ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

University of Phoenix has helped pioneer online education since launching online courses in 1989. Today, as one of the largest online universities in the world, we’re still innovating by reinventing the model of higher education for a changing world. The first step in our ongoing evolution is the launch of Career Services for Life™. We don’t stop at graduation. Because these days, you need more than an education. Whether you’re actively pursuing a degree with us or graduated long ago, you can count on University of Phoenix to be by your side throughout your entire career. To learn more about Career Services for Life®, visit phoenix.edu Follow UOPX on Medium: https://universityofphoenix.medium.com

University of Phoenix A.I CyberSecurity Scoring

UP

Company Details

Linkedin ID:

university-of-phoenix

Employees number:

7,162

Number of followers:

1,104,540

NAICS:

6113

Industry Type:

Higher Education

Homepage:

uof.ph

IP Addresses:

0

Company ID:

UNI_1245533

Scan Status:

In-progress

AI scoreUP Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/university-of-phoenix.jpeg
UP Higher Education
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreUP Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/university-of-phoenix.jpeg
UP Higher Education
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

UP Company CyberSecurity News & History

Past Incidents
3
Attack Types
2
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Apollo Education Group: University of Phoenix Data Breach Exposes SSNs, More; Lawsuit PossibleBreach85412/2025
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: What's Going On? Attorneys need to hear from people affected by the University of Phoenix data breach as they investigate whether a class action lawsuit can be filed. What You Can Do If you believe your information may have been compromised in the University of Phoenix data breach, fill out the form on this page to learn more about the investigation and how you can help. Does This Cost Anything? It costs nothing to get in touch or to talk to someone about your rights.

Apollo Education Group: University of Phoenix discloses data breach after Oracle hackBreach100411/2025
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: The University of Phoenix (UoPX) has joined a growing list of U.S. universities breached in a Clop data theft campaign targeting vulnerable Oracle E-Business Suite instances in August 2025. Founded in 1976 and headquartered in Phoenix, Arizona, UoPX is a private for-profit university with nearly 3,000 academic staff and over 100,000 enrolled students. The university disclosed the data breach on its official website on Tuesday, while its parent company, Phoenix Education Partners, filed an 8-K form with the U.S. Securities and Exchange Commission (SEC). UoPX said it detected the incident on November 21 (after the extortion group added it to its data leak site) and noted that the attackers exploited a zero-day vulnerability in the Oracle E-Business Suite (EBS) financial application to steal a wide range of sensitive personal and financial information belonging to students, staff, and suppliers. "We believe that the unauthorized third-party obtained certain personal information, including names and contact information, dates of birth, social security numbers, and bank account and routing numbers with respect to numerous current and former students, employees, faculty and suppliers was accessed without authorization," the school said. "We continue to review the impacted data and will provide the required notifications to affected individuals and regulatory entities. Affected individuals will soon receive a letter via US Mail outlining the details of the incident and next ste

Princeton University, Oracle Corporation and Phoenix Education Partners: University of Phoenix data breach impacts nearly 3.5 million individualsCyber Attack85411/2025
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: **Clop Ransomware Gang Steals Data of 3.5 Million from University of Phoenix** The Clop ransomware gang has stolen the personal and financial data of nearly **3.5 million** individuals—including current and former students, staff, and suppliers—after breaching the **University of Phoenix (UoPX)** network in **August 2025**. The attack was part of a broader extortion campaign exploiting a **zero-day vulnerability (CVE-2025-61882)** in **Oracle E-Business Suite (EBS)**, a financial application used by the university. UoPX, a private for-profit institution based in **Phoenix, Arizona**, detected the breach on **November 21** after Clop listed the university on its data leak site. The stolen data includes **names, contact details, dates of birth, Social Security numbers, and bank account information**. In early December, the university publicly disclosed the incident and filed an **8-K report with the U.S. Securities and Exchange Commission (SEC)**. On **Monday**, UoPX confirmed in notification letters filed with **Maine’s Attorney General** that **3,489,274 individuals** were affected. The university is offering **free identity protection services**, including credit monitoring, dark web surveillance, and a **$1 million fraud reimbursement policy**. While UoPX has not officially attributed the attack, the tactics align with Clop’s recent campaign targeting **Oracle EBS vulnerabilities**. Other U.S. universities, including **Harvard and the University of Pennsylvania**, have also reported similar breaches linked to the same exploit. Clop has a history of high-profile data theft operations, previously targeting **GoAnywhere MFT, Accellion FTA, MOVEit Transfer, Cleo, and Gladinet CentreStack**. The U.S. Department of State has offered a **$10 million reward** for information connecting the gang’s activities to a foreign government. In a separate wave of attacks since **late October**, multiple universities—including **Harvard, Princeton, and the University of Pennsylvania**—have also fallen victim to **voice phishing (vishing) attacks**, compromising systems tied to development and alumni activities.

