ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

We believe it’s people who give purpose to our technology. So we’re committed to staying close to our customers and providing them the best experience. And delivering the best tech. On the best network. Because our purpose is to build a connected future so everyone can thrive. We build technology and content solutions that are simple and easy to use, including Australia’s largest and fastest national mobile network. That’s why we strive to serve and know our customers better than anyone else – offering a choice of not just digital connection, but digital content as well. And that’s why we have an international presence spanning 15 countries, including China. In the 21st century, opportunity belongs to connected businesses, governments, communities and individuals. As Australia’s leading telecommunications and information services company, Telstra is proud to be helping our customers improve the ways in which they live and work through connection. Be first to know about Telstra news, advice and offers, as well as updates on our people and partners: tel.st/subscribe

Telstra A.I CyberSecurity Scoring

Telstra

Company Details

Linkedin ID:

telstra

Employees number:

35,264

Number of followers:

403,314

NAICS:

517

Industry Type:

Telecommunications

Homepage:

telstra.com.au

IP Addresses:

0

Company ID:

TEL_3122641

Scan Status:

In-progress

AI scoreTelstra Risk Score (AI oriented)

Between 700 and 749

https://images.rankiteo.com/companyimages/telstra.jpeg
Telstra Telecommunications
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreTelstra Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/telstra.jpeg
Telstra Telecommunications
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Telstra Company CyberSecurity News & History

Past Incidents
5
Attack Types
3
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
TelstraBreach60407/2018
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: A 63-year-old layman was been able to access a Telstra database containing the contact details of their customers. Once he signed in, he put in the search term “email” and it returned 66,500 results containing names, addresses, email addresses and phone numbers. Telstra has also since identified two other customers who were able to access the database.

TelstraBreach80310/2022
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: Australia's largest telecoms firm Telstra Corp Ltd suffered a data breach incident which affected around 30,000 current and former employees. The breach compromised basic information like names and email addresses.

TelstraData Leak50112/2011
Rankiteo Explanation :
Attack without any consequences

Description: TELSTRA faced another data privacy breach incident after the email addresses and phone numbers of more than a thousand of its BigPond customers were made accessible online. An online spreadsheet containing customer names, email addresses and details of service support issues, was exposed.

TelstraData Leak85405/2021
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Australian telecom firm Telstra was hit by a cyber attack result of which the hackers gained access to 10000 SIM cards. The compromised information included financial information, contracts, and banking information of the SIM card users. The company’s website has been offline for days after a hacker group said it infiltrated the company’s data systems and posted a disturbing ransom note on the dark web.

TelstraVulnerability85403/2018
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: A flaw in medical software used by more than 40,000 Australian health specialists and distributed by Telstra has potentially exposed Australians' medical information to hackers. Hackers have been logging into practitioners' computers and servers to carry out illegal activities. The flaw in the "secure" messaging software is specifically leaving computers with remote desktop software installed wide open because it creates a separate username with a static default password that will allow for an easy intrusion.

Telstra
Breach
Severity: 60
Impact: 4
Seen: 07/2018
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: A 63-year-old layman was been able to access a Telstra database containing the contact details of their customers. Once he signed in, he put in the search term “email” and it returned 66,500 results containing names, addresses, email addresses and phone numbers. Telstra has also since identified two other customers who were able to access the database.

Telstra
Breach
Severity: 80
Impact: 3
Seen: 10/2022
Blog:
Rankiteo Explanation
Attack with significant impact with internal employee data leaks

Description: Australia's largest telecoms firm Telstra Corp Ltd suffered a data breach incident which affected around 30,000 current and former employees. The breach compromised basic information like names and email addresses.

Telstra
Data Leak
Severity: 50
Impact: 1
Seen: 12/2011
Blog:
Rankiteo Explanation
Attack without any consequences

Description: TELSTRA faced another data privacy breach incident after the email addresses and phone numbers of more than a thousand of its BigPond customers were made accessible online. An online spreadsheet containing customer names, email addresses and details of service support issues, was exposed.

Telstra
Data Leak
Severity: 85
Impact: 4
Seen: 05/2021
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Australian telecom firm Telstra was hit by a cyber attack result of which the hackers gained access to 10000 SIM cards. The compromised information included financial information, contracts, and banking information of the SIM card users. The company’s website has been offline for days after a hacker group said it infiltrated the company’s data systems and posted a disturbing ransom note on the dark web.

Telstra
Vulnerability
Severity: 85
Impact: 4
Seen: 03/2018
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: A flaw in medical software used by more than 40,000 Australian health specialists and distributed by Telstra has potentially exposed Australians' medical information to hackers. Hackers have been logging into practitioners' computers and servers to carry out illegal activities. The flaw in the "secure" messaging software is specifically leaving computers with remote desktop software installed wide open because it creates a separate username with a static default password that will allow for an easy intrusion.

Ailogo

Telstra Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Telstra

Incidents vs Telecommunications Industry Average (This Year)

No incidents recorded for Telstra in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Telstra in 2025.

Incident Types Telstra vs Telecommunications Industry Avg (This Year)

No incidents recorded for Telstra in 2025.

Incident History — Telstra (X = Date, Y = Severity)

Telstra cyber incidents detection timeline including parent company and subsidiaries

Telstra Company Subsidiaries

SubsidiaryImage

We believe it’s people who give purpose to our technology. So we’re committed to staying close to our customers and providing them the best experience. And delivering the best tech. On the best network. Because our purpose is to build a connected future so everyone can thrive. We build technology and content solutions that are simple and easy to use, including Australia’s largest and fastest national mobile network. That’s why we strive to serve and know our customers better than anyone else – offering a choice of not just digital connection, but digital content as well. And that’s why we have an international presence spanning 15 countries, including China. In the 21st century, opportunity belongs to connected businesses, governments, communities and individuals. As Australia’s leading telecommunications and information services company, Telstra is proud to be helping our customers improve the ways in which they live and work through connection. Be first to know about Telstra news, advice and offers, as well as updates on our people and partners: tel.st/subscribe

Loading...
similarCompanies

Telstra Similar Companies

Airtel was founded to provide global connectivity and unlock endless opportunities. Our organization embodies a unique blend of energy, innovation, creativity, dedication, scale, and ownership, all aimed at being limitless. At Airtel, we strive to go beyond our duties to create impactful solutions f

EchoStar Corporation

EchoStar Corporation (Nasdaq: SATS) is a premier provider of technology, networking services, television entertainment and connectivity, offering consumer, enterprise, operator and government solutions worldwide under its EchoStar®, Boost Mobile®, Sling TV, DISH TV, Hughes®, HughesNet®, HughesON™ an

Cox Communications

Cox Communications is committed to creating more moments of real human connection. We bring people closer to family and friends through technology that’s inspired by a culture that puts people first, and we’re always working to improve life in the communities we serve. Our world-class broadband appl

Telecom Egypt

Since its establishment in 1854, Telecom Egypt has played a pivotal role in driving growth within the local ICT market capitalizing on its vast infrastructure, which is one of the largest in the region. Its vast domestic and international infrastructure has helped it serve various customer groups in

PT. Indosat Tbk

Indosat Ooredoo Hutchison (IDX: ISAT) ("IOH"), are here with our vision to become the most preferred digital telecommunications company of Indonesia. The IOH merger combines two highly complementary businesses between PT Indosat Tbk (“Indosat Ooredoo”) and PT Hutchison 3 Indonesia to create a new wo

Vivo (Telefônica Brasil)

Vivo (Telefônica Brasil) is part of the Telefónica Group and with more than 94 million customers, of which 75 million mobile and 19 million fixed, we are the largest telecommunications company in Brazil, with nationwide presence and a complete, convergent portfolio of products, combining fixed, mobi

Totalplay

Somos una empresa orgullosamente mexicana, líder en tecnología, telecomunicaciones y entretenimiento. Estamos siempre a la vanguardia con el objetivo de llevar a nuestros clientes lo mejor en conectividad, ya sea para que estén cerca de los que más quieren ó puedan alcanzar el éxito profesion

DISH Network

Our adventure began by changing the way people watched TV, bringing DISH to where big cable wouldn’t: rural America. Since then, we have reinvented ourselves and our own industry with Sling TV to give millions of consumers more choice in entertainment. Today, we’ve officially entered the consumer wi

We are driving the digital transition of Italy and Brazil with innovative technologies and services because we want to contribute to accelerating the sustainable growth of the economy and society by bringing value and prosperity to people, companies and institutions. We offer diversified solutions

newsone

Telstra CyberSecurity News

October 09, 2025 07:00 AM
Telstra denies being hacked in cyber extortion bid

Telstra has denied being breached by hackers after a notorious criminal group added it to the list of companies exposed in a wide-ranging...

October 08, 2025 07:00 AM
Telstra Data Breach Denied After Hacker Claims Stolen Data

The Telstra Data Breach involves claims of 100GB of stolen data by Scattered Spider. Telstra denies system breach as ransom deadline...

