Company Details
uk-home-office
16,852
439,416
92
www.gov.uk
0
UK _1627996
In-progress

UK Home Office Company CyberSecurity Posture
www.gov.ukAt the Home Office, we help to ensure that the country is safe and secure. We’ve been looking after UK citizens since 1782. We are responsible for: - working on the problems caused by illegal drug use - shaping the alcohol strategy, policy and licensing conditions - keeping the United Kingdom safe from the threat of terrorism - reducing and preventing crime, and ensuring people feel safe in their homes and communities - securing the UK border and controlling immigration - considering applications to enter and stay in the UK - issuing passports and visas - supporting visible, responsible and accountable policing by empowering the public and freeing up the police to fight crime - fire prevention and rescue These organisations are all part of the Home Office: - Border Force - HM Passport Office (HMPO) - Immigration Enforcement - UK Visas and Immigration (UKVI)
Company Details
uk-home-office
16,852
439,416
92
www.gov.uk
0
UK _1627996
In-progress
Between 750 and 799

UHO Global Score (TPRM)XXXX

Description: The UK government is facing severe criticism for its repeated failures in safeguarding sensitive data, with a history of major breaches exposing highly confidential information. Recent incidents include the **Afghan data leak**, where 19,000 Afghans (including British military allies) and over 100 UK officials had their personal details exposed, endangering lives. Another breach involved **200 abuse survivors in the Church of England**, whose private records were leaked through a compensation scheme. Additionally, the **Police Service of Northern Ireland (PSNI) breach** compromised nearly 10,000 officers' data, risking their safety and that of their families. The **Legal Aid Agency breach** further exposed names, addresses, National Insurance numbers, and criminal histories dating back to 2010.The proposed **mandatory digital ID system** would centralize biometric and identity data for the entire UK population, creating a high-value target for cyberattacks. Experts warn this could lead to **mass surveillance risks**, **foreign adversary exploitation**, and **large-scale identity theft**, with 63% of Britons already distrusting the government’s data security. The cumulative impact of these breaches—combined with the potential for a centralized digital ID—poses existential threats to **national security, civil liberties, and individual safety**, turning the UK into a high-risk surveillance state.


No incidents recorded for UK Home Office in 2025.
No incidents recorded for UK Home Office in 2025.
No incidents recorded for UK Home Office in 2025.
UHO cyber incidents detection timeline including parent company and subsidiaries

At the Home Office, we help to ensure that the country is safe and secure. We’ve been looking after UK citizens since 1782. We are responsible for: - working on the problems caused by illegal drug use - shaping the alcohol strategy, policy and licensing conditions - keeping the United Kingdom safe from the threat of terrorism - reducing and preventing crime, and ensuring people feel safe in their homes and communities - securing the UK border and controlling immigration - considering applications to enter and stay in the UK - issuing passports and visas - supporting visible, responsible and accountable policing by empowering the public and freeing up the police to fight crime - fire prevention and rescue These organisations are all part of the Home Office: - Border Force - HM Passport Office (HMPO) - Immigration Enforcement - UK Visas and Immigration (UKVI)


MINISTRY of ENVIRONMENT and URBANISM (MEU) MAIN SERVICE UNITS ================== 1) General Directorate of Construction Works 2) General Directorate of Spatial Planning 3) General Directorate of Environmental Management 4) General Directorate of EIA, Permits and Control 5) General Directo

The County of Santa Clara is located at the southern end of the San Francisco Bay and encompasses 1,312 square miles. It has one of the highest median family incomes in the country, and a wide diversity of cultures, backgrounds and talents. The County of Santa Clara continues to attract people fro

HM Revenue and Customs (HMRC) is the UK’s tax, payments and customs authority. We collect the money that pays for the UK’s public services and help families and individuals with targeted financial support. We help the honest majority to get their taxes and payments right, and make it hard for the d

The City of Los Angeles employs more than 45,000 people in a wide range of careers. Visit our website for information on current openings, including regular civil service positions, exempt and emergency appointment opportunities, in addition to internships! The City of Los Angeles is a Mayor-Counci

Build the Missouri of tomorrow. Ensure a strong foundation today. Join a group of innovative team members focused on driving the State of Missouri forward. As public servants, our team members have the opportunity to produce work that is both lasting and important. This work serves to protect famil

Work With Purpose. Shape Seattle. Inspire the World. Seattle is more than a world-class city — it’s a vibrant, evolving community rooted in shared values of sustainability, innovation, and inclusion. As a public employer, the City of Seattle is committed to building a city that works for everyone —

Maryland is on the path to becoming the best state in the nation. Referred to as “America in Miniature”, Maryland embodies the very spirit of the United States. Maryland is home to ethnic groups of every origin, just about every natural feature, and much like our country, opportunity! If you are

Welcome to the official WA Government page where you can stay up to date on the latest information about Western Australia and WA government initiatives. Questions relating to a specific activity within the WA Government should be referred to the relevant Department or Minister’s Office for a re

Its main functions are to: collect and administer all national taxes, duties and levies; collect revenue that may be imposed under any other legislation, as agreed on between SARS and an organ of state or institution entitled to the revenue; provide protection against the illegal importation
.png)
Our commitment to audit quality. At EY US, we are bringing our bold vision for the future of audit to life with quality at the center,...
UK government introduced the Cyber Security and Resilience (CSR) Bill to Parliament today, marking a significant overhaul of local...
Major recent cybersecurity incidents should spur the British government to act decisively on new cybersecurity laws, opposition MPs say.
Exclusive: Nine attempts have been made to sell classified UK military documents in the past year – with experts warning it could 'directly...
CyberSmart has joined the National Cyber Resilience Centre Group (NCRCG) as a National Ambassador. NCRCG is funded and supported by the Home...
Conference-room screens at Ford's Dearborn HQ were briefly hijacked on Thursday to display a protest image in an apparent swipe at the...
With cyber attacks regularly in the news, we are reminding businesses to check they have the appropriate security measures in place to...
Recruitment company Robert Half reported that 45% of UK employers intend to grow their permanent IT and technology teams before the end of...
Fake Home Office emails target the UK Visa Sponsorship System, stealing logins to issue fraudulent visas and run costly immigration scams.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of UK Home Office is https://www.gov.uk/government/organisations/home-office.
According to Rankiteo, UK Home Office’s AI-generated cybersecurity score is 792, reflecting their Fair security posture.
According to Rankiteo, UK Home Office currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, UK Home Office is not certified under SOC 2 Type 1.
According to Rankiteo, UK Home Office does not hold a SOC 2 Type 2 certification.
According to Rankiteo, UK Home Office is not listed as GDPR compliant.
According to Rankiteo, UK Home Office does not currently maintain PCI DSS compliance.
According to Rankiteo, UK Home Office is not compliant with HIPAA regulations.
According to Rankiteo,UK Home Office is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
UK Home Office operates primarily in the Government Administration industry.
UK Home Office employs approximately 16,852 people worldwide.
UK Home Office presently has no subsidiaries across any sectors.
UK Home Office’s official LinkedIn profile has approximately 439,416 followers.
UK Home Office is classified under the NAICS code 92, which corresponds to Public Administration.
No, UK Home Office does not have a profile on Crunchbase.
Yes, UK Home Office maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/uk-home-office.
As of November 27, 2025, Rankiteo reports that UK Home Office has experienced 1 cybersecurity incidents.
UK Home Office has an estimated 11,106 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with partial (varies by breach), incident response plan activated with legal gagging orders (afghan leak), and law enforcement notified with likely (for psni breach), law enforcement notified with unclear for other incidents, and containment measures with data removal requests (psni), containment measures with legal suppression (afghan leak), and remediation measures with review of 11 breaches by cabinet office, remediation measures with unclear if all recommendations implemented, and communication strategy with delayed/supppressed (afghan leak), communication strategy with public disclosures for psni/church of england breaches..
Title: Series of Major UK Public Sector Data Breaches and Concerns Over Proposed Mandatory Digital ID System
Description: A review by the UK Cabinet Office revealed eleven major data breaches in recent years, exposing systemic failures in safeguarding sensitive public sector data. High-profile incidents include the 'Afghan data leak' (19,000 Afghans and 100+ British officials exposed), the PSNI breach (10,000 police officers' details published online), a Church of England abuse survivors' data leak (200 victims), and the Legal Aid Agency breach (sensitive data dating back to 2010 accessed by unauthorized parties). These breaches highlight risks associated with the UK government's proposed mandatory digital ID system, which critics argue would create a centralized 'honeypot' for hackers, enabling mass surveillance and threatening civil liberties. Public trust in the government's data security is low (63% distrust), per YouGov polling commissioned by Big Brother Watch.
Type: Data Breach
Attack Vector: Human ErrorInsecure Data HandlingImproper Access ControlsAccidental Publication
Vulnerability Exploited: Lack of Data EncryptionPoor Access ManagementInadequate RedactionFailure to Implement Security Recommendations
Threat Actor: Insider Threat (Accidental)Unauthorized Third PartiesPotential State-Sponsored Actors (for future digital ID risks)
Motivation: NegligenceOperational FailuresPotential Espionage (for Afghan/PSNI breaches)Financial Gain (for dark web sales of leaked data)
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Human error (e.g. and accidental publication)Insecure data storage.

Data Compromised: Personal identifiable information (pii), Biometric data (potential future risk with digital id), National insurance numbers, Criminal history records, Addresses, Names, Sensitive role identifiers (e.g., mi6, special forces), Abuse survivor details, Legal aid client data
Systems Affected: Defence Ministry Systems (Afghan leak)Police Service of Northern Ireland (PSNI) DatabasesChurch of England Compensation SchemeLegal Aid Agency Systems
Operational Impact: Endangerment of Afghans who assisted British forcesRisk to lives of PSNI officers and familiesRe-traumatization of abuse survivorsLegal and reputational damage to UK governmentErosion of public trust in digital systems
Customer Complaints: ['High (public outcry, 95,000+ petition signatories)']
Brand Reputation Impact: Severe damage to UK government credibilityIncreased skepticism toward digital ID proposals
Legal Liabilities: Potential lawsuits from affected individualsViolations of GDPR/UK Data Protection ActLegal gagging orders (e.g., Afghan leak suppression)
Identity Theft Risk: ['High (for exposed PII)', 'Extreme (potential future risk with digital ID)']
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Pii (Names, Addresses), Sensitive Role Identifiers (Mi6, Special Forces), National Insurance Numbers, Criminal History, Abuse Survivor Details, Biometric Data (Potential Future Risk) and .

Entity Name: UK Ministry of Defence
Entity Type: Government Agency
Industry: Defence
Location: United Kingdom
Customers Affected: 19,000 Afghans + 100+ British officials

Entity Name: Police Service of Northern Ireland (PSNI)
Entity Type: Law Enforcement
Industry: Public Safety
Location: Northern Ireland, UK
Customers Affected: 10,000 officers and staff

Entity Name: Church of England
Entity Type: Religious Institution
Industry: Non-Profit/Religious
Location: United Kingdom
Customers Affected: 200 abuse survivors

Entity Name: Legal Aid Agency
Entity Type: Government Agency
Industry: Legal Services
Location: United Kingdom
Customers Affected: Unknown (records dating to 2010)

Entity Name: UK Cabinet Office
Entity Type: Government Department
Industry: Public Administration
Location: United Kingdom
Customers Affected: Population-wide (potential future risk with digital ID)

Incident Response Plan Activated: ['Partial (varies by breach)', 'Legal gagging orders (Afghan leak)']
Law Enforcement Notified: Likely (for PSNI breach), Unclear for other incidents,
Containment Measures: Data removal requests (PSNI)Legal suppression (Afghan leak)
Remediation Measures: Review of 11 breaches by Cabinet OfficeUnclear if all recommendations implemented
Communication Strategy: Delayed/Supppressed (Afghan leak)Public disclosures for PSNI/Church of England breaches
Incident Response Plan: The company's incident response plan is described as Partial (varies by breach), Legal gagging orders (Afghan leak), .

Type of Data Compromised: Pii (names, addresses), Sensitive role identifiers (mi6, special forces), National insurance numbers, Criminal history, Abuse survivor details, Biometric data (potential future risk)
Number of Records Exposed: 19,000 (Afghan leak), 10,000 (PSNI), 200 (Church of England), Unknown (Legal Aid Agency, records since 2010)
Sensitivity of Data: Extremely High (life-endangering in some cases)
Data Exfiltration: Confirmed (published online for PSNI)Likely (Afghan leak)Unclear for others
Data Encryption: ['Likely Unencrypted (based on breach severity)']
File Types Exposed: DatabasesSpreadsheetsCompensation Scheme Records
Personally Identifiable Information: NamesAddressesNational Insurance NumbersRoles/Associations (e.g., interpreters, police)
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Review of 11 breaches by Cabinet Office, Unclear if all recommendations implemented, .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by data removal requests (psni), legal suppression (afghan leak) and .

Regulations Violated: UK GDPR, Data Protection Act 2018, Potential Human Rights Act violations (for surveillance risks),
Legal Actions: Potential lawsuits from affected parties, Parliamentary scrutiny,
Regulatory Notifications: Cabinet Office reviewLikely ICO notifications (unconfirmed)
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Potential lawsuits from affected parties, Parliamentary scrutiny, .

Lessons Learned: Centralized databases create high-value targets for attackers., Public sector data handling practices are consistently inadequate., Legal suppression of breaches (e.g., gagging orders) undermines transparency., Mandatory digital ID systems could exacerbate risks to privacy and civil liberties., Public trust in government data security is critically low (63% distrust).

Recommendations: Reject mandatory digital ID proposals to prevent mass surveillance risks., Implement all Cabinet Office review recommendations for existing systems., Enhance transparency in breach disclosures (avoid gagging orders)., Adopt decentralized, privacy-preserving identity solutions if digital ID is pursued., Strengthen legal protections for whistleblowers reporting data mishandling., Conduct independent audits of public sector data security practices.Reject mandatory digital ID proposals to prevent mass surveillance risks., Implement all Cabinet Office review recommendations for existing systems., Enhance transparency in breach disclosures (avoid gagging orders)., Adopt decentralized, privacy-preserving identity solutions if digital ID is pursued., Strengthen legal protections for whistleblowers reporting data mishandling., Conduct independent audits of public sector data security practices.Reject mandatory digital ID proposals to prevent mass surveillance risks., Implement all Cabinet Office review recommendations for existing systems., Enhance transparency in breach disclosures (avoid gagging orders)., Adopt decentralized, privacy-preserving identity solutions if digital ID is pursued., Strengthen legal protections for whistleblowers reporting data mishandling., Conduct independent audits of public sector data security practices.Reject mandatory digital ID proposals to prevent mass surveillance risks., Implement all Cabinet Office review recommendations for existing systems., Enhance transparency in breach disclosures (avoid gagging orders)., Adopt decentralized, privacy-preserving identity solutions if digital ID is pursued., Strengthen legal protections for whistleblowers reporting data mishandling., Conduct independent audits of public sector data security practices.Reject mandatory digital ID proposals to prevent mass surveillance risks., Implement all Cabinet Office review recommendations for existing systems., Enhance transparency in breach disclosures (avoid gagging orders)., Adopt decentralized, privacy-preserving identity solutions if digital ID is pursued., Strengthen legal protections for whistleblowers reporting data mishandling., Conduct independent audits of public sector data security practices.Reject mandatory digital ID proposals to prevent mass surveillance risks., Implement all Cabinet Office review recommendations for existing systems., Enhance transparency in breach disclosures (avoid gagging orders)., Adopt decentralized, privacy-preserving identity solutions if digital ID is pursued., Strengthen legal protections for whistleblowers reporting data mishandling., Conduct independent audits of public sector data security practices.
Key Lessons Learned: The key lessons learned from past incidents are Centralized databases create high-value targets for attackers.,Public sector data handling practices are consistently inadequate.,Legal suppression of breaches (e.g., gagging orders) undermines transparency.,Mandatory digital ID systems could exacerbate risks to privacy and civil liberties.,Public trust in government data security is critically low (63% distrust).

Source: Big Brother Watch Report: 'Checkpoint Britain: the dangers of digital ID and why privacy must be protected'

Source: YouGov Polling (commissioned by Big Brother Watch)

Source: UK Cabinet Office Review of 11 Major Data Breaches

Source: Big Brother Watch Petition Against Digital ID
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Big Brother Watch Report: 'Checkpoint Britain: the dangers of digital ID and why privacy must be protected', and Source: YouGov Polling (commissioned by Big Brother Watch), and Source: UK Cabinet Office Review of 11 Major Data Breaches, and Source: Big Brother Watch Petition Against Digital ID.

Investigation Status: ['Ongoing (for some breaches)', 'Cabinet Office review completed but recommendations not fully implemented']
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Delayed/Supppressed (Afghan Leak) and Public Disclosures For Psni/Church Of England Breaches.

Stakeholder Advisories: Big Brother Watch Warns Of Orwellian Surveillance Risks With Digital Id., Public Opposition Via 95,000+ Petition Signatories., Mps Criticize Government For Failing To Act On Breach Review Recommendations..
Customer Advisories: Affected individuals in Afghan/PSNI breaches likely received risk notifications.Church of England abuse survivors offered support (unclear if adequate).General public advised to oppose mandatory digital ID proposals.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Big Brother Watch Warns Of Orwellian Surveillance Risks With Digital Id., Public Opposition Via 95,000+ Petition Signatories., Mps Criticize Government For Failing To Act On Breach Review Recommendations., Affected Individuals In Afghan/Psni Breaches Likely Received Risk Notifications., Church Of England Abuse Survivors Offered Support (Unclear If Adequate)., General Public Advised To Oppose Mandatory Digital Id Proposals. and .

Entry Point: Human Error (E.G., Accidental Publication), Insecure Data Storage,
High Value Targets: Afghan Interpreters, Psni Officers, Abuse Survivors, Potential Future: Entire Uk Adult Population (Digital Id),
Data Sold on Dark Web: Afghan Interpreters, Psni Officers, Abuse Survivors, Potential Future: Entire Uk Adult Population (Digital Id),

Root Causes: Chronic Underinvestment In Public Sector Cybersecurity., Culture Of Secrecy (E.G., Gagging Orders) Prioritized Over Transparency., Lack Of Accountability For Repeated Breaches., Failure To Implement Existing Security Recommendations., Over-Reliance On Centralized Data Storage Without Adequate Protections.,
Corrective Actions: Cabinet Office Review (Incomplete Implementation)., Public Campaigning Against Digital Id (E.G., Big Brother Watch)., Parliamentary Scrutiny Of Breach Responses., Proposed Decentralized Alternatives To Digital Id (By Privacy Advocates).,
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Cabinet Office Review (Incomplete Implementation)., Public Campaigning Against Digital Id (E.G., Big Brother Watch)., Parliamentary Scrutiny Of Breach Responses., Proposed Decentralized Alternatives To Digital Id (By Privacy Advocates)., .
Last Attacking Group: The attacking group in the last incident was an Insider Threat (Accidental)Unauthorized Third PartiesPotential State-Sponsored Actors (for future digital ID risks).
Most Significant Data Compromised: The most significant data compromised in an incident were Personal Identifiable Information (PII), Biometric Data (potential future risk with digital ID), National Insurance Numbers, Criminal History Records, Addresses, Names, Sensitive Role Identifiers (e.g., MI6, Special Forces), Abuse Survivor Details, Legal Aid Client Data and .
Most Significant System Affected: The most significant system affected in an incident was Defence Ministry Systems (Afghan leak)Police Service of Northern Ireland (PSNI) DatabasesChurch of England Compensation SchemeLegal Aid Agency Systems.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Data removal requests (PSNI)Legal suppression (Afghan leak).
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Names, Biometric Data (potential future risk with digital ID), National Insurance Numbers, Sensitive Role Identifiers (e.g., MI6, Special Forces), Legal Aid Client Data, Personal Identifiable Information (PII), Abuse Survivor Details, Addresses and Criminal History Records.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 29.4K.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Potential lawsuits from affected parties, Parliamentary scrutiny, .
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Public trust in government data security is critically low (63% distrust).
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Conduct independent audits of public sector data security practices., Strengthen legal protections for whistleblowers reporting data mishandling., Reject mandatory digital ID proposals to prevent mass surveillance risks., Adopt decentralized, privacy-preserving identity solutions if digital ID is pursued., Enhance transparency in breach disclosures (avoid gagging orders). and Implement all Cabinet Office review recommendations for existing systems..
Most Recent Source: The most recent source of information about an incident are YouGov Polling (commissioned by Big Brother Watch), Big Brother Watch Report: 'Checkpoint Britain: the dangers of digital ID and why privacy must be protected', UK Cabinet Office Review of 11 Major Data Breaches and Big Brother Watch Petition Against Digital ID.
Current Status of Most Recent Investigation: The current status of the most recent investigation is ['Ongoing (for some breaches)', 'Cabinet Office review completed but recommendations not fully implemented'].
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Big Brother Watch warns of Orwellian surveillance risks with digital ID., Public opposition via 95,000+ petition signatories., MPs criticize government for failing to act on breach review recommendations., .
Most Recent Customer Advisory: The most recent customer advisory issued was an Affected individuals in Afghan/PSNI breaches likely received risk notifications.Church of England abuse survivors offered support (unclear if adequate).General public advised to oppose mandatory digital ID proposals.
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.