Company Details
the-marker-group
178
1,577
5411
marker-group.com
0
THE_1427714
In-progress

The Marker Group Company CyberSecurity Posture
marker-group.comFounded in 1985, the Marker Group is the nation’s most trusted name in record collection, medical review, data analysis, and many other litigation support services. We are a certified Women’s Business Enterprise that helps the world’s most prestigious defense law firms win cases with records and analysis they can rely on, every time.
Company Details
the-marker-group
178
1,577
5411
marker-group.com
0
THE_1427714
In-progress
Between 700 and 749

MG Global Score (TPRM)XXXX

Description: The Maine Attorney General's Office reported a data breach involving The Marker Group Inc. on December 23, 2021. The breach was discovered on September 3, 2021, and involved unauthorized access to files potentially containing personal information of nine Maine residents, including names, dates of birth, Social Security numbers, and medical records.


No incidents recorded for The Marker Group in 2025.
No incidents recorded for The Marker Group in 2025.
No incidents recorded for The Marker Group in 2025.
MG cyber incidents detection timeline including parent company and subsidiaries

Founded in 1985, the Marker Group is the nation’s most trusted name in record collection, medical review, data analysis, and many other litigation support services. We are a certified Women’s Business Enterprise that helps the world’s most prestigious defense law firms win cases with records and analysis they can rely on, every time.


A Charlotte Firm Specializing in Accuracy, Dependability, and Timeliness. We're on the Case! Covering Both North and South Carolina The seasoned court reporters at Queen City Court Reporting strive to be the ultimate solution for all of your deposition and litigation needs. Based in Charlotte, N

Innovative businesses usually have more Intellectual Property (IP) than they realize. Most are also unsure of which IP they need to protect, and the best way to do that. And, they often aren’t seeing opportunities to get their IP earning additional revenue. ★ WHAT WE DO: Here at INTELLECTULAW™,

At GTNlaw, we strive to provide our clients with the utmost service and attention. Our law firm encompasses all aspects of a general practicing boutique law firm, allowing us to cater to our clients’ specific, special needs. Since 1965, our firm has garnered both experience and a reputation for achi

Horak Law is a highly distinguished South Texas law firm focusing exclusively on criminal defense matters. Matt Horak is Board Certified in criminal defense trial law. With over 18 years of experience, including time spent as an assistant Harris County District Attorney, Matt Horak has deep insight

Uw partner in zekerheid zijn, dát is onze drijfveer. Van het uitbrengen van een gedegen advies tot het volledig ontzorgen. Juridische vraagstukken van een jong volwassene, een gezin, (jonge) ondernemer of een (jonge) senior, bij Metis Notarissen hebben we voor ieder rechtsgebied een specialist in h

Desde 1999, temos ajudado centenas de pessoas a obter financiamento para suas casas e apartamentos, além de resolver diversas questões imobiliárias. Nosso foco é na regularização de imóveis, usucapião e inventários. Contamos com uma equipe de advogados especializados em direito imobiliário, prontos
.png)
The global cybersecurity market size is projected to grow from $218.98 billion in 2025 to $562.77 billion by 2032, at a CAGR of 14.4% during...
Feature What's better, prevention or cure? For a long time the global cybersecurity industry has operated by reacting to attacks and...
Claimed attack: The Cl0p ransomware group has asserted responsibility for a data breach targeting American Airlines.
Senior executives must do better to prepare for almost inevitable future cyber-attacks and cannot rely on government alone for protection, the UK government...
An article by Dmitry Marinov, CTO of ANY.RUN, a UAE-based cybersecurity company As the MENA startup ecosystem matures,...
Maharashtra Cyber identified seven APT groups, primarily Pakistan-allied, responsible for over 1.5 million cyber attacks targeting critical Indian...
A team of researchers at the Georgia Institute of Technology uncovered significant vulnerabilities in Tile, a popular tracking device.
Over the past year, a shadowy threat actor known as TAG-144—also tracked under aliases Blind Eagle and APT-C-36—has intensified operations...
Threat actors successfully compromised corporate systems within just five minutes using a combination of social engineering tactics and...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of The Marker Group is http://www.marker-group.com.
According to Rankiteo, The Marker Group’s AI-generated cybersecurity score is 731, reflecting their Moderate security posture.
According to Rankiteo, The Marker Group currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, The Marker Group is not certified under SOC 2 Type 1.
According to Rankiteo, The Marker Group does not hold a SOC 2 Type 2 certification.
According to Rankiteo, The Marker Group is not listed as GDPR compliant.
According to Rankiteo, The Marker Group does not currently maintain PCI DSS compliance.
According to Rankiteo, The Marker Group is not compliant with HIPAA regulations.
According to Rankiteo,The Marker Group is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
The Marker Group operates primarily in the Legal Services industry.
The Marker Group employs approximately 178 people worldwide.
The Marker Group presently has no subsidiaries across any sectors.
The Marker Group’s official LinkedIn profile has approximately 1,577 followers.
The Marker Group is classified under the NAICS code 5411, which corresponds to Legal Services.
No, The Marker Group does not have a profile on Crunchbase.
Yes, The Marker Group maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/the-marker-group.
As of November 30, 2025, Rankiteo reports that The Marker Group has experienced 1 cybersecurity incidents.
The Marker Group has an estimated 7,389 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Title: Data Breach at The Marker Group Inc.
Description: Unauthorized access to files potentially containing personal information of nine Maine residents, including names, dates of birth, Social Security numbers, and medical records.
Date Detected: 2021-09-03
Date Publicly Disclosed: 2021-12-23
Type: Data Breach
Attack Vector: Unauthorized Access
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Names, Dates of birth, Social security numbers, Medical records
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Dates Of Birth, Social Security Numbers, Medical Records and .

