Company Details
ucdaviscvp
None employees
496
92312
ucdavis.edu
0
UC _1738031
In-progress

UC Davis Centers for Violence Prevention Company CyberSecurity Posture
ucdavis.eduAt the Centers for Violence Prevention (CVP), we provide a scientific approach to understanding and preventing violence. Our research centers have more than 30 years of experience, through which we’ve helped shape the way violence is studied and prevented. We continue to build the evidence base that community members and change makers can rely on for effective violence prevention strategies. CVP unites and shares the work of our component centers and programs: 1. Founded in 1991, the UC Davis Violence Prevention Research Program (VPRP) is internationally recognized for its interdisciplinary research and policy development focused on the causes, consequences, and prevention of violence. 2. The California Firearm Violence Research Center at UC Davis (CA FVRC) was established in 2017 as the first state-funded center for firearm violence research. CA FVRC conducts and disseminates basic, translational, and transformative research, and extends those efforts through education and training. 3. In 2019, the BulletPoints Project was developed by CA FVRC to teach medical and mental health care providers how to reduce the risk of firearm injury in their patients. CVP believes in the value of scientific research in addressing major health and social problems, including violence. To advance our research, we built a team with wide-ranging expertise related to violence and its prevention, including public health, medicine, epidemiology, statistics and biostatistics, sociology, criminology, law, economics, and policy analysis. Together, we continue to empower key stakeholders and translate findings into impactful policies and initiatives, creating safer, more equitable communities where all can flourish. Email: [email protected] @UCDavisCVP on BlueSky and X
Company Details
ucdaviscvp
None employees
496
92312
ucdavis.edu
0
UC _1738031
In-progress
Between 750 and 799

UDCVP Global Score (TPRM)XXXX

Description: The California Office of the Attorney General reported that the University of California Davis Medical Center experienced a data breach on September 25, 2014, involving unauthorized access to an email account of a healthcare provider. The breach potentially affected an unknown number of patients, but specific details on the number of individuals or types of compromised information beyond communication about patients were not provided.
Description: The University of California Davis Medical Center experienced a data breach on December 13, 2013, due to an email phishing scam. The breach potentially affected patient information, specifically names, medical record numbers, and clinic visit dates; however, no financial information was compromised. The report was made on February 3, 2014.
Description: The California Office of the Attorney General reported a data breach involving UC Davis Health on July 6, 2017. The breach occurred on May 17, 2017, due to unauthorized access to an employee's email account following a phishing event, potentially exposing patients' names, addresses, and diagnoses.
Description: The California Office of the Attorney General reported that UC Davis Health experienced a data breach on May 24, 2023, where an unauthorized individual accessed an employee's work email account. The exposed information may have included patients' names and health information, but not credit card or PIN numbers. The number of individuals affected is unknown.


No incidents recorded for UC Davis Centers for Violence Prevention in 2025.
No incidents recorded for UC Davis Centers for Violence Prevention in 2025.
No incidents recorded for UC Davis Centers for Violence Prevention in 2025.
UDCVP cyber incidents detection timeline including parent company and subsidiaries

At the Centers for Violence Prevention (CVP), we provide a scientific approach to understanding and preventing violence. Our research centers have more than 30 years of experience, through which we’ve helped shape the way violence is studied and prevented. We continue to build the evidence base that community members and change makers can rely on for effective violence prevention strategies. CVP unites and shares the work of our component centers and programs: 1. Founded in 1991, the UC Davis Violence Prevention Research Program (VPRP) is internationally recognized for its interdisciplinary research and policy development focused on the causes, consequences, and prevention of violence. 2. The California Firearm Violence Research Center at UC Davis (CA FVRC) was established in 2017 as the first state-funded center for firearm violence research. CA FVRC conducts and disseminates basic, translational, and transformative research, and extends those efforts through education and training. 3. In 2019, the BulletPoints Project was developed by CA FVRC to teach medical and mental health care providers how to reduce the risk of firearm injury in their patients. CVP believes in the value of scientific research in addressing major health and social problems, including violence. To advance our research, we built a team with wide-ranging expertise related to violence and its prevention, including public health, medicine, epidemiology, statistics and biostatistics, sociology, criminology, law, economics, and policy analysis. Together, we continue to empower key stakeholders and translate findings into impactful policies and initiatives, creating safer, more equitable communities where all can flourish. Email: [email protected] @UCDavisCVP on BlueSky and X


Stanford is a place of discovery, creativity and innovation located in the San Francisco Bay Area on the ancestral land of the Muwekma Ohlone Tribe. Dedicated to our founding mission—benefitting society through research and education—we are working toward a sustainable future, accelerating the impac

UCLA offers a combination that’s rare, especially among public research universities. The breadth, depth and inspired excellence among academic programs—from the visual and performing arts to the humanities, social sciences, STEM disciplines and health sciences—add up to endless opportunity. The loc

Founded in 1898, Northeastern is a global research university with a distinctive, experience-driven approach to education and discovery. The university is a leader in experiential learning, powered by the world’s most far-reaching cooperative education program. We integrate classroom study with opp

The University of Cincinnati, top 5 university for co-op, offers students a balance of educational excellence and real-world experience. Since its founding in 1819, UC has been the source of many discoveries creating positive change for society, including the first antihistamine, the first co-op edu

Auburn University is a comprehensive land, space and sea grant research institution blending arts and applied sciences. The university continuously changes to accommodate today's needs, while still respecting the traditions and spirit of Auburn. As we grow and change, Auburn will always continue its

We are Mizzou! Our distinct mission, as Missouri's only state-supported member of the Association of American Universities, is to provide all Missourians the benefits of a world-class research university. We are stewards and builders of a priceless state resource, a unique physical infrastructure an
.png)
The state appeals court has overturned a San Diego Superior Court ruling that would have barred the state from sharing registered gun and...
Experts in many fields — domestic violent extremism, civil conflict, democracy studies — are concerned about the likelihood that political...
One recent night a nurse at UC Davis Medical Center in Sacramento, California, awakened a patient to provide anti-seizure medication and got...
Our research group just completed a nationwide survey measuring support for — and willingness to engage in — violence to advance political...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of UC Davis Centers for Violence Prevention is https://cvp.ucdavis.edu.
According to Rankiteo, UC Davis Centers for Violence Prevention’s AI-generated cybersecurity score is 762, reflecting their Fair security posture.
According to Rankiteo, UC Davis Centers for Violence Prevention currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, UC Davis Centers for Violence Prevention is not certified under SOC 2 Type 1.
According to Rankiteo, UC Davis Centers for Violence Prevention does not hold a SOC 2 Type 2 certification.
According to Rankiteo, UC Davis Centers for Violence Prevention is not listed as GDPR compliant.
According to Rankiteo, UC Davis Centers for Violence Prevention does not currently maintain PCI DSS compliance.
According to Rankiteo, UC Davis Centers for Violence Prevention is not compliant with HIPAA regulations.
According to Rankiteo,UC Davis Centers for Violence Prevention is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
UC Davis Centers for Violence Prevention operates primarily in the Public Health industry.
UC Davis Centers for Violence Prevention employs approximately None employees people worldwide.
UC Davis Centers for Violence Prevention presently has no subsidiaries across any sectors.
UC Davis Centers for Violence Prevention’s official LinkedIn profile has approximately 496 followers.
UC Davis Centers for Violence Prevention is classified under the NAICS code 92312, which corresponds to Administration of Public Health Programs.
No, UC Davis Centers for Violence Prevention does not have a profile on Crunchbase.
Yes, UC Davis Centers for Violence Prevention maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/ucdaviscvp.
As of November 28, 2025, Rankiteo reports that UC Davis Centers for Violence Prevention has experienced 4 cybersecurity incidents.
UC Davis Centers for Violence Prevention has an estimated 280 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Title: UC Davis Health Data Breach
Description: The California Office of the Attorney General reported that UC Davis Health experienced a data breach on May 24, 2023, where an employee's work email account was accessed by an unauthorized individual. Although specific details on the number of individuals affected are UNKN, the exposed information may have included patients' names and health information, but not credit card or PIN numbers.
Date Detected: 2023-05-24
Type: Data Breach
Attack Vector: Email Account Compromise
Threat Actor: Unauthorized Individual
Title: Data Breach at University of California Davis Medical Center
Description: The University of California Davis Medical Center experienced a data breach involving unauthorized access to an email account of a healthcare provider.
Date Detected: 2014-09-25
Type: Data Breach
Attack Vector: Unauthorized Access
Vulnerability Exploited: Email Account
Title: UC Davis Health Data Breach
Description: The California Office of the Attorney General reported a data breach involving UC Davis Health on July 6, 2017. The breach occurred on May 17, 2017, due to unauthorized access to an employee's email account following a phishing event, potentially exposing patients' names, addresses, and diagnoses.
Date Detected: 2017-05-17
Date Publicly Disclosed: 2017-07-06
Type: Data Breach
Attack Vector: Phishing
Vulnerability Exploited: Email Account
Title: Data Breach at University of California Davis Medical Center
Description: The University of California Davis Medical Center experienced a data breach on December 13, 2013, due to an email phishing scam. The breach potentially affected patient information, specifically names, medical record numbers, and clinic visit dates; however, no financial information was compromised.
Date Detected: 2013-12-13
Date Publicly Disclosed: 2014-02-03
Type: Data Breach
Attack Vector: Phishing
Vulnerability Exploited: Email Phishing Scam
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Email Account and Email Account.

Data Compromised: Patients' names, Health information

Data Compromised: Communication about patients
Systems Affected: Email Account

Data Compromised: Patients' names, Addresses, Diagnoses

Data Compromised: Names, Medical record numbers, Clinic visit dates
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Patients' Names, Health Information, , Communication About Patients, , Patients' Names, Addresses, Diagnoses, , Names, Medical Record Numbers, Clinic Visit Dates and .

Entity Name: UC Davis Health
Entity Type: Healthcare
Industry: Healthcare
Location: California

Entity Name: University of California Davis Medical Center
Entity Type: Healthcare Provider
Industry: Healthcare
Location: California, USA
Customers Affected: Unknown number of patients

Entity Name: UC Davis Health
Entity Type: Healthcare
Industry: Healthcare
Location: California

Entity Name: University of California Davis Medical Center
Entity Type: Healthcare
Industry: Healthcare
Location: California, USA

Type of Data Compromised: Patients' names, Health information
Sensitivity of Data: High
Personally Identifiable Information: Yes

Type of Data Compromised: Communication about patients
Number of Records Exposed: Unknown

Type of Data Compromised: Patients' names, Addresses, Diagnoses
Sensitivity of Data: High

Type of Data Compromised: Names, Medical record numbers, Clinic visit dates
Personally Identifiable Information: NamesMedical Record NumbersClinic Visit Dates

Source: California Office of the Attorney General

Source: California Office of the Attorney General

Source: California Office of the Attorney General
Date Accessed: 2017-07-06

Source: California Office of the Attorney General
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney General, and Source: California Office of the Attorney General, and Source: California Office of the Attorney GeneralDate Accessed: 2017-07-06, and Source: California Office of the Attorney General.

Entry Point: Email Account

Entry Point: Email Account

Root Causes: Phishing
Last Attacking Group: The attacking group in the last incident was an Unauthorized Individual.
Most Recent Incident Detected: The most recent incident detected was on 2023-05-24.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2014-02-03.
Most Significant Data Compromised: The most significant data compromised in an incident were Patients' names, Health information, , Communication about patients, , Patients' names, Addresses, Diagnoses, , Names, Medical Record Numbers, Clinic Visit Dates and .
Most Significant System Affected: The most significant system affected in an incident was Email Account.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Communication about patients, Health information, Diagnoses, Medical Record Numbers, Clinic Visit Dates, Addresses, Names and Patients' names.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 0.
Most Recent Source: The most recent source of information about an incident is California Office of the Attorney General.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Email Account.
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.