Apollo Education Group: University of Phoenix Data Breach Exposes SSNs, More; Lawsuit Possible
Breach
Severity: 85
Impact: 4
Seen: 12/2025
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: What's Going On? Attorneys need to hear from people affected by the University of Phoenix data breach as they investigate whether a class action lawsuit can be filed. What You Can Do If you believe your information may have been compromised in the University of Phoenix data breach, fill out the form on this page to learn more about the investigation and how you can help. Does This Cost Anything? It costs nothing to get in touch or to talk to someone about your rights.

Apollo Education Group: University of Phoenix discloses data breach after Oracle hack
Breach
Severity: 100
Impact: 4
Seen: 11/2025
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: The University of Phoenix (UoPX) has joined a growing list of U.S. universities breached in a Clop data theft campaign targeting vulnerable Oracle E-Business Suite instances in August 2025. Founded in 1976 and headquartered in Phoenix, Arizona, UoPX is a private for-profit university with nearly 3,000 academic staff and over 100,000 enrolled students. The university disclosed the data breach on its official website on Tuesday, while its parent company, Phoenix Education Partners, filed an 8-K form with the U.S. Securities and Exchange Commission (SEC). UoPX said it detected the incident on November 21 (after the extortion group added it to its data leak site) and noted that the attackers exploited a zero-day vulnerability in the Oracle E-Business Suite (EBS) financial application to steal a wide range of sensitive personal and financial information belonging to students, staff, and suppliers. "We believe that the unauthorized third-party obtained certain personal information, including names and contact information, dates of birth, social security numbers, and bank account and routing numbers with respect to numerous current and former students, employees, faculty and suppliers was accessed without authorization," the school said. "We continue to review the impacted data and will provide the required notifications to affected individuals and regulatory entities. Affected individuals will soon receive a letter via US Mail outlining the details of the incident and next ste

Princeton University, Oracle Corporation and Phoenix Education Partners: University of Phoenix data breach impacts nearly 3.5 million individuals
Cyber Attack
Severity: 85
Impact: 4
Seen: 11/2025
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: **Clop Ransomware Gang Steals Data of 3.5 Million from University of Phoenix** The Clop ransomware gang has stolen the personal and financial data of nearly **3.5 million** individuals—including current and former students, staff, and suppliers—after breaching the **University of Phoenix (UoPX)** network in **August 2025**. The attack was part of a broader extortion campaign exploiting a **zero-day vulnerability (CVE-2025-61882)** in **Oracle E-Business Suite (EBS)**, a financial application used by the university. UoPX, a private for-profit institution based in **Phoenix, Arizona**, detected the breach on **November 21** after Clop listed the university on its data leak site. The stolen data includes **names, contact details, dates of birth, Social Security numbers, and bank account information**. In early December, the university publicly disclosed the incident and filed an **8-K report with the U.S. Securities and Exchange Commission (SEC)**. On **Monday**, UoPX confirmed in notification letters filed with **Maine’s Attorney General** that **3,489,274 individuals** were affected. The university is offering **free identity protection services**, including credit monitoring, dark web surveillance, and a **$1 million fraud reimbursement policy**. While UoPX has not officially attributed the attack, the tactics align with Clop’s recent campaign targeting **Oracle EBS vulnerabilities**. Other U.S. universities, including **Harvard and the University of Pennsylvania**, have also reported similar breaches linked to the same exploit. Clop has a history of high-profile data theft operations, previously targeting **GoAnywhere MFT, Accellion FTA, MOVEit Transfer, Cleo, and Gladinet CentreStack**. The U.S. Department of State has offered a **$10 million reward** for information connecting the gang’s activities to a foreign government. In a separate wave of attacks since **late October**, multiple universities—including **Harvard, Princeton, and the University of Pennsylvania**—have also fallen victim to **voice phishing (vishing) attacks**, compromising systems tied to development and alumni activities.

