Company Details
restore-oregon
10
724
712
http://www.Restoreoregon.org
0
RES_1139173
In-progress

Restore Oregon Company CyberSecurity Posture
http://www.Restoreoregon.orgFounded in 1977, Restore Oregon is a statewide, 501(c)(3) nonprofit organization, supported by members/donors, led by a volunteer board, and staffed by professionals, who help people save and revitalize historic places and spaces. We work on the front lines and behind the scenes to leverage relationships, resources, and creativity to preserve, protect, and pass forward Oregon's heritage. Restore Oregon promotes inclusive historic preservation as a means of preserving our region’s cultural heritage, and as a tool for solving challenges such as insufficient affordable housing, stalled economic development, and negative impacts from climate change. We advocate for effective policies and incentives, deliver quality educational programs, and directly intervene to save endangered places that matter to Oregonians.
Company Details
restore-oregon
10
724
712
http://www.Restoreoregon.org
0
RES_1139173
In-progress
Between 750 and 799

Restore Oregon Global Score (TPRM)XXXX



No incidents recorded for Restore Oregon in 2025.
No incidents recorded for Restore Oregon in 2025.
No incidents recorded for Restore Oregon in 2025.
Restore Oregon cyber incidents detection timeline including parent company and subsidiaries

Founded in 1977, Restore Oregon is a statewide, 501(c)(3) nonprofit organization, supported by members/donors, led by a volunteer board, and staffed by professionals, who help people save and revitalize historic places and spaces. We work on the front lines and behind the scenes to leverage relationships, resources, and creativity to preserve, protect, and pass forward Oregon's heritage. Restore Oregon promotes inclusive historic preservation as a means of preserving our region’s cultural heritage, and as a tool for solving challenges such as insufficient affordable housing, stalled economic development, and negative impacts from climate change. We advocate for effective policies and incentives, deliver quality educational programs, and directly intervene to save endangered places that matter to Oregonians.


Visit Canada's community aquarium and learning centre for the Salish Sea. Experience 160 species of marine life, a marine mammal artifact exhibit, and an inspirational Coast Salish art collection. Connect with our Oceaneers, learn about, explore and conserve our Salish Sea Bioregion – its wildlife,

A visit to Mission San Luis transports you back in time. Your destination is a community where Apalachee Indians and newcomers from Spain live in close proximity drawn together by religion as well as military and economic purpose. Modern day visitors to Mission San Luis discover a re-created comm

The Canadian Museum for Human Rights (CMHR) is the first museum in the world solely dedicated to the evolution, celebration and future of human rights. It is the first national museum in Canada to be built outside the National Capital Region. Located in the heart of Canada in Winnipeg, Manitoba, the

The Lucas Museum of Narrative Art's mission is to inspire and connect people through the exploration of visual stories and their influences in society. Co-founded by George Lucas and Mellody Hobson, the Lucas Museum was designed by renowned architect Ma Yansong of MAD Architects with Stantec as exe

The Museum of Jewish Heritage – A Living Memorial to the Holocaust is New York’s contribution to the global responsibility to never forget. The Museum is committed to the crucial mission of educating diverse visitors about Jewish life before, during, and after the Holocaust. As a place of memory, t

Japan House is the London home for Japanese creativity and innovation. Spread over three floors, Japan House London offers a gallery, with a regular programme of exhibitions; a hall for talks, performances, workshops and events; innovative Japanese restaurant AKIRA; and The Shop, a cultural retail
.png)
Arkansas, Massachusetts, Oregon, Pennsylvania and Texas are introducing and passing legislation that other states could learn from,...
Oregon could lose out on $272,727 in election security funding from the U.S. Election Assistance Commission following updated requirements...
The ransomware group Rhysida released said it released stolen Oregon agency files to the dark web. The agency said it's "aware" of the...
The Oregon Department of Environmental Quality on Friday declined to confirm or deny reports that a well-known ransomware group stole employee files in a...
Officials in Fulton County, Georgia, said they received a new deadline to pay a ransom after their first deadline passed.
Kansas State University and a popular community college in Oregon are in the process of recovering from cyberattacks that knocked out campus systems.
A new jointly run facility will be housed at Portland State University with experts collaborating from Oregon State University and the...
The center will provide cybersecurity services to local government agencies, build a talent pipeline with high school and higher ed training options, and more.
A survey of lower education providers in 14 countries found recovery costs averaged about $2.18 million for those paying ransoms.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Restore Oregon is http://www.Restoreoregon.org.
According to Rankiteo, Restore Oregon’s AI-generated cybersecurity score is 761, reflecting their Fair security posture.
According to Rankiteo, Restore Oregon currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Restore Oregon is not certified under SOC 2 Type 1.
According to Rankiteo, Restore Oregon does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Restore Oregon is not listed as GDPR compliant.
According to Rankiteo, Restore Oregon does not currently maintain PCI DSS compliance.
According to Rankiteo, Restore Oregon is not compliant with HIPAA regulations.
According to Rankiteo,Restore Oregon is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Restore Oregon operates primarily in the Museums, Historical Sites, and Zoos industry.
Restore Oregon employs approximately 10 people worldwide.
Restore Oregon presently has no subsidiaries across any sectors.
Restore Oregon’s official LinkedIn profile has approximately 724 followers.
Restore Oregon is classified under the NAICS code 712, which corresponds to Museums, Historical Sites, and Similar Institutions.
No, Restore Oregon does not have a profile on Crunchbase.
Yes, Restore Oregon maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/restore-oregon.
As of December 03, 2025, Rankiteo reports that Restore Oregon has not experienced any cybersecurity incidents.
Restore Oregon has an estimated 2,131 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Restore Oregon has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
vLLM is an inference and serving engine for large language models (LLMs). Prior to 0.11.1, vllm has a critical remote code execution vector in a config class named Nemotron_Nano_VL_Config. When vllm loads a model config that contains an auto_map entry, the config class resolves that mapping with get_class_from_dynamic_module(...) and immediately instantiates the returned class. This fetches and executes Python from the remote repository referenced in the auto_map string. Crucially, this happens even when the caller explicitly sets trust_remote_code=False in vllm.transformers_utils.config.get_config. In practice, an attacker can publish a benign-looking frontend repo whose config.json points via auto_map to a separate malicious backend repo; loading the frontend will silently run the backend’s code on the victim host. This vulnerability is fixed in 0.11.1.
fastify-reply-from is a Fastify plugin to forward the current HTTP request to another server. Prior to 12.5.0, by crafting a malicious URL, an attacker could access routes that are not allowed, even though the reply.from is defined for specific routes in @fastify/reply-from. This vulnerability is fixed in 12.5.0.
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to 21.0.2, 20.3.15, and 19.2.17, A Stored Cross-Site Scripting (XSS) vulnerability has been identified in the Angular Template Compiler. It occurs because the compiler's internal security schema is incomplete, allowing attackers to bypass Angular's built-in security sanitization. Specifically, the schema fails to classify certain URL-holding attributes (e.g., those that could contain javascript: URLs) as requiring strict URL security, enabling the injection of malicious scripts. This vulnerability is fixed in 21.0.2, 20.3.15, and 19.2.17.
Gin-vue-admin is a backstage management system based on vue and gin. In 2.8.6 and earlier, attackers can delete any file on the server at will, causing damage or unavailability of server resources. Attackers can control the 'FileMd5' parameter to delete any file and folder.
Portkey.ai Gateway is a blazing fast AI Gateway with integrated guardrails. Prior to 1.14.0, the gateway determined the destination baseURL by prioritizing the value in the x-portkey-custom-host request header. The proxy route then appends the client-specified path to perform an external fetch. This can be maliciously used by users for SSRF attacks. This vulnerability is fixed in 1.14.0.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.