Entity Name: The Marker Group Inc.
Entity Type: Company
Customers Affected: 9

Type of Data Compromised: Names, Dates of birth, Social security numbers, Medical records
Number of Records Exposed: 9
Sensitivity of Data: High
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Maine Attorney General's OfficeDate Accessed: 2021-12-23.
Most Recent Incident Detected: The most recent incident detected was on 2021-09-03.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2021-12-23.
Most Significant Data Compromised: The most significant data compromised in an incident were Names, Dates of Birth, Social Security Numbers, Medical Records and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Social Security Numbers, Names, Dates of Birth and Medical Records.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 9.0.
Most Recent Source: The most recent source of information about an incident is Maine Attorney General's Office.
.png)
A vulnerability was determined in motogadget mo.lock Ignition Lock up to 20251125. Affected by this vulnerability is an unknown functionality of the component NFC Handler. Executing manipulation can lead to use of hard-coded cryptographic key . The physical device can be targeted for the attack. A high complexity level is associated with this attack. The exploitation appears to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the interview attachment retrieval endpoint in the Recruitment module serves files based solely on an authenticated session and user-supplied identifiers, without verifying whether the requester has permission to access the associated interview record. Because the server does not perform any recruitment-level authorization checks, an ESS-level user with no access to recruitment workflows can directly request interview attachment URLs and receive the corresponding files. This exposes confidential interview documents—including candidate CVs, evaluations, and supporting files—to unauthorized users. The issue arises from relying on predictable object identifiers and session presence rather than validating the user’s association with the relevant recruitment process. This issue has been patched in version 5.8.
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application’s recruitment attachment retrieval endpoint does not enforce the required authorization checks before serving candidate files. Even users restricted to ESS-level access, who have no permission to view the Recruitment module, can directly access candidate attachment URLs. When an authenticated request is made to the attachment endpoint, the system validates the session but does not confirm that the requesting user has the necessary recruitment permissions. As a result, any authenticated user can download CVs and other uploaded documents for arbitrary candidates by issuing direct requests to the attachment endpoint, leading to unauthorized exposure of sensitive applicant data. This issue has been patched in version 5.8.
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application does not invalidate existing sessions when a user is disabled or when a password change occurs, allowing active session cookies to remain valid indefinitely. As a result, a disabled user, or an attacker using a compromised account, can continue to access protected pages and perform operations as long as a prior session remains active. Because the server performs no session revocation or session-store cleanup during these critical state changes, disabling an account or updating credentials has no effect on already-established sessions. This makes administrative disable actions ineffective and allows unauthorized users to retain full access even after an account is closed or a password is reset, exposing the system to prolonged unauthorized use and significantly increasing the impact of account takeover scenarios. This issue has been patched in version 5.8.
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the password reset workflow does not enforce that the username submitted in the final reset request matches the account for which the reset process was originally initiated. After obtaining a valid reset link for any account they can receive email for, an attacker can alter the username parameter in the final reset request to target a different user. Because the system accepts the supplied username without verification, the attacker can set a new password for any chosen account, including privileged accounts, resulting in full account takeover. This issue has been patched in version 5.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.