Company Details
regeneron-pharmaceuticals
15,762
522,175
None
regeneron.com
101
REG_3217609
Completed

Regeneron Company CyberSecurity Posture
regeneron.comAt Regeneron we believe that when the right idea finds the right team, powerful change is possible. As we work across our expanding global network to invent, develop and commercialize life-transforming medicines for people with serious diseases, we’re establishing new ways to think about science, manufacturing and commercialization. And new ways to think about health. Connect with us so we can learn more about you, and you can learn more about our biopharmaceutical medicines. And join us, as we build a future we believe in. Please visit www.regeneron.com/social-media-terms for information on how to engage with us on social media. An important note about privacy: Regeneron is committed to your privacy and will not ask for sensitive personal information such as social security number, date of birth or bank account details via email or social media.
Company Details
regeneron-pharmaceuticals
15,762
522,175
None
regeneron.com
101
REG_3217609
Completed
Between 800 and 849

Regeneron Global Score (TPRM)XXXX



No incidents recorded for Regeneron in 2025.
No incidents recorded for Regeneron in 2025.
No incidents recorded for Regeneron in 2025.
Regeneron cyber incidents detection timeline including parent company and subsidiaries

At Regeneron we believe that when the right idea finds the right team, powerful change is possible. As we work across our expanding global network to invent, develop and commercialize life-transforming medicines for people with serious diseases, we’re establishing new ways to think about science, manufacturing and commercialization. And new ways to think about health. Connect with us so we can learn more about you, and you can learn more about our biopharmaceutical medicines. And join us, as we build a future we believe in. Please visit www.regeneron.com/social-media-terms for information on how to engage with us on social media. An important note about privacy: Regeneron is committed to your privacy and will not ask for sensitive personal information such as social security number, date of birth or bank account details via email or social media.

At Regeneron we believe that when the right idea finds the right team, powerful change is possible. As we work across our expanding global network to invent, develop and commercialize life-transforming medicines for people with serious diseases, we’re establishing new ways to think about science, ma
.png)
Regeneron stock increased by 19% over the past month, driven by strong third-quarter earnings. But is Gilead the better pick?
Here's why we believe Regeneron Pharmaceuticals (REGN) stock merits attention as a value addition. Currently, it is trading almost 44% lower...
Following the sale of the direct-to-consumer genetic testing company 23andMe, the Utah Attorney General's Office is issuing a consumer...
July 14 at 11:59 p.m. CT is your last chance to file a claim with 23andMe for a 2023 data breach that may have compromised your genetic...
The consumer privacy ombudsman tasked with analyzing the impact of 23andMe's bankruptcy sale on individuals' privacy has called for users' consent.
23andMe's interim chief executive Joseph Selsavage told lawmakers on Tuesday that 1.9 million people, or about 15% of its customer base, have requested their...
Bob McCowan, CIO at Regeneron, joins host Maryfran Johnson for this CIO Leadership Live interview. They discuss fostering high-performance tech teams.
In light of the significant drop in Regeneron's stock price, a natural question emerges: is REGN now a viable buying opportunity?
Bankrupt genetic testing provider 23andMe Inc. said Tuesday it will delist its stock from the Nasdaq exchange, following Regeneron...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Regeneron is http://www.regeneron.com.
According to Rankiteo, Regeneron’s AI-generated cybersecurity score is 821, reflecting their Good security posture.
According to Rankiteo, Regeneron currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Regeneron is not certified under SOC 2 Type 1.
According to Rankiteo, Regeneron does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Regeneron is not listed as GDPR compliant.
According to Rankiteo, Regeneron does not currently maintain PCI DSS compliance.
According to Rankiteo, Regeneron is not compliant with HIPAA regulations.
According to Rankiteo,Regeneron is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Regeneron operates primarily in the Biotechnology industry.
Regeneron employs approximately 15,762 people worldwide.
Regeneron presently has no subsidiaries across any sectors.
Regeneron’s official LinkedIn profile has approximately 522,175 followers.
Regeneron is classified under the NAICS code None, which corresponds to Others.
Yes, Regeneron has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/regeneron-pharmaceuticals.
Yes, Regeneron maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/regeneron-pharmaceuticals.
As of December 14, 2025, Rankiteo reports that Regeneron has not experienced any cybersecurity incidents.
Regeneron has an estimated 1,032 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Regeneron has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.
A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.