Company Details
st.-john's-riverside-hospital
1,206
7,343
62
riversidehealth.org
0
ST._3384308
In-progress


St. John's Riverside Hospital Company CyberSecurity Posture
riversidehealth.orgSt. John's Riverside Hospital is a leader in providing the highest quality, compassionate health care utilizing the latest, state-of-the-art medical technology. Serving Yonkers to the Rivertown communities of Hastings-on-Hudson, Ardsley, Dobbs Ferry and Irvington, St. John's Riverside has been and continues to be a unique and comprehensive network of medical professionals dedicated to a tradition of service that spans generations. •superior medical care •dedicated nursing staff •the latest in medical technology and minimally invasive surgeries •highly skilled surgeons, doctors, technicians and counselors •the best in preventative medicine Here at St. John’s, we are committed to making life better for our patients. Our community and lifestyles have gone through many changes and likewise St. John's has evolved in response to these changes. We continue to elevate the services we provide with the goal of increasing the quality of life for all who entrust St. John's Riverside Hospital to their care. St. John's most recent developments have result in: •expedited admission time •expanded and improved emergency rooms and wait times •new, private maternity suites •the addition of industry-leading specialists in all areas of medicine and surgery We've been an integral part of your community since the 1869 and our commitment to provide you with the most advanced medical services available continues to be St. John's vision, mission and value. St. John's Riverside Hospital built itself around an early foundation of nursing and community service. In 1894, the Cochran School of Nursing, the oldest hospital-based school of nursing in the metropolitan area, was founded, thus making the St. John's Nursing Staff more than just the backbone of the hospital, but the heart and soul. Our dedicated nurses give superior attention to those who need it most with a strong emphasis on patient and family-focused nursing care.
Company Details
st.-john's-riverside-hospital
1,206
7,343
62
riversidehealth.org
0
ST._3384308
In-progress
Between 650 and 699

SJRH Global Score (TPRM)XXXX

Description: St. John’s Riverside Hospital Data Breach Exposes PII and PHI of Over 2,200 Individuals St. John’s Riverside Hospital, a community-based healthcare provider in Yonkers, New York, disclosed a data breach affecting at least 2,238 individuals across the U.S. The incident, reported to the U.S. Department of Health and Human Services on November 14, 2025, stemmed from unauthorized access to a limited number of employee email accounts. The breach was detected in September 2025 after the hospital identified suspicious activity, including phishing emails and an attempt to reroute payment funds. The compromised accounts contained sensitive data, including personally identifiable information (PII) such as names, dates of birth, Social Security numbers, driver’s license details, and financial account numbers as well as protected health information (PHI), including health insurance details, medical conditions, treatment records, and diagnosis information. In response, St. John’s Riverside Hospital took immediate action to secure its systems, including resetting passwords, revoking session tokens, and implementing multifactor authentication. The hospital also engaged cybersecurity professionals to investigate the incident, contain the unauthorized access, and identify affected individuals. The breach has since been remediated.


No incidents recorded for St. John's Riverside Hospital in 2026.
No incidents recorded for St. John's Riverside Hospital in 2026.
No incidents recorded for St. John's Riverside Hospital in 2026.
SJRH cyber incidents detection timeline including parent company and subsidiaries

St. John's Riverside Hospital is a leader in providing the highest quality, compassionate health care utilizing the latest, state-of-the-art medical technology. Serving Yonkers to the Rivertown communities of Hastings-on-Hudson, Ardsley, Dobbs Ferry and Irvington, St. John's Riverside has been and continues to be a unique and comprehensive network of medical professionals dedicated to a tradition of service that spans generations. •superior medical care •dedicated nursing staff •the latest in medical technology and minimally invasive surgeries •highly skilled surgeons, doctors, technicians and counselors •the best in preventative medicine Here at St. John’s, we are committed to making life better for our patients. Our community and lifestyles have gone through many changes and likewise St. John's has evolved in response to these changes. We continue to elevate the services we provide with the goal of increasing the quality of life for all who entrust St. John's Riverside Hospital to their care. St. John's most recent developments have result in: •expedited admission time •expanded and improved emergency rooms and wait times •new, private maternity suites •the addition of industry-leading specialists in all areas of medicine and surgery We've been an integral part of your community since the 1869 and our commitment to provide you with the most advanced medical services available continues to be St. John's vision, mission and value. St. John's Riverside Hospital built itself around an early foundation of nursing and community service. In 1894, the Cochran School of Nursing, the oldest hospital-based school of nursing in the metropolitan area, was founded, thus making the St. John's Nursing Staff more than just the backbone of the hospital, but the heart and soul. Our dedicated nurses give superior attention to those who need it most with a strong emphasis on patient and family-focused nursing care.


American Medical Response, America’s leading provider of medical transportation, has a single mission: making a difference by caring for people in need. AMR solutions include 911 emergency, interfacility transportation, event medical, advanced & basic life support transports and federal disaster res

Addus HomeCare is one of the nation's largest and fastest growing providers of personal home care and support services. Since 1979, Addus has built an exceptional home care company through a commitment to improving the health and wellness of our clients and providing high-quality, cost-effective car

Integrative Medicine (IM) is an approach to healthcare that takes into account the whole person addressing the full range of physical, emotional, mental, social, spiritual, and environmental influences that affect an individual’s health. IM is informed by evidence, makes use of all appropriate thera

Boston Children's Hospital is a 404-bed comprehensive center for pediatric health care. As one of the largest pediatric medical centers in the United States, Boston Children's offers a complete range of health care services for children from birth through 21 years of age. (Our services can begin int

Based on our extensive expertise and know how we seek to ensure high quality, efficient and patient focused healthcare, locally as well as within an international environment. For this purpose Helios Health was founded in 2017. Helios Health combines Helios Germany (Helios Kliniken) and Helios Spa

Allegheny Health Network is an integrated health care delivery system serving the greater Western Pennsylvania region. More than 2,600 physicians and 21,000 employees serve the system's 14 hospitals as well as its ambulatory medical and surgery centers, Health + Wellness Pavilions, and hundreds of p

A world-leading multinational healthcare provider, IHH believes that making a difference starts with our aspiration to Care. For Good. Our team of 70,000 people commit to deliver greater good to our patients, people, the public and our planet, as we live our purpose each day to touch lives and tr

The University of Maryland Medical System (UMMS) was created in 1984 when the state-owned University Hospital became a private, nonprofit organization. It has evolved into a multi-hospital system with academic, community and specialty service missions reaching every part of the state and beyond. UM

As a nationally ranked academic medical center and one of Alabama’s largest employers, UAB Medicine is about teamwork, support, mentorship, and collaboration. Employees are empowered to lead, learn, and innovate as they deliver world-class care to every patient, every family, every time. When you ar
.png)
Strauss Borrelli PLLC, a leading data breach law firm, is investigating St. John's Riverside Hospital (“St. John's”) regarding its recent...
Tennessee-based Artemis Healthcare has experienced a ransomware attack involving data theft, and email account breaches have been announced...
The breach was the third largest reported to a portal managed by federal regulators last year.
Many schools offer after-school enrichment programs in STEM/quantum computing, career and technical education (CTE) classes, and pre-apprentice programs in a...
Healthcare Dive is tracking pharmacy operations, emergency rooms statuses and potential care delays across Ascension's hospitals.
Ascension confirmed Wednesday that some of its hospitals across the United States were facing disruptions from a possible cyberattack.
M Health Fairview St. John's Hospital in Minnesota addressed crowding and capacity constraints by opening a new, 16-bed short-stay and observation uni.
Saint Joseph's Medical Center and St. John's Riverside Hospital, both in Yonkers, have been awarded grants from New York state.
At St. John's Riverside Hospital, two-thirds of the patient population is over the age of 65. The leadership team at the hospital in Yonkers, New York.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of St. John's Riverside Hospital is http://www.riversidehealth.org.
According to Rankiteo, St. John's Riverside Hospital’s AI-generated cybersecurity score is 694, reflecting their Weak security posture.
According to Rankiteo, St. John's Riverside Hospital currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, St. John's Riverside Hospital has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, St. John's Riverside Hospital is not certified under SOC 2 Type 1.
According to Rankiteo, St. John's Riverside Hospital does not hold a SOC 2 Type 2 certification.
According to Rankiteo, St. John's Riverside Hospital is not listed as GDPR compliant.
According to Rankiteo, St. John's Riverside Hospital does not currently maintain PCI DSS compliance.
According to Rankiteo, St. John's Riverside Hospital is not compliant with HIPAA regulations.
According to Rankiteo,St. John's Riverside Hospital is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
St. John's Riverside Hospital operates primarily in the Hospitals and Health Care industry.
St. John's Riverside Hospital employs approximately 1,206 people worldwide.
St. John's Riverside Hospital presently has no subsidiaries across any sectors.
St. John's Riverside Hospital’s official LinkedIn profile has approximately 7,343 followers.
St. John's Riverside Hospital is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.
No, St. John's Riverside Hospital does not have a profile on Crunchbase.
Yes, St. John's Riverside Hospital maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/st.-john's-riverside-hospital.
As of January 21, 2026, Rankiteo reports that St. John's Riverside Hospital has experienced 1 cybersecurity incidents.
St. John's Riverside Hospital has an estimated 31,578 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with yes, and third party assistance with data security and privacy professionals, and containment measures with password changes, containment measures with session token revocation, containment measures with multifactor authentication reset, and remediation measures with unauthorized activity contained and remediated, and communication strategy with official notice to consumers..
Title: St. John’s Riverside Hospital Data Breach
Description: St. John’s Riverside Hospital experienced a data breach that potentially exposed personally identifiable information (PII) and protected health information (PHI) of at least 2,238 individuals across the U.S. The breach originated from unauthorized access to a limited number of employee email accounts.
Date Detected: 2025-09
Date Publicly Disclosed: 2025-11-14
Type: Data Breach
Attack Vector: Phishing
Vulnerability Exploited: Employee email accounts
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Employee email accounts.

Data Compromised: PII and PHI
Systems Affected: Employee email accounts
Identity Theft Risk: High
Payment Information Risk: High
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personally Identifiable Information (Pii), Protected Health Information (Phi) and .

Entity Name: St. John’s Riverside Hospital
Entity Type: Healthcare Provider
Industry: Healthcare
Location: Yonkers, New York, USA
Customers Affected: 2238

Incident Response Plan Activated: Yes
Third Party Assistance: Data security and privacy professionals
Containment Measures: Password changesSession token revocationMultifactor authentication reset
Remediation Measures: Unauthorized activity contained and remediated
Communication Strategy: Official notice to consumers
Incident Response Plan: The company's incident response plan is described as Yes.
Third-Party Assistance: The company involves third-party assistance in incident response through Data security and privacy professionals.

Type of Data Compromised: Personally identifiable information (pii), Protected health information (phi)
Number of Records Exposed: 2238
Sensitivity of Data: High
Personally Identifiable Information: NameDate of birthSocial Security numberDriver’s license or state identification numberFinancial account numberHealth insurance detailsMedical condition informationTreatment provider nameMedical record numberTreatment cost informationDiagnosis or treatment information
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Unauthorized activity contained and remediated.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by password changes, session token revocation, multifactor authentication reset and .

Regulations Violated: HIPAA,
Regulatory Notifications: U.S. Department of Health and Human Services

Source: U.S. Department of Health and Human Services
Date Accessed: 2025-11-14

Source: Official notice to consumers
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: U.S. Department of Health and Human ServicesDate Accessed: 2025-11-14, and Source: Official notice to consumers.

Investigation Status: Completed
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Official notice to consumers.

Customer Advisories: If you believe your personal information may have been compromised in this breach, please take appropriate steps to protect your information.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were If you believe your personal information may have been compromised in this breach and please take appropriate steps to protect your information..

Entry Point: Employee email accounts

Root Causes: Phishing emails and unauthorized access to employee email accounts
Corrective Actions: Password Changes, Session Token Revocation, Multifactor Authentication Reset, Engagement Of Data Security And Privacy Professionals,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Data security and privacy professionals.
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Password Changes, Session Token Revocation, Multifactor Authentication Reset, Engagement Of Data Security And Privacy Professionals, .
Most Recent Incident Detected: The most recent incident detected was on 2025-09.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-11-14.
Most Significant Data Compromised: The most significant data compromised in an incident was PII and PHI.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Data security and privacy professionals.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Password changesSession token revocationMultifactor authentication reset.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was PII and PHI.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 231.0.
Most Recent Source: The most recent source of information about an incident are U.S. Department of Health and Human Services and Official notice to consumers.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Completed.
Most Recent Customer Advisory: The most recent customer advisory issued were an If you believe your personal information may have been compromised in this breach and please take appropriate steps to protect your information.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Employee email accounts.
.png)
SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g., execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.