Company Details
ring-labs
1,682
74,710
334
ring.com
0
RIN_2043523
In-progress

Ring Company CyberSecurity Posture
ring.comMaking Neighborhoods Safer
Company Details
ring-labs
1,682
74,710
334
ring.com
0
RIN_2043523
In-progress
Between 650 and 699

Ring Global Score (TPRM)XXXX

Description: A security flaw in Ring’s Neighbors app exposed the precise locations and home addresses of users who had posted to the app. It included the videos taken by Ring doorbells and security cameras and the bug made it possible to retrieve the location data of users who posted to the app. The bug retrieved the hidden data, including the user’s latitude and longitude and their home address, from Ring’s servers. The hackers also created tools to break into Ring accounts and over 1,500 user account passwords were found on the dark web.
Description: Ring, a subsidiary of Amazon, faced a significant issue on May 28th when customers reported unauthorized devices logged into their accounts from various locations worldwide. While Ring attributed this to a backend update bug, customers remained skeptical, citing unknown devices and strange IP addresses. The company's explanation was met with disbelief, as users saw logins from countries they had never visited and devices they did not recognize. Additionally, some users reported live view activity during times when no one accessed the app and missed security alerts or multi-factor authentication prompts. Ring's lack of clarity and the persistence of the issue have raised concerns among customers about potential security breaches.
Description: 3,672 Ring camera owners' login information, including login emails, passwords, time zones, and the names people give to certain Ring cameras, was stolen. This enables a potential assailant to observe cameras in someone's home, which is a grave potential breach of privacy. A hacker might access a Ring customer's home address, phone number, and payment information, including the type of card they have, its last four numbers, and security code, using the login email and password. The nature of the leaked data, which contains a username, password, camera name, and time zone in a standardized format, shows that it was acquired from a company database.
Description: Amazon-owned home security camera company Ring fired employees for improperly accessing Ring users' video data. This data can be particularly sensitive though, as customers often put the cameras inside their home. Ring employees in Ukraine were given unrestricted access to videos from Ring cameras around the world.


Ring has 257.14% more incidents than the average of same-industry companies with at least one recorded incident.
Ring has 56.25% more incidents than the average of all companies with at least one recorded incident.
Ring reported 1 incidents this year: 1 cyber attacks, 0 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
Ring cyber incidents detection timeline including parent company and subsidiaries

Making Neighborhoods Safer


Samsung Electronics is a global leader in technology, opening new possibilities for people everywhere. Through relentless innovation and discovery, we are transforming the worlds of TVs, smartphones, wearable devices, tablets, digital appliances, network systems, medical devices, semiconductors and
Step into the innovative world of LG Electronics. As a global leader in technology, LG Electronics is dedicated to creating innovative solutions for a better life. Our brand promise, 'Life's Good', embodies our commitment to ensuring a happier, better life for all. With a rich history spanning ov

We’re a diverse collective of thinkers and doers, continually reimagining what’s possible to help us all do what we love in new ways. And the same innovation that goes into our products also applies to our practices — strengthening our commitment to leave the world better than we found it. This is w
Voltas is the No. 1* Room Air Conditioner Brand in India. Apart from ACs, Voltas offers a wide range of cooling products including Air Coolers, Commercial Refrigeration, Water Coolers and Water Dispensers. Apart from being the leaders in consumer products, Voltas is also one of the world's premier e

As part of the Lenovo family, Motorola Mobility is creating innovative smartphones and accessories designed with the consumer in mind. That’s why we’re looking for the thinkers, innovators and problem solvers who believe in working together to challenge the status quo. If you share our commitment to