August 27, 2025 07:00 AM
Telstra avoided fear in cybersecurity campaign, tapped the never-scary… Steve Buscemi…

The ad features Buscemi as an intergalactic Emperor attempting to take over Australia with hi-tech scams, but his schemes are foiled as his crew...

August 11, 2025 07:00 AM
Ad of the Day: Steve Buscemi as evil scamming emperor in Telstra cybersecurity ad

Ad of the Day: Steve Buscemi as evil scamming emperor in Telstra cybersecurity ad. Australian telecoms brand proves its anti-scamming...

August 11, 2025 07:00 AM
Steve Buscemi Stars For Telstra In Out-Of-This-World Cybersecurity Ad

Settings ... Telstra has tapped Steve Buscemi (yes, really) to star in its latest spot showing off the power of its network security created by...

August 11, 2025 07:00 AM
Steve Buscemi Plays a Pissed-Off Galactic Emperor for Telstra

Steve Buscemi's bulbous-brained galactic emperor barks orders. But his malevolent minions can't reckon with the cybersecurity prowess of...

August 04, 2025 03:15 PM
We block millions of cyber threats every day

Telstra helps protect millions of Australians daily by blocking scam calls, fake messages & dangerous websites before they reach your device.

June 26, 2025 07:00 AM
FirstWave Extends Agreement with Telstra for ISM-Compliant Email Security Platform

Cybersecurity firm secures 12-month extension for Secure Internet Gateway agreement, diversifies revenue streams.

May 12, 2025 07:00 AM
Cyber security trends to watch in 2025

Cyber security checklist · 1. Stay informed and aware · 2. Be proactive with password management · 3. Consider social media privacy · 4. Switch...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Telstra CyberSecurity History Information

Official Website of Telstra

The official website of Telstra is https://www.telstra.com.au/careers.

Telstra’s AI-Generated Cybersecurity Score

According to Rankiteo, Telstra’s AI-generated cybersecurity score is 749, reflecting their Moderate security posture.

How many security badges does Telstra’ have ?

According to Rankiteo, Telstra currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Telstra have SOC 2 Type 1 certification ?

According to Rankiteo, Telstra is not certified under SOC 2 Type 1.

Does Telstra have SOC 2 Type 2 certification ?

According to Rankiteo, Telstra does not hold a SOC 2 Type 2 certification.

Does Telstra comply with GDPR ?

According to Rankiteo, Telstra is not listed as GDPR compliant.

Does Telstra have PCI DSS certification ?

According to Rankiteo, Telstra does not currently maintain PCI DSS compliance.

Does Telstra comply with HIPAA ?

According to Rankiteo, Telstra is not compliant with HIPAA regulations.

Does Telstra have ISO 27001 certification ?

According to Rankiteo,Telstra is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Telstra

Telstra operates primarily in the Telecommunications industry.

Number of Employees at Telstra

Telstra employs approximately 35,264 people worldwide.

Subsidiaries Owned by Telstra

Telstra presently has no subsidiaries across any sectors.

Telstra’s LinkedIn Followers

Telstra’s official LinkedIn profile has approximately 403,314 followers.

NAICS Classification of Telstra

Telstra is classified under the NAICS code 517, which corresponds to Telecommunications.

Telstra’s Presence on Crunchbase

Yes, Telstra has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/telstra.

Telstra’s Presence on LinkedIn

Yes, Telstra maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/telstra.

Cybersecurity Incidents Involving Telstra

As of November 27, 2025, Rankiteo reports that Telstra has experienced 5 cybersecurity incidents.

Number of Peer and Competitor Companies

Telstra has an estimated 9,535 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Telstra ?

Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability, Breach and Data Leak.

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Medical Software Flaw Exposes Australians' Medical Information

Description: A flaw in medical software used by more than 40,000 Australian health specialists and distributed by Telstra has potentially exposed Australians' medical information to hackers. Hackers have been logging into practitioners' computers and servers to carry out illegal activities. The flaw in the 'secure' messaging software is specifically leaving computers with remote desktop software installed wide open because it creates a separate username with a static default password that will allow for an easy intrusion.

Type: Data Breach

Attack Vector: Exploitation of Default Credentials

Vulnerability Exploited: Static default password in remote desktop software

Threat Actor: Hackers

Motivation: Illegal activities

Incident : Data Breach

Title: Telstra Data Breach

Description: Australia's largest telecoms firm Telstra Corp Ltd suffered a data breach incident which affected around 30,000 current and former employees. The breach compromised basic information like names and email addresses.

