Company Details
weld-county
792
2,934
92
weldgov.com
0
WEL_2949511
In-progress

Weld County Government Company CyberSecurity Posture
weldgov.comWeld County covers an area of 3,999 square miles in north central Colorado. It is bordered on the north by Wyoming and Nebraska and on the south by the Denver metropolitan area. The third largest county in Colorado, Weld County has an area greater than that of Rhode Island, Delaware and the District of Columbia combined. The climate is dry and generally mild with warm summers, mild winters and a growing season of approximately 138 days. The land surface is fairly level in the east, with rolling prairies and low hills near the western border. Elevations in the county range from 4,400 to 5,000 feet.
Company Details
weld-county
792
2,934
92
weldgov.com
0
WEL_2949511
In-progress
Between 700 and 749

WCG Global Score (TPRM)XXXX

Description: **Weld County’s Emergency Alert System Restored After Cyber Attack Disrupts CodeRED** Weld County, Colorado, has restored its emergency notification system following a cyber attack that disabled its previous platform, CodeRED. The incident, detected on **November 10**, prompted the county’s Public Safety Communications Department to rely on a backup agreement with the **Larimer Emergency Telephone Authority** for critical alerts. CodeRED’s parent company, **GardaWorld**, confirmed the attack was contained to its platform and did not affect other systems. Subscribers were automatically transferred to a new system, with those registered as of **March** already migrated. GardaWorld advised users to update passwords for any accounts sharing the same credentials. While the new system has undergone a **security audit**, Weld County continues to evaluate long-term solutions for emergency alerts. For now, the **Integrated Public Alert and Warning System (IPAWS)**—which sends notifications to all cellphones in targeted areas—will be managed through Larimer’s authority. Residents can still register for alerts via **accountportal.onsolve.net/weldcountyco**. The incident highlights vulnerabilities in critical public safety infrastructure and the importance of redundant notification systems.


Weld County Government has 17.65% more incidents than the average of same-industry companies with at least one recorded incident.
Weld County Government has 28.21% more incidents than the average of all companies with at least one recorded incident.
Weld County Government reported 1 incidents this year: 1 cyber attacks, 0 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
WCG cyber incidents detection timeline including parent company and subsidiaries

Weld County covers an area of 3,999 square miles in north central Colorado. It is bordered on the north by Wyoming and Nebraska and on the south by the Denver metropolitan area. The third largest county in Colorado, Weld County has an area greater than that of Rhode Island, Delaware and the District of Columbia combined. The climate is dry and generally mild with warm summers, mild winters and a growing season of approximately 138 days. The land surface is fairly level in the east, with rolling prairies and low hills near the western border. Elevations in the county range from 4,400 to 5,000 feet.


Working for Amsterdam means working for the most beautiful city in the world. Think of its rich history, the role Amsterdam plays internationally, and events such as Sail, Gay Pride and King’s Day. Of course everybody wants to visit Amsterdam, or work or live here. As you can probably imagine, work

OVERVIEW Framingham was incorporated as a town on June 25, 1700. Chapter 143 of the Acts of 1949 established the Town of Framingham Representative Town Government by Limited Town Meetings. The Citizens of Framingham adopted the Home Rule Charter for the City of Framingham at an election held on Ap

Op vrijwel alle werkterreinen en functieniveaus biedt de Rijksoverheid leuke en boeiende banen. Vacatures zijn bovendien in heel Nederland te vinden. Waar voor jou precies de mogelijkheden liggen hangt onder andere samen met je vooropleiding. Zowel met een mbo- of hbo-diploma als met een universitai

The Food and Drug Administration is an agency within the Department of Health and Human Services. The FDA is responsible for protecting the public health by ensuring the safety, efficacy, and security of human and veterinary drugs, biological products, and medical devices; and by ensuring the safet

The government of Illinois, under the Constitution of Illinois, has three branches of government: executive, legislative and judicial. The executive branch is split into several statewide elected offices, with the Governor as chief executive, and has numerous departments, agencies, boards and commis

The Philippine Department of Health (abbreviated as DOH; Filipino: Kagawaran ng Kalusugan) is the executive department of the Philippine government responsible for ensuring access to basic public health services by all Filipinos through the provision of quality health care and the regulation of all

We are the largest and most diverse organisation in our state. We have more than 90 government departments and organisations providing essential services across 4000+ locations—from the Torres Strait to the Gold Coast; Mount Isa to Brisbane. We are passionate about making Queensland better through

