Company Details
uscellular
7,583
55,102
517
http://www.uscellular.com
0
USC_1311879
In-progress

UScellular Company CyberSecurity Posture
http://www.uscellular.comConsidering where to invest your time, talent and ambition? Select the team that’s determined to be the best, offering the ability to make a positive difference for every customer, a unique culture and competitive rewards. Choose UScellular. With more than 5.1 million customers, we are one of the nation’s largest wireless carriers. Consistently honored as a top workplace, we empower our 5,400+ associates to make meaningful contributions to our success and that of the communities where we live and work with outreach, education initiatives and volunteerism. Here, you’ll find a broad array of resources for learning and development. You’ll enjoy almost endless opportunities for career advancement and a highly supportive team defined by the Dynamic Organization, a culture rooted in diversity, relationships, respect, empowerment and innovation. If you’re determined to be the best, join our talent network. Then select your ideal opportunity to soar with an industry leader.
Company Details
uscellular
7,583
55,102
517
http://www.uscellular.com
0
USC_1311879
In-progress
Between 650 and 699

UScellular Global Score (TPRM)XXXX

Description: US mobile carrier in UScellular was hacked in December 2021 and its data was compromised in the attack. The personal information of 405 clients was stolen and the attackers also ported some of the affected customers' numbers. The company immediately disconnected the computer accessed by unauthorized individuals from the internet to contain the attack.
Description: The Maine Office of the Attorney General reported a data breach involving UScellular on February 13, 2024. The breach occurred on January 28, 2024, due to an external system breach (hacking), affecting 100 individuals, including 8 residents. Information compromised includes customer account numbers, names, addresses, and PIN codes, but sensitive personal information such as Social Security numbers and credit card details is masked and was not accessed.
Description: The Maine Office of the Attorney General reported a data breach at US Cellular on September 18, 2020, involving hacking. The breach affected a total of 78 individuals, with 1 resident specifically impacted. The breach was discovered on September 23, 2020, and notifications were sent out on October 3, 2020.
Description: The Federal Communications Commission (FCC) disclosed a data breach affecting **UScellular** in early November 2022. Between **October 29 and October 31, 2022**, unauthorized actors gained access to the company’s systems, compromising **customer billing information**, including **names, addresses, PIN codes, and cellular telephone numbers**. While the exact number of impacted individuals remains undisclosed, the breach exposed sensitive personal data that could facilitate **identity theft, SIM-swapping attacks, or targeted phishing campaigns**. The incident highlights vulnerabilities in UScellular’s security protocols, raising concerns over the protection of customer data. Although no financial records (e.g., credit card details) or highly sensitive information (e.g., Social Security numbers) were reported as stolen, the exposure of **PIN codes**—often used for account authentication—poses a significant risk of **fraudulent account takeovers**. The breach underscores the growing threat of **cyber intrusions targeting telecom providers**, where even non-financial data can be weaponized for malicious purposes. UScellular has not publicly detailed the attack vector, but the FCC’s involvement suggests regulatory scrutiny over compliance with data protection standards.


No incidents recorded for UScellular in 2025.
No incidents recorded for UScellular in 2025.
No incidents recorded for UScellular in 2025.
UScellular cyber incidents detection timeline including parent company and subsidiaries

Considering where to invest your time, talent and ambition? Select the team that’s determined to be the best, offering the ability to make a positive difference for every customer, a unique culture and competitive rewards. Choose UScellular. With more than 5.1 million customers, we are one of the nation’s largest wireless carriers. Consistently honored as a top workplace, we empower our 5,400+ associates to make meaningful contributions to our success and that of the communities where we live and work with outreach, education initiatives and volunteerism. Here, you’ll find a broad array of resources for learning and development. You’ll enjoy almost endless opportunities for career advancement and a highly supportive team defined by the Dynamic Organization, a culture rooted in diversity, relationships, respect, empowerment and innovation. If you’re determined to be the best, join our talent network. Then select your ideal opportunity to soar with an industry leader.


Somos una empresa orgullosamente mexicana, líder en tecnología, telecomunicaciones y entretenimiento. Estamos siempre a la vanguardia con el objetivo de llevar a nuestros clientes lo mejor en conectividad, ya sea para que estén cerca de los que más quieren ó puedan alcanzar el éxito profesion

We are an award-winning international communications company operating across the Middle East, North Africa and Southeast Asia. Serving consumers and businesses in 10 countries, we deliver a leading data experience through a broad range of content and services via our advanced, data-centric mob

Reliance Communications Limited, founded by the late Shri Dhirubhai H Ambani (1932-2002), has Corporate clientele that includes 40,000 Indian and multinational corporations, including small and medium enterprises. Reliance Communications has established a pan-India, Next-Generation, digital network

