Company Details
rr-donnelley
39,291
243,131
5418
rrd.com
0
RR _3060798
In-progress

RR Donnelley Company CyberSecurity Posture
rrd.comRRD provides a complete portfolio of marketing, packaging, print and business services to the world’s most respected brands, including 91% of the Fortune 100. Our proprietary technology, advanced data analytics and established expertise fuel organizational decision-making, from strategy through execution. With operations in 30 countries, global organizations and regulated industries trust RRD to reduce complexity and drive audience connections across the entire customer journey.
Company Details
rr-donnelley
39,291
243,131
5418
rrd.com
0
RR _3060798
In-progress
Between 650 and 699

RR Donnelley Global Score (TPRM)XXXX

Description: On August 5, 2022, the California Office of the Attorney General reported a data breach involving R.R. Donnelley & Sons Company (RRD), which occurred on November 29, 2021. The breach involved unauthorized access to RRD systems, with personal information potentially exfiltrated, although specific types of information compromised remain unspecified.
Description: The Washington Attorney General's Office reported a data breach involving R. R. Donnelley & Sons Company (RRD) on August 5, 2022. The breach, identified on December 23, 2021, resulted from a phishing attack that targeted employees and ultimately affected 648 Washington residents, exposing names, social security numbers, driver’s license numbers, and dates of birth.
Description: On October 9, 2020, **R. R. Donnelley & Sons Company** experienced a data breach reported by the Maine Office of the Attorney General on November 13, 2020. The incident involved the **inadvertent disclosure of Social Security Numbers (SSNs)**, affecting **13 Maine residents** among a total of **2,657 individuals** whose sensitive data was exposed. The breach stemmed from an internal error leading to unauthorized access or exposure of personally identifiable information (PII), specifically SSNs—a high-value target for identity theft and fraud. While the total number of impacted individuals was substantial, the immediate focus was on the **13 Maine residents**, whose SSNs were confirmed compromised. The company initiated notifications to affected parties on **November 16, 2020**, likely offering credit monitoring or identity protection services as remediation. The breach highlights vulnerabilities in data handling procedures, particularly around the safeguarding of critical identifiers like SSNs, which can have long-term repercussions for victims, including financial fraud, credit damage, and reputational harm to the organization.
Description: Marketing giant RR Donnelly was targeted by the Conti ransomware that led to the shut down of their network. The disrupted services interrupted many operations for the customers. A large quantity of data was stolen in the attack and the attackers leaked about 2.5GB of data stolen from the RRD.


No incidents recorded for RR Donnelley in 2025.
No incidents recorded for RR Donnelley in 2025.
No incidents recorded for RR Donnelley in 2025.
RR Donnelley cyber incidents detection timeline including parent company and subsidiaries

RRD provides a complete portfolio of marketing, packaging, print and business services to the world’s most respected brands, including 91% of the Fortune 100. Our proprietary technology, advanced data analytics and established expertise fuel organizational decision-making, from strategy through execution. With operations in 30 countries, global organizations and regulated industries trust RRD to reduce complexity and drive audience connections across the entire customer journey.


