Company Details
brigham-young-university
16,614
348,411
6113
byu.edu
0
BRI_2742062
In-progress


Brigham Young University Vendor Cyber Rating & Cyber Score
byu.eduWe believe a world yearning for hope and joy needs the graduates of Brigham Young University—disciples of Jesus Christ who are driven by love for God and His children and who are prepared to serve and lead. This preparation demands a unique university model: at BYU, belief enhances inquiry, study amplifies faith, and revelation leads to rich understanding; at BYU, helping students develop their full divine potential is central to both our teaching and our scholarship. As the flagship higher education institution of The Church of Jesus Christ of Latter-day Saints, BYU strives to be among the exceptional universities in the world and an essential university for the world.
Company Details
brigham-young-university
16,614
348,411
6113
byu.edu
0
BRI_2742062
In-progress
Between 800 and 849

BYU Global Score (TPRM)XXXX

Description: The personal information of hundreds of international students at Brigham Young University was inadvertently released by email. The message was sent by a staff member in the University Advisement Center who was sending out a notice of a career workshop but attacked a complete list of students with personal information. The details included the students’ names, email addresses, phone numbers and student ID numbers of all 1,300 international students.


No incidents recorded for Brigham Young University in 2026.
No incidents recorded for Brigham Young University in 2026.
No incidents recorded for Brigham Young University in 2026.
BYU cyber incidents detection timeline including parent company and subsidiaries

We believe a world yearning for hope and joy needs the graduates of Brigham Young University—disciples of Jesus Christ who are driven by love for God and His children and who are prepared to serve and lead. This preparation demands a unique university model: at BYU, belief enhances inquiry, study amplifies faith, and revelation leads to rich understanding; at BYU, helping students develop their full divine potential is central to both our teaching and our scholarship. As the flagship higher education institution of The Church of Jesus Christ of Latter-day Saints, BYU strives to be among the exceptional universities in the world and an essential university for the world.


Deakin’s unique identity – rooted in balanced excellence in education and research – has been driving lasting change for a better future since 1974. Over our 50+ year history, Deakin has grown to be one of the top universities worldwide with a truly global presence. Our passion and commitment to tea

The University of Alberta is one of Canada’s top teaching and research universities, with an international reputation for excellence across the humanities, sciences, creative arts, business, engineering, and health sciences. Home to more than 39,000 students and 15,000 faculty and staff, the univers

The University of Illinois Urbana-Champaign is dedicated to building upon its tradition of excellence in education, research, public engagement and economic development. More than 3,000 faculty members discover and create new knowledge. Their work is an economic engine for the state and is recognize

The University of Kentucky is a public, research-extensive, land grant university dedicated to improving people's lives through excellence in teaching, research, health care, cultural enrichment, and economic development for over 150 years. The University of Kentucky: - Facilitates learning, inf

UC San Francisco is driven by the idea that when the best research, the best education and the best patient care converge, great breakthroughs are achieved. We pursue this integrated excellence with singular focus, fueled by collaboration among our top-ranked professional and graduate schools, medic

Working for the world Science has the power to change the world. Join one of the best research universities in the world – an international community united through bold thinking, science, research, and learning, with over 30,000 students and 8,000 employees. We are defined by our multidisciplina

Alma Mater Studiorum - Università di Bologna operates on the principle that every individual carries within themselves a unique and unrepeatable potential. Active listening and dialogue guide the work of the University of Bologna, which promotes, in all its activities, inclusion, equity, and dive

The Tecnológico de Monterrey is a private university system with 33 campuses in 26 cities in Mexico, which serves more than 96,000 students in its high school, undergraduate and graduate programs. It also has liaison offices in 12 countries. Through the promotion of research, generation of knowle

LSU is the flagship institution of Louisiana and is one of only 30 universities nationwide holding land-grant, sea-grant and space-grant status. Since 1860, LSU has served its region, the nation, and the world through extensive, multipurpose programs encompassing instruction, research, and public
.png)
If your X (formerly Twitter) account is locked, limited, or suspended, these steps can help you get your account back in good standing.
The Collegiate Penetration Testing Competition brings together the best offense-based cybersecurity students in the world.
The Middlebury Institute of International Studies made history this November by hosting the first-ever West Coast edition of the...
S&T and Brigham Young University are developing predictive tools to address the dangers facing our aging critical infrastructure.
A high-level delegation from Utah, led by World Trade Centre-Utah Managing Director and COO David Carlebach, called on the minister at the...
We are investigating a data breach impacting the sensitive personal information of individuals affiliated with Brigham Young University...
University of South Florida student explores robotics reinforcement learning and multi-goal spatial navigation using hierarchical learning...
In a riveting display of Wolverine grit, Utah Valley University's (UVU) “W0LV3R1NES” cybersecurity team claimed first place among 45 top university,...
Students from 10 regional colleges and universities huddled around computers, anticipating an onslaught of simulated cyberattacks.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Brigham Young University is https://byu.edu.
According to Rankiteo, Brigham Young University’s AI-generated cybersecurity score is 800, reflecting their Good security posture.
According to Rankiteo, Brigham Young University currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Brigham Young University has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Brigham Young University is not certified under SOC 2 Type 1.
According to Rankiteo, Brigham Young University does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Brigham Young University is not listed as GDPR compliant.
According to Rankiteo, Brigham Young University does not currently maintain PCI DSS compliance.
According to Rankiteo, Brigham Young University is not compliant with HIPAA regulations.
According to Rankiteo,Brigham Young University is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Brigham Young University operates primarily in the Higher Education industry.
Brigham Young University employs approximately 16,614 people worldwide.
Brigham Young University presently has no subsidiaries across any sectors.
Brigham Young University’s official LinkedIn profile has approximately 348,411 followers.
Brigham Young University is classified under the NAICS code 6113, which corresponds to Colleges, Universities, and Professional Schools.
No, Brigham Young University does not have a profile on Crunchbase.
Yes, Brigham Young University maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/brigham-young-university.
As of April 02, 2026, Rankiteo reports that Brigham Young University has experienced 1 cybersecurity incidents.
Brigham Young University has an estimated 15,823 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Data Leak.
Title: Data Breach at Brigham Young University
Description: The personal information of hundreds of international students at Brigham Young University was inadvertently released by email. The message was sent by a staff member in the University Advisement Center who was sending out a notice of a career workshop but attached a complete list of students with personal information. The details included the students’ names, email addresses, phone numbers and student ID numbers of all 1,300 international students.
Type: Data Breach
Attack Vector: Email
Vulnerability Exploited: Human Error
Threat Actor: Internal Staff
Motivation: Accidental
Common Attack Types: The most common types of attacks the company has faced is Data Leak.

Data Compromised: Names, Email addresses, Phone numbers, Student id numbers
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personally Identifiable Information and .

Entity Name: Brigham Young University
Entity Type: Educational Institution
Industry: Education
Customers Affected: 1300

Type of Data Compromised: Personally identifiable information
Number of Records Exposed: 1300
Sensitivity of Data: High
Personally Identifiable Information: NamesEmail AddressesPhone NumbersStudent ID Numbers
Last Attacking Group: The attacking group in the last incident was an Internal Staff.
Most Significant Data Compromised: The most significant data compromised in an incident were Names, Email Addresses, Phone Numbers, Student ID Numbers and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Email Addresses, Names, Student ID Numbers and Phone Numbers.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 130.0.
.png)
A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.