Company Details
wedge-hr
34
3,110
5112
wedgehr.com
0
WED_1471877
In-progress

WedgeHR Company CyberSecurity Posture
wedgehr.comWedgeHR is a Michigan-based company built on the belief that everyone deserves the chance to be truly seen. We’re creating a candidate-driven hiring platform that helps people share who they are - on their time - and gives hiring teams the insight they need to connect sooner, move faster, and make smarter decisions. Simple by design and powerful in impact, WedgeHR has helped over 1 million candidates engage meaningfully with hundreds of hiring teams. Founded in the Midwest, we’re proud to build diverse teams, strong partnerships, and a more human hiring experience - one connection at a time. Since 2015, we’ve focused on creating meaningful connections - within our own team and across the hiring landscape. No need to worry over scheduling hassles, or travel fees; you can setup and interview wherever and whenever you want. The dream team is just a few clicks away. See what the future of self-service hiring tech is all about.
Company Details
wedge-hr
34
3,110
5112
wedgehr.com
0
WED_1471877
In-progress
Between 650 and 699

WedgeHR Global Score (TPRM)XXXX

Description: Recently, WEDGE reported to the Attorney General of the Commonwealth of Massachusetts that the sensitive personal identifiable information in its care may have been compromised. In the sample breach notice provided to the Attorney General of the Commonwealth of Massachusetts, WEDGE does not elaborate on the nature of the security incident that impacted its systems. While the information impacted varies depending on the individual, the type of information potentially exposed includes:4 Name Social Security number Driver’s license information On November 26, 2025, WEDGE began mailing data breach notification letters to impacted individuals. Based on the breach notice sent to Massachusetts residents, WEDGE is providing affected individuals with a list of the specific types of sensitive information impacted and complimentary credit monitoring services. A link to the form breach notification letters that WEDGE filed with the Attorney General of the Commonwealth of Massachusetts is below.


WedgeHR has 132.56% more incidents than the average of same-industry companies with at least one recorded incident.
WedgeHR has 56.25% more incidents than the average of all companies with at least one recorded incident.
WedgeHR reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.
WedgeHR cyber incidents detection timeline including parent company and subsidiaries

WedgeHR is a Michigan-based company built on the belief that everyone deserves the chance to be truly seen. We’re creating a candidate-driven hiring platform that helps people share who they are - on their time - and gives hiring teams the insight they need to connect sooner, move faster, and make smarter decisions. Simple by design and powerful in impact, WedgeHR has helped over 1 million candidates engage meaningfully with hundreds of hiring teams. Founded in the Midwest, we’re proud to build diverse teams, strong partnerships, and a more human hiring experience - one connection at a time. Since 2015, we’ve focused on creating meaningful connections - within our own team and across the hiring landscape. No need to worry over scheduling hassles, or travel fees; you can setup and interview wherever and whenever you want. The dream team is just a few clicks away. See what the future of self-service hiring tech is all about.

SAP is the leading enterprise application and business AI company. We stand at the intersection of business and technology, where our innovations are designed to directly address real business challenges and produce real-world impacts. Our solutions are the backbone for the world’s most complex and

Intuit is a global technology platform that helps our customers and communities overcome their most important financial challenges. Serving millions of customers worldwide with TurboTax, QuickBooks, Credit Karma and Mailchimp, we believe that everyone should have the opportunity to prosper and we wo

Meta's mission is to build the future of human connection and the technology that makes it possible. Our technologies help people connect, find communities, and grow businesses. When Facebook launched in 2004, it changed the way people connect. Apps like Messenger, Instagram and WhatsApp further e
The Bosch Group is a leading global supplier of technology and services. It employs roughly 417,900 associates worldwide (as of December 31, 2024). According to preliminary figures, the company generated sales of 90.5 billion euros in 2024. Its operations are divided into four business sectors: Mobi

Cox Automotive is the world’s largest automotive services and technology provider. Fueled by the largest breadth of first-party data fed by 2.3 billion online interactions a year, Cox Automotive tailors leading solutions for car shoppers, auto manufacturers, dealers, lenders and fleets. The company

DiDi Global Inc. is a leading mobility technology platform. It offers a wide range of app-based services across Asia Pacific, Latin America, and other global markets, including ride hailing, taxi hailing, designated driving, hitch and other forms of shared mobility as well as certain energy and vehi

Dassault Systèmes is a catalyst for human progress. Since 1981, the company has pioneered virtual worlds to improve real life for consumers, patients and citizens. With Dassault Systèmes’ 3DEXPERIENCE platform, 370,000 customers of all sizes, in all industries, can collaborate, imagine and create

Thomson Reuters is the world’s leading provider of news and information-based tools to professionals. Our worldwide network of journalists and specialist editors keep customers up to speed on global developments, with a particular focus on legal, regulatory and tax changes. Our customers operat

HubSpot is a leading CRM platform that provides software and support to help businesses grow better. Our platform includes marketing, sales, service, and website management products that start free and scale to meet our customers’ needs at any stage of growth. Today, thousands of customers around th
.png)
As holiday shopping increases, experts warn of a surge in online scams targeting distracted consumers, emphasizing the importance of...
Senators Hassan and Cornyn introduced a bipartisan bill to reauthorize the state and local cybersecurity grant program.
President Donald Trump has signed a bill proposed by Oklahoma Senator Markwayne Mullin on Monday.The 988 Lifeline Cybersecurity...
WASHINGTON — Spire Global has secured a contract from Deloitte to design, build and operate eight satellites that will support the...
As holiday shopping ramps up, cybersecurity experts are urging consumers to stay vigilant. They say scammers are already taking advantage of...
As the gifting season draws near, children across the region are busy making their Christmas lists. This year, some lists may include AI...
Cybersecurity giant Zscaler is a pioneer and global leader in zero trust security. Many of the world's largest businesses,...
Congressmen Deluzio and Valadao reintroduced the SECURE IT Act to enhance election cybersecurity through mandatory testing.
The fundamental cybersecurity vulnerabilities of Level 0 process sensors in industrial systems.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of WedgeHR is https://wedgehr.com.
According to Rankiteo, WedgeHR’s AI-generated cybersecurity score is 687, reflecting their Weak security posture.
According to Rankiteo, WedgeHR currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, WedgeHR is not certified under SOC 2 Type 1.
According to Rankiteo, WedgeHR does not hold a SOC 2 Type 2 certification.
According to Rankiteo, WedgeHR is not listed as GDPR compliant.
According to Rankiteo, WedgeHR does not currently maintain PCI DSS compliance.
According to Rankiteo, WedgeHR is not compliant with HIPAA regulations.
According to Rankiteo,WedgeHR is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
WedgeHR operates primarily in the Software Development industry.
WedgeHR employs approximately 34 people worldwide.
WedgeHR presently has no subsidiaries across any sectors.
WedgeHR’s official LinkedIn profile has approximately 3,110 followers.
WedgeHR is classified under the NAICS code 5112, which corresponds to Software Publishers.
No, WedgeHR does not have a profile on Crunchbase.
Yes, WedgeHR maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/wedge-hr.
As of December 02, 2025, Rankiteo reports that WedgeHR has experienced 1 cybersecurity incidents.
WedgeHR has an estimated 26,999 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
A weakness has been identified in codingWithElias School Management System up to f1ac334bfd89ae9067cc14dea12ec6ff3f078c01. Affected is an unknown function of the file /student-view.php of the component Edit Student Info Page. This manipulation of the argument First Name causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. Other parameters might be affected as well. The vendor was contacted early about this disclosure but did not respond in any way.
By providing a command-line argument starting with a semi-colon ; to an API endpoint created by the EnhancedCommandExecutor class of the HexStrike AI MCP server, the resultant composed command is executed directly in the context of the MCP server’s normal privilege; typically, this is root. There is no attempt to sanitize these arguments in the default configuration of this MCP server at the affected version (as of commit 2f3a5512 in September of 2025).
A weakness has been identified in winston-dsouza Ecommerce-Website up to 87734c043269baac0b4cfe9664784462138b1b2e. Affected by this issue is some unknown functionality of the file /includes/header_menu.php of the component GET Parameter Handler. Executing manipulation of the argument Error can lead to cross site scripting. The attack can be executed remotely. The exploit has been made available to the public and could be exploited. This product implements a rolling release for ongoing delivery, which means version information for affected or updated releases is unavailable. The vendor was contacted early about this disclosure but did not respond in any way.
A security flaw has been discovered in Qualitor 8.20/8.24. Affected by this vulnerability is the function eval of the file /html/st/stdeslocamento/request/getResumo.php. Performing manipulation of the argument passageiros results in code injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was identified in Scada-LTS up to 2.7.8.1. Affected is the function Common.getHomeDir of the file br/org/scadabr/vo/exporter/ZIPProjectManager.java of the component Project Import. Such manipulation leads to path traversal. The attack may be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.