Welcome to the Internal Revenue Service’s official LinkedIn account. Here, you will find the latest and greatest news and updates for taxpayers to help them understand and meet their tax responsibilities. Also, this is a place to learn about a meaningful career with the IRS. Check out the tabs above

The Department of Homeland Security (DHS) has a vital mission: to secure the nation from the many threats we face. This requires the hard work of more than 260,000 employees in jobs that range from aviation and border security to emergency response, from cybersecurity analyst to chemical facility in
.png)
The local government was among many nationwide that were impacted by a cyber attack on the CodeRED platform. Its owner has transferred the...
Discover the plans for the Judicial Center expansion in Weld County, guided by Level5 Collaborative to enhance community justice services.
The Inc ransomware gang took responsibility for the attack earlier this month and claimed it stole sensitive subscriber data.
A cyberattack has taken the CodeRED system offline, a service used by public safety agencies to send emergency notifications to the public.
Voters fill out their ballots at a polling place on Election Day, Nov. 4, in Minneapolis, Minn. Stephen Maturen / Getty Images.
Learn about the potential impact of the government shutdown on snap assistance for Weld County residents and their families.
Local governments are warning citizens that because the federal government has been shut down for weeks with no end in sight, November SNAP...
Nine Republican candidates for Colorado's gubernatorial election debate on budget, cost of living, and Medicaid. Learn about their plans and...
A political consultant with long ties to Colorado recently reached out to as many as 10 county clerks across the state to obtain voting...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Weld County Government is http://www.weldgov.com.
According to Rankiteo, Weld County Government’s AI-generated cybersecurity score is 738, reflecting their Moderate security posture.
According to Rankiteo, Weld County Government currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Weld County Government is not certified under SOC 2 Type 1.
According to Rankiteo, Weld County Government does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Weld County Government is not listed as GDPR compliant.
According to Rankiteo, Weld County Government does not currently maintain PCI DSS compliance.
According to Rankiteo, Weld County Government is not compliant with HIPAA regulations.
According to Rankiteo,Weld County Government is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Weld County Government operates primarily in the Government Administration industry.
Weld County Government employs approximately 792 people worldwide.
Weld County Government presently has no subsidiaries across any sectors.
Weld County Government’s official LinkedIn profile has approximately 2,934 followers.
Weld County Government is classified under the NAICS code 92, which corresponds to Public Administration.
No, Weld County Government does not have a profile on Crunchbase.
Yes, Weld County Government maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/weld-county.
As of December 20, 2025, Rankiteo reports that Weld County Government has experienced 1 cybersecurity incidents.
Weld County Government has an estimated 11,757 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with codered platform taken offline; attack contained to the platform, and remediation measures with subscribers migrated to a new system; comprehensive security audit conducted on the new system, and recovery measures with backup system (larimer emergency telephone authority) used for emergency notifications; new system implemented, and communication strategy with county news release; statement from gardaworld; advisory to change passwords..
Title: Cyber Attack on CodeRED Emergency Notification System
Description: Weld County’s emergency notification system (CodeRED) went offline due to a cyber attack. The system was transferred to a new platform after the incident, and subscribers were migrated. The attack was contained to the CodeRED platform, and affected users were advised to change passwords for other accounts using the same credentials.
Date Detected: 2023-11-11
Type: Cyber Attack
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Systems Affected: CodeRED emergency notification system
Downtime: Since 2023-11-10
Operational Impact: Emergency notifications were disrupted; backup system (Larimer Emergency Telephone Authority) was used
Identity Theft Risk: Users advised to change passwords due to potential credential reuse

Entity Name: Weld County Public Safety Communications Department
Entity Type: Government
Industry: Public Safety/Emergency Services
Location: Weld County, Colorado, USA
Customers Affected: Subscribers to CodeRED emergency notification system

Entity Name: Crisis24 (CodeRED)
Entity Type: Private Company
Industry: Emergency Notification Services
Customers Affected: Subscribers as of March 2023

Entity Name: GardaWorld
Entity Type: Private Company
Industry: Security Services

Containment Measures: CodeRED platform taken offline; attack contained to the platform
Remediation Measures: Subscribers migrated to a new system; comprehensive security audit conducted on the new system
Recovery Measures: Backup system (Larimer Emergency Telephone Authority) used for emergency notifications; new system implemented
Communication Strategy: County news release; statement from GardaWorld; advisory to change passwords

Personally Identifiable Information: Potential credential exposure due to password reuse advisory
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Subscribers migrated to a new system; comprehensive security audit conducted on the new system.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by codered platform taken offline; attack contained to the platform.
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Backup system (Larimer Emergency Telephone Authority) used for emergency notifications; new system implemented.

Recommendations: Users advised to change passwords for other accounts where the same credentials were used
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Users advised to change passwords for other accounts where the same credentials were used.

Source: GardaWorld Statement

Source: Weld County News Release
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: GardaWorld Statement, and Source: Weld County News Release.
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through County news release; statement from GardaWorld; advisory to change passwords.

Stakeholder Advisories: Advisory to change passwords due to potential credential exposure
Customer Advisories: Residents encouraged to register for the new emergency alert system at accountportal.onsolve.net/weldcountyco
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Advisory to change passwords due to potential credential exposure and Residents encouraged to register for the new emergency alert system at accountportal.onsolve.net/weldcountyco.

Corrective Actions: Comprehensive security audit of the new system; backup notification system used during downtime
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Comprehensive security audit of the new system; backup notification system used during downtime.
Most Recent Incident Detected: The most recent incident detected was on 2023-11-11.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was CodeRED platform taken offline; attack contained to the platform.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Users advised to change passwords for other accounts where the same credentials were used.
Most Recent Source: The most recent source of information about an incident are Weld County News Release and GardaWorld Statement.
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Advisory to change passwords due to potential credential exposure, .
Most Recent Customer Advisory: The most recent customer advisory issued was an Residents encouraged to register for the new emergency alert system at accountportal.onsolve.net/weldcountyco.
.png)
n8n is an open source workflow automation platform. Versions starting with 0.211.0 and prior to 1.120.4, 1.121.1, and 1.122.0 contain a critical Remote Code Execution (RCE) vulnerability in their workflow expression evaluation system. Under certain conditions, expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n process. Successful exploitation may lead to full compromise of the affected instance, including unauthorized access to sensitive data, modification of workflows, and execution of system-level operations. This issue has been fixed in versions 1.120.4, 1.121.1, and 1.122.0. Users are strongly advised to upgrade to a patched version, which introduces additional safeguards to restrict expression evaluation. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Limit workflow creation and editing permissions to fully trusted users only; and/or deploy n8n in a hardened environment with restricted operating system privileges and network access to reduce the impact of potential exploitation. These workarounds do not fully eliminate the risk and should only be used as short-term measures.
FastAPI Users allows users to quickly add a registration and authentication system to their FastAPI project. Prior to version 15.0.2, the OAuth login state tokens are completely stateless and carry no per-request entropy or any data that could link them to the session that initiated the OAuth flow. `generate_state_token()` is always called with an empty `state_data` dict, so the resulting JWT only contains the fixed audience claim plus an expiration timestamp. On callback, the library merely checks that the JWT verifies under `state_secret` and is unexpired; there is no attempt to match the state value to the browser that initiated the OAuth request, no correlation cookie, and no server-side cache. Any attacker can hit `/authorize`, capture the server-generated state, finish the upstream OAuth flow with their own provider account, and then trick a victim into loading `.../callback?code=<attacker_code>&state=<attacker_state>`. Because the state JWT is valid for any client for \~1 hour, the victim’s browser will complete the flow. This leads to login CSRF. Depending on the app’s logic, the login CSRF can lead to an account takeover of the victim account or to the victim user getting logged in to the attacker's account. Version 15.0.2 contains a patch for the issue.
FileZilla Client 3.63.1 contains a DLL hijacking vulnerability that allows attackers to execute malicious code by placing a crafted TextShaping.dll in the application directory. Attackers can generate a reverse shell payload using msfvenom and replace the missing DLL to achieve remote code execution when the application launches.
LDAP Tool Box Self Service Password 1.5.2 contains a password reset vulnerability that allows attackers to manipulate HTTP Host headers during token generation. Attackers can craft malicious password reset requests that generate tokens sent to a controlled server, enabling potential account takeover by intercepting and using stolen reset tokens.
Kimai 1.30.10 contains a SameSite cookie vulnerability that allows attackers to steal user session cookies through malicious exploitation. Attackers can trick victims into executing a crafted PHP script that captures and writes session cookie information to a file, enabling potential session hijacking.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.