Company Details
recovery-international
49
458
62133
recoveryinternational.org
0
REC_1388486
In-progress


Recovery International Company CyberSecurity Posture
recoveryinternational.orgThe mission of Recovery International is to use the cognitive-behavioral, peer-to-peer, self-help training system developed by Abraham Low, MD, to help individuals gain skills to lead more peaceful and productive lives. The organization meets this mission by providing mental health self-help groups: Recovery International community, telephone, and online meetings; The Power to Change for Young Adults community and webconference meetings; and The Power to Change for Correctional Facilities. Recovery International has grown to 600 community-based meetings in the U.S., Canada, Ireland, Puerto Rico, Spain, Israel, India and the United Kingdom as well as countless telephone and online meetings 7 days a week.
Company Details
recovery-international
49
458
62133
recoveryinternational.org
0
REC_1388486
In-progress
Between 750 and 799

Recovery International Global Score (TPRM)XXXX



No incidents recorded for Recovery International in 2026.
No incidents recorded for Recovery International in 2026.
No incidents recorded for Recovery International in 2026.
Recovery International cyber incidents detection timeline including parent company and subsidiaries

The mission of Recovery International is to use the cognitive-behavioral, peer-to-peer, self-help training system developed by Abraham Low, MD, to help individuals gain skills to lead more peaceful and productive lives. The organization meets this mission by providing mental health self-help groups: Recovery International community, telephone, and online meetings; The Power to Change for Young Adults community and webconference meetings; and The Power to Change for Correctional Facilities. Recovery International has grown to 600 community-based meetings in the U.S., Canada, Ireland, Puerto Rico, Spain, Israel, India and the United Kingdom as well as countless telephone and online meetings 7 days a week.


De Forensische Zorgspecialisten te Utrecht is een instelling voor forensische psychiatrie. Het werkterrein van de organisatie is de geestelijke gezondheidszorg voor mensen die met Justitie in aanraking zijn gekomen of dreigen te komen, waarbij een relatie is met een psychiatrische of persoonlijkheid

The Institute of Couples Therapy offers specialized training for therapists seeking to incorporate couples work into their practice. Our program equips therapists with the skills to assist couples in cultivating intimate and trusting relationships. We empower individuals to navigate their own desire

We are a robust, independently-operating affiliate of NAMI, the National Alliance on Mental Illness. Located in Hamilton, NJ, we serve New Jersey's Capital region. NAMI Mercer listens, leads, educates, and advocates, empowering families and individuals affected by mental illness to build lives of q

We, Carroll County Youth Service Bureau, commit ourselves to provide a continuum of community-based mental health and substance use services for children, adults, and families in Carroll County. We use a mulit-disciplinary approach to deliver prevention, intervention, and treatment services in the

Bowling Green is located in the Brandywine River Valley in Kennett Square, Pennsylvania. Our center offers programming options that include inpatient care, partial hospitalization, detox, an opioid program, a program for pregnant women, and a co-occurring program. Serving the adult population, we fo

Charter Harley Street supports and treats individuals and families who have problems relating to trauma, addiction, eating disorders and mental health. This is not 'one size fits all', rather we take a personal interest and treat each enquiry individually and with proven success. It is our aim to

Cannenta Center for Healing and Empowerment (CCHE) provides therapeutic counseling for children, adolescents, individuals and couples. Our services include counseling, psychoeducational groups, and pre-marital classes. Our services are offered virtual through telehealth and in person. CCHE is also

Situated alongside Lake Champlain, we are the largest private non-profit human services organization in the State of Vermont. Since 1865, Howard Center has been helping people and communities thrive by providing supports and services to address mental health, substance use, and developmental needs

People USA is a peer-run mental health nonprofit that creates, provides, and promotes its own innovative crisis response and wellness services. Being “peer-run” means that all our services are developed and operated by people who have personally overcome mental health issues, addiction, or trauma.
.png)
Satcom Global has announced the launch of Aura Citadel, an on-vessel IT management and security solution providing simplicity…
While Energy Recovery, Inc. ( NASDAQ:ERII ) might not have the largest market cap around , it received a lot of...
MIAMI, FLORIDA / ACCESS Newswire / December 7, 2025 / MSP Recovery, Inc. (NASDAQ:MSPR) (the "Company"), a Medicare, Medicaid, commercial,...
A lawsuit filed by Nebraska Attorney General Mike Hilgers over the 2024 Change Healthcare data breach has been allowed to proceed after...
Mobile phone fraud has been classified as a technological hazard. However, there is a lack of comparable and thorough research on this topic...
Key Insights Significantly high institutional ownership implies Energy Recovery's stock price is sensitive to their...
While 95% of organizations are confident in their ransomware recovery, AI-driven attacks and limited data governance are undermining that...
Amazon.com cloud service returned to normal operations on Monday afternoon, the company said, after an internet outage that caused global...
SAN FRANCISCO >> Amazon.com said today that a cloud computing unit at its data center in northern Virginia had largely contained fallout...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Recovery International is https://www.recoveryinternational.org.
According to Rankiteo, Recovery International’s AI-generated cybersecurity score is 755, reflecting their Fair security posture.
According to Rankiteo, Recovery International currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Recovery International has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Recovery International is not certified under SOC 2 Type 1.
According to Rankiteo, Recovery International does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Recovery International is not listed as GDPR compliant.
According to Rankiteo, Recovery International does not currently maintain PCI DSS compliance.
According to Rankiteo, Recovery International is not compliant with HIPAA regulations.
According to Rankiteo,Recovery International is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Recovery International operates primarily in the Mental Health Care industry.
Recovery International employs approximately 49 people worldwide.
Recovery International presently has no subsidiaries across any sectors.
Recovery International’s official LinkedIn profile has approximately 458 followers.
Recovery International is classified under the NAICS code 62133, which corresponds to Offices of Mental Health Practitioners (except Physicians).
No, Recovery International does not have a profile on Crunchbase.
Yes, Recovery International maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/recovery-international.
As of January 22, 2026, Rankiteo reports that Recovery International has not experienced any cybersecurity incidents.
Recovery International has an estimated 5,280 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Recovery International has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g., execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.