Company Details
university-of-north-texas
12,668
332,568
6113
unt.edu
0
UNI_7826029
In-progress

University of North Texas Company CyberSecurity Posture
unt.eduRanked a Tier One research institution by the Carnegie Classification, UNT is one of the nation’s largest public research universities with more than 46,000 students who push creative boundaries and graduate with credentials of value so they can become tomorrow’s leaders. UNT is recognized as a Minority-Serving and Hispanic-Serving Institution, reflecting the population of Texas. UNT students earned nearly 13,000 degrees last year in 240 degree programs, many nationally and internationally recognized. With a focus on academic excellence and graduating career-ready students, UNT has served as a catalyst for creativity since its founding in 1890, continually fueling progress, entrepreneurship and innovation for the North Texas region, the state — and beyond.
Company Details
university-of-north-texas
12,668
332,568
6113
unt.edu
0
UNI_7826029
In-progress
Between 750 and 799

UNT Global Score (TPRM)XXXX



No incidents recorded for University of North Texas in 2025.
No incidents recorded for University of North Texas in 2025.
No incidents recorded for University of North Texas in 2025.
UNT cyber incidents detection timeline including parent company and subsidiaries

Ranked a Tier One research institution by the Carnegie Classification, UNT is one of the nation’s largest public research universities with more than 46,000 students who push creative boundaries and graduate with credentials of value so they can become tomorrow’s leaders. UNT is recognized as a Minority-Serving and Hispanic-Serving Institution, reflecting the population of Texas. UNT students earned nearly 13,000 degrees last year in 240 degree programs, many nationally and internationally recognized. With a focus on academic excellence and graduating career-ready students, UNT has served as a catalyst for creativity since its founding in 1890, continually fueling progress, entrepreneurship and innovation for the North Texas region, the state — and beyond.


The University of Arizona is the leading public research university in the American Southwest and Arizona's only member of the prestigious Association of American Universities. As the state's land-grant university, our research and resources enrich communities around the state and worldwide. Named #

Cornell is a privately endowed research university and a partner of the State University of New York. As the federal land-grant institution in New York State, we have a responsibility—unique within the Ivy League—to make contributions in all fields of knowledge in a manner that prioritizes public en

Founded in 1898, Northeastern is a global research university with a distinctive, experience-driven approach to education and discovery. The university is a leader in experiential learning, powered by the world’s most far-reaching cooperative education program. We integrate classroom study with opp

Monash University is Australia’s largest and most international university. Its extensive educational offering, delivered via our 10 faculties, includes undergraduate, postgraduate and research courses. Monash is a research-intensive university, known for some significant and lasting discoveries tha

For more than 300 years, Yale University has inspired the minds that inspire the world. Based in New Haven, Connecticut, Yale brings people and ideas together for positive impact around the globe. A research university that focuses on students and encourages learning as an essential way of life, Yal

George Mason University is Virginia’s largest and most diverse public research university. Located near Washington, D.C., Mason enrolls more than 40,000 students from 130 countries and 50 states, and has a residential population of more than 6,000 students. Mason has grown rapidly over the past half

The University of Manchester is part of the prestigious Russell Group of universities and highly respected across the globe as a centre of teaching excellence and research innovation and discovery. With 25 Nobel Prize winners among our current and former staff and students, we have a history of wor

Rutgers, The State University of New Jersey, stands among America’s highest-ranked, most diverse public research universities. The oldest, largest, and top-ranked public university in the New York/New Jersey metropolitan area, you’ll find us at our main locations in three New Jersey cities, and our

LSU is the flagship institution of Louisiana and is one of only 30 universities nationwide holding land-grant, sea-grant and space-grant status. Since 1860, LSU has served its region, the nation, and the world through extensive, multipurpose programs encompassing instruction, research, and public
.png)
North Texas Inno features local news and analysis about North Texas' startup and tech ecosystems. We also provide tools to help growing businesses scale,...
This week's Cyber Awareness and Research Symposium is a student-oriented event to promote cybersecurity practices and recruit students to...
NSA designation affirms the University's national leadership in cyber innovation, education and workforce growth.
DKBinnovative has promoted COO Mike Walsh to CEO as the Frisco-based IT and cybersecurity firm continues growth in North Texas and beyond.
David Gardner, PhD, Interim Associate Director of the School of the Sciences; Head, Division of Computer Science; Associate Professor of...
Plano-based Fortress Solutions has expanded defense field services to support surveillance tower projects for the DoD and U.S. Customs and...
The University of North Texas has launched a new initiative aimed at tackling some of the country's most urgent challenges by bringing...
Darktrace is opening a cybersecurity deployment center in North Texas and appointing new U.S. execs to support growing federal and...
The Texas Senate will now consider legislation to establish a new state cyber defense program under The University of Texas system.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of University of North Texas is http://unt.edu.
According to Rankiteo, University of North Texas’s AI-generated cybersecurity score is 799, reflecting their Fair security posture.
According to Rankiteo, University of North Texas currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, University of North Texas is not certified under SOC 2 Type 1.
According to Rankiteo, University of North Texas does not hold a SOC 2 Type 2 certification.
According to Rankiteo, University of North Texas is not listed as GDPR compliant.
According to Rankiteo, University of North Texas does not currently maintain PCI DSS compliance.
According to Rankiteo, University of North Texas is not compliant with HIPAA regulations.
According to Rankiteo,University of North Texas is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
University of North Texas operates primarily in the Higher Education industry.
University of North Texas employs approximately 12,668 people worldwide.
University of North Texas presently has no subsidiaries across any sectors.
University of North Texas’s official LinkedIn profile has approximately 332,568 followers.
University of North Texas is classified under the NAICS code 6113, which corresponds to Colleges, Universities, and Professional Schools.
No, University of North Texas does not have a profile on Crunchbase.
Yes, University of North Texas maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/university-of-north-texas.
As of November 27, 2025, Rankiteo reports that University of North Texas has not experienced any cybersecurity incidents.
University of North Texas has an estimated 14,028 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, University of North Texas has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.