Company Details
ucdavishealth
8,995
69,178
62
ucdavis.edu
0
UC _1153733
In-progress

UC Davis Health Company CyberSecurity Posture
ucdavis.eduUC Davis Health is improving lives and transforming health care by providing excellent patient care, conducting groundbreaking research, fostering innovative, interprofessional education, and creating dynamic, productive partnerships with the community. The academic health system includes one of the country’s best medical schools, a 627-bed acute-care teaching hospital, a 1,000-member physician's practice group and the Betty Irene Moore School of Nursing. It is home to a National Cancer Institute-designated comprehensive cancer center, an international neurodevelopmental institute, a stem cell institute, and a comprehensive children’s hospital. Other nationally prominent centers focus on advancing telemedicine, improving vascular care, eliminating health disparities and translating research findings into new treatments for patients. Together, they make UC Davis a hub of innovation that is transforming health for all. For more information, visit health.ucdavis.edu. Our social media rules of engagement, https://ucdavis.health/3sDQr1h, apply to all of our social channels.
Company Details
ucdavishealth
8,995
69,178
62
ucdavis.edu
0
UC _1153733
In-progress
Between 700 and 749

UDH Global Score (TPRM)XXXX

Description: The California Office of the Attorney General reported that the University of California Davis Medical Center experienced a data breach on September 25, 2014, involving unauthorized access to an email account of a healthcare provider. The breach potentially affected an unknown number of patients, but specific details on the number of individuals or types of compromised information beyond communication about patients were not provided.
Description: The University of California Davis Medical Center experienced a data breach on December 13, 2013, due to an email phishing scam. The breach potentially affected patient information, specifically names, medical record numbers, and clinic visit dates; however, no financial information was compromised. The report was made on February 3, 2014.
Description: The California Office of the Attorney General reported a data breach involving UC Davis Health on July 6, 2017. The breach occurred on May 17, 2017, due to unauthorized access to an employee's email account following a phishing event, potentially exposing patients' names, addresses, and diagnoses.
Description: The California Office of the Attorney General reported that UC Davis Health experienced a data breach on May 24, 2023, where an unauthorized individual accessed an employee's work email account. The exposed information may have included patients' names and health information, but not credit card or PIN numbers. The number of individuals affected is unknown.


No incidents recorded for UC Davis Health in 2025.
No incidents recorded for UC Davis Health in 2025.
No incidents recorded for UC Davis Health in 2025.
UDH cyber incidents detection timeline including parent company and subsidiaries

UC Davis Health is improving lives and transforming health care by providing excellent patient care, conducting groundbreaking research, fostering innovative, interprofessional education, and creating dynamic, productive partnerships with the community. The academic health system includes one of the country’s best medical schools, a 627-bed acute-care teaching hospital, a 1,000-member physician's practice group and the Betty Irene Moore School of Nursing. It is home to a National Cancer Institute-designated comprehensive cancer center, an international neurodevelopmental institute, a stem cell institute, and a comprehensive children’s hospital. Other nationally prominent centers focus on advancing telemedicine, improving vascular care, eliminating health disparities and translating research findings into new treatments for patients. Together, they make UC Davis a hub of innovation that is transforming health for all. For more information, visit health.ucdavis.edu. Our social media rules of engagement, https://ucdavis.health/3sDQr1h, apply to all of our social channels.


LUX MED - leader and trustworthy expert We care for the health of the patients professionally and with engagement, we have been developing our business for over 20 years. Today we are the leader and expert on the private healthcare market. We take under our care both individual patients and corpo

Cencora, a company building on the legacy of AmerisourceBergen, is a leading global pharmaceutical solutions organization centered on improving the lives of people and animals around the world. We connect manufacturers, providers, and patients to ensure that anyone can get the therapies they need, w

As a nationally ranked academic medical center and one of Alabama’s largest employers, UAB Medicine is about teamwork, support, mentorship, and collaboration. Employees are empowered to lead, learn, and innovate as they deliver world-class care to every patient, every family, every time. When you ar

The University of Texas MD Anderson Cancer Center is one of the world's most respected centers devoted exclusively to cancer patient care, research, education and prevention. MD Anderson provides cancer care at several convenient locations throughout the Greater Houston Area and collaborates with co
Ardent Health is a leading provider of healthcare in communities across the country. With a focus on consumer-friendly processes and investments in innovative services and technologies, Ardent is passionate about making healthcare better and easier to access. Through its subsidiaries, Ardent owns an

Founded in 2003, Omega Healthcare Management Services® (Omega Healthcare) empowers healthcare to thrive via intelligent solutions that optimize revenue cycle operations, administrative workflows, care coordination, and clinical research on a global scale. The company works with providers, payers, li

Beginning with a single community in 1981, Sunrise Senior Living has grown to more than 270 communities throughout the U.S. and Canada. Each of our communities continues the mission laid out by founders Paul and Terry Klaassen more than 40 years ago: to champion quality of life for all seniors. Jo

Stanford Health Care, with multiple facilities throughout the Bay Area, is internationally renowned for leading edge and coordinated care in cancer care, neurosciences, cardiovascular medicine, surgery, organ transplant, medicine specialties, and primary care. Throughout its history, Stanford has be

At Sienna Senior Living, our Purpose is to cultivate happiness in daily life. Our work does not stop at providing the highest quality of service and care to our residents - it goes much further. Each and every day, we strive to bring happiness into our residents’ lives by enabling our team to put
.png)
University of California, Davis Chancellor Gary S. May has appointed Aisha Jackson as the university's first chief information and digital...
Cybersecurity training programs as implemented today by most large companies do little to reduce the risk that employees will fall for...
This post was updated July 20 at 7:40 p.m.. Following the implementation of a systemwide cybersecurity program, UC faculty said they are...
Explore how to get a tech job in Sacramento in 2024 with top companies, salaries, and resources in California's burgeoning tech scene.
On May 28, 2025, a new cybersecurity mandate will fully go into effect for all University of California (UC) campuses, with several key requirements for campus...
Local WIT chapters nominated individual women and teams of women for their impactful work in Information Technology — from education technology...
Post Wanted called upon industry experts to put together a list of the best online classes and certificate programs of 2025 to learn new...
Dear Colleagues, Cyberattacks are on the rise – and getting more advanced every day. These threats put both the university and your personal...
Las Vegas, NV — The 2025 HIMSS Global Health Conference & Exhibition commenced yesterday, drawing over 30,000 healthcare professionals to...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of UC Davis Health is http://health.ucdavis.edu.
According to Rankiteo, UC Davis Health’s AI-generated cybersecurity score is 728, reflecting their Moderate security posture.
According to Rankiteo, UC Davis Health currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, UC Davis Health is not certified under SOC 2 Type 1.
According to Rankiteo, UC Davis Health does not hold a SOC 2 Type 2 certification.
According to Rankiteo, UC Davis Health is not listed as GDPR compliant.
According to Rankiteo, UC Davis Health does not currently maintain PCI DSS compliance.
According to Rankiteo, UC Davis Health is not compliant with HIPAA regulations.
According to Rankiteo,UC Davis Health is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
UC Davis Health operates primarily in the Hospitals and Health Care industry.
UC Davis Health employs approximately 8,995 people worldwide.
UC Davis Health presently has no subsidiaries across any sectors.
UC Davis Health’s official LinkedIn profile has approximately 69,178 followers.
UC Davis Health is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.
No, UC Davis Health does not have a profile on Crunchbase.
Yes, UC Davis Health maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/ucdavishealth.
As of November 28, 2025, Rankiteo reports that UC Davis Health has experienced 4 cybersecurity incidents.
UC Davis Health has an estimated 30,038 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Title: UC Davis Health Data Breach
Description: The California Office of the Attorney General reported that UC Davis Health experienced a data breach on May 24, 2023, where an employee's work email account was accessed by an unauthorized individual. Although specific details on the number of individuals affected are UNKN, the exposed information may have included patients' names and health information, but not credit card or PIN numbers.
Date Detected: 2023-05-24
Type: Data Breach
Attack Vector: Email Account Compromise
Threat Actor: Unauthorized Individual
Title: Data Breach at University of California Davis Medical Center
Description: The University of California Davis Medical Center experienced a data breach involving unauthorized access to an email account of a healthcare provider.
Date Detected: 2014-09-25
Type: Data Breach
Attack Vector: Unauthorized Access
Vulnerability Exploited: Email Account
Title: UC Davis Health Data Breach
Description: The California Office of the Attorney General reported a data breach involving UC Davis Health on July 6, 2017. The breach occurred on May 17, 2017, due to unauthorized access to an employee's email account following a phishing event, potentially exposing patients' names, addresses, and diagnoses.
Date Detected: 2017-05-17
Date Publicly Disclosed: 2017-07-06
Type: Data Breach
Attack Vector: Phishing
Vulnerability Exploited: Email Account
Title: Data Breach at University of California Davis Medical Center
Description: The University of California Davis Medical Center experienced a data breach on December 13, 2013, due to an email phishing scam. The breach potentially affected patient information, specifically names, medical record numbers, and clinic visit dates; however, no financial information was compromised.
Date Detected: 2013-12-13
Date Publicly Disclosed: 2014-02-03
Type: Data Breach
Attack Vector: Phishing
Vulnerability Exploited: Email Phishing Scam
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Email Account and Email Account.

Data Compromised: Patients' names, Health information

Data Compromised: Communication about patients
Systems Affected: Email Account

Data Compromised: Patients' names, Addresses, Diagnoses

Data Compromised: Names, Medical record numbers, Clinic visit dates
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Patients' Names, Health Information, , Communication About Patients, , Patients' Names, Addresses, Diagnoses, , Names, Medical Record Numbers, Clinic Visit Dates and .

Entity Name: UC Davis Health
Entity Type: Healthcare
Industry: Healthcare
Location: California

Entity Name: University of California Davis Medical Center
Entity Type: Healthcare Provider
Industry: Healthcare
Location: California, USA
Customers Affected: Unknown number of patients

Entity Name: UC Davis Health
Entity Type: Healthcare
Industry: Healthcare
Location: California

Entity Name: University of California Davis Medical Center
Entity Type: Healthcare
Industry: Healthcare
Location: California, USA

Type of Data Compromised: Patients' names, Health information
Sensitivity of Data: High
Personally Identifiable Information: Yes

Type of Data Compromised: Communication about patients
Number of Records Exposed: Unknown

Type of Data Compromised: Patients' names, Addresses, Diagnoses
Sensitivity of Data: High

Type of Data Compromised: Names, Medical record numbers, Clinic visit dates
Personally Identifiable Information: NamesMedical Record NumbersClinic Visit Dates

Source: California Office of the Attorney General

Source: California Office of the Attorney General

Source: California Office of the Attorney General
Date Accessed: 2017-07-06

Source: California Office of the Attorney General
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney General, and Source: California Office of the Attorney General, and Source: California Office of the Attorney GeneralDate Accessed: 2017-07-06, and Source: California Office of the Attorney General.

Entry Point: Email Account

Entry Point: Email Account

Root Causes: Phishing
Last Attacking Group: The attacking group in the last incident was an Unauthorized Individual.
Most Recent Incident Detected: The most recent incident detected was on 2023-05-24.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2014-02-03.
Most Significant Data Compromised: The most significant data compromised in an incident were Patients' names, Health information, , Communication about patients, , Patients' names, Addresses, Diagnoses, , Names, Medical Record Numbers, Clinic Visit Dates and .
Most Significant System Affected: The most significant system affected in an incident was Email Account.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Addresses, Clinic Visit Dates, Diagnoses, Communication about patients, Health information, Medical Record Numbers, Names and Patients' names.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 0.
Most Recent Source: The most recent source of information about an incident is California Office of the Attorney General.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Email Account.
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.