TELMEX, la empresa líder de telecomunicaciones y servicios TI en México, ha realizado importantes inversiones para desarrollar la plataforma tecnológica más robusta y vanguardista del país, que le permite ofrecer la más amplia gama de soluciones, con los mayores estándares de calidad, seguridad, con

AXIATA GROUP BERHAD 242188-H (199201010685) In pursuit of its vision to be The Next Generation Digital Champion, Axiata is a diversified telecommunications and digital conglomerate operating Digital Telcos, Digital Businesses and Infrastructure businesses across a footprint spanning ASEAN and Sout
Welkom bij de LinkedIn pagina van KPN. Sinds jaar en dag maakt KPN technologie toegankelijk. Hier leest u alles over de ontwikkelingen rondom de thema’s die KPN belangrijk vindt, zoals Het Nieuwe Leven & Werken, Veiligheid & Privacy en ICT-infrastructuur. Ook een transparante en betrouwbare dienstve

EE, part of BT Group, is the largest and most advanced mobile communications company in the UK, delivering mobile and fixed communications services to consumers. We run the UK's biggest and fastest mobile network, having pioneered the UK's first superfast 4G mobile service in October 2012 and was

At TELUS, our purpose-driven team works together every day to innovate and do good. From providing technology solutions that make our lives safer and easier, to supporting those who need it most, our inclusive, spirited and giving people are passionate about empowering our customers, communities and
Orange is one of the world’s leading telecommunications operators with revenues of 40.3 billion euros in 2024 and 127,000 employees worldwide at 31 December 2024, including 71,000 employees in France. The Group has a total customer base of 291 million customers worldwide at 31 December 2024, inclu
.png)
AT&T got the Federal Communications Commission's approval for its $1 billion UScellular deal Wednesday, following in the wake of rivals...
Jessica Holt, with U.S. Cellular and T-Mobile, was in the studio to talk about being mindful of your digital habits and what security...
Telephone & Data Systems Inc. (TDS), a diversified telecommunications company, has released its 2023 Form 10-K report, detailing its...
Called the vote on new cybersecurity proposals 'partisan, uncoordinated, and counterproductive'
UScellular and Palo Alto Networks are teaming up once again to tackle the ever-growing security challenges of LTE, 5G and Gi-LAN networks.
UScellular noted it has deployed public 4G and 5G networks across states like Wisconsin, Iowa, Illinois and Nebraska.
PRNewswire/ -- UScellular joins MxD as a member to lead the organization's focus on introducing private networking technologies to U.S....
Not only do we use our phones for calls, texts, and emails, they act as another layer of cybersecurity.
Privacy-first mobile carrier Cape announced it raised $61 million in funding led by A* and Andreessen Horowitz. And XYZ Ventures, ex/ante,...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of UScellular is http://www.uscellular.com.
According to Rankiteo, UScellular’s AI-generated cybersecurity score is 656, reflecting their Weak security posture.
According to Rankiteo, UScellular currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, UScellular is not certified under SOC 2 Type 1.
According to Rankiteo, UScellular does not hold a SOC 2 Type 2 certification.
According to Rankiteo, UScellular is not listed as GDPR compliant.
According to Rankiteo, UScellular does not currently maintain PCI DSS compliance.
According to Rankiteo, UScellular is not compliant with HIPAA regulations.
According to Rankiteo,UScellular is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
UScellular operates primarily in the Telecommunications industry.
UScellular employs approximately 7,583 people worldwide.
UScellular presently has no subsidiaries across any sectors.
UScellular’s official LinkedIn profile has approximately 55,102 followers.
UScellular is classified under the NAICS code 517, which corresponds to Telecommunications.
Yes, UScellular has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/u-s-cellular.
Yes, UScellular maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/uscellular.
As of December 18, 2025, Rankiteo reports that UScellular has experienced 4 cybersecurity incidents.
UScellular has an estimated 9,750 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with disconnected the computer from the internet..
Title: UScellular Data Breach
Description: US mobile carrier UScellular was hacked in December 2021 and its data was compromised in the attack. The personal information of 405 clients was stolen and the attackers also ported some of the affected customers' numbers. The company immediately disconnected the computer accessed by unauthorized individuals from the internet to contain the attack.
Date Detected: December 2021
Type: Data Breach
Title: US Cellular Data Breach
Description: The Maine Office of the Attorney General reported that US Cellular experienced a data breach on September 18, 2020, involving hacking, which affected a total of 78 individuals, with 1 resident specifically impacted. The breach was discovered on September 23, 2020, and notifications were sent out on October 3, 2020.
Date Detected: 2020-09-23
Date Publicly Disclosed: 2020-10-03
Type: Data Breach
Attack Vector: Hacking
Title: Data Breach at USCC Services, LLC d/b/a UScellular
Description: The Maine Office of the Attorney General reported a data breach involving USCC Services, LLC d/b/a UScellular on February 13, 2024. The breach occurred on January 28, 2024, due to an external system breach (hacking), affecting 100 individuals, including 8 residents. Information compromised includes customer account numbers, names, addresses, and PIN codes, but sensitive personal information such as Social Security numbers and credit card details is masked and was not accessed.
Date Detected: 2024-01-28
Date Publicly Disclosed: 2024-02-13
Type: Data Breach
Attack Vector: External System Breach (Hacking)
Title: UScellular Data Breach (2022)
Description: The Federal Communications Commission reported a data breach involving UScellular on November 9, 2022. The breach occurred between October 29, 2022, and October 31, 2022, allowing unauthorized access to customer billing information, including names, addresses, PIN codes, and cellular telephone numbers. The number of affected individuals is currently unknown.
Date Detected: 2022-11-09
Date Publicly Disclosed: 2022-11-09
Type: Data Breach
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Personal Information

Data Compromised: Customer account numbers, Names, Addresses, Pin codes

Data Compromised: Names, Addresses, Pin codes, Cellular telephone numbers
Identity Theft Risk: Potential (PIN codes and personal data exposed)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information, Customer Account Numbers, Names, Addresses, Pin Codes, , Customer Billing Information, Personally Identifiable Information (Pii) and .

Entity Name: UScellular
Entity Type: Mobile Carrier
Industry: Telecommunications
Location: United States
Customers Affected: 405

Entity Name: US Cellular
Entity Type: Telecommunications Company
Industry: Telecommunications
Customers Affected: 78

Entity Name: USCC Services, LLC d/b/a UScellular
Entity Type: Company
Industry: Telecommunications
Customers Affected: 100

Entity Name: UScellular
Entity Type: Telecommunications Provider
Industry: Telecommunications
Location: United States
Customers Affected: Unknown

Containment Measures: Disconnected the computer from the internet

Type of Data Compromised: Personal Information
Number of Records Exposed: 405
Data Exfiltration: Yes
Personally Identifiable Information: Yes

Number of Records Exposed: 78

Type of Data Compromised: Customer account numbers, Names, Addresses, Pin codes
Number of Records Exposed: 100
Sensitivity of Data: Medium
Personally Identifiable Information: namesaddresses

Type of Data Compromised: Customer billing information, Personally identifiable information (pii)
Number of Records Exposed: Unknown
Sensitivity of Data: High (includes PIN codes and personal details)
Data Exfiltration: Likely (unauthorized access confirmed)
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by disconnected the computer from the internet.

Regulatory Notifications: Reported to the Federal Communications Commission (FCC)

Source: Maine Office of the Attorney General

Source: Maine Office of the Attorney General
Date Accessed: 2024-02-13

Source: Federal Communications Commission (FCC)
Date Accessed: 2022-11-09
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Maine Office of the Attorney General, and Source: Maine Office of the Attorney GeneralDate Accessed: 2024-02-13, and Source: Federal Communications Commission (FCC)Date Accessed: 2022-11-09.

Investigation Status: Ongoing (as of disclosure date)
Most Recent Incident Detected: The most recent incident detected was on December 2021.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2022-11-09.
Most Significant Data Compromised: The most significant data compromised in an incident were Personal Information, customer account numbers, names, addresses, PIN codes, , names, addresses, PIN codes, cellular telephone numbers and .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Disconnected the computer from the internet.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Personal Information, cellular telephone numbers, addresses, customer account numbers, names and PIN codes.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 583.0.
Most Recent Source: The most recent source of information about an incident are Maine Office of the Attorney General and Federal Communications Commission (FCC).
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (as of disclosure date).
.png)
Nagios XI versions prior to 2026R1.1 are vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A user‑accessible maintenance script may be executed as root via sudo and includes an application file that is writable by a lower‑privileged user. A local attacker with access to the application account can modify this file to introduce malicious code, which is then executed with elevated privileges when the script is run. Successful exploitation results in arbitrary code execution as the root user.
Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
SIPGO is a library for writing SIP services in the GO language. Starting in version 0.3.0 and prior to version 1.0.0-alpha-1, a nil pointer dereference vulnerability is in the SIPGO library's `NewResponseFromRequest` function that affects all normal SIP operations. The vulnerability allows remote attackers to crash any SIP application by sending a single malformed SIP request without a To header. The vulnerability occurs when SIP message parsing succeeds for a request missing the To header, but the response creation code assumes the To header exists without proper nil checks. This affects routine operations like call setup, authentication, and message handling - not just error cases. This vulnerability affects all SIP applications using the sipgo library, not just specific configurations or edge cases, as long as they make use of the `NewResponseFromRequest` function. Version 1.0.0-alpha-1 contains a patch for the issue.
GLPI is a free asset and IT management software package. Starting in version 9.1.0 and prior to version 10.0.21, an unauthorized user with an API access can read all knowledge base entries. Users should upgrade to 10.0.21 to receive a patch.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.