Company Details
usnatarchives
2,300
90,597
92
archives.gov
0
U.S_2797877
In-progress

U.S. National Archives and Records Administration Company CyberSecurity Posture
archives.govThe National Archives and Records Administration (NARA) is the nation's record keeper. Of all documents and materials created in the course of business conducted by the United States Federal government, only 1%-3% are so important for legal or historical reasons that they are kept by us forever. Those valuable records are preserved and are available to you, whether you want to see if they contain clues about your family’s history, need to prove a veteran’s military service, or are researching an historical topic that interests you.
Company Details
usnatarchives
2,300
90,597
92
archives.gov
0
U.S_2797877
In-progress
Between 700 and 749

UNARA Global Score (TPRM)XXXX

Description: The **National Personnel Records Center (NPRC)**, a division of the **National Archives and Records Administration (NARA)**, inadvertently disclosed the **unredacted military personnel file** of **Rep. Mikie Sherrill (D-NJ)**, including her **Social Security number (SSN), date of birth, and other sensitive personal data**, to an unauthorized **FOIA requester**—**Nicolas de Gregorio**, a former Republican candidate. The breach occurred in **June 2024** when a technician failed to follow **standard operating procedures**, releasing the **full record** instead of only publicly available information. The NPRC acknowledged the error, offered **credit monitoring** to Sherrill, and requested the recipient not disseminate the data. The incident sparked outrage among **top Democrats**, including **Hakeem Jeffries** and **Adam Smith**, who called for a **criminal investigation** into the **unlawful disclosure**. This breach follows similar past incidents, such as the **2021–2022 illegal release of military records** belonging to **Rep. Don Bacon (R-NE)** and **Zach Nunn (R-IA)** to the **Democratic Congressional Campaign Committee**. The case highlights systemic vulnerabilities in **FOIA processing** and **veterans' data protection**, prompting calls for **policy reviews, staff retraining, and stricter safeguards** to prevent future privacy violations.


No incidents recorded for U.S. National Archives and Records Administration in 2025.
No incidents recorded for U.S. National Archives and Records Administration in 2025.
No incidents recorded for U.S. National Archives and Records Administration in 2025.
UNARA cyber incidents detection timeline including parent company and subsidiaries

The National Archives and Records Administration (NARA) is the nation's record keeper. Of all documents and materials created in the course of business conducted by the United States Federal government, only 1%-3% are so important for legal or historical reasons that they are kept by us forever. Those valuable records are preserved and are available to you, whether you want to see if they contain clues about your family’s history, need to prove a veteran’s military service, or are researching an historical topic that interests you.


The Government of Canada works on behalf of Canadians, both at home and abroad. Visit www.Canada.ca to learn more. Canada’s professional, non-partisan public service is among the best in the world, and many of its departments and agencies place in Canada’s Top 100 Employers year after year. If you

Bij UWV werken we aan een samenleving waarin iedereen mee kan doen. We helpen mensen op weg bij het vinden of behouden van werk. In geval van ziekte kijken we wat iemand nog wél kan. En als werken niet mogelijk is, zorgt UWV snel voor inkomen. We geven op deskundige en efficiënte wijze uitvoering a

Ontario Government | Gouvernement de l’Ontario The Ontario Government works to serve the public interest and uphold the public trust by providing Ministers with objective advice and expert guidance. The Ontario Public Service carries out the decisions and policies of the elected government with int
Official LinkedIn page for the state of Oregon. Oregon is a state in the Pacific Northwest region of the United States. It is located on the Pacific coast, with Washington to the north, California to the south, Nevada on the southeast and Idaho to the east. The Columbia and Snake rivers delineate mu

Rijkswaterstaat is de uitvoeringsorganisatie van het Ministerie van Infrastructuur en Waterstaat. We beheren en ontwikkelen de rijkswegen, -vaarwegen en –wateren en zetten in op een duurzame leefomgeving. Samen met andere organisaties werken we aan een land dat beschermd is tegen overstromingen. Wa

Tallinn is the capital of Estonia. The mission of the city organization is to make Tallinn the best place to live for the people staying here, the desired destination for people arriving here, and a good place of departure for people who start here. For this purpose, the management of Tallinn as a

Californians deserve a government that works for them and with them. One that will work to ensure opportunity and justice. We are building a California not for the few, but for all — including those who have historically been left out. We are doing the work to make our state a place for every Cali

With a workforce of 30,000 people, and opportunities in 1,000 different job categories, the City of Philadelphia is one of the largest employers in Southeastern Pennsylvania. As an employer, we operate through the guiding principles of service, integrity, respect, accountability, collaboration, dive

