Badge
11,371 badges added since 01 January 2025
ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

We enable sexual liberation at scale by creating platforms grounded in consent and safety. Our first platform, Headero, is the connection app for oral pleasure.

ThotExperiment A.I CyberSecurity Scoring

ThotExperiment

Company Details

Linkedin ID:

thotexperiment

Employees number:

1

Number of followers:

39

NAICS:

513

Industry Type:

Technology, Information and Internet

Homepage:

thotexperiment.co

IP Addresses:

0

Company ID:

THO_2869852

Scan Status:

In-progress

AI scoreThotExperiment Risk Score (AI oriented)

Between 650 and 699

https://images.rankiteo.com/companyimages/thotexperiment.jpeg
ThotExperiment Technology, Information and Internet
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreThotExperiment Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/thotexperiment.jpeg
ThotExperiment Technology, Information and Internet
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

ThotExperiment Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
ThotExperimentBreach8546/2025NA
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Security researchers from Cybernews discovered an unsecured MongoDB instance belonging to Headero, a dating and hookup app. The database contained over 350,000 user records, including names, email addresses, social login IDs, JWT tokens, profile pictures, device tokens, sexual preferences, STD status, and exact GPS locations. Although the database was immediately locked down by ThotExperiment, it is unclear how long it remained open or if any threat actors accessed it. No evidence of abuse has been found so far. Users are advised to be vigilant against phishing attacks and to change passwords if they are used across multiple services.

ThotExperiment
Breach
Severity: 85
Impact: 4
Seen: 6/2025
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Security researchers from Cybernews discovered an unsecured MongoDB instance belonging to Headero, a dating and hookup app. The database contained over 350,000 user records, including names, email addresses, social login IDs, JWT tokens, profile pictures, device tokens, sexual preferences, STD status, and exact GPS locations. Although the database was immediately locked down by ThotExperiment, it is unclear how long it remained open or if any threat actors accessed it. No evidence of abuse has been found so far. Users are advised to be vigilant against phishing attacks and to change passwords if they are used across multiple services.

Ailogo

ThotExperiment Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for ThotExperiment

Incidents vs Technology, Information and Internet Industry Average (This Year)

No incidents recorded for ThotExperiment in 2026.

Incidents vs All-Companies Average (This Year)

No incidents recorded for ThotExperiment in 2026.

Incident Types ThotExperiment vs Technology, Information and Internet Industry Avg (This Year)

No incidents recorded for ThotExperiment in 2026.

Incident History — ThotExperiment (X = Date, Y = Severity)

ThotExperiment cyber incidents detection timeline including parent company and subsidiaries

ThotExperiment Company Subsidiaries

SubsidiaryImage

We enable sexual liberation at scale by creating platforms grounded in consent and safety. Our first platform, Headero, is the connection app for oral pleasure.

Loading...
similarCompanies

ThotExperiment Similar Companies

Binance

Binance is the world’s leading blockchain ecosystem and cryptocurrency infrastructure provider with a product suite that includes the world's largest digital asset exchange and much more. Trusted by over 200 millions of users worldwide, the Binance platform is dedicated to increasing the freedom of

Freelancer.com

Thirteen-time Webby award-winning Freelancer is the world’s largest freelancing and crowdsourcing marketplace by total number of users and projects posted. More than 80 million registered users have posted over 25 million projects and contests to date in over 3,000 areas as diverse as website develo

We're a global technology group focused on innovation and collaboration to create a better future for all. Since 1976, we've been pioneering new technologies and expanding our reach to more people and places. Today, we provide services to over 163 million customers across 16 countries in the Middle

Avnet

Avnet is a global electronic components distributor with extensive design, product, marketing and supply chain expertise for customers and suppliers at every stage of the product lifecycle. For the past 100 years, Avnet has helped its customers and suppliers around the world realize the transformati

We are a technology company that unlocks access to energy for the benefit of all. As innovators, that’s been our mission for nearly a century. Today, we face a global imperative to create a future with more energy, but less carbon. Our diverse, innovative change makers are focused on going further i

Mynet

Türk internet kullanıcılarının en çok tercih ettiği dijital platform olan Mynet, 1999 yılından bugüne liderliğini koruyor. Kendi alanında sayısız ilki gerçekleştiren öncü internet devi Mynet, Türkiye'nin dijital ekosisteminin kalkınmasına ve gelişmesine destek olmayı sürdürüyor.   Her ay ortalama 4

Synechron

At Synechron, we believe in the power of digital to transform businesses for the better. Our global consulting firm combines creativity and innovative technology to deliver industry-leading digital solutions. Synechron’s progressive technologies and optimization strategies span end-to-end Artificial

Times Internet

At Times Internet, we create premium digital products that simplify and enhance the lives of millions. As India’s largest digital products company, we have a significant presence across a wide range of categories, including News, Sports, Fintech, and Enterprise solutions. Our portfolio features mar

Zomato

Zomato’s mission statement is “better food for more people.” Since our inception in 2010, we have grown tremendously, both in scope and scale - and emerged as India’s most trusted brand during the pandemic, along with being one of the largest hyperlocal delivery networks in the country. Today, Zoma

newsone

ThotExperiment CyberSecurity News

January 25, 2026 09:34 AM
Carahsoft Expands Quantum-Resilient Cybersecurity Offerings With Cyber Intell

Cyber Intell Solution and Carahsoft Technology Corp. have partnered to bring quantum-resilient cybersecurity solutions to the Public Sector,...

