Company Details
us-sentencing-commission
67
1,379
922
ussc.gov
0
UNI_3181956
In-progress

United States Sentencing Commission Company CyberSecurity Posture
ussc.govThe U.S. Sentencing Commission, a bipartisan, independent agency located in the judicial branch of government, was created by Congress in 1984 to reduce sentencing disparities and promote transparency and proportionality in sentencing. The Commission collects, analyzes, and distributes a broad array of information on federal sentencing practices, continuously establishing and amending sentencing guidelines for the judicial branch and assisting the other branches in developing effective and efficient crime policy. Related social comment policies: https://www.ussc.gov/about/privacy-security-and-comment-policy
Company Details
us-sentencing-commission
67
1,379
922
ussc.gov
0
UNI_3181956
In-progress
Between 750 and 799

USSC Global Score (TPRM)XXXX



No incidents recorded for United States Sentencing Commission in 2025.
No incidents recorded for United States Sentencing Commission in 2025.
No incidents recorded for United States Sentencing Commission in 2025.
USSC cyber incidents detection timeline including parent company and subsidiaries

The U.S. Sentencing Commission, a bipartisan, independent agency located in the judicial branch of government, was created by Congress in 1984 to reduce sentencing disparities and promote transparency and proportionality in sentencing. The Commission collects, analyzes, and distributes a broad array of information on federal sentencing practices, continuously establishing and amending sentencing guidelines for the judicial branch and assisting the other branches in developing effective and efficient crime policy. Related social comment policies: https://www.ussc.gov/about/privacy-security-and-comment-policy


Rossendales joined Marston Holdings in March 2013. We provide enforcement and warrant execution services to local government and the public sector. Operating since 1972, Rossendales was founded on local government expertise and is driven by ex-local authority revenues practitioners. We deliver e

The National Judicial System is the judicial arm of the Government of the Independent State of Papua New Guinea and is established by the Constitution, various Organic Laws and enabling Acts of Parliament. The other two "arms of Government" under the Constitution are the Legislature and the Executiv

The Victorian Civil and Administrative Tribunal (VCAT) provides fair, efficient and affordable justice for the Victorian community. We do this by making decisions about a wide range of cases or by helping people to resolve disputes. We're part of Victoria's court system, but less formal than a cour

The Supreme Court of California is the court of last resort in the courts of the State of California. It is headquartered in San Francisco and regularly holds sessions in Los Angeles and Sacramento. Its decisions are binding on all other California state courts. Under the original 1849 California

The court of common pleas, the only trial court created by the Ohio Constitution, is established by Article IV, Section 1, of the Constitution, and its duties are outlined in Article IV, Section 4. There is a court of common pleas in each of Ohio's 88 counties. Specific courts of common pleas may

The Caribbean Court of Justice (CCJ) is a unique court, established in 2005 and currently led by the Hon. Mr Justice Adrian Saunders. The CCJ functions as two courts in one. In its appellate jurisdiction, it serves as a final court of appeal, and in its original jurisdiction, it protects the rights
.png)
Justices in the U.S. Supreme Court's conservative faction questioned Wednesday whether the U.S. Sentencing Commission overstepped when it...
The US Supreme Court appeared wary of expanding the limits of what judges can consider when deciding compassionate release petitions from...
The US Sentencing Commission and now Congress are encouraging a smarter approach to post prison supervised release. Will it get implemented?
Peter Williams, an Australian cybersecurity executive living in the US, has pleaded guilty to selling trade secrets to a Russian broker.
The leader of the federal judiciary's administrative arm said the guidance was distributed in July, and courts are simultaneously...
Injustice for All � is a weekly series about how the Trump administration is trying to weaponize the justice system—and the people who are...
Dr. Kevin T. Wolff, associate professor in the Department of Criminal Justice, was appointed to the US Sentencing Commission's new Ad Hoc...
The settlement would end a lawsuit filed by the U.S. Securities and Exchange Commission about the 2020 SUNBURST hack.
The statement from the U.S. court system follows reports that the judiciary suffered a recent cyber breach.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of United States Sentencing Commission is https://www.ussc.gov.
According to Rankiteo, United States Sentencing Commission’s AI-generated cybersecurity score is 759, reflecting their Fair security posture.
According to Rankiteo, United States Sentencing Commission currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, United States Sentencing Commission is not certified under SOC 2 Type 1.
According to Rankiteo, United States Sentencing Commission does not hold a SOC 2 Type 2 certification.
According to Rankiteo, United States Sentencing Commission is not listed as GDPR compliant.
According to Rankiteo, United States Sentencing Commission does not currently maintain PCI DSS compliance.
According to Rankiteo, United States Sentencing Commission is not compliant with HIPAA regulations.
According to Rankiteo,United States Sentencing Commission is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
United States Sentencing Commission operates primarily in the Administration of Justice industry.
United States Sentencing Commission employs approximately 67 people worldwide.
United States Sentencing Commission presently has no subsidiaries across any sectors.
United States Sentencing Commission’s official LinkedIn profile has approximately 1,379 followers.
No, United States Sentencing Commission does not have a profile on Crunchbase.
Yes, United States Sentencing Commission maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/us-sentencing-commission.
As of December 08, 2025, Rankiteo reports that United States Sentencing Commission has not experienced any cybersecurity incidents.
United States Sentencing Commission has an estimated 330 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, United States Sentencing Commission has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
A vulnerability has been found in TykoDev cherry-studio-TykoFork 0.1. This issue affects the function redirectToAuthorization of the file /.well-known/oauth-authorization-server of the component OAuth Server Discovery. Such manipulation of the argument authorizationUrl leads to os command injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.
A flaw has been found in code-projects Question Paper Generator up to 1.0. This vulnerability affects unknown code of the file /selectquestionuser.php. This manipulation of the argument subid causes sql injection. Remote exploitation of the attack is possible. The exploit has been published and may be used.
A vulnerability was found in alokjaiswal Hotel-Management-services-using-MYSQL-and-php up to 5f8b60a7aa6c06a5632de569d4e3f6a8cd82f76f. Affected by this vulnerability is an unknown functionality of the file /dishsub.php. The manipulation of the argument item.name results in cross site scripting. It is possible to launch the attack remotely. The exploit has been made public and could be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability has been found in alokjaiswal Hotel-Management-services-using-MYSQL-and-php up to 5f8b60a7aa6c06a5632de569d4e3f6a8cd82f76f. Affected is an unknown function of the file /usersub.php of the component Request Pending Page. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
A flaw has been found in Verysync 微力同步 up to 2.21.3. This impacts an unknown function of the file /rest/f/api/resources/f96956469e7be39d/tmp/text.txt?override=false of the component Web Administration Module. Executing manipulation can lead to unrestricted upload. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.