The Department of Education is responsible for delivering the Victorian Government’s commitment to making Victoria the Education State, where all Victorians have the best learning and development experience, regardless of their background, postcode or circumstances. Education remains a cornerstone f
.png)
Those officials are now asked to screenshot their messages and upload them to a shared drive, according to sworn court testimony released...
The Department of Homeland Security has stopped using software that automatically captured text messages and saved trails of communication...
This article is part of Spiceworks' Recalibrating Risk Tolerance series investigating the contemporary landscape of cybersecurity risk.
Stay informed on the latest shifts in federal technology leadership as new CIOs are appointed and President Trump's second term takes shape.
Most federal agencies are managing most of their records in electronic formats, while the National Archives and Records Administration looks...
Increased connectivity of people and devices to the Internet and to each other has created an ever-expanding attack surface that extends...
Compilation of cyberattacks by organization type and number of records compromised.
The lawmakers reiterated that it's up to Congress to decide whether federal agencies should be rearranged or dismantled.
The Trump administration's plans to cut budgets and staff at the National Archives and Records Administration will put a dent in NARA's...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of U.S. National Archives and Records Administration is http://www.archives.gov.
According to Rankiteo, U.S. National Archives and Records Administration’s AI-generated cybersecurity score is 742, reflecting their Moderate security posture.
According to Rankiteo, U.S. National Archives and Records Administration currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, U.S. National Archives and Records Administration is not certified under SOC 2 Type 1.
According to Rankiteo, U.S. National Archives and Records Administration does not hold a SOC 2 Type 2 certification.
According to Rankiteo, U.S. National Archives and Records Administration is not listed as GDPR compliant.
According to Rankiteo, U.S. National Archives and Records Administration does not currently maintain PCI DSS compliance.
According to Rankiteo, U.S. National Archives and Records Administration is not compliant with HIPAA regulations.
According to Rankiteo,U.S. National Archives and Records Administration is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
U.S. National Archives and Records Administration operates primarily in the Government Administration industry.
U.S. National Archives and Records Administration employs approximately 2,300 people worldwide.
U.S. National Archives and Records Administration presently has no subsidiaries across any sectors.
U.S. National Archives and Records Administration’s official LinkedIn profile has approximately 90,597 followers.
U.S. National Archives and Records Administration is classified under the NAICS code 92, which corresponds to Public Administration.
No, U.S. National Archives and Records Administration does not have a profile on Crunchbase.
Yes, U.S. National Archives and Records Administration maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/usnatarchives.
As of December 03, 2025, Rankiteo reports that U.S. National Archives and Records Administration has experienced 1 cybersecurity incidents.
U.S. National Archives and Records Administration has an estimated 11,267 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with acknowledgment letter to rep. sherrill, incident response plan activated with internal review initiated, and law enforcement notified with potential (calls for criminal investigation by democrats), and containment measures with request to foia requester (nicolas de gregorio) not to disseminate data, and remediation measures with free credit monitoring for rep. sherrill, remediation measures with policy and procedure review, remediation measures with additional staff training, and communication strategy with public statements by nprc director scott levin, communication strategy with media engagement via cnn, communication strategy with social media statement by rep. sherrill..
Title: Unauthorized Disclosure of Rep. Mikie Sherrill's Military Records by National Archives
Description: The National Personnel Records Center (NPRC) inadvertently disclosed an unredacted Official Military Personnel File of Rep. Mikie Sherrill (D-NJ) to an unauthorized FOIA requester, Nicolas de Gregorio, a former Republican candidate in New Jersey. The breach included sensitive personal data such as Sherrill's Social Security number and date of birth. The incident was acknowledged by NPRC Director Scott Levin, who cited a failure to follow standard operating procedures. The disclosure has sparked calls for a criminal investigation by top Democrats, including Rep. Hakeem Jeffries and Rep. Adam Smith. The NPRC has offered Sherrill free credit monitoring and requested de Gregorio not to disseminate the information. This follows similar past breaches involving military records of other lawmakers, including Rep. Don Bacon (R-NE) and Rep. Zach Nunn (R-IA) in 2021–2022.
Date Detected: 2024-08-15
Date Publicly Disclosed: 2024-08-15
Type: Data Breach
Vulnerability Exploited: Human ErrorImproper FOIA Redaction ProceduresFailure to Follow Standard Operating Procedures
Threat Actor: Name: Nicolas de GregorioType: Individual (Former Republican Candidate)Motivation: ['Political', "Unclear (FOIA Request for 'Publicly Available Data')"]
Motivation: Political Targeting (Alleged)Administrative Negligence
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Social security number, Date of birth, Full military personnel file
Systems Affected: National Personnel Records Center (NPRC) FOIA Processing System
Operational Impact: Loss of Trust in FOIA ProcessingPolicy Review and Staff Retraining Required
Customer Complaints: ['Public Outcry from Veterans and Lawmakers']
Brand Reputation Impact: Erosion of Trust in National Archives and NPRCPerception of Political Weaponization of Military Records
Legal Liabilities: Potential Criminal InvestigationViolation of Privacy Laws
Identity Theft Risk: ['High (Due to SSN Exposure)']
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Military Personnel File, Personally Identifiable Information (Pii) and .