January 24, 2026 09:51 PM
Kataria calls for team to boost cybersecurity

Punjab Governor and UT Administrator Gulab Chand Kataria on Saturday stressed the need to create a dedicated and trained team to strengthen...

January 24, 2026 07:00 PM
🔒 What is a VPN Portal- Learn why VPN portals are important for online security #VPNPortal #VPNSecurity #FreeVPNRisks #ssl #vpn #VPNSafety #VPNDisadvantages #VPNAndroid #CyberSecurity #OnlineSafety

January 24, 2026 02:38 PM
Germany news: Berlin vows aggressive cybersecurity stance

Berlin promises to take down bad cyber actors and a new report prompts questions of whether police should carry Tasers to keep them from...

January 24, 2026 11:30 AM
AgweekTV Full Show: Disappearing topsoil, bull genetics, virtual fencing, cybersecurity in ag

Disappearing topsoil is a big problem for land and bottom line. Expert advice for picking the best bull genetics. Keeping cattle right where...

January 24, 2026 10:00 AM
National Cyber Security Summit: Cybersecurity a strategic business risk

It's been a busy time for New Zealand's National Cyber Security Centre as it takes an unprecedentedly proactive posture to cyber threats.

January 24, 2026 09:48 AM
Data Deletion: Why Erasing Your Information Matters More Than Ever

Data deletion is a great way to reduce your digital footprint and lower the risk of cybercrime – here's a guide to deleting your data...

January 24, 2026 08:09 AM
CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw affecting Broadcom VMware vCenter...

January 24, 2026 07:53 AM
Why harmonisation, interoperability and resilience should be the focus of the revised EU Cybersecurity Act

As Brussels prepares to present the revised EU Cybersecurity Act, it has a rare opportunity to strengthen the foundations, creating a more...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

ThotExperiment CyberSecurity History Information

Official Website of ThotExperiment

The official website of ThotExperiment is http://www.thotexperiment.co.

ThotExperiment’s AI-Generated Cybersecurity Score

According to Rankiteo, ThotExperiment’s AI-generated cybersecurity score is 668, reflecting their Weak security posture.

How many security badges does ThotExperiment’ have ?

According to Rankiteo, ThotExperiment currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has ThotExperiment been affected by any supply chain cyber incidents ?

According to Rankiteo, ThotExperiment has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.

Does ThotExperiment have SOC 2 Type 1 certification ?

According to Rankiteo, ThotExperiment is not certified under SOC 2 Type 1.

Does ThotExperiment have SOC 2 Type 2 certification ?

According to Rankiteo, ThotExperiment does not hold a SOC 2 Type 2 certification.

Does ThotExperiment comply with GDPR ?

According to Rankiteo, ThotExperiment is not listed as GDPR compliant.

Does ThotExperiment have PCI DSS certification ?

According to Rankiteo, ThotExperiment does not currently maintain PCI DSS compliance.

Does ThotExperiment comply with HIPAA ?

According to Rankiteo, ThotExperiment is not compliant with HIPAA regulations.

Does ThotExperiment have ISO 27001 certification ?

According to Rankiteo,ThotExperiment is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of ThotExperiment

ThotExperiment operates primarily in the Technology, Information and Internet industry.

Number of Employees at ThotExperiment

ThotExperiment employs approximately 1 people worldwide.

Subsidiaries Owned by ThotExperiment

ThotExperiment presently has no subsidiaries across any sectors.

ThotExperiment’s LinkedIn Followers

ThotExperiment’s official LinkedIn profile has approximately 39 followers.

NAICS Classification of ThotExperiment

ThotExperiment is classified under the NAICS code 513, which corresponds to Others.

ThotExperiment’s Presence on Crunchbase

Yes, ThotExperiment has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/thotexperiment.

ThotExperiment’s Presence on LinkedIn

Yes, ThotExperiment maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/thotexperiment.

Cybersecurity Incidents Involving ThotExperiment

As of January 25, 2026, Rankiteo reports that ThotExperiment has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

ThotExperiment has an estimated 13,485 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at ThotExperiment ?

Incident Types: The types of cybersecurity incidents that have occurred include Breach.

How does ThotExperiment detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with database locked down, and communication strategy with advised users to be vigilant..

Incident Details

Can you provide details on each incident ?

Incident : Data Exposure

Title: Headero Data Exposure

Description: Cybernews found an unsecured MongoDB instance belonging to Headero, which contained millions of records and PII.

Type: Data Exposure

Attack Vector: Unsecured Database

Vulnerability Exploited: Unsecured MongoDB instance

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Unsecured MongoDB instance.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Exposure THO301061125

Data Compromised: Names, Email addresses, Social login ids, Jwt tokens, Profile pictures, Device tokens, Sexual preferences, Std status, Exact gps locations

Systems Affected: MongoDB database

Identity Theft Risk: High

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Email Addresses, Social Login Ids, Jwt Tokens, Profile Pictures, Device Tokens, Sexual Preferences, Std Status, Exact Gps Locations and .