Headquartered in Stamford, Connecticut, HARMAN (harman.com) designs and engineers connected products and solutions for automakers, consumers, and enterprises worldwide, including connected car systems, audio and visual products, enterprise automation solutions; and services supporting the Internet o
.png)
Amazon's Ring cameras will soon scan faces of visitors, delivery drivers, and passersby without consent via new feature.
Tech giant dismantles 'Smishing Triad' cybercriminals behind E-ZPass, USPS phishing.
Amazon blamed the problem on its domain name system, which translates web addresses into IP addresses.
A major Amazon Web Services (AWS) outage in the us-east-1 region caused global disruptions, affecting popular platforms like Snapchat,...
According to a press release dated 14 October, the US Department of Justice seized 127,271 BTC worth ~$15bn from the head of Prince Group, Chen...
Cybersecurity researchers have shed light on a Chinese-speaking cybercrime group codenamed UAT-8099 that has been attributed to search...
The terrifying moment a woman was taunted by a stranger through her Ring doorbell has been shared online and it has sparked alarm bells for...
Microsoft's Digital Crimes Unit (DCU) has taken down a cybercrime service called RaccoonO365. The company announced on September 16 that,...
A Nigerian-led phishing service, RaccoonO365, made $100K from fake Microsoft sites before being shut down. Microsoft seized 338 domains used...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Ring is http://www.ring.com.
According to Rankiteo, Ring’s AI-generated cybersecurity score is 690, reflecting their Weak security posture.
According to Rankiteo, Ring currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Ring is not certified under SOC 2 Type 1.
According to Rankiteo, Ring does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Ring is not listed as GDPR compliant.
According to Rankiteo, Ring does not currently maintain PCI DSS compliance.
According to Rankiteo, Ring is not compliant with HIPAA regulations.
According to Rankiteo,Ring is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Ring operates primarily in the Computers and Electronics Manufacturing industry.
Ring employs approximately 1,682 people worldwide.
Ring presently has no subsidiaries across any sectors.
Ring’s official LinkedIn profile has approximately 74,710 followers.
Ring is classified under the NAICS code 334, which corresponds to Computer and Electronic Product Manufacturing.
Yes, Ring has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/ring.
Yes, Ring maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/ring-labs.
As of November 27, 2025, Rankiteo reports that Ring has experienced 4 cybersecurity incidents.
Ring has an estimated 1,888 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach, Data Leak and Cyber Attack.
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with ring is deploying a fix, and communication strategy with ring posted on facebook and updated its status page..
Title: Ring Neighbors App Security Flaw
Description: A security flaw in Ring’s Neighbors app exposed the precise locations and home addresses of users who had posted to the app. It included the videos taken by Ring doorbells and security cameras and the bug made it possible to retrieve the location data of users who posted to the app. The bug retrieved the hidden data, including the user’s latitude and longitude and their home address, from Ring’s servers. The hackers also created tools to break into Ring accounts and over 1,500 user account passwords were found on the dark web.
Type: Data Breach
Attack Vector: Exploitation of Software Vulnerability
Vulnerability Exploited: Security flaw in Neighbors app
Threat Actor: Hackers
Motivation: Data Theft
Title: Ring Employees Fired for Improper Access to User Video Data
Description: Amazon-owned home security camera company Ring fired employees for improperly accessing Ring users' video data. This data can be particularly sensitive as customers often put the cameras inside their home. Ring employees in Ukraine were given unrestricted access to videos from Ring cameras around the world.
Type: Data Breach
Attack Vector: Insider Threat
Vulnerability Exploited: Improper Access Controls
Threat Actor: Ring Employees
Motivation: Unauthorized Access
Title: Ring Camera Data Breach
Description: 3,672 Ring camera owners' login information, including login emails, passwords, time zones, and the names people give to certain Ring cameras, was stolen. This enables a potential assailant to observe cameras in someone's home, which is a grave potential breach of privacy. A hacker might access a Ring customer's home address, phone number, and payment information, including the type of card they have, its last four numbers, and security code, using the login email and password.
Type: Data Breach
Attack Vector: Unauthorized Access
Threat Actor: Unknown
Motivation: Data Theft
Title: Ring Backend Update Bug Causes Unauthorized Device Logins
Description: Ring customers reported seeing unusual devices logged into their accounts from various locations worldwide, leading them to believe their accounts had been hacked. Ring attributed this to a backend update bug.
Date Detected: 2023-05-28
Type: Bug/Exploit
Attack Vector: Backend Update Bug
Vulnerability Exploited: Backend Update Bug
Common Attack Types: The most common types of attacks the company has faced is Data Leak.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Security flaw in Neighbors app.

Data Compromised: Home addresses, Latitude and longitude, User account passwords
Systems Affected: Ring Neighbors app

Data Compromised: Video Data
Systems Affected: Ring Security Cameras

Data Compromised: Login emails, Passwords, Time zones, Camera names, Home address, Phone number, Payment information
Systems Affected: Ring Cameras
Identity Theft Risk: High
Payment Information Risk: High

Systems Affected: Ring Accounts
Customer Complaints: ['Users reported unknown devices and strange IP addresses', 'Users reported live view activity without household access', 'Users reported not receiving security alerts or MFA prompts']
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Home Addresses, Latitude And Longitude, User Account Passwords, , Video Data, Login Information, Camera Names, Time Zones, Home Address, Phone Number, Payment Information and .

Entity Name: Ring
Entity Type: Company
Industry: Home Security
Location: Global

Entity Name: Ring
Entity Type: Company
Industry: Smart Home Technology
Customers Affected: 3672

Remediation Measures: Ring is deploying a fix
Communication Strategy: Ring posted on Facebook and updated its status page

Type of Data Compromised: Home addresses, Latitude and longitude, User account passwords
Number of Records Exposed: 1500
Sensitivity of Data: High

Type of Data Compromised: Video Data
Sensitivity of Data: High
File Types Exposed: Video Files

Type of Data Compromised: Login information, Camera names, Time zones, Home address, Phone number, Payment information
Number of Records Exposed: 3672
Sensitivity of Data: High
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Ring is deploying a fix, .

Recommendations: Review authorized devices, Change account password, Enable two-factor authenticationReview authorized devices, Change account password, Enable two-factor authenticationReview authorized devices, Change account password, Enable two-factor authentication

Source: BleepingComputer
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: BleepingComputer.

Investigation Status: Ongoing
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Ring Posted On Facebook And Updated Its Status Page.

Customer Advisories: Ring users should review authorized devices from the app's Control Center > Authorized Client Devices section. If any devices or logins are not recognized, they should be removed immediately.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Ring Users Should Review Authorized Devices From The App'S Control Center > Authorized Client Devices Section. If Any Devices Or Logins Are Not Recognized, They Should Be Removed Immediately. and .

Entry Point: Security flaw in Neighbors app

Root Causes: Backend Update Bug
Last Attacking Group: The attacking group in the last incident were an Hackers, Ring Employees and Unknown.
Most Recent Incident Detected: The most recent incident detected was on 2023-05-28.
Most Significant Data Compromised: The most significant data compromised in an incident were Home addresses, Latitude and longitude, User account passwords, , Video Data, Login Emails, Passwords, Time Zones, Camera Names, Home Address, Phone Number, Payment Information and .
Most Significant System Affected: The most significant system affected in an incident was Ring Cameras and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Latitude and longitude, Payment Information, Time Zones, Video Data, Login Emails, Home addresses, Phone Number, Camera Names, Passwords, User account passwords and Home Address.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 519.0.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Change account password, Enable two-factor authentication and Review authorized devices.
Most Recent Source: The most recent source of information about an incident is BleepingComputer.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Most Recent Customer Advisory: The most recent customer advisory issued were an Ring users should review authorized devices from the app's Control Center > Authorized Client Devices section. If any devices or logins are not recognized and they should be removed immediately.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Security flaw in Neighbors app.
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.