RRD provides a complete portfolio of marketing, packaging, print and business services to the world’s most respected brands, including 91% of the Fortune 100. Our proprietary technology, advanced data analytics and established expertise fuel organizational decision-making, from strategy through ex
.png)
The U.S. Securities and Exchange Commission (SEC) is becoming one of the federal agencies at the forefront of driving transparency,...
As US authorities, including the DOJ and SEC, continue to make cybersecurity an enforcement priority, whistleblowers are poised to play a key role in those...
The settlements concern the issuers' disclosures relating to cybersecurity risks and intrusions following the December 2020 SUNBURST cybersecurity incident.
The October edition of Tech Regulation Digest looks at the SEC's new rule requiring public companies to report cybersecurity incidents.
More than a decade ago, I expressed concern about the Securities and Exchange Commission's predilection for targeting victims of crimes.
The SEC now thinks that a cyber breach can also be an internal accounting controls issue. A case in point is the July 2024 SEC settlement with RR Donnelley &...
On July 18, 2024, the U.S. District Court for the Southern District of New York dismissed most of the claims brought by the Securities and...
On July 18, 2024, a New York federal judge dismissed most of the US Securities and Exchange Commission's (SEC) claims against SolarWinds Corp.
SDNY court's decision is a blow to the SEC's cybersecurity enforcement efforts — and a useful guide for cybersecurity professionals.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of RR Donnelley is http://www.rrd.com.
According to Rankiteo, RR Donnelley’s AI-generated cybersecurity score is 698, reflecting their Weak security posture.
According to Rankiteo, RR Donnelley currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, RR Donnelley is not certified under SOC 2 Type 1.
According to Rankiteo, RR Donnelley does not hold a SOC 2 Type 2 certification.
According to Rankiteo, RR Donnelley is not listed as GDPR compliant.
According to Rankiteo, RR Donnelley does not currently maintain PCI DSS compliance.
According to Rankiteo, RR Donnelley is not compliant with HIPAA regulations.
According to Rankiteo,RR Donnelley is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
RR Donnelley operates primarily in the Marketing Services industry.
RR Donnelley employs approximately 39,291 people worldwide.
RR Donnelley presently has no subsidiaries across any sectors.
RR Donnelley’s official LinkedIn profile has approximately 243,131 followers.
RR Donnelley is classified under the NAICS code 5418, which corresponds to Advertising, Public Relations, and Related Services.
No, RR Donnelley does not have a profile on Crunchbase.
Yes, RR Donnelley maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/rr-donnelley.
As of November 28, 2025, Rankiteo reports that RR Donnelley has experienced 4 cybersecurity incidents.
RR Donnelley has an estimated 2,865 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach and Ransomware.
Detection and Response: The company detects and responds to cybersecurity incidents through an communication strategy with notification to affected individuals (scheduled for 2020-11-16)..
Title: RR Donnelly Ransomware Attack
Description: Marketing giant RR Donnelly was targeted by the Conti ransomware that led to the shut down of their network. The disrupted services interrupted many operations for the customers. A large quantity of data was stolen in the attack and the attackers leaked about 2.5GB of data stolen from the RRD.
Type: Ransomware Attack
Threat Actor: Conti Ransomware
Motivation: Financial Gain
Title: Data Breach at R.R. Donnelley & Sons Company
Description: Unauthorized access to RRD systems with potential exfiltration of personal information.
Date Detected: 2022-08-05
Date Publicly Disclosed: 2022-08-05
Type: Data Breach
Attack Vector: Unauthorized Access
Title: Data Breach at R. R. Donnelley & Sons Company
Description: The Washington Attorney General's Office reported a data breach involving R. R. Donnelley & Sons Company (RRD) on August 5, 2022. The breach, identified on December 23, 2021, resulted from a phishing attack that targeted employees and ultimately affected 648 Washington residents, exposing names, social security numbers, driver’s license numbers, and dates of birth.
Date Detected: 2021-12-23
Date Publicly Disclosed: 2022-08-05
Type: Data Breach
Attack Vector: Phishing
Title: R. R. Donnelley & Sons Company Data Breach (2020)
Description: The Maine Office of the Attorney General reported a data breach involving R. R. Donnelley & Sons Company on November 13, 2020. The breach, which occurred on October 9, 2020, involved the inadvertent disclosure of Social Security Numbers affecting 13 Maine residents out of a total of 2,657 individuals. Notification to affected individuals was made on November 16, 2020.
Date Detected: 2020-10-09
Date Publicly Disclosed: 2020-11-13
Type: Data Breach
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: 2.5gb of data
Systems Affected: Network
Operational Impact: Disrupted servicesInterrupted operations for customers

Data Compromised: Personal information

Data Compromised: Names, Social security numbers, Driver’s license numbers, Dates of birth

Data Compromised: Social security numbers
Identity Theft Risk: High (SSNs exposed)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information, , Names, Social Security Numbers, Driver’S License Numbers, Dates Of Birth, , Social Security Numbers and .

Entity Name: RR Donnelly
Entity Type: Company
Industry: Marketing

Entity Name: R.R. Donnelley & Sons Company
Entity Type: Company
Industry: Printing and Marketing Services

Entity Name: R. R. Donnelley & Sons Company
Entity Type: Company
Customers Affected: 648

Entity Name: R. R. Donnelley & Sons Company
Entity Type: Corporation
Industry: Printing & Business Communications
Location: United States
Customers Affected: 2657

Entity Name: Maine Office of the Attorney General
Entity Type: Government
Industry: Legal/Regulatory
Location: Maine, United States
Customers Affected: 13

Communication Strategy: Notification to affected individuals (scheduled for 2020-11-16)

Data Exfiltration: 2.5GB of data

Type of Data Compromised: Personal information

Type of Data Compromised: Names, Social security numbers, Driver’s license numbers, Dates of birth
Number of Records Exposed: 648
Sensitivity of Data: High

Type of Data Compromised: Social security numbers
Number of Records Exposed: 2657
Sensitivity of Data: High

Ransomware Strain: Conti
Data Exfiltration: ['2.5GB of data']

Regulatory Notifications: Maine Office of the Attorney General

Source: California Office of the Attorney General
Date Accessed: 2022-08-05

Source: Washington Attorney General's Office
Date Accessed: 2022-08-05

Source: Maine Office of the Attorney General
Date Accessed: 2020-11-13
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney GeneralDate Accessed: 2022-08-05, and Source: Washington Attorney General's OfficeDate Accessed: 2022-08-05, and Source: Maine Office of the Attorney GeneralDate Accessed: 2020-11-13.
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notification to affected individuals (scheduled for 2020-11-16).

Customer Advisories: Notification letters sent to affected individuals (2020-11-16)
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Notification letters sent to affected individuals (2020-11-16).
Last Attacking Group: The attacking group in the last incident was an Conti Ransomware.
Most Recent Incident Detected: The most recent incident detected was on 2022-08-05.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2020-11-13.
Most Significant Data Compromised: The most significant data compromised in an incident were 2.5GB of data, , Personal Information, , names, social security numbers, driver’s license numbers, dates of birth, , Social Security Numbers and .
Most Significant System Affected: The most significant system affected in an incident was Network.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Social Security Numbers, social security numbers, Personal Information, names, dates of birth, 2.5GB of data and driver’s license numbers.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 920.0.
Most Recent Source: The most recent source of information about an incident are Maine Office of the Attorney General, California Office of the Attorney General and Washington Attorney General's Office.
Most Recent Customer Advisory: The most recent customer advisory issued was an Notification letters sent to affected individuals (2020-11-16).
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.