Entity Name: Rep. Mikie Sherrill (D-NJ)
Entity Type: Individual (U.S. Congresswoman, Veteran, NJ Gubernatorial Candidate)
Industry: Government/Politics
Location: Randolph, NJ, USA

Entity Name: National Personnel Records Center (NPRC)
Entity Type: Government Agency (Under National Archives)
Industry: Public Records Management
Location: St. Louis, MO, USA
Customers Affected: Veterans with Military Records on File

Entity Name: U.S. Veterans (Broader Impact)
Entity Type: Group
Location: United States

Incident Response Plan Activated: ['Acknowledgment Letter to Rep. Sherrill', 'Internal Review Initiated']
Law Enforcement Notified: Potential (Calls for Criminal Investigation by Democrats),
Containment Measures: Request to FOIA Requester (Nicolas de Gregorio) Not to Disseminate Data
Remediation Measures: Free Credit Monitoring for Rep. SherrillPolicy and Procedure ReviewAdditional Staff Training
Communication Strategy: Public Statements by NPRC Director Scott LevinMedia Engagement via CNNSocial Media Statement by Rep. Sherrill
Incident Response Plan: The company's incident response plan is described as Acknowledgment Letter to Rep. Sherrill, Internal Review Initiated, .

Type of Data Compromised: Military personnel file, Personally identifiable information (pii)
Number of Records Exposed: 1
Sensitivity of Data: High (Includes SSN, DOB, Military Service Details)
Data Exfiltration: Unintentional (via FOIA Response)
File Types Exposed: Official Military Personnel File (OMFP)
Personally Identifiable Information: Social Security NumberDate of BirthMilitary Service Records
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Free Credit Monitoring for Rep. Sherrill, Policy and Procedure Review, Additional Staff Training, .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by request to foia requester (nicolas de gregorio) not to disseminate data and .

Regulations Violated: Freedom of Information Act (FOIA) Procedures, Privacy Laws (Potential),
Legal Actions: Calls for Criminal Investigation, Potential Administrative Accountability,
Regulatory Notifications: Internal Review by NPRCCongressional Oversight Expected
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Calls for Criminal Investigation, Potential Administrative Accountability, .

Lessons Learned: Human error in FOIA processing can lead to severe privacy breaches., Military records require stricter redaction protocols to prevent unauthorized PII disclosure., Political motivations can exacerbate the impact of administrative failures., Proactive monitoring and auditing of FOIA responses are critical for sensitive records.

Recommendations: Implement automated redaction tools for FOIA responses involving military records., Enhance training for NPRC staff on handling sensitive PII, especially for high-profile individuals., Establish clearer guidelines for FOIA requests targeting military records of public officials., Conduct regular audits of FOIA processing procedures to identify and mitigate risks., Explore legislative changes to strengthen protections for veterans' military records under FOIA., Develop a rapid-response protocol for breaches involving high-profile individuals to minimize reputational and operational damage.Implement automated redaction tools for FOIA responses involving military records., Enhance training for NPRC staff on handling sensitive PII, especially for high-profile individuals., Establish clearer guidelines for FOIA requests targeting military records of public officials., Conduct regular audits of FOIA processing procedures to identify and mitigate risks., Explore legislative changes to strengthen protections for veterans' military records under FOIA., Develop a rapid-response protocol for breaches involving high-profile individuals to minimize reputational and operational damage.Implement automated redaction tools for FOIA responses involving military records., Enhance training for NPRC staff on handling sensitive PII, especially for high-profile individuals., Establish clearer guidelines for FOIA requests targeting military records of public officials., Conduct regular audits of FOIA processing procedures to identify and mitigate risks., Explore legislative changes to strengthen protections for veterans' military records under FOIA., Develop a rapid-response protocol for breaches involving high-profile individuals to minimize reputational and operational damage.Implement automated redaction tools for FOIA responses involving military records., Enhance training for NPRC staff on handling sensitive PII, especially for high-profile individuals., Establish clearer guidelines for FOIA requests targeting military records of public officials., Conduct regular audits of FOIA processing procedures to identify and mitigate risks., Explore legislative changes to strengthen protections for veterans' military records under FOIA., Develop a rapid-response protocol for breaches involving high-profile individuals to minimize reputational and operational damage.Implement automated redaction tools for FOIA responses involving military records., Enhance training for NPRC staff on handling sensitive PII, especially for high-profile individuals., Establish clearer guidelines for FOIA requests targeting military records of public officials., Conduct regular audits of FOIA processing procedures to identify and mitigate risks., Explore legislative changes to strengthen protections for veterans' military records under FOIA., Develop a rapid-response protocol for breaches involving high-profile individuals to minimize reputational and operational damage.Implement automated redaction tools for FOIA responses involving military records., Enhance training for NPRC staff on handling sensitive PII, especially for high-profile individuals., Establish clearer guidelines for FOIA requests targeting military records of public officials., Conduct regular audits of FOIA processing procedures to identify and mitigate risks., Explore legislative changes to strengthen protections for veterans' military records under FOIA., Develop a rapid-response protocol for breaches involving high-profile individuals to minimize reputational and operational damage.
Key Lessons Learned: The key lessons learned from past incidents are Human error in FOIA processing can lead to severe privacy breaches.,Military records require stricter redaction protocols to prevent unauthorized PII disclosure.,Political motivations can exacerbate the impact of administrative failures.,Proactive monitoring and auditing of FOIA responses are critical for sensitive records.

Source: Daily Record/USA Today Network (Photo Credit)
Date Accessed: 2024-08-15

Source: Rep. Mikie Sherrill (Social Media Statement)
Date Accessed: 2024-08-15

Source: Rep. Hakeem Jeffries (Statement)
Date Accessed: 2024-08-15

Source: Rep. Don Bacon (Statement on Past Breaches)
Date Accessed: 2024-08-15
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: CNNDate Accessed: 2024-08-15, and Source: Daily Record/USA Today Network (Photo Credit)Date Accessed: 2024-08-15, and Source: Rep. Mikie Sherrill (Social Media Statement)Date Accessed: 2024-08-15, and Source: Rep. Hakeem Jeffries (Statement)Date Accessed: 2024-08-15, and Source: Rep. Adam Smith (Statement)Date Accessed: 2024-08-15, and Source: Rep. Don Bacon (Statement on Past Breaches)Date Accessed: 2024-08-15.

Investigation Status: ['Ongoing (Internal Review by NPRC)', 'Calls for Criminal Investigation by Congress', 'Congressional Oversight Expected']
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public Statements By Nprc Director Scott Levin, Media Engagement Via Cnn and Social Media Statement By Rep. Sherrill.

Stakeholder Advisories: National Archives Spokesperson Grace Mckaffrey Confirmed The Technician Failed To Follow Standard Operating Procedures., Top Democrats (Jeffries, Smith) Have Demanded Accountability And A Full Investigation., Rep. Don Bacon Highlighted Past Breaches And Called For Better Protections For Veterans' Records..
Customer Advisories: NPRC offered Rep. Sherrill free credit monitoring services.Rep. Sherrill advised veterans via social media that their records may not be safe under current procedures.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were National Archives Spokesperson Grace Mckaffrey Confirmed The Technician Failed To Follow Standard Operating Procedures., Top Democrats (Jeffries, Smith) Have Demanded Accountability And A Full Investigation., Rep. Don Bacon Highlighted Past Breaches And Called For Better Protections For Veterans' Records., Nprc Offered Rep. Sherrill Free Credit Monitoring Services., Rep. Sherrill Advised Veterans Via Social Media That Their Records May Not Be Safe Under Current Procedures. and .

Root Causes: Failure To Adhere To Foia Redaction Procedures For Sensitive Military Records., Inadequate Staff Training On Handling Pii In High-Profile Cases., Lack Of Automated Safeguards To Prevent Full-Record Disclosures., Potential Political Targeting Via Foia Requests For Military Records.,
Corrective Actions: Policy And Procedure Review At Nprc., Additional Staff Training On Foia Compliance And Pii Protection., Potential Legislative Reforms To Foia Processing For Military Records., Enhanced Oversight Of Foia Requests Involving Veterans' Data.,
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Policy And Procedure Review At Nprc., Additional Staff Training On Foia Compliance And Pii Protection., Potential Legislative Reforms To Foia Processing For Military Records., Enhanced Oversight Of Foia Requests Involving Veterans' Data., .
Last Attacking Group: The attacking group in the last incident were an Name: Nicolas de GregorioType: Individual (Former Republican Candidate)Motivation: ['Political' and "Unclear (FOIA Request for 'Publicly Available Data')"].
Most Recent Incident Detected: The most recent incident detected was on 2024-08-15.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-08-15.
Most Significant Data Compromised: The most significant data compromised in an incident were Social Security Number, Date of Birth, Full Military Personnel File and .
Most Significant System Affected: The most significant system affected in an incident was National Personnel Records Center (NPRC) FOIA Processing System.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Request to FOIA Requester (Nicolas de Gregorio) Not to Disseminate Data.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Date of Birth, Social Security Number and Full Military Personnel File.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 1.0.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Calls for Criminal Investigation, Potential Administrative Accountability, .
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Proactive monitoring and auditing of FOIA responses are critical for sensitive records.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Establish clearer guidelines for FOIA requests targeting military records of public officials., Implement automated redaction tools for FOIA responses involving military records., Explore legislative changes to strengthen protections for veterans' military records under FOIA., Enhance training for NPRC staff on handling sensitive PII, especially for high-profile individuals., Conduct regular audits of FOIA processing procedures to identify and mitigate risks. and Develop a rapid-response protocol for breaches involving high-profile individuals to minimize reputational and operational damage..
Most Recent Source: The most recent source of information about an incident are Rep. Hakeem Jeffries (Statement), Rep. Adam Smith (Statement), CNN, Rep. Don Bacon (Statement on Past Breaches), Daily Record/USA Today Network (Photo Credit) and Rep. Mikie Sherrill (Social Media Statement).
Current Status of Most Recent Investigation: The current status of the most recent investigation is ['Ongoing (Internal Review by NPRC)', 'Calls for Criminal Investigation by Congress', 'Congressional Oversight Expected'].
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was National Archives spokesperson Grace McKaffrey confirmed the technician failed to follow standard operating procedures., Top Democrats (Jeffries, Smith) have demanded accountability and a full investigation., Rep. Don Bacon highlighted past breaches and called for better protections for veterans' records., .
Most Recent Customer Advisory: The most recent customer advisory issued was an NPRC offered Rep. Sherrill free credit monitoring services.Rep. Sherrill advised veterans via social media that their records may not be safe under current procedures.
.png)
vLLM is an inference and serving engine for large language models (LLMs). Prior to 0.11.1, vllm has a critical remote code execution vector in a config class named Nemotron_Nano_VL_Config. When vllm loads a model config that contains an auto_map entry, the config class resolves that mapping with get_class_from_dynamic_module(...) and immediately instantiates the returned class. This fetches and executes Python from the remote repository referenced in the auto_map string. Crucially, this happens even when the caller explicitly sets trust_remote_code=False in vllm.transformers_utils.config.get_config. In practice, an attacker can publish a benign-looking frontend repo whose config.json points via auto_map to a separate malicious backend repo; loading the frontend will silently run the backend’s code on the victim host. This vulnerability is fixed in 0.11.1.
fastify-reply-from is a Fastify plugin to forward the current HTTP request to another server. Prior to 12.5.0, by crafting a malicious URL, an attacker could access routes that are not allowed, even though the reply.from is defined for specific routes in @fastify/reply-from. This vulnerability is fixed in 12.5.0.
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to 21.0.2, 20.3.15, and 19.2.17, A Stored Cross-Site Scripting (XSS) vulnerability has been identified in the Angular Template Compiler. It occurs because the compiler's internal security schema is incomplete, allowing attackers to bypass Angular's built-in security sanitization. Specifically, the schema fails to classify certain URL-holding attributes (e.g., those that could contain javascript: URLs) as requiring strict URL security, enabling the injection of malicious scripts. This vulnerability is fixed in 21.0.2, 20.3.15, and 19.2.17.
Gin-vue-admin is a backstage management system based on vue and gin. In 2.8.6 and earlier, attackers can delete any file on the server at will, causing damage or unavailability of server resources. Attackers can control the 'FileMd5' parameter to delete any file and folder.
Portkey.ai Gateway is a blazing fast AI Gateway with integrated guardrails. Prior to 1.14.0, the gateway determined the destination baseURL by prioritizing the value in the x-portkey-custom-host request header. The proxy route then appends the client-specified path to perform an external fetch. This can be maliciously used by users for SSRF attacks. This vulnerability is fixed in 1.14.0.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.