
Verizon Business
You’re more than a business, agency or organization leader. We’re more than the usual network that provides reliable coverage. Together, we can empower you and your people.



You’re more than a business, agency or organization leader. We’re more than the usual network that provides reliable coverage. Together, we can empower you and your people.

GlobalLogic, una empresa del grupo Hitachi, es líder en ingeniería digital en Latinoamérica. Ayudamos a diferentes marcas a diseñar y crear productos, plataformas y experiencias digitales innovadoras para el mundo moderno. Al integrar el diseño de experiencia, la ingeniería compleja y la experiencia en datos, ayudamos a nuestros clientes a imaginar lo que es posible y a acelerar su transición a los negocios digitales del mañana. Con sede en Silicon Valley, GlobalLogic opera estudios de diseño y centros de ingeniería en todo el mundo, extendiendo nuestra profunda experiencia a clientes en las industrias automotriz, comunicaciones, servicios financieros, salud y ciencias biológicas, manufactura, medios y entretenimiento, semiconductores y tecnología. GlobalLogic es una empresa del Grupo Hitachi que opera bajo Hitachi, Ltd. (TSE: 6501), que contribuye a una sociedad sostenible con una mejor calidad de vida al impulsar la innovación a través de datos y tecnología como el Negocio de Innovación Social.
Security & Compliance Standards Overview












No incidents recorded for Verizon Business in 2025.
No incidents recorded for GlobalLogic Latinoamérica in 2025.
Verizon Business cyber incidents detection timeline including parent company and subsidiaries
GlobalLogic Latinoamérica cyber incidents detection timeline including parent company and subsidiaries
Last 3 Security & Risk Events by Company
NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.
uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.
A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."
MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.
A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).