Company Details
california-medical-evaluators-inc-
61
1,124
5411
calmedeval.com
0
CAL_6540480
In-progress


California Medical Evaluators Vendor Cyber Rating & Cyber Score
calmedeval.comCalifornia Medical Evaluators is a doctor-owned management company focused on serving the medical and legal communities. While providing full-service administration of physicians’ medical-legal practices, CME also strategizes with law firms, attorneys and insurers to find the best possible medical expert for any matter. CME's services include: Workers' Compensation Evaluations (QME/AME) Independent Medical Evaluations Expert Witness Engagements Disability Evaluations Medical Records Review
Company Details
california-medical-evaluators-inc-
61
1,124
5411
calmedeval.com
0
CAL_6540480
In-progress
Between 550 and 599

CME Global Score (TPRM)XXXX

Description: Russian National Pleads Guilty in Phobos Ransomware Scheme, Faces 20-Year Sentence A 43-year-old Russian national, Evgenii Ptitsyn, pleaded guilty to wire fraud charges on Wednesday for his role as a key figure in the Phobos ransomware operation. Ptitsyn, the primary developer behind the ransomware, faces up to 20 years in prison and is scheduled for sentencing on July 15. Ptitsyn and his associates launched the Phobos ransomware campaign in November 2020, targeting over 1,000 organizations worldwide. He was arrested in South Korea and extradited to the U.S. in November 2024. According to prosecutors, Ptitsyn marketed the ransomware on cybercriminal forums, managed the gang’s darknet site for selling stolen data, and took a percentage of ransom payments from affiliates who carried out attacks. Among the victims were the California public school system, which paid a $300,000 ransom in 2023, as well as multiple healthcare organizations and businesses. U.S. authorities estimate that Phobos and its related strain, 8Base, extorted over $16 million from victims globally since 2019. Law enforcement in the U.S. and Europe have dismantled parts of the group over the past two years, including recent arrests in Poland and Thailand. In July 2024, Japanese officials released a free decryption tool to help organizations recover from Phobos attacks.


No incidents recorded for California Medical Evaluators in 2026.
No incidents recorded for California Medical Evaluators in 2026.
No incidents recorded for California Medical Evaluators in 2026.
CME cyber incidents detection timeline including parent company and subsidiaries

California Medical Evaluators is a doctor-owned management company focused on serving the medical and legal communities. While providing full-service administration of physicians’ medical-legal practices, CME also strategizes with law firms, attorneys and insurers to find the best possible medical expert for any matter. CME's services include: Workers' Compensation Evaluations (QME/AME) Independent Medical Evaluations Expert Witness Engagements Disability Evaluations Medical Records Review


Established in 1990, Smith Knowles provides transactional and litigation counseling, services and representation to businesses and to individuals. We have developed the resources and experience necessary to effectively provide legal services in general litigation, real estate-construction, commercia

Founded in 1984, McCarthy, Leonard & Kaemmerer L.C. provides experienced and efficient legal representation both in general practice areas and in specialized areas of the law. The firm represents management in labor and employment law and practices in the areas of insurance, products liability, envi

Murphy Sanchez is a national law firm with offices in New York, New Jersey, Pennsylvania, Delaware, Maryland (also serving Washington, DC), and California. As a women-owned firm, Murphy Sanchez has been designed from the ground up to provide to its clients the best legal services available and empo

The mission of the Office of the Public Defender (OPD) is to provide superior legal representation to indigent defendants in the State of Maryland by safeguarding fundamental individual rights and ensuring access to the guaranteed protections afforded by the United States Constitution, the Bill of R

I am a lawyer and mediator with over 30 years experience and have conducted over 2000 mediations and 200 arbitrations. I am a nationally registered mediator and certified as a Federal Dispute Resolution Practitioner. I coach, teach and conduct workshops and seminars about mediations. Specialties:
At The Barrister Group, we’re redefining what a modern chambers looks like. As one of the largest barristers’ chambers in England & Wales, we combine nationwide court coverage with the flexibility of a tech-driven, online booking system. Our barristers and mediators cover 84 areas of law, from busi

Nishimura & Asahi has five offices in Japan, as well as offices in Bangkok, Shanghai, Dubai, Frankfurt/Düsseldorf, Hanoi, Ho Chi Minh City, Jakarta, Kuala Lumpur, Manila, New York, Singapore, Taipei, and Yangon. We opened Bangkok office in 2013, under the name Nishimura & Asahi (Thailand) Co., Ltd

At Join the Claim, we unite eligible claimants and law firms, significantly increasing qualified sign-ups for your group actions. A matchmaker for justice, if you need potential claimants for your group claims, we’ll find them. A passionate crew of digital specialists, combined we’ve spent over

ICAN is a nonprofit public interest litigation organization dedicated to breaking down barriers to entry to capital markets and pushing back against the overreach of the Securities and Exchange Commission (SEC), serving as a legal advocate and voice for small investors and entrepreneurs whose effort
.png)
After years of delays, the process of sending commercial driver medical cards to state licensing agencies is finally going digital — except...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of California Medical Evaluators is https://calmedeval.com/.
According to Rankiteo, California Medical Evaluators’s AI-generated cybersecurity score is 565, reflecting their Very Poor security posture.
According to Rankiteo, California Medical Evaluators currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, California Medical Evaluators has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, California Medical Evaluators is not certified under SOC 2 Type 1.
According to Rankiteo, California Medical Evaluators does not hold a SOC 2 Type 2 certification.
According to Rankiteo, California Medical Evaluators is not listed as GDPR compliant.
According to Rankiteo, California Medical Evaluators does not currently maintain PCI DSS compliance.
According to Rankiteo, California Medical Evaluators is not compliant with HIPAA regulations.
According to Rankiteo,California Medical Evaluators is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
California Medical Evaluators operates primarily in the Legal Services industry.
California Medical Evaluators employs approximately 61 people worldwide.
California Medical Evaluators presently has no subsidiaries across any sectors.
California Medical Evaluators’s official LinkedIn profile has approximately 1,124 followers.
California Medical Evaluators is classified under the NAICS code 5411, which corresponds to Legal Services.
Yes, California Medical Evaluators has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/california-medical-evaluators.
Yes, California Medical Evaluators maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/california-medical-evaluators-inc-.
As of April 03, 2026, Rankiteo reports that California Medical Evaluators has experienced 1 cybersecurity incidents.
California Medical Evaluators has an estimated 7,769 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.
Total Financial Loss: The total financial loss from these incidents is estimated to be $16 million.
Detection and Response: The company detects and responds to cybersecurity incidents through an law enforcement notified with yes (u.s. and european authorities), and remediation measures with free decryption tool released by japanese officials (july 2024)..
Title: Russian National Pleads Guilty in Phobos Ransomware Scheme
Description: A 43-year-old Russian national, Evgenii Ptitsyn, pleaded guilty to wire fraud charges for his role as a key figure in the Phobos ransomware operation. Ptitsyn, the primary developer behind the ransomware, faces up to 20 years in prison. The Phobos ransomware campaign targeted over 1,000 organizations worldwide since November 2020.
Type: Ransomware
Attack Vector: Cybercriminal forums, darknet site for selling stolen data
Threat Actor: Evgenii Ptitsyn and associates
Motivation: Financial gain
Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Financial Loss: $16 million (estimated total extorted)
Data Compromised: Stolen data sold on darknet
Average Financial Loss: The average financial loss per incident is $16.00 million.

Entity Name: California public school system
Entity Type: Educational institution
Industry: Education
Location: California, USA

Entity Type: Businesses

Law Enforcement Notified: Yes (U.S. and European authorities)
Remediation Measures: Free decryption tool released by Japanese officials (July 2024)

Data Exfiltration: Yes (data sold on darknet)
Data Encryption: Yes (ransomware encryption)
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Free decryption tool released by Japanese officials (July 2024).

Ransom Paid: $300,000 (California public school system)
Ransomware Strain: Phobos, 8Base
Data Encryption: Yes
Data Exfiltration: Yes

Legal Actions: Wire fraud charges (U.S.)
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Wire fraud charges (U.S.).

Source: U.S. Department of Justice
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: U.S. Department of Justice.

Investigation Status: Ongoing (parts of the group dismantled)
Ransom Payment History: The company has Paid ransoms in the past.
Last Attacking Group: The attacking group in the last incident was an Evgenii Ptitsyn and associates.
Highest Financial Loss: The highest financial loss from an incident was $16 million (estimated total extorted).
Most Significant Data Compromised: The most significant data compromised in an incident was Stolen data sold on darknet.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Stolen data sold on darknet.
Highest Ransom Paid: The highest ransom paid in a ransomware incident was $300,000 (California public school system).
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Wire fraud charges (U.S.).
Most Recent Source: The most recent source of information about an incident is U.S. Department of Justice.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (parts of the group dismantled).
.png)
Hirschmann EagleSDV version 05.4.01 prior to 05.4.02 contains a denial-of-service vulnerability that causes the device to crash during session establishment when using TLS 1.0 or TLS 1.1. Attackers can trigger a crash by initiating TLS connections with these protocol versions to disrupt service availability.
The stored API keys in temporary browser client is not marked as protected allowing for JavScript console or other errors to allow for extraction of the encryption credentials.
XSS vulnerability in cveInterface.js allows for inject HTML to be passed to display, as cveInterface trusts input from CVE API services
Multiple reflected cross-site scripting (XSS) vulnerabilities in the login.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda and red_url parameters.
A reflected cross-site scripting (XSS) vulnerability in the login_newpwd.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda parameter.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.