Company Details
city-of-hope
12,192
151,504
62
cityofhope.org
57
CIT_3094536
Completed


City of Hope Vendor Cyber Rating & Cyber Score
cityofhope.orgCity of Hope's mission is to deliver the cures of tomorrow to the people who need them today. Founded in 1913, City of Hope has grown into one of the largest cancer research and treatment organizations in the U.S. and one of the leading research centers for diabetes and other life-threatening illnesses. City of Hope research has been the basis for numerous breakthrough cancer medicines, as well as human synthetic insulin and monoclonal antibodies. With an independent, National Cancer Institute-designated comprehensive cancer center at its core, City of Hope brings a uniquely integrated model to patients spanning cancer care, research and development, academics and training, and innovation initiatives. City of Hope’s growing national system includes its Los Angeles campus, a network of clinical care locations across Southern California, a new cancer center in Orange County, California, and treatment facilities in Atlanta, Chicago and Phoenix. City of Hope’s affiliated group of organizations includes Translational Genomics Research Institute and AccessHope™.
Company Details
city-of-hope
12,192
151,504
62
cityofhope.org
57
CIT_3094536
Completed
Between 700 and 749

CH Global Score (TPRM)XXXX

Description: The California Office of the Attorney General reported that City of Hope experienced a data breach involving unauthorized access to systems resulting in potential exposure of personal information between September 19, 2023, and October 12, 2023. The breach was reported on April 2, 2024, and is believed to have affected various personal information types including names, contact information, and financial details; the exact number of individuals affected is unspecified.
Description: On April 2, 2024, the Washington State Office of the Attorney General reported a data breach involving City of Hope. The breach, which affected 3,784 Washington residents, resulted from a cyberattack that began on September 19, 2023, and was discovered on October 13, 2023. The compromised information may include names, Social Security numbers, and medical records.
Description: The California Office of the Attorney General reported that City of Hope experienced a phishing email incident that compromised the email accounts of four staff members on May 31 and June 2, 2017. The breach potentially exposed protected health information (PHI) of individuals, including names and medical record information. The report was made on August 3, 2017.


No incidents recorded for City of Hope in 2026.
No incidents recorded for City of Hope in 2026.
No incidents recorded for City of Hope in 2026.
CH cyber incidents detection timeline including parent company and subsidiaries

City of Hope's mission is to deliver the cures of tomorrow to the people who need them today. Founded in 1913, City of Hope has grown into one of the largest cancer research and treatment organizations in the U.S. and one of the leading research centers for diabetes and other life-threatening illnesses. City of Hope research has been the basis for numerous breakthrough cancer medicines, as well as human synthetic insulin and monoclonal antibodies. With an independent, National Cancer Institute-designated comprehensive cancer center at its core, City of Hope brings a uniquely integrated model to patients spanning cancer care, research and development, academics and training, and innovation initiatives. City of Hope’s growing national system includes its Los Angeles campus, a network of clinical care locations across Southern California, a new cancer center in Orange County, California, and treatment facilities in Atlanta, Chicago and Phoenix. City of Hope’s affiliated group of organizations includes Translational Genomics Research Institute and AccessHope™.


Thomas Jefferson University and Thomas Jefferson University Hospitals are partners in providing excellent clinical and compassionate care for our patients in the Philadelphia region, educating the health professionals of tomorrow in a variety of disciplines and discovering new knowledge that will de

M42 is an Abu Dhabi-based, global tech-enabled healthcare company operating at the forefront of medical advancement. The company is seeking to transform lives through innovative clinical solutions that can solve the world’s most critical health and diagnostic challenges. By harnessing unique medical

The Medical University of South Carolina (MUSC) is a public institution of higher learning the purpose of which is to preserve and optimize human life in South Carolina and beyond. The university provides an interprofessional environment for learning and discovery through education of health care p
Fortis Healthcare Group is a leading integrated healthcare provider operating across the Asia Pacific region. With more than 20,000 employees and growing, Fortis Helathcare is currently present in Australia, Canada, Hong Kong SAR, India, Mauritius, New Zealand, Singapore, Sri Lanka, UAE, and Vietnam
Indiana University Health is Indiana’s largest and most comprehensive system. A unique partnership with the Indiana University School of Medicine—one of the nation’s largest medical schools—gives patients access to groundbreaking research and innovative treatments, and it offers team members acces

The Mount Sinai Health System is an integrated health system committed to providing distinguished care, conducting transformative research, and advancing biomedical education. Structured around seven hospital campuses and a single medical school, the Health System has an extensive ambulatory netwo
The University of Maryland Medical System (UMMS) was created in 1984 when the state-owned University Hospital became a private, nonprofit organization. It has evolved into a multi-hospital system with academic, community and specialty service missions reaching every part of the state and beyond. UM

We are Erasmus MC. Our roots lie in Rotterdam, a city and port of international standing. We are the most innovative university medical center in the Netherlands and one of the world’s leading centers of scientific research. We are committed to achieving a healthy population and pursuing excellence

O nascimento da Sociedade Beneficente Israelita Brasileira Albert Einstein, na década de 50, resultou do compromisso da comunidade judaica em oferecer à população brasileira uma referência em qualidade da prática médica. Mas a Sociedade queria ir além da simples construção de um hospital. E assi
.png)
The media could not be loaded, either because the server or network failed or because the format is not supported. Error Code: 400-4.
A powerful musical experience rooted in history is about to arrive in Sioux City, bringing with it stories of resilience, memory, and hope.
High school students are attaining the technological skills and professionals are making career switches to the cybersecurity field.
A new report finds critical infrastructure is at greater risk of failure in Calgary than it has been in the past, with 11 per cent of...
When you tune in to When Calls the Heart each week, do you ever find yourself wishing you could spend a day in the idyllic Hope Valley?
LOS ANGELES, December 09, 2025--City of Hope® CEO Robert Stone, who leads one of the largest and most advanced cancer research and treatment...
City of Hope has agreed to a $8.5 million class action settlement to resolve claims it failed to prevent a 2023 data breach that compromised patient...
City of Hope, a Duarte, California-based non-profit clinical research and cancer treatment center, has agreed to settle a class action...
St. Paul city officials say they hope to get systems back online by the end of the week, after what they're calling a ransomware attack.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of City of Hope is http://www.cityofhope.org.
According to Rankiteo, City of Hope’s AI-generated cybersecurity score is 735, reflecting their Moderate security posture.
According to Rankiteo, City of Hope currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, City of Hope has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, City of Hope is not certified under SOC 2 Type 1.
According to Rankiteo, City of Hope does not hold a SOC 2 Type 2 certification.
According to Rankiteo, City of Hope is not listed as GDPR compliant.
According to Rankiteo, City of Hope does not currently maintain PCI DSS compliance.
According to Rankiteo, City of Hope is not compliant with HIPAA regulations.
According to Rankiteo,City of Hope is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
City of Hope operates primarily in the Hospitals and Health Care industry.
City of Hope employs approximately 12,192 people worldwide.
City of Hope presently has no subsidiaries across any sectors.
City of Hope’s official LinkedIn profile has approximately 151,504 followers.
City of Hope is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.
No, City of Hope does not have a profile on Crunchbase.
Yes, City of Hope maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/city-of-hope.
As of March 30, 2026, Rankiteo reports that City of Hope has experienced 3 cybersecurity incidents.
City of Hope has an estimated 32,297 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack and Breach.
Title: City of Hope Data Breach
Description: A data breach involving City of Hope affected 3,784 Washington residents, compromising names, Social Security numbers, and medical records.
Date Detected: 2023-10-13
Date Publicly Disclosed: 2024-04-02
Type: Data Breach
Title: City of Hope Data Breach
Description: The California Office of the Attorney General reported that City of Hope experienced a data breach involving unauthorized access to systems resulting in potential exposure of personal information between September 19, 2023, and October 12, 2023.
Date Publicly Disclosed: 2024-04-02
Type: Data Breach
Attack Vector: Unauthorized Access
Title: City of Hope Phishing Email Incident
Description: The California Office of the Attorney General reported that City of Hope experienced a phishing email incident that compromised the email accounts of four staff members on May 31 and June 2, 2017. The breach potentially exposed protected health information (PHI) of individuals, including names and medical record information.
Date Detected: 2017-05-312017-06-02
Date Publicly Disclosed: 2017-08-03
Type: Phishing
Attack Vector: Email
Vulnerability Exploited: Human
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Email.

Data Compromised: Names, Social security numbers, Medical records

Data Compromised: Names, Contact information, Financial details

Data Compromised: Protected Health Information (PHI)
Systems Affected: Email accounts
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Social Security Numbers, Medical Records, , Names, Contact Information, Financial Details, and Protected Health Information (PHI).

Entity Name: City of Hope
Entity Type: Healthcare
Industry: Healthcare
Location: Washington
Customers Affected: 3784

Entity Name: City of Hope
Entity Type: Healthcare
Industry: Healthcare
Location: California

Entity Name: City of Hope
Entity Type: Healthcare
Industry: Healthcare
Location: California

Type of Data Compromised: Names, Social security numbers, Medical records
Number of Records Exposed: 3784
Sensitivity of Data: High

Type of Data Compromised: Names, Contact information, Financial details

Type of Data Compromised: Protected Health Information (PHI)
Sensitivity of Data: High
Personally Identifiable Information: Names, Medical Record Information

Source: Washington State Office of the Attorney General
Date Accessed: 2024-04-02

Source: California Office of the Attorney General
Date Accessed: 2024-04-02

Source: California Office of the Attorney General
Date Accessed: 2017-08-03
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Washington State Office of the Attorney GeneralDate Accessed: 2024-04-02, and Source: California Office of the Attorney GeneralDate Accessed: 2024-04-02, and Source: California Office of the Attorney GeneralDate Accessed: 2017-08-03.

Entry Point: Email
Most Recent Incident Detected: The most recent incident detected was on 2023-10-13.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2017-08-03.
Most Significant Data Compromised: The most significant data compromised in an incident were names, Social Security numbers, medical records, , names, contact information, financial details, and Protected Health Information (PHI).
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Protected Health Information (PHI), medical records, contact information, Social Security numbers, names and financial details.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 382.0.
Most Recent Source: The most recent source of information about an incident are Washington State Office of the Attorney General and California Office of the Attorney General.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Email.
.png)
A vulnerability was identified in Totolink A3300R 17.0.0cu.557_b20221024. This affects the function setLanCfg of the file /cgi-bin/cstecgi.cgi of the component Parameter Handler. The manipulation of the argument lanIp leads to command injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.
Perl versions from 5.9.4 before 5.40.4-RC1, from 5.41.0 before 5.42.2-RC1, from 5.43.0 before 5.43.9 contain a vulnerable version of Compress::Raw::Zlib. Compress::Raw::Zlib is included in the Perl package as a dual-life core module, and is vulnerable to CVE-2026-3381 due to a vendored version of zlib which has several vulnerabilities, including CVE-2026-27171. The bundled Compress::Raw::Zlib was updated to version 2.221 in Perl blead commit c75ae9cc164205e1b6d6dbd57bd2c65c8593fe94.
Ghidra versions prior to 12.0.3 improperly process annotation directives embedded in automatically extracted binary data, resulting in arbitrary command execution when an analyst interacts with the UI. Specifically, the @execute annotation (which is intended for trusted, user-authored comments) is also parsed in comments generated during auto-analysis (such as CFStrings in Mach-O binaries). This allows a crafted binary to present seemingly benign clickable text which, when clicked, executes attacker-controlled commands on the analyst’s machine.
A critical security vulnerability in parisneo/lollms versions up to 2.2.0 allows any authenticated user to accept or reject friend requests belonging to other users. The `respond_request()` function in `backend/routers/friends.py` does not implement proper authorization checks, enabling Insecure Direct Object Reference (IDOR) attacks. Specifically, the `/api/friends/requests/{friendship_id}` endpoint fails to verify whether the authenticated user is part of the friendship or the intended recipient of the request. This vulnerability can lead to unauthorized access, privacy violations, and potential social engineering attacks. The issue has been addressed in version 2.2.0.
A Server-Side Request Forgery (SSRF) vulnerability exists in parisneo/lollms versions prior to 2.2.0, specifically in the `/api/files/export-content` endpoint. The `_download_image_to_temp()` function in `backend/routers/files.py` fails to validate user-controlled URLs, allowing attackers to make arbitrary HTTP requests to internal services and cloud metadata endpoints. This vulnerability can lead to internal network access, cloud metadata access, information disclosure, port scanning, and potentially remote code execution.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.