Type: Data Breach

Incident : Data Breach

Title: Telstra Database Breach

Description: A 63-year-old layman was able to access a Telstra database containing the contact details of their customers. Once he signed in, he put in the search term 'email' and it returned 66,500 results containing names, addresses, email addresses, and phone numbers. Telstra has also since identified two other customers who were able to access the database.

Type: Data Breach

Attack Vector: Unauthorized Access

Threat Actor: Layman

Incident : Data Breach

Title: Telstra BigPond Customer Data Breach

Description: Telstra faced a data privacy breach incident where the email addresses and phone numbers of more than a thousand of its BigPond customers were made accessible online. An online spreadsheet containing customer names, email addresses, and details of service support issues was exposed.

Type: Data Breach

Incident : Data Breach

Title: Telstra Cyber Attack

Description: Australian telecom firm Telstra was hit by a cyber attack resulting in hackers gaining access to 10000 SIM cards. The compromised information included financial information, contracts, and banking information of the SIM card users. The company’s website has been offline for days after a hacker group said it infiltrated the company’s data systems and posted a disturbing ransom note on the dark web.

Type: Data Breach

Attack Vector: Unspecified

Threat Actor: Hacker Group

Motivation: Ransom

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Remote desktop software.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach TEL141210622

Data Compromised: Medical information

Systems Affected: Computers with remote desktop software

Incident : Data Breach TEL23611122

Data Compromised: Names, Email addresses

Incident : Data Breach TEL025101122

Data Compromised: Names, Addresses, Email addresses, Phone numbers

Systems Affected: Telstra Database

Incident : Data Breach TEL2211121222

Data Compromised: Email addresses, Phone numbers, Customer names, Details of service support issues

Incident : Data Breach TEL15346123

Data Compromised: Financial information, Contracts, Banking information

Systems Affected: website

Downtime: days

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Medical information, Names, Email Addresses, , Personal Information, , Email Addresses, Phone Numbers, Customer Names, Details Of Service Support Issues, , Financial Information, Contracts, Banking Information and .

Which entities were affected by each incident ?

Incident : Data Breach TEL141210622

Entity Name: Telstra

Entity Type: Company

Industry: Telecommunications

Location: Australia

Customers Affected: More than 40,000 Australian health specialists

Incident : Data Breach TEL23611122

Entity Name: Telstra Corp Ltd

Entity Type: Telecoms Firm

Industry: Telecommunications

Location: Australia

Customers Affected: 30,000 current and former employees

Incident : Data Breach TEL025101122

Entity Name: Telstra

Entity Type: Telecommunications Company

Industry: Telecommunications

Customers Affected: 66500

Incident : Data Breach TEL2211121222

Entity Name: Telstra

Entity Type: Telecommunications Company

Industry: Telecommunications

Customers Affected: More than a thousand BigPond customers

Incident : Data Breach TEL15346123

Entity Name: Telstra

Entity Type: Telecom Firm

Industry: Telecommunications

Location: Australia

Customers Affected: 10000

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach TEL141210622

Type of Data Compromised: Medical information

Sensitivity of Data: High

Incident : Data Breach TEL23611122

Type of Data Compromised: Names, Email addresses

Number of Records Exposed: 30,000

Incident : Data Breach TEL025101122

Type of Data Compromised: Personal information

Number of Records Exposed: 66500

Incident : Data Breach TEL2211121222

Type of Data Compromised: Email addresses, Phone numbers, Customer names, Details of service support issues

Number of Records Exposed: More than a thousand

Incident : Data Breach TEL15346123

Type of Data Compromised: Financial information, Contracts, Banking information

Number of Records Exposed: 10000

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Data Breach TEL141210622

Entry Point: Remote desktop software

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Data Breach TEL141210622

Root Causes: Static default password in remote desktop software

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident were an Hackers, Layman and Hacker Group.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Medical information, names, email addresses, , Names, Addresses, Email Addresses, Phone Numbers, , email addresses, phone numbers, customer names, details of service support issues, , financial information, contracts, banking information and .

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident was Telstra Database and website.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Phone Numbers, Addresses, banking information, Email Addresses, customer names, contracts, email addresses, details of service support issues, phone numbers, financial information, Medical information, names and Names.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 30.8K.

Initial Access Broker

What was the most recent entry point used by an initial access broker ?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an Remote desktop software.

cve

Latest Global CVEs (Not Company-Specific)

Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=telstra' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge