Company Details
unacademy
8,937
1,181,962
611693
unacademy.com
0
UNA_2978531
In-progress

Unacademy Company CyberSecurity Posture
unacademy.comUnacademy aims to build the world's largest online knowledge repository for multi-lingual education. We use technology to empower great educators and create a community of self-learners. Our vision is to partner with the brightest minds and democratise education for everyone looking to learn. Join us in our journey to change the future of education. Visit us at unacademy.com **Follow us on:** twitter.com/unacademy facebook.com/unacademy youtube.com/user/unacademy instagram.com/unacademy blog.unacademy.com
Company Details
unacademy
8,937
1,181,962
611693
unacademy.com
0
UNA_2978531
In-progress
Between 750 and 799

Unacademy Global Score (TPRM)XXXX

Description: Online learning platform Unacademy has suffered a data breach after a hacker gained access to their database and started selling the account information for close to 22 million users. Unacademy is one of India's largest online learning platforms boasting 14K teachers, over a million video lessons, and over 20 million registered users (learners). On May 3rd, 2020, cyber intelligence company Cyble Inc. discovered that a threat actor had begun to sell an Unacademy user database containing 20 million accounts for $2,000. The database contains a total of 21,909,707 user records. These records include usernames, SHA-256 hashed passwords, date joined, last login date, email addresses, first and last names, and whether the account is active, a staff member, or a superuser.


No incidents recorded for Unacademy in 2025.
No incidents recorded for Unacademy in 2025.
No incidents recorded for Unacademy in 2025.
Unacademy cyber incidents detection timeline including parent company and subsidiaries

Unacademy aims to build the world's largest online knowledge repository for multi-lingual education. We use technology to empower great educators and create a community of self-learners. Our vision is to partner with the brightest minds and democratise education for everyone looking to learn. Join us in our journey to change the future of education. Visit us at unacademy.com **Follow us on:** twitter.com/unacademy facebook.com/unacademy youtube.com/user/unacademy instagram.com/unacademy blog.unacademy.com


Online Tutorials is a website sharing online courses and tutorials absolutely free of cost on a daily basis. The tutorials we share on our website are produced by the world's top and leading online courses providers like Udemy, Coursera, Skillshare, Edx, Bitdegree, Simpliv and from top Universities
.png)
After a notable decrease in valuation, Unacademy is recalibrating its strategy. Co-founder Gaurav Munjal is dedicated to enhancing product...
A complete list of all the known layoffs in tech, from Big Tech to startups, broken down by month throughout 2024 and 2025.
Horizon3.ai, a cybersecurity startup that provides tools like autonomous penetration testing, is seeking to raise $100 million in a new funding round.
Learn about the biggest data breaches in India, why the India is an attractive target for cyber attacks and how these could have been...
23andMe, the genetic testing giant once valued in the billions, is now navigating Chapter 11 bankruptcy and notifying millions of current...
Google's parent company Alphabet is again in advanced talks to acquire cloud cybersecurity startup Wiz, a person familiar with the deal told TechCrunch.
The leaked dataset allegedly includes full names, email addresses, phone numbers, and transactional payment histories.
Wiz, one of the most talked-about names in the world of cybersecurity, is making a significant acquisition to expand its product reach in...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Unacademy is http://unacademy.com.
According to Rankiteo, Unacademy’s AI-generated cybersecurity score is 790, reflecting their Fair security posture.
According to Rankiteo, Unacademy currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Unacademy is not certified under SOC 2 Type 1.
According to Rankiteo, Unacademy does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Unacademy is not listed as GDPR compliant.
According to Rankiteo, Unacademy does not currently maintain PCI DSS compliance.
According to Rankiteo, Unacademy is not compliant with HIPAA regulations.
According to Rankiteo,Unacademy is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Unacademy operates primarily in the E-Learning Providers industry.
Unacademy employs approximately 8,937 people worldwide.
Unacademy presently has no subsidiaries across any sectors.
Unacademy’s official LinkedIn profile has approximately 1,181,962 followers.
Unacademy is classified under the NAICS code 611693, which corresponds to Others.
Yes, Unacademy has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/unacademy.
Yes, Unacademy maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/unacademy.
As of December 25, 2025, Rankiteo reports that Unacademy has experienced 1 cybersecurity incidents.
Unacademy has an estimated 2,711 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Data Leak.
Title: Unacademy Data Breach
Description: Online learning platform Unacademy has suffered a data breach after a hacker gained access to their database and started selling the account information for close to 22 million users.
Date Detected: 2020-05-03
Type: Data Breach
Common Attack Types: The most common types of attacks the company has faced is Data Leak.

Data Compromised: Usernames, Sha-256 hashed passwords, Date joined, Last login date, Email addresses, First and last names, Account status, Staff member status, Superuser status
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Usernames, Sha-256 Hashed Passwords, Date Joined, Last Login Date, Email Addresses, First And Last Names, Account Status, Staff Member Status, Superuser Status and .

Entity Name: Unacademy
Entity Type: Online Learning Platform
Industry: Education
Location: India
Size: {'teachers': 14000, 'video_lessons': 1000000, 'registered_users': 20000000}
Customers Affected: 21909707

Type of Data Compromised: Usernames, Sha-256 hashed passwords, Date joined, Last login date, Email addresses, First and last names, Account status, Staff member status, Superuser status
Number of Records Exposed: 21909707
Data Encryption: SHA-256 hashed passwords
Personally Identifiable Information: email addressesfirst and last names
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Cyble Inc.Date Accessed: 2020-05-03.
Most Recent Incident Detected: The most recent incident detected was on 2020-05-03.
Most Significant Data Compromised: The most significant data compromised in an incident were usernames, SHA-256 hashed passwords, date joined, last login date, email addresses, first and last names, account status, staff member status, superuser status and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were usernames, staff member status, superuser status, last login date, email addresses, date joined, first and last names, SHA-256 hashed passwords and account status.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 323.0.
Most Recent Source: The most recent source of information about an incident is Cyble Inc..
.png)
A vulnerability was determined in itsourcecode Online Frozen Foods Ordering System 1.0. This affects an unknown part of the file /contact_us.php. This manipulation of the argument Name causes sql injection. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.
C-Kermit (aka ckermit) through 10.0 Beta.12 (aka 416-beta12) before 244644d allows a remote Kermit system to overwrite files on the local system, or retrieve arbitrary files from the local system.
Telenium Online Web Application is vulnerable due to a Perl script that is called to load the login page. Due to improper input validation, an attacker can inject arbitrary Perl code through a crafted HTTP request, leading to remote code execution on the server.
Fujitsu / Fsas Technologies ETERNUS SF ACM/SC/Express (DX / AF Management Software) before 16.8-16.9.1 PA 2025-12, when collected maintenance data is accessible by a principal/authority other than ETERNUS SF Admin, allows an attacker to potentially affect system confidentiality, integrity, and availability.
ONLYOFFICE Docs before 9.2.1 allows XSS in the textarea of the comment editing form. This is related to DocumentServer.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.