Company Details
varian-medical-systems
9,749
314,084
None
varian.com
0
VAR_1842802
In-progress

Varian Company CyberSecurity Posture
varian.comAt Varian, a Siemens Healthineers company, we envision a world without fear of cancer. For more than 75 years, Varian has developed, built, and delivered innovative technologies and solutions that help care providers around the globe treat millions of patients each year. Today, as a Siemens Healthineers company, we support every step of the cancer care journey – from screening to survivorship. From advanced imaging and radiation therapy, to comprehensive software and services, to interventional radiology, we are harnessing the power of our perspective while also pursuing clinical research to create a more efficient, and more personalized care pathway. Because, for cancer patients everywhere, their fight is our fight. Varian reserves the right to remove any comment for any reason and ban any user from its page at its sole discretion. Varian does not endorse user comments on its page and cannot confirm their accuracy. User comments do not necessarily represent the ideas, thoughts, beliefs, opinions or views of Varian, or any of its affiliates.
Company Details
varian-medical-systems
9,749
314,084
None
varian.com
0
VAR_1842802
In-progress
Between 700 and 749

Varian Global Score (TPRM)XXXX

Description: The LockBit ransomware organisation claims to have breached the security of the healthcare provider Varian Medical Systems and has threatened to release cancer patients' medical information. The Lockbit group claims on their TOR leak site that "ALL DATABASES AND PATIENT DATA WAS EXFILTRATED AND PREPARED TO BE PUBLISHED ON THE BLOG." If verified, the incident might significantly affect cancer patients' right to privacy. The business hasn't yet made the security mishap public. The ransom payment date has been set by Lockbit for August 17, 2023.


No incidents recorded for Varian in 2025.
No incidents recorded for Varian in 2025.
No incidents recorded for Varian in 2025.
Varian cyber incidents detection timeline including parent company and subsidiaries

At Varian, a Siemens Healthineers company, we envision a world without fear of cancer. For more than 75 years, Varian has developed, built, and delivered innovative technologies and solutions that help care providers around the globe treat millions of patients each year. Today, as a Siemens Healthineers company, we support every step of the cancer care journey – from screening to survivorship. From advanced imaging and radiation therapy, to comprehensive software and services, to interventional radiology, we are harnessing the power of our perspective while also pursuing clinical research to create a more efficient, and more personalized care pathway. Because, for cancer patients everywhere, their fight is our fight. Varian reserves the right to remove any comment for any reason and ban any user from its page at its sole discretion. Varian does not endorse user comments on its page and cannot confirm their accuracy. User comments do not necessarily represent the ideas, thoughts, beliefs, opinions or views of Varian, or any of its affiliates.


A Global Total Solutions Provider Dentsply Sirona is the world’s largest manufacturer of professional dental products and technologies, empowering dental professionals to provide better, safer and faster dental care. Our products and solutions include leading positions and platforms across consuma
.png)
Also in the Forbes CIO newsletter: Legacy tech stops innovation, California AI regulation law signed, CoreWeave enters deal with Meta.
Raghu Chandrashekar has taken on the role of Head of Human Resources (HR) for Varian EMEA at Siemens Healthineers, overseeing HR functions across Europe, the...
A UK hospital is battling what it is calling a critical incident as the ongoing global IT outage caused by a CrowdStrike update is impacting its Varian system.
Varian, a Siemens Healthineers company, will showcase its ongoing commitment to embracing innovation and enhancing outcomes for cancer care teams and their...
Varian Siemens Healthineers and Nova Scotia Health form $175 million CAD multi-disciplinary oncology partnership.
Varian, a Siemens Healthineers company, and Nova Scotia Health have formed an unprecedented 10-year, $175 million CAD (approx. $131 million USD) multi-...
Siemens Healthineers said it is investigating recent reports about the LockBit ransomware group listing its subsidiary Varian Medical Systems as a victim on...
Varian — a radiation oncology treatments and software maker acquired by Siemens Healthineers two years ago — is listed on the ransomware...
Varian, a Siemens Healthineers company, announced today that the first participant has been treated in the RADIATE-VT 1 clinical trial (NCT 05765175)

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Varian is http://www.varian.com.
According to Rankiteo, Varian’s AI-generated cybersecurity score is 733, reflecting their Moderate security posture.
According to Rankiteo, Varian currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Varian is not certified under SOC 2 Type 1.
According to Rankiteo, Varian does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Varian is not listed as GDPR compliant.
According to Rankiteo, Varian does not currently maintain PCI DSS compliance.
According to Rankiteo, Varian is not compliant with HIPAA regulations.
According to Rankiteo,Varian is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Varian operates primarily in the Medical Device industry.
Varian employs approximately 9,749 people worldwide.
Varian presently has no subsidiaries across any sectors.
Varian’s official LinkedIn profile has approximately 314,084 followers.
Varian is classified under the NAICS code None, which corresponds to Others.
No, Varian does not have a profile on Crunchbase.
Yes, Varian maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/varian-medical-systems.
As of December 22, 2025, Rankiteo reports that Varian has experienced 1 cybersecurity incidents.
Varian has an estimated 1,454 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.
Title: LockBit Ransomware Attack on Varian Medical Systems
Description: The LockBit ransomware organisation claims to have breached the security of the healthcare provider Varian Medical Systems and has threatened to release cancer patients' medical information.
Type: Ransomware
Threat Actor: LockBit
Motivation: Financial gain
Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Data Compromised: Patient data, Medical information
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Patient Data, Medical Information and .

Entity Name: Varian Medical Systems
Entity Type: Healthcare provider
Industry: Healthcare

Type of Data Compromised: Patient data, Medical information
Sensitivity of Data: High
Data Exfiltration: Yes

Source: LockBit TOR leak site
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: LockBit TOR leak site.
Last Attacking Group: The attacking group in the last incident was an LockBit.
Most Significant Data Compromised: The most significant data compromised in an incident were Patient data, Medical information and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Patient data and Medical information.
Most Recent Source: The most recent source of information about an incident is LockBit TOR leak site.
.png)
Versa SASE Client for Windows versions released between 7.8.7 and 7.9.4 contain a local privilege escalation vulnerability in the audit log export functionality. The client communicates user-controlled file paths to a privileged service, which performs file system operations without impersonating the requesting user. Due to improper privilege handling and a time-of-check time-of-use race condition combined with symbolic link and mount point manipulation, a local authenticated attacker can coerce the service into deleting arbitrary directories with SYSTEM privileges. This can be exploited to delete protected system folders such as C:\\Config.msi and subsequently achieve execution as NT AUTHORITY\\SYSTEM via MSI rollback techniques.
The WP JobHunt plugin for WordPress, used by the JobCareer theme, is vulnerable to unauthorized modification of data due to a missing capability check on the 'cs_update_application_status_callback' function in all versions up to, and including, 7.7. This makes it possible for authenticated attackers, with Candidate-level access and above, to inject cross-site scripting into the 'status' parameter of applied jobs for any user.
The WP JobHunt plugin for WordPress, used by the JobCareer theme, is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 7.7 via the 'cs_update_application_status_callback' due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Candidate-level access and above, to send a site-generated email with injected HTML to any user.
The FiboSearch – Ajax Search for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `thegem_te_search` shortcode in all versions up to, and including, 1.32.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This vulnerability requires TheGem theme (premium) to be installed with Header Builder mode enabled, and the FiboSearch "Replace search bars" option enabled for TheGem integration.
The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.11.0 via the ajax_get_members function. This is due to the use of a predictable low-entropy token (5 hex characters derived from md5 of post ID) to identify member directories and insufficient authorization checks on the unauthenticated AJAX endpoint. This makes it possible for unauthenticated attackers to extract sensitive data including usernames, display names, user roles (including administrator accounts), profile URLs, and user IDs by enumerating predictable directory_id values or brute-forcing the small 16^5 token space.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.