Company Details
refugee-council-of-australia
36
11,602
921
refugeecouncil.org.au
0
REF_1583207
In-progress

Refugee Council of Australia Company CyberSecurity Posture
refugeecouncil.org.auThe Refugee Council of Australia (RCOA) is the national umbrella body for refugees and people seeking protection, and the organisations and individuals who support them. We advocate for flexible, humane and practical policies towards refugees, asylum seekers and displaced persons, within Australia and internationally. We do this through national and international research, policy analysis, representation, training and community education. We are a non-profit organisation with tax-deductible charity status, funded through public donations, fees from our organisational and individual members, foundations and project work. The priority activities for RCOA are set by our members, as represented by an elected Board. Our policy and research work is informed by a constant process of consultation – convening regional forums and national teleconferences, attending interagency gatherings and meeting regularly with organisations and individuals across Australia. We have Special Consultative Status with the United Nations Economic and Social Council, enabling us to take the concerns of refugees to a wide range of UN gatherings, particularly those convened by the UN High Commissioner for Refugees.
Company Details
refugee-council-of-australia
36
11,602
921
refugeecouncil.org.au
0
REF_1583207
In-progress
Between 700 and 749

RCA Global Score (TPRM)XXXX



No incidents recorded for Refugee Council of Australia in 2025.
No incidents recorded for Refugee Council of Australia in 2025.
No incidents recorded for Refugee Council of Australia in 2025.
RCA cyber incidents detection timeline including parent company and subsidiaries

The Refugee Council of Australia (RCOA) is the national umbrella body for refugees and people seeking protection, and the organisations and individuals who support them. We advocate for flexible, humane and practical policies towards refugees, asylum seekers and displaced persons, within Australia and internationally. We do this through national and international research, policy analysis, representation, training and community education. We are a non-profit organisation with tax-deductible charity status, funded through public donations, fees from our organisational and individual members, foundations and project work. The priority activities for RCOA are set by our members, as represented by an elected Board. Our policy and research work is informed by a constant process of consultation – convening regional forums and national teleconferences, attending interagency gatherings and meeting regularly with organisations and individuals across Australia. We have Special Consultative Status with the United Nations Economic and Social Council, enabling us to take the concerns of refugees to a wide range of UN gatherings, particularly those convened by the UN High Commissioner for Refugees.


Israel Government Fellows (IGF) is a selective, ten-month Masa-sponsored professional development and education program endorsed by the Prime Minister's Office. IGF offers outstanding and highly motivated young Jewish leaders an experience at the heart of the Israeli government through top-level int

The Marine Institute has prepared a draft of Ireland's new Strategy for Marine Research, Knowledge & Innovation for the period 2025-2030, Ocean Knowledge 2030. This draft has been prepared in collaboration with government departments and agencies, including members of the Marine Research Funders' Fo
BIT (the Behavioural Insights Team) is a global research and innovation consultancy which combines a deep understanding of human behaviour with evidence-led problem-solving to improve people’s lives. We work with all levels of government, nonprofits and the private sector, applying behavioural scien

TransitMatters is an advocacy group dedicated to improving transit in and around Boston by offering new perspectives, uniting transit advocates, educating riders and promoting a level of critical analysis normally absent from other media. We advocate for plans and policies that promote convenient an

The National Governors Association (NGA)—the bipartisan organization of the nation's governors—promotes visionary state leadership, shares best practices and speaks with a collective voice on national policy. Founded in 1908, the National Governors Association (NGA) is the collective voice of the na

Columbia Riverkeeper protects and restores the water quality of the Columbia River and all life connected to it, from the headwaters to the Pacific Ocean. Representing a diverse coalition of members and interests, Columbia Riverkeeper works to restore a Columbia River where people can safely eat the
.png)
The Australian Government is committed to being a world-leader in cyber security by 2030, as outlined in the 2023-2030...
Australia has agreed to pay the tiny Pacific nation of Nauru A$2.5 billion ($1.62 billion) over three decades to host deported non-citizens,...
The Immigration and Refugee Board said it took its public-facing website offline Sunday after it was notified of potential threats.
I am writing on behalf of the Refugee Council of Australia (RCOA) to provide community feedback on the impacts of the ongoing crisis in...
Developing a new legislative framework that is clearer, more coherant and better adapted to the modern world.
At its current session, the UN Human Rights Council will discuss a draft resolution on human rights defenders and new and emerging...
On 30 August 2024, RCOA CEO Paul Power wrote to the Minister for Home Affairs and Immigration, the Hon Tony Burke MP, to highlight the...
A tailored submission portal was created to accept submissions in all languages and by written, audio and video formats.
The ongoing situation faced by refugees and asylum seekers in Papua New Guinea (PNG) remains a pressing humanitarian crisis.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Refugee Council of Australia is http://www.refugeecouncil.org.au.
According to Rankiteo, Refugee Council of Australia’s AI-generated cybersecurity score is 743, reflecting their Moderate security posture.
According to Rankiteo, Refugee Council of Australia currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Refugee Council of Australia is not certified under SOC 2 Type 1.
According to Rankiteo, Refugee Council of Australia does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Refugee Council of Australia is not listed as GDPR compliant.
According to Rankiteo, Refugee Council of Australia does not currently maintain PCI DSS compliance.
According to Rankiteo, Refugee Council of Australia is not compliant with HIPAA regulations.
According to Rankiteo,Refugee Council of Australia is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Refugee Council of Australia operates primarily in the Public Policy Offices industry.
Refugee Council of Australia employs approximately 36 people worldwide.
Refugee Council of Australia presently has no subsidiaries across any sectors.
Refugee Council of Australia’s official LinkedIn profile has approximately 11,602 followers.
Refugee Council of Australia is classified under the NAICS code 921, which corresponds to Executive, Legislative, and Other General Government Support.
No, Refugee Council of Australia does not have a profile on Crunchbase.
Yes, Refugee Council of Australia maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/refugee-council-of-australia.
As of November 28, 2025, Rankiteo reports that Refugee Council of Australia has not experienced any cybersecurity incidents.
Refugee Council of Australia has an estimated 1,024 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Refugee Council of Australia has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.