Company Details
verivox-gmbh
393
4,235
51913
verivox.de
0
VER_2566119
In-progress

Verivox GmbH Company CyberSecurity Posture
verivox.de𝗪𝗶𝗿 𝘀𝗶𝗻𝗱 𝗩𝗲𝗿𝗶𝘃𝗼𝘅! Verivox ist eines der führenden Online-Vergleichsportale für alle Verträge rund um das eigene Zuhause. Verbraucherinnen und Verbraucher finden auf Verivox.de aktuelle und übersichtliche Vergleiche für Strom und Gas, Internet und Mobilfunk sowie Finanzen und Versicherungen. Seit unserer Gründung im Jahr 1998 haben mehr als 8 Millionen Menschen ihren neuen Anbieter über uns gefunden und zusammen mehr als zwei Milliarden Euro gespart. Unsere vier Standorte befinden sich in Heidelberg, Berlin, Leipzig und München. Von dort aus sorgen wir dafür, dass unsere Nutzerinnen und Nutzer stets die für sie besten Tarife und Angebote finden und der Tarifwechsel schnell, komfortabel und sicher funktioniert. Verivox ist Teil der ProSiebenSat.1 Gruppe. Unsere Werte sind... 𝗣𝗮𝘀𝘀𝗶𝗼𝗻: Wir motivieren uns gegenseitig – Tag für Tag 𝗜𝗻𝗻𝗼𝘃𝗮𝘁𝗶𝗼𝗻: Bei uns gewinnt immer die beste Idee, egal von wem sie kommt 𝗖𝗼𝘂𝗿𝗮𝗴𝗲: Wir leben eine Kultur, in der alle offen ihre Meinung sagen und ihre Ideen einbringen 𝗚𝗼𝗮𝗹 𝗢𝗿𝗶𝗲𝗻𝘁𝗮𝘁𝗶𝗼𝗻: Wir arbeiten crossfunktionial und mit flachen Hierarchien, um das beste Ergebnis zu erreichen 𝗥𝗲𝘀𝗽𝗼𝗻𝘀𝗶𝗯𝗶𝗹𝗶𝘁𝘆: Jede:r bekommt so viel Verantwortung, wie er tragen kann und will 𝗩𝗶𝗲𝗹𝗳𝗮𝗹𝘁: Jede:r kann seine Stärke gleichermaßen einbringen STELLENANZEIGEN Auf https://www.verivox.de/karriere/stellenangebote/ findest du unsere aktuellen Stellenanzeigen. IMPRESSUM http://www.verivox.de/company/impressum/
Company Details
verivox-gmbh
393
4,235
51913
verivox.de
0
VER_2566119
In-progress
Between 700 and 749

Verivox GmbH Global Score (TPRM)XXXX

Description: A cyber attack that damaged more than a 1000 businesses and organisations worldwide, including Verivox, happened. A serious flaw in the file transfer programme MOVEit Transfer was the attack's target. Prior to Verivox's termination of the MOVEit environment, the business discovered that information on this serious vulnerability had been illegally obtained. A thorough forensic investigation of the incident and the stolen data is currently being conducted with the assistance of outside experts after the organisation immediately notified the authorities about the loss of data.


No incidents recorded for Verivox GmbH in 2025.
No incidents recorded for Verivox GmbH in 2025.
No incidents recorded for Verivox GmbH in 2025.
Verivox GmbH cyber incidents detection timeline including parent company and subsidiaries

𝗪𝗶𝗿 𝘀𝗶𝗻𝗱 𝗩𝗲𝗿𝗶𝘃𝗼𝘅! Verivox ist eines der führenden Online-Vergleichsportale für alle Verträge rund um das eigene Zuhause. Verbraucherinnen und Verbraucher finden auf Verivox.de aktuelle und übersichtliche Vergleiche für Strom und Gas, Internet und Mobilfunk sowie Finanzen und Versicherungen. Seit unserer Gründung im Jahr 1998 haben mehr als 8 Millionen Menschen ihren neuen Anbieter über uns gefunden und zusammen mehr als zwei Milliarden Euro gespart. Unsere vier Standorte befinden sich in Heidelberg, Berlin, Leipzig und München. Von dort aus sorgen wir dafür, dass unsere Nutzerinnen und Nutzer stets die für sie besten Tarife und Angebote finden und der Tarifwechsel schnell, komfortabel und sicher funktioniert. Verivox ist Teil der ProSiebenSat.1 Gruppe. Unsere Werte sind... 𝗣𝗮𝘀𝘀𝗶𝗼𝗻: Wir motivieren uns gegenseitig – Tag für Tag 𝗜𝗻𝗻𝗼𝘃𝗮𝘁𝗶𝗼𝗻: Bei uns gewinnt immer die beste Idee, egal von wem sie kommt 𝗖𝗼𝘂𝗿𝗮𝗴𝗲: Wir leben eine Kultur, in der alle offen ihre Meinung sagen und ihre Ideen einbringen 𝗚𝗼𝗮𝗹 𝗢𝗿𝗶𝗲𝗻𝘁𝗮𝘁𝗶𝗼𝗻: Wir arbeiten crossfunktionial und mit flachen Hierarchien, um das beste Ergebnis zu erreichen 𝗥𝗲𝘀𝗽𝗼𝗻𝘀𝗶𝗯𝗶𝗹𝗶𝘁𝘆: Jede:r bekommt so viel Verantwortung, wie er tragen kann und will 𝗩𝗶𝗲𝗹𝗳𝗮𝗹𝘁: Jede:r kann seine Stärke gleichermaßen einbringen STELLENANZEIGEN Auf https://www.verivox.de/karriere/stellenangebote/ findest du unsere aktuellen Stellenanzeigen. IMPRESSUM http://www.verivox.de/company/impressum/

Equinix (Nasdaq: EQIX) is the world’s digital infrastructure company™, enabling digital leaders to harness a trusted platform to bring together and interconnect the foundational infrastructure that powers their success. Equinix enables today’s businesses to access all the right places, partners and
Founded in 1999 and headquartered in Buenos Aires, Argentina, Mercado Libre is Latin America’s leading e-commerce technology company. Through its primary platforms, MercadoLibre.com and MercadoPago.com, it provides solutions to individuals and companies buying, selling, advertising, and paying for
.png)
OpenAI is hiring a Head of Preparedness to confront growing concerns around advanced AI systems uncovering critical security flaws and...
In 2025, the financial sector faced several high-profile data breaches, affecting millions of customers and raising serious concerns about...
Coupang, South Korea's e-commerce giant, has found itself in the headlines once again, this time with a dramatic twist in the ongoing...
Cybersecurity has moved from a technical problem to a boardroom concern tied to survival. A global Rimini Street study of senior executives...
Learn how lava lamps are used to protect systems from cyber attacks by generating true randomness for encryption.
Forensics, the application of scientific methods and principles to enable decision making in criminal cases, has evolved beyond the crime...
By Kang Yoon-seung SEOUL, Dec. 30 (Yonhap) -- South Korean businesses' expenditure ...
Cybersecurity experts reveal what they do for high-profile clients targeted by hackers such as Scattered Spider.
An attack vector is a pathway or method through which hackers gain unauthorized access to target systems to commit a cyberattack.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Verivox GmbH is https://karriere.verivox.de/.
According to Rankiteo, Verivox GmbH’s AI-generated cybersecurity score is 725, reflecting their Moderate security posture.
According to Rankiteo, Verivox GmbH currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Verivox GmbH is not certified under SOC 2 Type 1.
According to Rankiteo, Verivox GmbH does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Verivox GmbH is not listed as GDPR compliant.
According to Rankiteo, Verivox GmbH does not currently maintain PCI DSS compliance.
According to Rankiteo, Verivox GmbH is not compliant with HIPAA regulations.
According to Rankiteo,Verivox GmbH is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Verivox GmbH operates primarily in the Internet Publishing industry.
Verivox GmbH employs approximately 393 people worldwide.
Verivox GmbH presently has no subsidiaries across any sectors.
Verivox GmbH’s official LinkedIn profile has approximately 4,235 followers.
Verivox GmbH is classified under the NAICS code 51913, which corresponds to Internet Publishing and Broadcasting and Web Search Portals.
No, Verivox GmbH does not have a profile on Crunchbase.
Yes, Verivox GmbH maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/verivox-gmbh.
As of December 30, 2025, Rankiteo reports that Verivox GmbH has experienced 1 cybersecurity incidents.
Verivox GmbH has an estimated 611 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Data Leak.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with yes, and law enforcement notified with yes..
Title: Cyber Attack on MOVEit Transfer Vulnerability
Description: A cyber attack that damaged more than a 1000 businesses and organisations worldwide, including Verivox, happened. A serious flaw in the file transfer programme MOVEit Transfer was the attack's target. Prior to Verivox's termination of the MOVEit environment, the business discovered that information on this serious vulnerability had been illegally obtained. A thorough forensic investigation of the incident and the stolen data is currently being conducted with the assistance of outside experts after the organisation immediately notified the authorities about the loss of data.
Type: Cyber Attack
Attack Vector: Vulnerability Exploitation
Vulnerability Exploited: MOVEit Transfer
Common Attack Types: The most common types of attacks the company has faced is Data Leak.
Third-Party Assistance: The company involves third-party assistance in incident response through Yes.

Investigation Status: Ongoing
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
.png)
Improper Input Validation vulnerability in qs (parse modules) allows HTTP DoS.This issue affects qs: < 6.14.1. SummaryThe arrayLimit option in qs does not enforce limits for bracket notation (a[]=1&a[]=2), allowing attackers to cause denial-of-service via memory exhaustion. Applications using arrayLimit for DoS protection are vulnerable. DetailsThe arrayLimit option only checks limits for indexed notation (a[0]=1&a[1]=2) but completely bypasses it for bracket notation (a[]=1&a[]=2). Vulnerable code (lib/parse.js:159-162): if (root === '[]' && options.parseArrays) { obj = utils.combine([], leaf); // No arrayLimit check } Working code (lib/parse.js:175): else if (index <= options.arrayLimit) { // Limit checked here obj = []; obj[index] = leaf; } The bracket notation handler at line 159 uses utils.combine([], leaf) without validating against options.arrayLimit, while indexed notation at line 175 checks index <= options.arrayLimit before creating arrays. PoCTest 1 - Basic bypass: npm install qs const qs = require('qs'); const result = qs.parse('a[]=1&a[]=2&a[]=3&a[]=4&a[]=5&a[]=6', { arrayLimit: 5 }); console.log(result.a.length); // Output: 6 (should be max 5) Test 2 - DoS demonstration: const qs = require('qs'); const attack = 'a[]=' + Array(10000).fill('x').join('&a[]='); const result = qs.parse(attack, { arrayLimit: 100 }); console.log(result.a.length); // Output: 10000 (should be max 100) Configuration: * arrayLimit: 5 (test 1) or arrayLimit: 100 (test 2) * Use bracket notation: a[]=value (not indexed a[0]=value) ImpactDenial of Service via memory exhaustion. Affects applications using qs.parse() with user-controlled input and arrayLimit for protection. Attack scenario: * Attacker sends HTTP request: GET /api/search?filters[]=x&filters[]=x&...&filters[]=x (100,000+ times) * Application parses with qs.parse(query, { arrayLimit: 100 }) * qs ignores limit, parses all 100,000 elements into array * Server memory exhausted → application crashes or becomes unresponsive * Service unavailable for all users Real-world impact: * Single malicious request can crash server * No authentication required * Easy to automate and scale * Affects any endpoint parsing query strings with bracket notation
A weakness has been identified in code-projects Refugee Food Management System 1.0. This affects an unknown part of the file /home/editfood.php. This manipulation of the argument a/b/c/d causes sql injection. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in code-projects Refugee Food Management System 1.0. Affected by this issue is some unknown functionality of the file /home/editrefugee.php. The manipulation of the argument rfid results in sql injection. The attack can be launched remotely. The exploit has been released to the public and may be exploited.
Authentication Bypass Using an Alternate Path or Channel vulnerability in Mobile Builder Mobile builder allows Authentication Abuse.This issue affects Mobile builder: from n/a through 1.4.2.
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Hiroaki Miyashita Custom Field Template allows Stored XSS.This issue affects Custom Field Template: from n/a through 2.7.5.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.