Which entities were affected by each incident ?

Incident : Data Exposure THO301061125

Entity Name: ThotExperiment

Entity Type: Company

Industry: Dating and Hookup App

Location: US

Customers Affected: 350,000 user records

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Data Exposure THO301061125

Containment Measures: Database locked down

Communication Strategy: Advised users to be vigilant

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Exposure THO301061125

Type of Data Compromised: Names, Email addresses, Social login ids, Jwt tokens, Profile pictures, Device tokens, Sexual preferences, Std status, Exact gps locations

Number of Records Exposed: 350,000 user records, 3 million chat records, 1 million chat room records

Sensitivity of Data: High

Personally Identifiable Information: Yes

How does the company handle incidents involving personally identifiable information (PII) ?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by database locked down.

Lessons Learned and Recommendations

What lessons were learned from each incident ?

Incident : Data Exposure THO301061125

Lessons Learned: Human error leading to exposed databases remains one of the most common causes of data leaks and security breaches.

What recommendations were made to prevent future incidents ?

Incident : Data Exposure THO301061125

Recommendations: Be vigilant when receiving unsolicited messages, Do not download files or click on links in unsolicited messages, Change passwords if using the same password across multiple services, Clear sessions / revoke tokens in apps, where possibleBe vigilant when receiving unsolicited messages, Do not download files or click on links in unsolicited messages, Change passwords if using the same password across multiple services, Clear sessions / revoke tokens in apps, where possibleBe vigilant when receiving unsolicited messages, Do not download files or click on links in unsolicited messages, Change passwords if using the same password across multiple services, Clear sessions / revoke tokens in apps, where possibleBe vigilant when receiving unsolicited messages, Do not download files or click on links in unsolicited messages, Change passwords if using the same password across multiple services, Clear sessions / revoke tokens in apps, where possible

What are the key lessons learned from past incidents ?

Key Lessons Learned: The key lessons learned from past incidents are Human error leading to exposed databases remains one of the most common causes of data leaks and security breaches.

References

Where can I find more information about each incident ?

Incident : Data Exposure THO301061125

Source: Cybernews

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Cybernews.

Investigation Status

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Advised users to be vigilant.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Data Exposure THO301061125

Customer Advisories: Be extra vigilant when receiving unsolicited messages, both via email and social platforms.

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Be extra vigilant when receiving unsolicited messages and both via email and social platforms..

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Data Exposure THO301061125

Entry Point: Unsecured MongoDB instance

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Data Exposure THO301061125

Root Causes: Human error leading to exposed databases

Additional Questions

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Names, Email addresses, Social login IDs, JWT tokens, Profile pictures, Device tokens, Sexual preferences, STD status, Exact GPS locations and .

Response to the Incidents

What containment measures were taken in the most recent incident ?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Database locked down.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Profile pictures, JWT tokens, Names, Exact GPS locations, Sexual preferences, Device tokens, STD status, Email addresses and Social login IDs.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 4.3M.

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents ?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was Human error leading to exposed databases remains one of the most common causes of data leaks and security breaches.

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Clear sessions / revoke tokens in apps, where possible, Do not download files or click on links in unsolicited messages, Be vigilant when receiving unsolicited messages and Change passwords if using the same password across multiple services.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is Cybernews.

Stakeholder and Customer Advisories

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued were an Be extra vigilant when receiving unsolicited messages and both via email and social platforms.

Initial Access Broker

What was the most recent entry point used by an initial access broker ?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an Unsecured MongoDB instance.

cve

Latest Global CVEs (Not Company-Specific)

Description

The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the processBackgroundAction() function in all versions up to, and including, 10.0.04. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify global map engine settings.

Risk Information
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Description

The Save as PDF Plugin by PDFCrowd plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘options’ parameter in all versions up to, and including, 4.5.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. NOTE: Successful exploitation of this vulnerability requires that the PDFCrowd API key is blank (also known as "demo mode", which is the default configuration when the plugin is installed) or known.

Risk Information
cvss3
Base: 6.1
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Description

The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the action_import_module() function in all versions up to, and including, 7.8.9.2. This makes it possible for authenticated attackers, with a lower-privileged role (e.g., Subscriber-level access and above), to upload arbitrary files on the affected site's server which may make remote code execution possible. Successful exploitation requires an admin to grant Hustle module permissions (or module edit access) to the low-privileged user so they can access the Hustle admin page and obtain the required nonce.

Risk Information
cvss3
Base: 7.5
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Description

The WP Directory Kit plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.9 via the wdk_public_action AJAX handler. This makes it possible for unauthenticated attackers to extract email addresses for users with Directory Kit-specific user roles.

Risk Information
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Description

The Meta-box GalleryMeta plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 3.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with editor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

Risk Information
cvss3
Base: 4.4
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=thotexperiment' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge