Museum Rail Workshops, Ipswich Queensland Museum Cobb+Co, Toowoomba Queensland Museum Tropics, Townsville
Company Details
queensland-museum-network
274
5,090
712
museum.qld.gov.au
0
QUE_1688889
In-progress
Between 750 and 799

Queensland Museum Global Score (TPRM)XXXX



No incidents recorded for Queensland Museum in 2025.
No incidents recorded for Queensland Museum in 2025.
No incidents recorded for Queensland Museum in 2025.
Queensland Museum cyber incidents detection timeline including parent company and subsidiaries

Queensland Museum is custodian of the state’s natural and cultural heritage, caring for more than a million items and specimens in collections that tell the changing story of Queensland. We deliver museum services across the state, through a network of public museums: Queensland Museum, Brisbane Queensland Museum Rail Workshops, Ipswich Queensland Museum Cobb+Co, Toowoomba Queensland Museum Tropics, Townsville


Since 1965, the University of California, Irvine has combined the strengths of a major research university with the bounty of an incomparable Southern California location. As a U.S. News & World Report top 10 public university, UCI’s unyielding commitment to rigorous academics, cutting-edge research

One of the nation’s largest schools, the University of Minnesota offers baccalaureate, master’s, and doctoral degrees in virtually every field—from medicine to business, law to liberal arts, and science and engineering to architecture. The University of Minnesota system is made up of five campuses

Founded in 1927, the University of Houston is the leading public research university in the vibrant international city of Houston. Each year, we educate more than 47,000 students in more than 250 undergraduate and graduate academic programs, on campus and online. UH awards over 10,000 degrees annual

Carnegie Mellon University founder Andrew Carnegie said: "My heart is in the work." No statement better captures the passion and drive of our people to make a real difference. At Carnegie Mellon, we're not afraid of the work. Our educational environment creates problem solvers, drivers of

The University of Kentucky is a public, research-extensive, land grant university dedicated to improving people's lives through excellence in teaching, research, health care, cultural enrichment, and economic development for over 150 years. The University of Kentucky: - Facilitates learning, inf

Texas A&M University has a proud history that stretches back to 1876 when The Agricultural and Mechanical College of Texas became the first public institution of higher learning in the state of Texas. Nestled in the heart of the Houston-Dallas-Austin triangle, Texas A&M University at College Station
.png)
First nations artefacts will be returned to Queensland from Canada under an agreement with the Museum of Vancouver.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Queensland Museum is https://www.museum.qld.gov.au/.
According to Rankiteo, Queensland Museum’s AI-generated cybersecurity score is 765, reflecting their Fair security posture.
According to Rankiteo, Queensland Museum currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Queensland Museum is not certified under SOC 2 Type 1.
According to Rankiteo, Queensland Museum does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Queensland Museum is not listed as GDPR compliant.
According to Rankiteo, Queensland Museum does not currently maintain PCI DSS compliance.
According to Rankiteo, Queensland Museum is not compliant with HIPAA regulations.
According to Rankiteo,Queensland Museum is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Queensland Museum operates primarily in the Museums, Historical Sites, and Zoos industry.
Queensland Museum employs approximately 274 people worldwide.
Queensland Museum presently has no subsidiaries across any sectors.
Queensland Museum’s official LinkedIn profile has approximately 5,090 followers.
Queensland Museum is classified under the NAICS code 712, which corresponds to Museums, Historical Sites, and Similar Institutions.
No, Queensland Museum does not have a profile on Crunchbase.
Yes, Queensland Museum maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/queensland-museum-network.
As of December 03, 2025, Rankiteo reports that Queensland Museum has not experienced any cybersecurity incidents.
Queensland Museum has an estimated 2,133 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Queensland Museum has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
vLLM is an inference and serving engine for large language models (LLMs). Prior to 0.11.1, vllm has a critical remote code execution vector in a config class named Nemotron_Nano_VL_Config. When vllm loads a model config that contains an auto_map entry, the config class resolves that mapping with get_class_from_dynamic_module(...) and immediately instantiates the returned class. This fetches and executes Python from the remote repository referenced in the auto_map string. Crucially, this happens even when the caller explicitly sets trust_remote_code=False in vllm.transformers_utils.config.get_config. In practice, an attacker can publish a benign-looking frontend repo whose config.json points via auto_map to a separate malicious backend repo; loading the frontend will silently run the backend’s code on the victim host. This vulnerability is fixed in 0.11.1.
fastify-reply-from is a Fastify plugin to forward the current HTTP request to another server. Prior to 12.5.0, by crafting a malicious URL, an attacker could access routes that are not allowed, even though the reply.from is defined for specific routes in @fastify/reply-from. This vulnerability is fixed in 12.5.0.
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to 21.0.2, 20.3.15, and 19.2.17, A Stored Cross-Site Scripting (XSS) vulnerability has been identified in the Angular Template Compiler. It occurs because the compiler's internal security schema is incomplete, allowing attackers to bypass Angular's built-in security sanitization. Specifically, the schema fails to classify certain URL-holding attributes (e.g., those that could contain javascript: URLs) as requiring strict URL security, enabling the injection of malicious scripts. This vulnerability is fixed in 21.0.2, 20.3.15, and 19.2.17.
Gin-vue-admin is a backstage management system based on vue and gin. In 2.8.6 and earlier, attackers can delete any file on the server at will, causing damage or unavailability of server resources. Attackers can control the 'FileMd5' parameter to delete any file and folder.
Portkey.ai Gateway is a blazing fast AI Gateway with integrated guardrails. Prior to 1.14.0, the gateway determined the destination baseURL by prioritizing the value in the x-portkey-custom-host request header. The proxy route then appends the client-specified path to perform an external fetch. This can be maliciously used by users for SSRF attacks. This vulnerability is fixed in 1.14.0.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.