Rankiteo Blog
  • Blog Home Page
  • Website Home Page
  • About
Sign in Sign up
Sign up Sign in
  • Blog Home Page
  • Website Home Page
  • About
  • Data & privacy
  • Contact
Unlock full access to see the entire library by subscribing to a paid plan.
Sign up
Bookmarks

Vulnerability

1258 posts
Colorado Department of Health Care Policy and Financing
Vulnerability cyber

Colorado Department of Health Care Policy and Financing

public – 1 min read
The Colorado Department of Health Care Policy & Financing (HCPF) reported a data breach involving Progress Software on August 11,…
May 28, 2023
Jeremy C Jeremy C
CWT Travel Holdings, Inc.
Vulnerability cyber

CWT Travel Holdings, Inc.

public – 1 min read
The Vermont Office of the Attorney General reported on September 22, 2023, that CWT Travel Holdings, Inc. experienced a data…
May 28, 2023
Jeremy C Jeremy C
Barrick Gold Corporation
Vulnerability cyber

Barrick Gold Corporation

public – 1 min read
The California Attorney General reported a data breach involving Barrick Gold Corporation on January 3, 2024. The breach occurred from…
May 28, 2023
Jeremy C Jeremy C
Revelstoke Mountaineer
Vulnerability cyber

Revelstoke Mountaineer

public – 1 min read
After learning about data security vulnerabilities with the system, the City of Revelstoke stopped its emergency notification system. The system…
May 27, 2023
Jeremy C Jeremy C
Fortinet
Vulnerability cyber

Fortinet

public – 1 min read
A threat actor exploited a Fortinet vulnerability and has exfiltrated and leaked a list of almost 500,000 Fortinet VPN…
May 27, 2023
Jeremy C Jeremy C
Travis CI
Vulnerability cyber

Travis CI

public – 1 min read
Travis CI, a continuous integration and continuous delivery (CI/CD) service for cloud platform projects, admitted to an issue in…
May 27, 2023
Jeremy C Jeremy C
Port Houston
Vulnerability cyber

Port Houston

public – 1 min read
The network of the Port of Houston, one of the largest port authorities in the US, was targeted by the…
May 27, 2023
Jeremy C Jeremy C
Twitter
Vulnerability cyber

Twitter

public – 1 min read
Twitter experienced a new security vulnerability that exposed the direct messages of users who access the service using Android devices.…
May 27, 2023
Jeremy C Jeremy C
Southern Water
Vulnerability cyber

Southern Water

public – 1 min read
British supplier of liquid of life, Southern Water botched its internal Sharepoint. They had set up Sharepoint to host customer…
May 27, 2023
Jeremy C Jeremy C
Inventory Hive
Vulnerability cyber

Inventory Hive

public – 1 min read
A vulnerability in the website of Inventory Hive, a property inventory service, leaked members’ personal information. It included their name…
May 27, 2023
Jeremy C Jeremy C
IOTA
Vulnerability cyber

IOTA

public – 1 min read
IOTA Foundation, the nonprofit organization behind the IOTA cryptocurrency, has shut down its entire network this week after hackers exploited…
May 27, 2023
Jeremy C Jeremy C
IBM
Vulnerability cyber

IBM

public – 1 min read
Four zero-day vulnerabilities impacted an IBM security product after the company refused to patch bugs following a private bug disclosure…
May 27, 2023
Jeremy C Jeremy C
Ready to get started now?
Subscribe to get access to premium content or contact us if you have any questions.
Subscribe Contact us
Rankiteo Blog
Every risk at your fingertips
Navigation
  • Blog Home Page
  • Website Home Page
  • About
Quick links
  • Data & privacy
  • Contact
Tags
cyber Breach Ransomware Cyber Attack Vulnerability
©2026 Rankiteo Blog. Published with Ghost & Dashi.
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.