Ailogo

UP Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for UP

Incidents vs Higher Education Industry Average (This Year)

University of Phoenix has 25.0% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

University of Phoenix has 28.21% more incidents than the average of all companies with at least one recorded incident.

Incident Types UP vs Higher Education Industry Avg (This Year)

University of Phoenix reported 1 incidents this year: 1 cyber attacks, 0 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.

Incident History — UP (X = Date, Y = Severity)

UP cyber incidents detection timeline including parent company and subsidiaries

UP Company Subsidiaries

SubsidiaryImage

University of Phoenix has helped pioneer online education since launching online courses in 1989. Today, as one of the largest online universities in the world, we’re still innovating by reinventing the model of higher education for a changing world. The first step in our ongoing evolution is the launch of Career Services for Life™. We don’t stop at graduation. Because these days, you need more than an education. Whether you’re actively pursuing a degree with us or graduated long ago, you can count on University of Phoenix to be by your side throughout your entire career. To learn more about Career Services for Life®, visit phoenix.edu Follow UOPX on Medium: https://universityofphoenix.medium.com

Loading...
similarCompanies

UP Similar Companies

University of South Florida

The University of South Florida, a high-impact research university dedicated to student success and committed to community engagement, generates an annual economic impact of more than $6 billion. With campuses in Tampa, St. Petersburg and Sarasota-Manatee, USF serves approximately 50,000 students wh

University of Rochester

The University of Rochester is a private research university located in Rochester, New York. Our campuses are home to more than 6,500 undergraduates and nearly 5,500 graduate students who come from across the United States and around the world to pursue their academic goals. We offer bachelor's, mas

University of Delaware

The University of Delaware - a state assisted, privately chartered institution - is a Land Grant, Sea Grant, Space Grant and Carnegie Research University (very high research activity). The University, with origins in 1743, was chartered by the State of Delaware in 1833. A Women's College was opened

The University of Georgia

The University of Georgia, a land-grant and sea-grant university with state-wide commitments and responsibilities, is the state's flagship institution of higher education. It is also the state's oldest, most comprehensive and most diversified institution of higher education. Its motto, "to teach, to

Laureate Education, Inc.

For more than 20 years, we have remained committed to making a positive impact in the communities we serve, by providing accessible, high-quality undergraduate, graduate, and specialized degree programs. We know that when our students succeed, countries prosper, and societies benefit. We take very

Brown University

Located in historic Providence, Rhode Island and founded in 1764, Brown University is the seventh-oldest college in the United States. Brown is an independent, coeducational Ivy League institution comprising undergraduate and graduate programs, plus the Alpert Medical School, School of Public Health

Monash University

Monash University is Australia’s largest and most international university. Its extensive educational offering, delivered via our 10 faculties, includes undergraduate, postgraduate and research courses. Monash is a research-intensive university, known for some significant and lasting discoveries tha

Northeastern University

Founded in 1898, Northeastern is a global research university with a distinctive, experience-driven approach to education and discovery. The university is a leader in experiential learning, powered by the world’s most far-reaching cooperative education program. We integrate classroom study with opp

Georgia Institute of Technology

The Georgia Institute of Technology is one of the nation's premier research universities providing a focused, technologically based education to more than 25,000 undergraduate and graduate students . Ranked seventh among U.S. News & World Report's top public universities, Georgia Tech offers degrees

newsone

UP CyberSecurity News

December 04, 2025 11:00 AM
Cybersecurity News: Record-breaking DDoS attack, React bug puts servers at risk, RansomHouse attack

Aisuru just broke the DDoS record again, firing off a massive 29.7-terabit-per-second attack that Cloudflare had to absorb.

December 03, 2025 08:00 AM
University of Phoenix says 'numerous individuals' impacted by Oracle EBS breach

The private, for-profit University of Phoenix is the latest school to disclose that it suffered a data breach due to a vulnerability in...

December 03, 2025 08:00 AM
University of Phoenix Data Breach Claims Investigated by Lynch Carpenter

PITTSBURGH, Dec. 03, 2025 (GLOBE NEWSWIRE) -- University of Phoenix (“Phoenix”), an online higher education provider,1 recently announced a...

December 03, 2025 08:00 AM
University of Pennsylvania and University of Phoenix disclose data breaches

The University of Pennsylvania and the University of Phoenix confirm they were hit in the Oracle E-Business Suite hacking campaign.

December 03, 2025 08:00 AM
University of Phoenix confirms data breach from Oracle EBS zero-day

The University of Phoenix has disclosed a cybersecurity incident involving unauthorized access to sensitive personal data through Oracle...

December 03, 2025 08:00 AM
Penn and Phoenix Universities Disclose Data Breach After Oracle Hack

The University of Pennsylvania and the University of Phoenix confirmed as victims of the Oracle's E-Business Suite (EBS) hack.

December 02, 2025 08:00 AM
Phoenix Education Partners reports cybersecurity incident at University of Phoenix

Phoenix Education Partners, Inc. (NYSE:PXED) disclosed Tuesday that its subsidiary, the University of Phoenix, experienced a cybersecurity...

December 02, 2025 08:00 AM
Phoenix Education Partners Faces Cybersecurity Incident

Phoenix Education Partners, Inc. ( ($PXED) ) has provided an announcement. The University of Phoenix, a subsidiary of Phoenix Education...

November 27, 2025 09:37 AM
AI-Driven Cybersecurity Challenges in Bangladesh’s Banking Industry

This report delves into the key challenges and opportunities that banks in Bangladesh face in adopting AI-powered cybersecurity measures.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

UP CyberSecurity History Information

Official Website of University of Phoenix

The official website of University of Phoenix is https://uof.ph/resourcelinks.

University of Phoenix’s AI-Generated Cybersecurity Score

According to Rankiteo, University of Phoenix’s AI-generated cybersecurity score is 770, reflecting their Fair security posture.

How many security badges does University of Phoenix’ have ?

According to Rankiteo, University of Phoenix currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does University of Phoenix have SOC 2 Type 1 certification ?

According to Rankiteo, University of Phoenix is not certified under SOC 2 Type 1.

Does University of Phoenix have SOC 2 Type 2 certification ?

According to Rankiteo, University of Phoenix does not hold a SOC 2 Type 2 certification.

Does University of Phoenix comply with GDPR ?

According to Rankiteo, University of Phoenix is not listed as GDPR compliant.

Does University of Phoenix have PCI DSS certification ?

According to Rankiteo, University of Phoenix does not currently maintain PCI DSS compliance.

Does University of Phoenix comply with HIPAA ?

According to Rankiteo, University of Phoenix is not compliant with HIPAA regulations.

Does University of Phoenix have ISO 27001 certification ?

According to Rankiteo,University of Phoenix is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of University of Phoenix

University of Phoenix operates primarily in the Higher Education industry.

Number of Employees at University of Phoenix

University of Phoenix employs approximately 7,162 people worldwide.

Subsidiaries Owned by University of Phoenix

University of Phoenix presently has no subsidiaries across any sectors.

University of Phoenix’s LinkedIn Followers

University of Phoenix’s official LinkedIn profile has approximately 1,104,540 followers.

NAICS Classification of University of Phoenix

University of Phoenix is classified under the NAICS code 6113, which corresponds to Colleges, Universities, and Professional Schools.

University of Phoenix’s Presence on Crunchbase

No, University of Phoenix does not have a profile on Crunchbase.

University of Phoenix’s Presence on LinkedIn

Yes, University of Phoenix maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/university-of-phoenix.

Cybersecurity Incidents Involving University of Phoenix

As of December 23, 2025, Rankiteo reports that University of Phoenix has experienced 3 cybersecurity incidents.

Number of Peer and Competitor Companies

University of Phoenix has an estimated 14,877 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at University of Phoenix ?

Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack and Breach.

How does University of Phoenix detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an communication strategy with disclosure on official website and sec filing (8-k form), and communication strategy with public disclosure on official website, sec filing, notification letters to affected individuals..

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: University of Phoenix Data Breach via Oracle E-Business Suite Zero-Day Exploit

Description: The University of Phoenix (UoPX) was breached in a Clop data theft campaign targeting vulnerable Oracle E-Business Suite instances in August 2025. The attackers exploited a zero-day vulnerability to steal sensitive personal and financial information belonging to students, staff, and suppliers.

Date Detected: 2025-11-21

Date Publicly Disclosed: 2025-11-26

Type: Data Breach

Attack Vector: Exploitation of zero-day vulnerability in Oracle E-Business Suite

Vulnerability Exploited: Zero-day vulnerability in Oracle E-Business Suite (EBS) financial application

Threat Actor: Clop ransomware group

Motivation: Data theft and extortion

Incident : Data Breach

Title: University of Phoenix Data Breach

Description: Attorneys are investigating whether a class action lawsuit can be filed regarding a data breach at the University of Phoenix that may have compromised personal information of affected individuals.

Type: Data Breach

Incident : Data Breach, Ransomware

Title: Clop Ransomware Gang Steals Data of 3.5 Million University of Phoenix Students and Staff

Description: The Clop ransomware gang has stolen the data of nearly 3.5 million University of Phoenix (UoPX) students, staff, and suppliers after breaching the university's network in August 2025. The attackers exploited a zero-day vulnerability in the Oracle E-Business Suite (EBS) financial application to steal sensitive personal and financial information.

Date Detected: 2025-11-21

Date Publicly Disclosed: 2025-12-01

Type: Data Breach, Ransomware

Attack Vector: Exploitation of zero-day vulnerability (CVE-2025-61882)

Vulnerability Exploited: CVE-2025-61882 (Oracle E-Business Suite)

Threat Actor: Clop ransomware gang

Motivation: Extortion, Data Theft

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Oracle E-Business Suite zero-day vulnerability and Oracle E-Business Suite (EBS) zero-day vulnerability (CVE-2025-61882).

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach APO1764771057

Data Compromised: Sensitive personal and financial information

Systems Affected: Oracle E-Business Suite (EBS) financial application

Identity Theft Risk: High

Payment Information Risk: High

Incident : Data Breach APO1764801272

Data Compromised: Personal information

Legal Liabilities: Potential class action lawsuit

Incident : Data Breach, Ransomware PRIORAUNI1766419165

Data Compromised: 3,489,274 records

Systems Affected: Oracle E-Business Suite (EBS) financial application

Brand Reputation Impact: Yes

Legal Liabilities: Potential regulatory fines and legal actions

Identity Theft Risk: Yes

Payment Information Risk: Yes

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Contact Information, Dates Of Birth, Social Security Numbers, Bank Account And Routing Numbers, , Personal information, Personal Information, Financial Information and .

Which entities were affected by each incident ?

Incident : Data Breach APO1764771057

Entity Name: University of Phoenix

Entity Type: Educational Institution

Industry: Higher Education

Location: Phoenix, Arizona, USA

Size: Nearly 3,000 academic staff and over 100,000 enrolled students

Customers Affected: Current and former students, employees, faculty, and suppliers

Incident : Data Breach APO1764801272

Entity Name: University of Phoenix

Entity Type: Educational Institution

Industry: Education

Incident : Data Breach, Ransomware PRIORAUNI1766419165

Entity Name: University of Phoenix

Entity Type: Educational Institution

Industry: Higher Education

Location: Phoenix, Arizona, USA

Size: Over 100,000 enrolled students and nearly 3,000 academic staff

Customers Affected: 3,489,274 (current and former students, employees, faculty, and suppliers)

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Data Breach APO1764771057

Communication Strategy: Disclosure on official website and SEC filing (8-K form)

Incident : Data Breach, Ransomware PRIORAUNI1766419165

Communication Strategy: Public disclosure on official website, SEC filing, notification letters to affected individuals

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach APO1764771057

Type of Data Compromised: Names, Contact information, Dates of birth, Social security numbers, Bank account and routing numbers

Sensitivity of Data: High

Data Exfiltration: Yes

Personally Identifiable Information: Yes

Incident : Data Breach APO1764801272

Type of Data Compromised: Personal information

Incident : Data Breach, Ransomware PRIORAUNI1766419165

Type of Data Compromised: Personal information, Financial information

Number of Records Exposed: 3,489,274

Sensitivity of Data: High (Social Security numbers, bank account and routing numbers, dates of birth, contact information)

Data Exfiltration: Yes

Personally Identifiable Information: Yes

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : Data Breach APO1764771057

Ransomware Strain: Clop

Data Exfiltration: Yes

Incident : Data Breach, Ransomware PRIORAUNI1766419165

Ransomware Strain: Clop

Data Exfiltration: Yes

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : Data Breach APO1764771057

Regulations Violated: Potential violations of data protection laws (e.g., FERPA, GDPR if applicable),

Regulatory Notifications: SEC filing (8-K form), required notifications to affected individuals and regulatory entities

Incident : Data Breach APO1764801272

Legal Actions: Potential class action lawsuit

Incident : Data Breach, Ransomware PRIORAUNI1766419165

Regulations Violated: Potential violations of data protection laws (e.g., FERPA, GDPR if applicable),

Regulatory Notifications: Filed with Maine's Attorney General, SEC filing

How does the company ensure compliance with regulatory requirements ?

Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Potential class action lawsuit.

References

Where can I find more information about each incident ?

Incident : Data Breach APO1764771057

Source: University of Phoenix Official Website

Date Accessed: 2025-11-26

Incident : Data Breach APO1764771057

Source: SEC Filing (8-K form)

Date Accessed: 2025-11-26

Incident : Data Breach APO1764801272

Source: Investigation Notice

Incident : Data Breach, Ransomware PRIORAUNI1766419165

Source: BleepingComputer

Incident : Data Breach, Ransomware PRIORAUNI1766419165

Source: University of Phoenix Official Website

Incident : Data Breach, Ransomware PRIORAUNI1766419165

Source: SEC Filing (8-K)

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: University of Phoenix Official WebsiteDate Accessed: 2025-11-26, and Source: SEC Filing (8-K form)Date Accessed: 2025-11-26, and Source: Investigation Notice, and Source: BleepingComputer, and Source: University of Phoenix Official Website, and Source: SEC Filing (8-K).

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Data Breach APO1764771057

Investigation Status: Ongoing

Incident : Data Breach APO1764801272

Investigation Status: Ongoing

Incident : Data Breach, Ransomware PRIORAUNI1766419165

Investigation Status: Ongoing

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Disclosure on official website and SEC filing (8-K form), Public disclosure on official website, SEC filing and notification letters to affected individuals.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Data Breach APO1764771057

Customer Advisories: Affected individuals will receive a letter via US Mail outlining the details of the incident and next steps

Incident : Data Breach APO1764801272

Customer Advisories: Affected individuals are advised to fill out a form to learn more about the investigation and their rights.

Incident : Data Breach, Ransomware PRIORAUNI1766419165

Stakeholder Advisories: Notification letters mailed to affected individuals, public disclosure on website

Customer Advisories: Free identity protection services offered (credit monitoring, identity theft recovery, dark web monitoring, $1 million fraud reimbursement policy)

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Affected individuals will receive a letter via US Mail outlining the details of the incident and next steps, Affected individuals are advised to fill out a form to learn more about the investigation and their rights., Notification letters mailed to affected individuals, public disclosure on website, Free identity protection services offered (credit monitoring, identity theft recovery, dark web monitoring and $1 million fraud reimbursement policy).

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Data Breach APO1764771057

Entry Point: Oracle E-Business Suite zero-day vulnerability

Incident : Data Breach, Ransomware PRIORAUNI1766419165

Entry Point: Oracle E-Business Suite (EBS) zero-day vulnerability (CVE-2025-61882)

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Data Breach APO1764771057

Root Causes: Exploitation of unpatched zero-day vulnerability in Oracle E-Business Suite

Incident : Data Breach, Ransomware PRIORAUNI1766419165

Root Causes: Exploitation of zero-day vulnerability in Oracle E-Business Suite (CVE-2025-61882)

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident were an Clop ransomware group and Clop ransomware gang.

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2025-11-21.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-12-01.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Sensitive personal and financial information, Personal information, 3,489 and274 records.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Sensitive personal and financial information, Personal information, 3,489 and274 records.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 3.5M.

Regulatory Compliance

What was the most significant legal action taken for a regulatory violation ?

Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Potential class action lawsuit.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are Investigation Notice, University of Phoenix Official Website, SEC Filing (8-K form), BleepingComputer and SEC Filing (8-K).

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.

Stakeholder and Customer Advisories

What was the most recent stakeholder advisory issued ?

Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Notification letters mailed to affected individuals, public disclosure on website, .

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued were an Affected individuals will receive a letter via US Mail outlining the details of the incident and next steps, Affected individuals are advised to fill out a form to learn more about the investigation and their rights., Free identity protection services offered (credit monitoring, identity theft recovery, dark web monitoring and $1 million fraud reimbursement policy).

Initial Access Broker

What was the most recent entry point used by an initial access broker ?

Most Recent Entry Point: The most recent entry point used by an initial access broker were an Oracle E-Business Suite zero-day vulnerability and Oracle E-Business Suite (EBS) zero-day vulnerability (CVE-2025-61882).

Post-Incident Analysis

What was the most significant root cause identified in post-incident analysis ?

Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Exploitation of unpatched zero-day vulnerability in Oracle E-Business Suite, Exploitation of zero-day vulnerability in Oracle E-Business Suite (CVE-2025-61882).

cve

Latest Global CVEs (Not Company-Specific)

Description

Marshmallow is a lightweight library for converting complex objects to and from simple Python datatypes. In versions from 3.0.0rc1 to before 3.26.2 and from 4.0.0 to before 4.1.2, Schema.load(data, many=True) is vulnerable to denial of service attacks. A moderately sized request can consume a disproportionate amount of CPU time. This issue has been patched in version 3.26.2 and 4.1.2.

Risk Information
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Description

KEDA is a Kubernetes-based Event Driven Autoscaling component. Prior to versions 2.17.3 and 2.18.3, an Arbitrary File Read vulnerability has been identified in KEDA, potentially affecting any KEDA resource that uses TriggerAuthentication to configure HashiCorp Vault authentication. The vulnerability stems from an incorrect or insufficient path validation when loading the Service Account Token specified in spec.hashiCorpVault.credential.serviceAccount. An attacker with permissions to create or modify a TriggerAuthentication resource can exfiltrate the content of any file from the node's filesystem (where the KEDA pod resides) by directing the file's content to a server under their control, as part of the Vault authentication request. The potential impact includes the exfiltration of sensitive system information, such as secrets, keys, or the content of files like /etc/passwd. This issue has been patched in versions 2.17.3 and 2.18.3.

Risk Information
cvss4
Base: 8.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Fedify is a TypeScript library for building federated server apps powered by ActivityPub. Prior to versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2, a Regular Expression Denial of Service (ReDoS) vulnerability exists in Fedify's document loader. The HTML parsing regex at packages/fedify/src/runtime/docloader.ts:259 contains nested quantifiers that cause catastrophic backtracking when processing maliciously crafted HTML responses. This issue has been patched in versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Authenticated Remote Code Execution (RCE) in PluXml CMS 5.8.22 allows an attacker with administrator panel access to inject a malicious PHP webshell into a theme file (e.g., home.php).

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
Description

An issue was discovered in Xiongmai XM530 IP cameras on firmware V5.00.R02.000807D8.10010.346624.S.ONVIF 21.06. The GetStreamUri exposes RTSP URIs containing hardcoded credentials enabling direct unauthorized video stream access.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=university-of-phoenix' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge