Heroku Company Cyber Security Posture

heroku.com

Heroku, a Salesforce company and industry pioneer in platform as a service (PaaS), enables developers to build and run applications entirely in the cloud, without the need to purchase or maintain any servers or software. Over 5 million apps, including ones from Live Nation Entertainment, HealthSherpa, and Airbase run on Heroku. With support for the most popular languages such as Ruby and Node.js, high-scale data services including Postgres, Kafka and Redis, and an add-ons ecosystem featuring over 180 cloud application services, Heroku provides companies from startups to Fortune 500 enterprises with a faster and more effective way to create, deploy and manage apps.

Heroku Company Details

Linkedin ID:

heroku

Employees number:

152 employees

Number of followers:

27258

NAICS:

511

Industry Type:

Software Development

Homepage:

heroku.com

IP Addresses:

Scan still pending

Company ID:

HER_6524630

Scan Status:

In-progress

AI scoreHeroku Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

globalscoreHeroku Global Score
blurone
Ailogo

Heroku Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

Heroku Company Cyber Security News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
HerokuBreach100605/2022HER12557522Link
Rankiteo Explanation :
Attack threatening the economy of a geographical region

Description: The popular cloud platform, Heroku, had to forcibly reset some user passwords after they were targeted in a security breach. The hackers obtained access to a Heroku database and downloaded stored customer GitHub integration OAuth tokens by leveraging a compromised token for a Heroku machine account. Heroku worked with GitHub, threat intelligence vendors, and even law enforcement to investigate the incident. In response to the incident, Heroku rotated all config var creds, changed passwords, and rotated API Key and 2FA.

Heroku Company Subsidiaries

SubsidiaryImage

Heroku, a Salesforce company and industry pioneer in platform as a service (PaaS), enables developers to build and run applications entirely in the cloud, without the need to purchase or maintain any servers or software. Over 5 million apps, including ones from Live Nation Entertainment, HealthSherpa, and Airbase run on Heroku. With support for the most popular languages such as Ruby and Node.js, high-scale data services including Postgres, Kafka and Redis, and an add-ons ecosystem featuring over 180 cloud application services, Heroku provides companies from startups to Fortune 500 enterprises with a faster and more effective way to create, deploy and manage apps.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=heroku' -H 'apikey: YOUR_API_KEY_HERE'
newsone

Heroku Cyber Security News

2025-06-10T07:00:00.000Z
Global Heroku Outage Disrupts Web Platforms Worldwide

Salesforce's cloud platform Heroku is currently experiencing a widespread service disruption that has affected thousands of businessesย ...

2025-04-16T07:00:00.000Z
Chinese Hackers Unleash New BRICKSTORM Malware to Target Windows and Linux Systems

A sophisticated cyber espionage campaign leveraging the newly identified BRICKSTORM malware variants has targeted European strategic.

2022-05-09T07:00:00.000Z
Salesforce Bruised over Heroku Breach Response

Without a doubt, the Heroku breach is a negative note for Salesforce cybersecurity and a red alert for every Heroku user. However, the problemย ...

2025-05-17T07:00:00.000Z
Guide to Cloud API Security - Preventing Token Abuse

As organizations accelerate cloud adoption, API token abuse has emerged as a critical vulnerability vector. Recent incidents at significantย ...

2025-01-18T08:00:00.000Z
$TRUMP meme coin on Solana surges to $8 billion market cap within hours

A cryptocurrency allegedly linked to President-elect Donald Trump soared to an $8 billion market capitalisation within three hours of its debutย ...

2021-11-03T07:00:00.000Z
Cybersecurity leader gives $50k, establishes CISO Fund Cybersecurity Scholarship Endowment

The University of West Florida has created the CISO Fund Cybersecurity Scholarship Endowment with a $50,000 gift from Adam Ely, technologyย ...

2023-11-29T14:03:20.000Z
Lessons From the GitHub Cybersecurity Breach

Developers definitely don't want to hear that word in relation to a platform they use day in and day out. When GitHub revealed details about a securityย ...

2024-02-14T08:00:00.000Z
What is cybersecurity mesh and how can it help you?

Discover what cybersecurity mesh is and how it can reduce the complexity introduced by multi-cloud deployments and the remote workforce.

2023-01-06T08:00:00.000Z
Hackers Using CAPTCHA Bypass Tactics in Freejacking Campaign on GitHub

The core idea that undergirds PURPLEURCHIN is the exploitation of computational resources allocated to free and premium accounts on cloudย ...

similarCompanies

Heroku Similar Companies

CPAN, the Comprehensive Perl Archive Network, is an archive of software written in Perl containing over 134,000 modules in over 29,700 distributions, as well as documentation for it. It has a presence on the World Wide Web at www.cpan.org and is mirrored world The Comprehensive Perl Archive Network

Facebook

The Facebook company is now Meta. Meta builds technologies that help people connect, find communities, and grow businesses. When Facebook launched in 2004, it changed the way people connect. Apps like Messenger, Instagram and WhatsApp further empowered billions around the world. Now, Meta is moving

Grab is Southeast Asiaโ€™s leading superapp, offering a suite of services consisting of deliveries, mobility, financial services, enterprise and others. Grabbers come from all over the world, and we are united by a common mission: to drive Southeast Asia forward by creating economic empowerment for ev

LinkedIn

Founded in 2003, LinkedIn connects the world's professionals to make them more productive and successful. With more than 1 billion members worldwide, including executives from every Fortune 500 company, LinkedIn is the world's largest professional network. The company has a diversified business mode

VMware by Broadcom delivers software that unifies and streamlines hybrid cloud environments for the worldโ€™s most complex organizations. By combining public-cloud scale and agility with private-cloud security and performance, we empower our customers to modernize, optimize and protect their apps an

Meta's mission is to build the future of human connection and the technology that makes it possible. Our technologies help people connect, find communities, and grow businesses. When Facebook launched in 2004, it changed the way people connect. Apps like Messenger, Instagram and WhatsApp further e

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Heroku CyberSecurity History Information

How many cyber incidents has Heroku faced?

Total Incidents: According to Rankiteo, Heroku has faced 1 incident in the past.

What types of cybersecurity incidents have occurred at Heroku?

Incident Types: The types of cybersecurity incidents that have occurred incident Breach.

How does Heroku detect and respond to cybersecurity incidents?

Detection and Response: The company detects and responds to cybersecurity incidents through third party assistance with GitHub, Threat intelligence vendors and law enforcement notified with True and remediation measures with Rotated all config var creds, Changed passwords, Rotated API Key and 2FA.

Incident Details

Can you provide details on each incident?

Incident : Security Breach

Title: Heroku Security Breach

Description: Heroku had to forcibly reset some user passwords after they were targeted in a security breach. Hackers obtained access to a Heroku database and downloaded stored customer GitHub integration OAuth tokens by leveraging a compromised token for a Heroku machine account.

Type: Security Breach

Attack Vector: Compromised Token

Vulnerability Exploited: Compromised OAuth token for a Heroku machine account

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Breach.

How does the company identify the attack vectors used in incidents?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Compromised OAuth token.

Impact of the Incidents

What was the impact of each incident?

Incident : Security Breach HER12557522

Data Compromised: GitHub integration OAuth tokens

Systems Affected: Heroku database

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are GitHub integration OAuth tokens.

Which entities were affected by each incident?

Incident : Security Breach HER12557522

Entity Type: Cloud Platform

Industry: Technology

Response to the Incidents

What measures were taken in response to each incident?

Incident : Security Breach HER12557522

Third Party Assistance: GitHub, Threat intelligence vendors

Law Enforcement Notified: True

Remediation Measures: Rotated all config var creds, Changed passwords, Rotated API Key and 2FA

How does the company involve third-party assistance in incident response?

Third-Party Assistance: The company involves third-party assistance in incident response through GitHub, Threat intelligence vendors.

Data Breach Information

What type of data was compromised in each breach?

Incident : Security Breach HER12557522

Type of Data Compromised: GitHub integration OAuth tokens

Data Exfiltration: True

What measures does the company take to prevent data exfiltration?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Rotated all config var creds, Changed passwords, Rotated API Key and 2FA.

Investigation Status

What is the current status of the investigation for each incident?

Incident : Security Breach HER12557522

Investigation Status: Investigation in progress

Initial Access Broker

How did the initial access broker gain entry for each incident?

Incident : Security Breach HER12557522

Entry Point: Compromised OAuth token

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident?

Incident : Security Breach HER12557522

Root Causes: Compromised OAuth token for a Heroku machine account

Corrective Actions: Rotated all config var creds, Changed passwords, Rotated API Key and 2FA

What is the company's process for conducting post-incident analysis?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as GitHub, Threat intelligence vendors.

What corrective actions has the company taken based on post-incident analysis?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Rotated all config var creds, Changed passwords, Rotated API Key and 2FA.

Additional Questions

Impact of the Incidents

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident was GitHub integration OAuth tokens.

What was the most significant system affected in an incident?

Most Significant System Affected: The most significant system affected in an incident was Heroku database.

Response to the Incidents

What third-party assistance was involved in the most recent incident?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was GitHub, Threat intelligence vendors.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach was GitHub integration OAuth tokens.

Investigation Status

What is the current status of the most recent investigation?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Investigation in progress.

Initial Access Broker

What was the most recent entry point used by an initial access broker?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an Compromised OAuth token.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge