Badge
11,371 badges added since 01 January 2025
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions

We are improving supply chain efficiency. For three decades, Wavelink has delivered mobile-enabling solutions that improve supply-chain efficiency and worker productivity. The company has been an innovator in mission-critical device management, wireless infrastructure management, terminal emulation, voice enabling, and mobile application development software. Thousands of companies with millions of devices across a broad spectrum of vertical markets rely on Wavelink to accelerate application delivery, reduce device management and support costs, and tighten network security. Wavelink was acquired by LANDESK in June 2012. In January 2017, as a result of the purchase of LANDESK by Clearlake Capital and the establishment of the new company Ivanti, both the Wavelink and LANDESK product brands were woven into the Ivanti line of technology solutions. Businesses around the globe in industries ranging from manufacturing and retail to warehousing and field-force automation rely on Wavelink mobility software platforms and voice-enablement and enterprise mobility management (EMM) solutions.

Ivanti Wavelink A.I CyberSecurity Scoring

Ivanti Wavelink

Company Details

Linkedin ID:

ivanti-wavelink

Employees number:

None employees

Number of followers:

1,716

NAICS:

5112

Industry Type:

Software Development

Homepage:

ivanti.com

IP Addresses:

0

Company ID:

IVA_1578835

Scan Status:

In-progress

AI scoreIvanti Wavelink Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/ivanti-wavelink.jpeg
Ivanti Wavelink Software Development
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
Get a Score Increase
globalscoreIvanti Wavelink Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/ivanti-wavelink.jpeg
Ivanti Wavelink Software Development
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Ivanti Wavelink Company CyberSecurity News & History

Past Incidents
15
Attack Types
4
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
IvantiVulnerability2513/2026NA
Rankiteo Explanation :
Attack without any consequences

Description: Ivanti Patches High-Severity Privilege Escalation Flaw in DSM Software Ivanti has released a security update for its Desktop and Server Management (DSM) software, addressing a high-severity privilege escalation vulnerability (CVE-2026-3483) with a CVSS score of 7.8. The flaw affects all DSM versions up to and including 2026.1 and stems from an exposed dangerous method (CWE-749), allowing a local authenticated attacker to gain elevated privileges on vulnerable systems. The vulnerability requires low attack complexity and no user interaction, making it easily exploitable once an attacker gains initial access. Successful exploitation could enable threat actors to compromise confidentiality, integrity, and availability of affected systems particularly critical in enterprise environments where DSM manages large-scale endpoints and servers. Ivanti has resolved the issue in DSM version 2026.1.1, available via the Ivanti License System (ILS). The company confirmed no active exploitation at the time of disclosure, as the flaw was reported through its responsible disclosure program. No indicators of compromise (IOCs) have been identified. Organizations using affected versions are advised to upgrade immediately to mitigate risk. Additional details are available in Ivanti’s release notes and upgrade documentation.

IvantiRansomware10052/2026NA
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Ransomware Attackers Exploit Overlooked Machine Identities, Widening Security Gaps A growing blind spot in ransomware defense strategies is leaving organizations vulnerable to prolonged attacks, with adversaries increasingly targeting machine identities such as service accounts, API tokens, and certificates to move laterally within networks undetected. Research from Gartner and CrowdStrike reveals that attackers spend days to months harvesting these credentials before deploying ransomware, often evading traditional detection methods. ### Key Vulnerabilities & Attack Trends - Machine identities are the weakest link: Unlike human credentials, compromised service accounts and API tokens rarely trigger alerts, allowing attackers to persist in networks. 76% of organizations fear ransomware spreading via unmanaged hosts over SMB network shares, yet most incident response playbooks fail to address non-human credentials. - Rapid deployment, high costs: Over 50% of ransomware attacks now deploy within one day of initial access. Recovery costs average 10 times the ransom demand, with CrowdStrike estimating $1.7 million in downtime per incident rising to $2.5 million for public sector organizations. - Paying ransoms offers no guarantee: 93% of organizations that paid still had data stolen, and 83% were attacked again. Nearly 40% could not fully restore data from backups, underscoring the futility of ransom payments. ### Critical Gaps in Incident Response - Playbooks ignore machine credentials: The most widely used ransomware containment frameworks including Gartner’s template focus on resetting human and device accounts but omit service accounts, API keys, and tokens. This oversight allows attackers to regain access even after initial remediation. - Detection logic lags behind threats: 85% of security teams admit traditional methods can’t keep pace with modern attacks. Only 53% have implemented AI-powered threat detection, leaving anomalous machine behavior such as unusual API call volumes or tokens used outside automation windows unmonitored. - AI adoption exacerbates risks: 87% of organizations prioritize agentic AI, which introduces autonomous machine identities that authenticate and act independently. Yet only 55% enforce formal guardrails, creating new attack surfaces. ### Industry-Specific Preparedness Failures - Manufacturing & public sector lag behind: Despite 60% of public sector organizations rating themselves as "very prepared," only 12% recovered within 24 hours after an attack. Among manufacturers, 40% suffered significant operational disruption. - Persistent entry points remain unaddressed: Only 38% of organizations fixed the specific vulnerability exploited in their last ransomware attack. The rest invested in general security improvements without closing the original breach vector. - Exposure management is inadequate: Nearly half of organizations lack a cybersecurity exposure score, and only 27% rate their risk assessment as "excellent." Stale service accounts some tied to former employees remain the easiest entry point for attackers. ### The Urgency of Machine Identity Governance Gartner warns that poor IAM practices are a primary starting point for ransomware, with previously compromised credentials frequently sold on the dark web. Yet most playbooks fail to inventory or reset machine identities during containment, leaving trust chains intact even after network isolation. The preparedness gap is widening: Ivanti’s 2026 report found that readiness deficits across ransomware, phishing, and supply chain attacks have grown by 10 points year-over-year. With 82 machine identities for every human user 42% of which have privileged access organizations must map ownership, enforce rotation policies, and integrate machine identity detection into incident response before the next attack.

IvantiCyber Attack8542/2026ConduentConduent
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Sophisticated Vishing Campaign Targets Apple Pay Users in Phishing Scam A highly convincing phishing campaign is actively targeting Apple Pay users, employing deceptive emails and phone-based social engineering to steal financial and login credentials. The attack, analyzed by Malwarebytes, begins with a fraudulent email mimicking an official Apple receipt, complete with the company’s logo, a fabricated case ID, and a timestamp. The message warns of a blocked high-value purchase such as a 2025 MacBook Air and urges the recipient to call a provided support number if the alleged "appointment" to review the fraud is inconvenient. Unlike traditional phishing schemes that rely on malicious links, this campaign uses vishing (voice phishing) to manipulate victims over the phone. When contacted, scammers posing as Apple’s fraud department follow a scripted conversation, initially verifying harmless details like partial phone numbers before escalating to requests for Apple ID two-factor authentication (2FA) codes. In real time, attackers use these codes to hijack accounts, gaining access to stored data, photos, and linked payment methods. The scam’s effectiveness lies in its psychological tactics leveraging urgency, brand trust, and fabricated transaction details to bypass skepticism. Researchers emphasize that Apple never schedules fraud reviews via email or demands callbacks, and official communications always originate from verified Apple domains. Victims who fall for the scheme risk full account compromise, with attackers potentially draining linked credit cards or locking users out of their devices. The campaign underscores the growing sophistication of social engineering attacks, where human manipulation not technical exploits remains the primary vector for financial theft.

IvantiBreach8542/2026IvantiIvanti
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Substack Discloses 2025 Data Breach Exposing User Email Addresses and Phone Numbers Substack has notified select users that their email addresses and phone numbers were exposed in a security incident last October. In an email sent to affected account holders, CEO Chris Best confirmed that an unauthorized third party accessed internal data on February 3, 2025, though passwords, credit card details, and financial information remained secure. The breach involved email addresses, phone numbers, and internal metadata, but Substack stated there is no evidence the data has been misused. The company has since patched the vulnerability and is conducting a full investigation while strengthening its security measures to prevent future incidents. No details were provided on the root cause of the breach or the total number of impacted users. Best apologized for the incident, acknowledging the company’s failure to adequately protect user data. Substack has not yet responded to requests for further clarification on the scope of the breach.

IvantiCyber Attack6031/2026IvantiIvanti
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: EU Commission Detects Cyberattack on Mobile Device Management Systems On January 30, CERT-EU, the European Commission’s cybersecurity team, identified a cyberattack targeting the Commission’s IT infrastructure, specifically systems used for mobile device management. The incident was swiftly contained, with affected systems restored within nine hours. While no mobile devices were compromised, CERT-EU confirmed that hackers may have accessed personal data of some European Commission staff, including names and phone numbers. The agency is conducting a full review to strengthen cybersecurity measures and prevent future breaches. The European Commission emphasized its commitment to securing internal systems, framing the response as part of a broader EU initiative to bolster cybersecurity across all institutions. This effort aligns with the recently introduced Cybersecurity Package, announced on January 20, aimed at enhancing resilience against growing cyber and hybrid threats targeting critical services and democratic institutions. The incident follows recent cybersecurity breaches affecting other European entities, including the European Space Agency and major firms targeted by access system vulnerabilities.

IvantiVulnerability8541/2026Wonderful CopenhagenWonderful Copenhagen
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Ivanti Discloses Two Critical EPMM Vulnerabilities with Active Exploitation Ivanti has revealed two critical vulnerabilities in its Endpoint Manager Mobile (EPMM) software, tracked as CVE-2026-1281 and CVE-2026-1340, both carrying a CVSS score of 9.8. The flaws stem from code injection issues and enable unauthenticated remote code execution (RCE) with no user interaction or additional privileges required only network access. The vulnerabilities affect multiple EPMM versions, including 12.5.0.0, 12.6.0.0, 12.7.0.0, 12.5.1.0, and 12.6.1.0, but do not impact other Ivanti products, such as Ivanti Neurons for MDM or Ivanti Endpoint Manager (EPM). Cloud-based deployments with Sentry integration remain unaffected. Ivanti has confirmed active exploitation in a limited number of customer environments, underscoring the urgency of remediation. The company has released version-specific RPM patches for affected deployments, which can be applied without downtime. However, the patches do not persist through upgrades, requiring reinstallation after version changes. A permanent fix will be included in EPMM 12.8.0.0, scheduled for release in Q1 2026. For heightened security, Ivanti recommends rebuilding the EPMM appliance and migrating data, avoiding the need for device re-enrollment. Organizations are advised to prioritize patching due to the low attack complexity, unauthenticated access, and confirmed exploitation. Early adoption of EPMM 12.8.0.0 is encouraged to eliminate recurring patch reapplications.

IvantiCyber Attack8541/2026NA
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Storm-2561 Exploits SEO Poisoning and Fake VPN Installers in Credential Theft Campaign Since May 2025, the financially motivated threat actor Storm-2561 has been conducting a credential theft campaign targeting enterprise VPN users by abusing SEO poisoning and trojanized VPN installers. The group leverages fake, code-signed software to harvest VPN credentials and configuration data, exploiting trust in search results and legitimate security certificates. In mid-January 2026, Microsoft Defender Experts identified a renewed campaign where Storm-2561 manipulated search engine results to direct victims to spoofed VPN download sites, such as vpn-fortinet[.]com and ivanti-vpn[.]org. These domains mimicked well-known VPN vendors, including Fortinet, Pulse Secure, and Ivanti, before redirecting users to a now-removed malicious GitHub repository hosting a ZIP file (*VPN-CLIENT.zip*) containing a trojanized MSI installer. The installer, disguised as a legitimate VPN client, deployed signed malware components including *Pulse.exe*, *dwmapi.dll*, and *inspector.dll* under a path imitating a real Pulse Secure installation (*%CommonFiles%\Pulse Secure*). The *dwmapi.dll* acted as an in-memory loader, executing shellcode to load *inspector.dll*, a variant of the Hyrax information stealer. This malware targeted stored VPN credentials and configuration data from *C:\ProgramData\Pulse Secure\ConnectionStore\connectionstore.dat*, exfiltrating them to a command-and-control server at 194.76.226[.]93:8080. A key tactic in this campaign was the abuse of a legitimate code-signing certificate issued to Taiyuan Lihua Near Information Technology Co., Ltd., which was later revoked. The signed MSI and DLLs bypassed Windows security warnings and evaded detection by some security tools, lending the malware a false appearance of legitimacy. Additional signed samples, including *Sophos-Connect-Client.exe* and *GlobalProtect-VPN.exe*, indicated a broader distribution effort under the same certificate. The fake VPN client displayed a realistic GUI mimicking Pulse Secure, prompting users for credentials before exfiltrating them and displaying a fake error message. To avoid suspicion, the malware sometimes redirected victims to the official vendor site, ensuring they ultimately installed a legitimate VPN leaving no immediate signs of compromise. Persistence was maintained via the Windows RunOnce registry key, ensuring the malware executed at reboot. Microsoft Defender Antivirus detects the payloads as Trojan:Win32/Malgent and TrojanSpy:Win64/Hyrax, while Defender for Endpoint can block active infections and flag unusual VPN process execution. The campaign highlights Storm-2561’s reliance on SEO manipulation, brand impersonation, and code-signing abuse to monetize stolen credentials.

IvantiVulnerability8531/2026IvantiIvanti
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: Dutch Government Agencies Hit by Major Data Breach via Ivanti Software Flaw A critical vulnerability in Ivanti Endpoint Manager Mobile software has led to a significant data breach affecting multiple Dutch government agencies, including the Dutch Data Protection Authority (Autoriteit Persoonsgegevens, AP) and the Council for Justice. Unauthorized parties exploited the flaw to access employees’ personal information, including names, email addresses, and phone numbers. The breach underscores the risks posed by third-party software vulnerabilities in high-security environments. While the full scope of the incident remains under investigation, the exposure of sensitive employee data raises concerns about potential follow-on attacks, such as phishing or identity fraud. The incident was reported by DataBreaches.net, which clarified that it does not engage in paid interviews or data purchases a rebuttal to claims suggesting otherwise. The breach follows a separate ransomware attack disclosed earlier, which compromised 377,000 individuals’ Social Security and driver’s license numbers from a Texas gas station and convenience store chain. Dutch authorities are likely assessing the fallout, including compliance with GDPR and internal security protocols. The breach serves as a reminder of the cascading impact of software vulnerabilities in critical infrastructure.

IvantiVulnerability85410/2025IvantiIvanti
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Ivanti Patches Critical Vulnerabilities in Endpoint Manager (EPM) Platform Ivanti has released urgent security updates for its Endpoint Manager (EPM) platform, addressing two critical vulnerabilities that could expose sensitive database information and user credentials. The patches, included in EPM 2024 SU5, also resolve 11 medium-severity flaws previously disclosed in October 2025. The most severe issue, CVE-2026-1603 (CVSS 8.6), is an authentication bypass flaw allowing remote, unauthenticated attackers to leak stored credential data without user interaction. The second vulnerability, CVE-2026-1602 (CVSS 6.5), is a SQL injection flaw enabling authenticated attackers to read arbitrary database data, though it does not impact system integrity or availability. Both vulnerabilities affect Ivanti EPM versions 2024 SU4 SR1 and earlier, with the patched 2024 SU5 now available via the Ivanti License System (ILS). Ivanti confirmed that no active exploitation was detected prior to disclosure, as the flaws were reported through its responsible disclosure program by security researcher 06fe5fd2bc53027c4a3b7e395af0b850e7b8a044, in collaboration with the Trend Zero Day Initiative. While Ivanti reports no known exploitation in the wild, the public release of technical details heightens the risk of future attacks. Organizations using affected versions are advised to apply the update immediately and review systems for potential unauthorized access. The vulnerabilities highlight persistent risks in enterprise endpoint management, particularly for platforms handling privileged credentials.

Ivanti WavelinkVulnerability10056/2025NA
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: In the first half of 2025, Ivanti became a primary target of UNC5221, a suspected China-linked state-sponsored threat group exploiting multiple vulnerabilities in its products, including Endpoint Manager Mobile, Connect Secure, and Policy Secure. These attacks were part of a broader trend where 69% of exploited vulnerabilities required no authentication, enabling remote execution without credentials. The exploitation of Ivanti’s edge infrastructure critical for encrypted traffic and privileged access posed severe risks, including unauthorized system control, espionage, and potential lateral movement into high-value networks. The attacks align with geopolitical motives, particularly state-sponsored espionage and surveillance, targeting enterprise solutions to compromise sensitive data or maintain persistent access. While the article does not specify direct data breaches or operational disruptions, the strategic weaponization of Ivanti’s flaws by advanced threat actors suggests high-stakes consequences, including potential compromise of government, defense, or critical infrastructure entities relying on these systems. The lack of authentication requirements further amplifies the threat, as attackers could remotely execute code (RCE) with full system control, posing existential risks to organizations dependent on Ivanti’s security appliances.

Ivanti WavelinkVulnerability1005/2025NA
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: The vulnerabilities CVE-2025-4427 and CVE-2025-4428 in Ivanti Endpoint Manager Mobile (EPMM) were exploited by a Chinese cyber espionage group. The attackers achieved remote code execution on internet-exposed Ivanti EPMM deployments, set up a reverse shell, deployed malware, and extracted data including IMEI, phone numbers, location, LDAP users, and Office 365 tokens. The attack affected various entities globally, including government authorities, healthcare organizations, research institutes, legal firms, telcos, manufacturers, aerospace companies, healthcare providers, and more.

IvantiCyber Attack8545/2025NA
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Storm-2561 Credential Theft Campaign Exploits SEO to Target Enterprise VPN Users Since May 2025, the financially motivated threat actor Storm-2561 has been conducting a credential theft campaign by manipulating search engine rankings to distribute fake VPN software. The operation targets employees searching for tools like Pulse Secure, Fortinet, and Ivanti, redirecting them to spoofed websites that deliver malicious download packages. Victims who install the fake software unknowingly expose their VPN credentials, which are silently harvested and sent to attacker-controlled servers. The campaign leverages SEO poisoning to push fraudulent sites to the top of search results for queries such as *“Pulse VPN download.”* These sites mimic legitimate vendor portals, complete with logos and download buttons, while hosting malicious ZIP files on GitHub repositories since removed. The trojans were digitally signed with a certificate issued to *“Taiyuan Lihua Near Information Technology Co., Ltd.”*, which has since been revoked. Microsoft Defender Experts identified the campaign in mid-January 2026, attributing it to Storm-2561 based on its history of malware distribution through SEO abuse and software impersonation. After credential theft, the fake VPN client displays a convincing error message before redirecting the victim to the official vendor website, ensuring no visible signs of compromise. The attack delivers its payload via a Windows Installer (MSI) package disguised as a legitimate Pulse Secure installer, dropping malicious DLL files (*dwmapi.dll* and *inspector.dll*) that function as an in-memory loader and a variant of the Hyrax infostealer. The malware exfiltrates credentials to 194.76.226[.]93:8080 and maintains persistence via the Windows RunOnce registry key. The campaign extends beyond Pulse Secure, with additional fake installers for GlobalProtect VPN and Sophos Connect discovered under the same certificate. Stolen credentials enable lateral movement within corporate networks, unauthorized data access, and follow-on attacks, posing a significant risk to enterprises relying on VPNs for remote operations. The attack’s sophistication combining realistic spoofing, legitimate-looking signatures, and post-compromise redirection makes detection particularly challenging.

Ivanti WavelinkVulnerability10054/2025NA
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: Chinese espionage threat actors exploited a vulnerability in Ivanti's security products, leading to the deployment of powerful malware known as Resurge. This malware campaign, detailed by the Cybersecurity and Infrastructure Security Agency (CISA) and cybersecurity firm Mandiant, has resulted in compromised system integrity and data breaches. The malware's capability to modify files, harvest credentials, create accounts, reset passwords, and escalate permissions poses a significant security threat. Ivanti has advised customers to reset devices and credentials, evidencing the severity of this security breach.

Ivanti WavelinkRansomware10053/2025NA
Rankiteo Explanation :
Attack threatening the organization’s existence

Description: Ivanti, a cybersecurity firm, predicts Ransomware as a top threat for 2025, with AI enhancements escalating its danger. Despite 38% of security professionals foreseeing an increased threat level, only 29% feel very prepared, indicating a significant preparedness gap. Organizations struggle with exposure management adoption, with data blind spots and tool disparities between IT and security teams. API and software vulnerabilities remain critical threats without proper visibility. Moreover, considerable tech debt interferes with security practices, growth, and innovation, ultimately affecting the strategic role of CISOs in guiding AI adoption and supply chain risk management, despite increased board-level cybersecurity discussions.

IvantiVulnerability10051/2025NA
Rankiteo Explanation :
Attack threatening the organization's existence

Description: CISA’s Silent Updates to Ransomware-Linked Vulnerabilities Raise Concerns in 2025 In 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) quietly updated its Known Exploited Vulnerabilities (KEV) catalog 59 times to reflect new evidence of ransomware exploitation without notifying defenders. The oversight, highlighted by Glenn Thorpe, senior director of security research at GreyNoise, underscores a critical gap in how organizations track evolving threats. CISA’s KEV catalog is designed to flag high-priority vulnerabilities actively exploited by attackers, helping federal agencies and security teams prioritize patches. One key feature is a field indicating whether a flaw is tied to ransomware operations. However, when this status changes from "Unknown" to "Known" signaling confirmed ransomware use CISA does not issue alerts. Instead, the update appears only as a silent modification in a JSON file, leaving defenders unaware of the heightened risk. Thorpe’s analysis revealed that 16 of the 59 updated vulnerabilities were Microsoft CVEs, with other frequent targets including Ivanti, Fortinet, Palo Alto Networks (PANW), and Zimbra. These vendors’ products often firewalls, VPNs, and email servers are prime targets for ransomware groups due to their widespread deployment and access to high-value networks. Notably, 39% of the vulnerabilities confirmed for ransomware use in 2025 had been listed in the KEV catalog before 2023. The oldest flaw updated last year had been in the catalog for 1,353 days, while the fastest flip occurred within a single day. Authentication bypasses and remote code execution (RCE) flaws were the most common types to see delayed ransomware confirmation. In response to the issue, GreyNoise launched an RSS feed that tracks KEV catalog updates, including ransomware status changes, with hourly refreshes. The tool addresses a long-standing frustration among security professionals, who argue that timely notifications could help organizations adjust their patching priorities and mitigate attacks. CISA has not yet responded to requests for comment.

Ivanti: Ivanti Desktop and Server Management Vulnerability Allows Attackers to Escalate Privileges
Vulnerability
Severity: 25
Impact: 1
Seen: 3/2026
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack without any consequences

Description: Ivanti Patches High-Severity Privilege Escalation Flaw in DSM Software Ivanti has released a security update for its Desktop and Server Management (DSM) software, addressing a high-severity privilege escalation vulnerability (CVE-2026-3483) with a CVSS score of 7.8. The flaw affects all DSM versions up to and including 2026.1 and stems from an exposed dangerous method (CWE-749), allowing a local authenticated attacker to gain elevated privileges on vulnerable systems. The vulnerability requires low attack complexity and no user interaction, making it easily exploitable once an attacker gains initial access. Successful exploitation could enable threat actors to compromise confidentiality, integrity, and availability of affected systems particularly critical in enterprise environments where DSM manages large-scale endpoints and servers. Ivanti has resolved the issue in DSM version 2026.1.1, available via the Ivanti License System (ILS). The company confirmed no active exploitation at the time of disclosure, as the flaw was reported through its responsible disclosure program. No indicators of compromise (IOCs) have been identified. Organizations using affected versions are advised to upgrade immediately to mitigate risk. Additional details are available in Ivanti’s release notes and upgrade documentation.

Ivanti, CrowdStrike and Gartner: Most ransomware playbooks don't address machine credentials. Attackers know it.
Ransomware
Severity: 100
Impact: 5
Seen: 2/2026
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack threatening the organization's existence

Description: Ransomware Attackers Exploit Overlooked Machine Identities, Widening Security Gaps A growing blind spot in ransomware defense strategies is leaving organizations vulnerable to prolonged attacks, with adversaries increasingly targeting machine identities such as service accounts, API tokens, and certificates to move laterally within networks undetected. Research from Gartner and CrowdStrike reveals that attackers spend days to months harvesting these credentials before deploying ransomware, often evading traditional detection methods. ### Key Vulnerabilities & Attack Trends - Machine identities are the weakest link: Unlike human credentials, compromised service accounts and API tokens rarely trigger alerts, allowing attackers to persist in networks. 76% of organizations fear ransomware spreading via unmanaged hosts over SMB network shares, yet most incident response playbooks fail to address non-human credentials. - Rapid deployment, high costs: Over 50% of ransomware attacks now deploy within one day of initial access. Recovery costs average 10 times the ransom demand, with CrowdStrike estimating $1.7 million in downtime per incident rising to $2.5 million for public sector organizations. - Paying ransoms offers no guarantee: 93% of organizations that paid still had data stolen, and 83% were attacked again. Nearly 40% could not fully restore data from backups, underscoring the futility of ransom payments. ### Critical Gaps in Incident Response - Playbooks ignore machine credentials: The most widely used ransomware containment frameworks including Gartner’s template focus on resetting human and device accounts but omit service accounts, API keys, and tokens. This oversight allows attackers to regain access even after initial remediation. - Detection logic lags behind threats: 85% of security teams admit traditional methods can’t keep pace with modern attacks. Only 53% have implemented AI-powered threat detection, leaving anomalous machine behavior such as unusual API call volumes or tokens used outside automation windows unmonitored. - AI adoption exacerbates risks: 87% of organizations prioritize agentic AI, which introduces autonomous machine identities that authenticate and act independently. Yet only 55% enforce formal guardrails, creating new attack surfaces. ### Industry-Specific Preparedness Failures - Manufacturing & public sector lag behind: Despite 60% of public sector organizations rating themselves as "very prepared," only 12% recovered within 24 hours after an attack. Among manufacturers, 40% suffered significant operational disruption. - Persistent entry points remain unaddressed: Only 38% of organizations fixed the specific vulnerability exploited in their last ransomware attack. The rest invested in general security improvements without closing the original breach vector. - Exposure management is inadequate: Nearly half of organizations lack a cybersecurity exposure score, and only 27% rate their risk assessment as "excellent." Stale service accounts some tied to former employees remain the easiest entry point for attackers. ### The Urgency of Machine Identity Governance Gartner warns that poor IAM practices are a primary starting point for ransomware, with previously compromised credentials frequently sold on the dark web. Yet most playbooks fail to inventory or reset machine identities during containment, leaving trust chains intact even after network isolation. The preparedness gap is widening: Ivanti’s 2026 report found that readiness deficits across ransomware, phishing, and supply chain attacks have grown by 10 points year-over-year. With 82 machine identities for every human user 42% of which have privileged access organizations must map ownership, enforce rotation policies, and integrate machine identity detection into incident response before the next attack.

Apple: Beware of Apple Pay Phishing Attack that Aims to Steal Your Payment Details
Cyber Attack
Severity: 85
Impact: 4
Seen: 2/2026
Blog:
Supply Chain Source: ConduentConduent
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Sophisticated Vishing Campaign Targets Apple Pay Users in Phishing Scam A highly convincing phishing campaign is actively targeting Apple Pay users, employing deceptive emails and phone-based social engineering to steal financial and login credentials. The attack, analyzed by Malwarebytes, begins with a fraudulent email mimicking an official Apple receipt, complete with the company’s logo, a fabricated case ID, and a timestamp. The message warns of a blocked high-value purchase such as a 2025 MacBook Air and urges the recipient to call a provided support number if the alleged "appointment" to review the fraud is inconvenient. Unlike traditional phishing schemes that rely on malicious links, this campaign uses vishing (voice phishing) to manipulate victims over the phone. When contacted, scammers posing as Apple’s fraud department follow a scripted conversation, initially verifying harmless details like partial phone numbers before escalating to requests for Apple ID two-factor authentication (2FA) codes. In real time, attackers use these codes to hijack accounts, gaining access to stored data, photos, and linked payment methods. The scam’s effectiveness lies in its psychological tactics leveraging urgency, brand trust, and fabricated transaction details to bypass skepticism. Researchers emphasize that Apple never schedules fraud reviews via email or demands callbacks, and official communications always originate from verified Apple domains. Victims who fall for the scheme risk full account compromise, with attackers potentially draining linked credit cards or locking users out of their devices. The campaign underscores the growing sophistication of social engineering attacks, where human manipulation not technical exploits remains the primary vector for financial theft.

Substack: Substack data breach exposed users’ emails and phone numbers
Breach
Severity: 85
Impact: 4
Seen: 2/2026
Blog:
Supply Chain Source: IvantiIvanti
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Substack Discloses 2025 Data Breach Exposing User Email Addresses and Phone Numbers Substack has notified select users that their email addresses and phone numbers were exposed in a security incident last October. In an email sent to affected account holders, CEO Chris Best confirmed that an unauthorized third party accessed internal data on February 3, 2025, though passwords, credit card details, and financial information remained secure. The breach involved email addresses, phone numbers, and internal metadata, but Substack stated there is no evidence the data has been misused. The company has since patched the vulnerability and is conducting a full investigation while strengthening its security measures to prevent future incidents. No details were provided on the root cause of the breach or the total number of impacted users. Best apologized for the incident, acknowledging the company’s failure to adequately protect user data. Substack has not yet responded to requests for further clarification on the scope of the breach.

European Commission: European Commission Investigating Cyberattack
Cyber Attack
Severity: 60
Impact: 3
Seen: 1/2026
Blog:
Supply Chain Source: IvantiIvanti
Rankiteo Explanation
Attack with significant impact with internal employee data leaks

Description: EU Commission Detects Cyberattack on Mobile Device Management Systems On January 30, CERT-EU, the European Commission’s cybersecurity team, identified a cyberattack targeting the Commission’s IT infrastructure, specifically systems used for mobile device management. The incident was swiftly contained, with affected systems restored within nine hours. While no mobile devices were compromised, CERT-EU confirmed that hackers may have accessed personal data of some European Commission staff, including names and phone numbers. The agency is conducting a full review to strengthen cybersecurity measures and prevent future breaches. The European Commission emphasized its commitment to securing internal systems, framing the response as part of a broader EU initiative to bolster cybersecurity across all institutions. This effort aligns with the recently introduced Cybersecurity Package, announced on January 20, aimed at enhancing resilience against growing cyber and hybrid threats targeting critical services and democratic institutions. The incident follows recent cybersecurity breaches affecting other European entities, including the European Space Agency and major firms targeted by access system vulnerabilities.

Ivanti: Ivanti Endpoint Manager Vulnerability Allows Remote Code Execution,
Vulnerability
Severity: 85
Impact: 4
Seen: 1/2026
Blog:
Supply Chain Source: Wonderful CopenhagenWonderful Copenhagen
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Ivanti Discloses Two Critical EPMM Vulnerabilities with Active Exploitation Ivanti has revealed two critical vulnerabilities in its Endpoint Manager Mobile (EPMM) software, tracked as CVE-2026-1281 and CVE-2026-1340, both carrying a CVSS score of 9.8. The flaws stem from code injection issues and enable unauthenticated remote code execution (RCE) with no user interaction or additional privileges required only network access. The vulnerabilities affect multiple EPMM versions, including 12.5.0.0, 12.6.0.0, 12.7.0.0, 12.5.1.0, and 12.6.1.0, but do not impact other Ivanti products, such as Ivanti Neurons for MDM or Ivanti Endpoint Manager (EPM). Cloud-based deployments with Sentry integration remain unaffected. Ivanti has confirmed active exploitation in a limited number of customer environments, underscoring the urgency of remediation. The company has released version-specific RPM patches for affected deployments, which can be applied without downtime. However, the patches do not persist through upgrades, requiring reinstallation after version changes. A permanent fix will be included in EPMM 12.8.0.0, scheduled for release in Q1 2026. For heightened security, Ivanti recommends rebuilding the EPMM appliance and migrating data, avoiding the need for device re-enrollment. Organizations are advised to prioritize patching due to the low attack complexity, unauthenticated access, and confirmed exploitation. Early adoption of EPMM 12.8.0.0 is encouraged to eliminate recurring patch reapplications.

Fortinet, Ivanti, Sophos and Pulse Secure: Storm-2561 Uses SEO Poisoning, Fake Signed VPN Apps to Steal Enterprise Credentials
Cyber Attack
Severity: 85
Impact: 4
Seen: 1/2026
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Storm-2561 Exploits SEO Poisoning and Fake VPN Installers in Credential Theft Campaign Since May 2025, the financially motivated threat actor Storm-2561 has been conducting a credential theft campaign targeting enterprise VPN users by abusing SEO poisoning and trojanized VPN installers. The group leverages fake, code-signed software to harvest VPN credentials and configuration data, exploiting trust in search results and legitimate security certificates. In mid-January 2026, Microsoft Defender Experts identified a renewed campaign where Storm-2561 manipulated search engine results to direct victims to spoofed VPN download sites, such as vpn-fortinet[.]com and ivanti-vpn[.]org. These domains mimicked well-known VPN vendors, including Fortinet, Pulse Secure, and Ivanti, before redirecting users to a now-removed malicious GitHub repository hosting a ZIP file (*VPN-CLIENT.zip*) containing a trojanized MSI installer. The installer, disguised as a legitimate VPN client, deployed signed malware components including *Pulse.exe*, *dwmapi.dll*, and *inspector.dll* under a path imitating a real Pulse Secure installation (*%CommonFiles%\Pulse Secure*). The *dwmapi.dll* acted as an in-memory loader, executing shellcode to load *inspector.dll*, a variant of the Hyrax information stealer. This malware targeted stored VPN credentials and configuration data from *C:\ProgramData\Pulse Secure\ConnectionStore\connectionstore.dat*, exfiltrating them to a command-and-control server at 194.76.226[.]93:8080. A key tactic in this campaign was the abuse of a legitimate code-signing certificate issued to Taiyuan Lihua Near Information Technology Co., Ltd., which was later revoked. The signed MSI and DLLs bypassed Windows security warnings and evaded detection by some security tools, lending the malware a false appearance of legitimacy. Additional signed samples, including *Sophos-Connect-Client.exe* and *GlobalProtect-VPN.exe*, indicated a broader distribution effort under the same certificate. The fake VPN client displayed a realistic GUI mimicking Pulse Secure, prompting users for credentials before exfiltrating them and displaying a fake error message. To avoid suspicion, the malware sometimes redirected victims to the official vendor site, ensuring they ultimately installed a legitimate VPN leaving no immediate signs of compromise. Persistence was maintained via the Windows RunOnce registry key, ensuring the malware executed at reboot. Microsoft Defender Antivirus detects the payloads as Trojan:Win32/Malgent and TrojanSpy:Win64/Hyrax, while Defender for Endpoint can block active infections and flag unusual VPN process execution. The campaign highlights Storm-2561’s reliance on SEO manipulation, brand impersonation, and code-signing abuse to monetize stolen credentials.

Ivanti and Dutch Data Protection Authority: Several Dutch agencies suffer major data breach
Vulnerability
Severity: 85
Impact: 3
Seen: 1/2026
Blog:
Supply Chain Source: IvantiIvanti
Rankiteo Explanation
Attack with significant impact with internal employee data leaks

Description: Dutch Government Agencies Hit by Major Data Breach via Ivanti Software Flaw A critical vulnerability in Ivanti Endpoint Manager Mobile software has led to a significant data breach affecting multiple Dutch government agencies, including the Dutch Data Protection Authority (Autoriteit Persoonsgegevens, AP) and the Council for Justice. Unauthorized parties exploited the flaw to access employees’ personal information, including names, email addresses, and phone numbers. The breach underscores the risks posed by third-party software vulnerabilities in high-security environments. While the full scope of the incident remains under investigation, the exposure of sensitive employee data raises concerns about potential follow-on attacks, such as phishing or identity fraud. The incident was reported by DataBreaches.net, which clarified that it does not engage in paid interviews or data purchases a rebuttal to claims suggesting otherwise. The breach follows a separate ransomware attack disclosed earlier, which compromised 377,000 individuals’ Social Security and driver’s license numbers from a Texas gas station and convenience store chain. Dutch authorities are likely assessing the fallout, including compliance with GDPR and internal security protocols. The breach serves as a reminder of the cascading impact of software vulnerabilities in critical infrastructure.

Ivanti: Ivanti Endpoint Manager Vulnerability Lets Remote Attacker Leak Arbitrary Data
Vulnerability
Severity: 85
Impact: 4
Seen: 10/2025
Blog:
Supply Chain Source: IvantiIvanti
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Ivanti Patches Critical Vulnerabilities in Endpoint Manager (EPM) Platform Ivanti has released urgent security updates for its Endpoint Manager (EPM) platform, addressing two critical vulnerabilities that could expose sensitive database information and user credentials. The patches, included in EPM 2024 SU5, also resolve 11 medium-severity flaws previously disclosed in October 2025. The most severe issue, CVE-2026-1603 (CVSS 8.6), is an authentication bypass flaw allowing remote, unauthenticated attackers to leak stored credential data without user interaction. The second vulnerability, CVE-2026-1602 (CVSS 6.5), is a SQL injection flaw enabling authenticated attackers to read arbitrary database data, though it does not impact system integrity or availability. Both vulnerabilities affect Ivanti EPM versions 2024 SU4 SR1 and earlier, with the patched 2024 SU5 now available via the Ivanti License System (ILS). Ivanti confirmed that no active exploitation was detected prior to disclosure, as the flaws were reported through its responsible disclosure program by security researcher 06fe5fd2bc53027c4a3b7e395af0b850e7b8a044, in collaboration with the Trend Zero Day Initiative. While Ivanti reports no known exploitation in the wild, the public release of technical details heightens the risk of future attacks. Organizations using affected versions are advised to apply the update immediately and review systems for potential unauthorized access. The vulnerabilities highlight persistent risks in enterprise endpoint management, particularly for platforms handling privileged credentials.

Ivanti
Vulnerability
Severity: 100
Impact: 5
Seen: 6/2025
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack threatening the organization’s existence

Description: In the first half of 2025, Ivanti became a primary target of UNC5221, a suspected China-linked state-sponsored threat group exploiting multiple vulnerabilities in its products, including Endpoint Manager Mobile, Connect Secure, and Policy Secure. These attacks were part of a broader trend where 69% of exploited vulnerabilities required no authentication, enabling remote execution without credentials. The exploitation of Ivanti’s edge infrastructure critical for encrypted traffic and privileged access posed severe risks, including unauthorized system control, espionage, and potential lateral movement into high-value networks. The attacks align with geopolitical motives, particularly state-sponsored espionage and surveillance, targeting enterprise solutions to compromise sensitive data or maintain persistent access. While the article does not specify direct data breaches or operational disruptions, the strategic weaponization of Ivanti’s flaws by advanced threat actors suggests high-stakes consequences, including potential compromise of government, defense, or critical infrastructure entities relying on these systems. The lack of authentication requirements further amplifies the threat, as attackers could remotely execute code (RCE) with full system control, posing existential risks to organizations dependent on Ivanti’s security appliances.

Ivanti
Vulnerability
Severity: 100
Impact:
Seen: 5/2025
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack threatening the organization’s existence

Description: The vulnerabilities CVE-2025-4427 and CVE-2025-4428 in Ivanti Endpoint Manager Mobile (EPMM) were exploited by a Chinese cyber espionage group. The attackers achieved remote code execution on internet-exposed Ivanti EPMM deployments, set up a reverse shell, deployed malware, and extracted data including IMEI, phone numbers, location, LDAP users, and Office 365 tokens. The attack affected various entities globally, including government authorities, healthcare organizations, research institutes, legal firms, telcos, manufacturers, aerospace companies, healthcare providers, and more.

Sophos, Fortinet, Ivanti, Palo Alto Networks and Pulse Secure: Attackers Use SEO Poisoning and Signed Trojans to Steal VPN Credentials
Cyber Attack
Severity: 85
Impact: 4
Seen: 5/2025
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Storm-2561 Credential Theft Campaign Exploits SEO to Target Enterprise VPN Users Since May 2025, the financially motivated threat actor Storm-2561 has been conducting a credential theft campaign by manipulating search engine rankings to distribute fake VPN software. The operation targets employees searching for tools like Pulse Secure, Fortinet, and Ivanti, redirecting them to spoofed websites that deliver malicious download packages. Victims who install the fake software unknowingly expose their VPN credentials, which are silently harvested and sent to attacker-controlled servers. The campaign leverages SEO poisoning to push fraudulent sites to the top of search results for queries such as *“Pulse VPN download.”* These sites mimic legitimate vendor portals, complete with logos and download buttons, while hosting malicious ZIP files on GitHub repositories since removed. The trojans were digitally signed with a certificate issued to *“Taiyuan Lihua Near Information Technology Co., Ltd.”*, which has since been revoked. Microsoft Defender Experts identified the campaign in mid-January 2026, attributing it to Storm-2561 based on its history of malware distribution through SEO abuse and software impersonation. After credential theft, the fake VPN client displays a convincing error message before redirecting the victim to the official vendor website, ensuring no visible signs of compromise. The attack delivers its payload via a Windows Installer (MSI) package disguised as a legitimate Pulse Secure installer, dropping malicious DLL files (*dwmapi.dll* and *inspector.dll*) that function as an in-memory loader and a variant of the Hyrax infostealer. The malware exfiltrates credentials to 194.76.226[.]93:8080 and maintains persistence via the Windows RunOnce registry key. The campaign extends beyond Pulse Secure, with additional fake installers for GlobalProtect VPN and Sophos Connect discovered under the same certificate. Stolen credentials enable lateral movement within corporate networks, unauthorized data access, and follow-on attacks, posing a significant risk to enterprises relying on VPNs for remote operations. The attack’s sophistication combining realistic spoofing, legitimate-looking signatures, and post-compromise redirection makes detection particularly challenging.

Ivanti
Vulnerability
Severity: 100
Impact: 5
Seen: 4/2025
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack threatening the organization’s existence

Description: Chinese espionage threat actors exploited a vulnerability in Ivanti's security products, leading to the deployment of powerful malware known as Resurge. This malware campaign, detailed by the Cybersecurity and Infrastructure Security Agency (CISA) and cybersecurity firm Mandiant, has resulted in compromised system integrity and data breaches. The malware's capability to modify files, harvest credentials, create accounts, reset passwords, and escalate permissions poses a significant security threat. Ivanti has advised customers to reset devices and credentials, evidencing the severity of this security breach.

Ivanti
Ransomware
Severity: 100
Impact: 5
Seen: 3/2025
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack threatening the organization’s existence

Description: Ivanti, a cybersecurity firm, predicts Ransomware as a top threat for 2025, with AI enhancements escalating its danger. Despite 38% of security professionals foreseeing an increased threat level, only 29% feel very prepared, indicating a significant preparedness gap. Organizations struggle with exposure management adoption, with data blind spots and tool disparities between IT and security teams. API and software vulnerabilities remain critical threats without proper visibility. Moreover, considerable tech debt interferes with security practices, growth, and innovation, ultimately affecting the strategic role of CISOs in guiding AI adoption and supply chain risk management, despite increased board-level cybersecurity discussions.

Ivanti, Fortinet, Palo Alto Networks and Zimbra: CISA quietly updated ransomware flags on 59 flaws last year
Vulnerability
Severity: 100
Impact: 5
Seen: 1/2025
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack threatening the organization's existence

Description: CISA’s Silent Updates to Ransomware-Linked Vulnerabilities Raise Concerns in 2025 In 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) quietly updated its Known Exploited Vulnerabilities (KEV) catalog 59 times to reflect new evidence of ransomware exploitation without notifying defenders. The oversight, highlighted by Glenn Thorpe, senior director of security research at GreyNoise, underscores a critical gap in how organizations track evolving threats. CISA’s KEV catalog is designed to flag high-priority vulnerabilities actively exploited by attackers, helping federal agencies and security teams prioritize patches. One key feature is a field indicating whether a flaw is tied to ransomware operations. However, when this status changes from "Unknown" to "Known" signaling confirmed ransomware use CISA does not issue alerts. Instead, the update appears only as a silent modification in a JSON file, leaving defenders unaware of the heightened risk. Thorpe’s analysis revealed that 16 of the 59 updated vulnerabilities were Microsoft CVEs, with other frequent targets including Ivanti, Fortinet, Palo Alto Networks (PANW), and Zimbra. These vendors’ products often firewalls, VPNs, and email servers are prime targets for ransomware groups due to their widespread deployment and access to high-value networks. Notably, 39% of the vulnerabilities confirmed for ransomware use in 2025 had been listed in the KEV catalog before 2023. The oldest flaw updated last year had been in the catalog for 1,353 days, while the fastest flip occurred within a single day. Authentication bypasses and remote code execution (RCE) flaws were the most common types to see delayed ransomware confirmation. In response to the issue, GreyNoise launched an RSS feed that tracks KEV catalog updates, including ransomware status changes, with hourly refreshes. The tool addresses a long-standing frustration among security professionals, who argue that timely notifications could help organizations adjust their patching priorities and mitigate attacks. CISA has not yet responded to requests for comment.

Ailogo

Ivanti Wavelink Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Ivanti Wavelink

Incidents vs Software Development Industry Average (This Year)

No incidents recorded for Ivanti Wavelink in 2026.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Ivanti Wavelink in 2026.

Incident Types Ivanti Wavelink vs Software Development Industry Avg (This Year)

No incidents recorded for Ivanti Wavelink in 2026.

Incident History — Ivanti Wavelink (X = Date, Y = Severity)

Ivanti Wavelink cyber incidents detection timeline including parent company and subsidiaries

Ivanti Wavelink Company Subsidiaries

SubsidiaryImage

We are improving supply chain efficiency. For three decades, Wavelink has delivered mobile-enabling solutions that improve supply-chain efficiency and worker productivity. The company has been an innovator in mission-critical device management, wireless infrastructure management, terminal emulation, voice enabling, and mobile application development software. Thousands of companies with millions of devices across a broad spectrum of vertical markets rely on Wavelink to accelerate application delivery, reduce device management and support costs, and tighten network security. Wavelink was acquired by LANDESK in June 2012. In January 2017, as a result of the purchase of LANDESK by Clearlake Capital and the establishment of the new company Ivanti, both the Wavelink and LANDESK product brands were woven into the Ivanti line of technology solutions. Businesses around the globe in industries ranging from manufacturing and retail to warehousing and field-force automation rely on Wavelink mobility software platforms and voice-enablement and enterprise mobility management (EMM) solutions.

Loading...
similarCompanies

Ivanti Wavelink Similar Companies

[24]7.ai

[24]7.ai™ customer engagement solutions use conversational artificial intelligence to understand customer intent, enabling companies to create personalized, predictive, and effortless customer experiences across all channels; attract and retain customers; boost agent productivity and satisfaction; a

Alibaba Group

🌍Alibaba Group is on a mission to make it easy to do business anywhere! Guided by our passion and imagination, we’re leading the way in AI, cloud computing and e-commerce. We aim to build the future infrastructure of commerce, and we aspire to be a good company that lasts for 102 years.

bigbasket

Starting our journey in 2011, today, bigbasket - a Tata Enterprise is India’s largest online supermarket with over 13 million customers and a presence in 60+ cities & towns. With our presence spanning the entire spectrum of consumer needs, we operate through a range of business lines - bigbasket, bb

Adobe

Adobe is the global leader in digital media and digital marketing solutions. Our creative, marketing and document solutions empower everyone – from emerging artists to global brands – to bring digital creations to life and deliver immersive, compelling experiences to the right person at the right mo

OpenText

OpenText is a leading Cloud and AI company that provides organizations around the world with a comprehensive suite of Business AI, Business Clouds, and Business Technology. We help organizations grow, innovate, become more efficient and effective, and do so in a trusted and secure way—through Inform

Facebook

The Facebook company is now Meta. Meta builds technologies that help people connect, find communities, and grow businesses. When Facebook launched in 2004, it changed the way people connect. Apps like Messenger, Instagram and WhatsApp further empowered billions around the world. Now, Meta is moving

IDEMIA

IDEMIA Secure Transactions (IST) is a leading provider of payment, connectivity, and cybersecurity solutions, serving billions of people worldwide. With decades of expertise in cryptography and credential issuance, IST is trusted by over 2000 financial institutions, mobile operators, automotive manu

Instacart

Instacart, the leading grocery technology company in North America, works with grocers and retailers to transform how people shop. The company partners with more than 1,500 national, regional, and local retail banners to facilitate online shopping, delivery and pickup services from more than 85,000

Nielsen

Nielsen shapes the world’s media and content as a global leader in audience insights, data and analytics. Through our understanding of people and their behaviors across all channels and platforms, we empower our clients with independent and actionable intelligence so they can connect and engage with

newsone

Ivanti Wavelink CyberSecurity News

September 01, 2023 07:00 AM
Cyber-Attacks Target Vulnerable Ivanti Products

Cyble's Global Sensor Intelligence Networks observes the exploitation of Ivanti Vulnerabilities across different products.

August 28, 2023 07:00 AM
Honeywell’s acquisition of cybersecurity provider sets sights on manufacturing sector’s deep IoT vulnerabilities

Honeywell's acquisition of SCADAfence is a response to cybersecurity gaps resulting from unprotected IoT sensors and devices.

December 27, 2021 08:00 AM
Top cybersecurity M&A deals for 2021

2021 is shaping up to be an active year for mergers and acquisitions in the cybersecurity industry. March alone saw more than 40 firms being acquired.

October 27, 2021 07:00 AM
Ivanti extends Neurons platform

Cyber-security specialist Ivanti has announced three new integrated products for its Ivanti Neurons platform, aimed at securing the...

October 29, 2020 07:00 AM
Ivanti Wavelink Adds Printer Management Capabilities

Ivanti Wavelink Avalanche now offers several new management and discovery capabilities for Zebra's ruggedized thermal and barcode printers for the supply chain.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Ivanti Wavelink CyberSecurity History Information

Official Website of Ivanti Wavelink

The official website of Ivanti Wavelink is https://www.ivanti.com/supply-chain.

Ivanti Wavelink’s AI-Generated Cybersecurity Score

According to Rankiteo, Ivanti Wavelink’s AI-generated cybersecurity score is 753, reflecting their Fair security posture.

How many security badges does Ivanti Wavelink’ have ?

According to Rankiteo, Ivanti Wavelink currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has Ivanti Wavelink been affected by any supply chain cyber incidents ?

According to Rankiteo, Ivanti Wavelink has been affected by multiple supply chain cyber incidents. The affected supply chain sources and their corresponding incident IDs are:

  • Conduent (Incident ID: APP1770616335)
  • Ivanti (Incident ID: SUB1770295740)
  • Ivanti (Incident ID: EUR1770630855)
  • Wonderful Copenhagen (Incident ID: IVA1769791658)
  • Ivanti (Incident ID: IVAAUT1770515557)
  • Ivanti (Incident ID: IVA1770746108)
Does Ivanti Wavelink have SOC 2 Type 1 certification ?

According to Rankiteo, Ivanti Wavelink is not certified under SOC 2 Type 1.

Does Ivanti Wavelink have SOC 2 Type 2 certification ?

According to Rankiteo, Ivanti Wavelink does not hold a SOC 2 Type 2 certification.

Does Ivanti Wavelink comply with GDPR ?

According to Rankiteo, Ivanti Wavelink is not listed as GDPR compliant.

Does Ivanti Wavelink have PCI DSS certification ?

According to Rankiteo, Ivanti Wavelink does not currently maintain PCI DSS compliance.

Does Ivanti Wavelink comply with HIPAA ?

According to Rankiteo, Ivanti Wavelink is not compliant with HIPAA regulations.

Does Ivanti Wavelink have ISO 27001 certification ?

According to Rankiteo,Ivanti Wavelink is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Ivanti Wavelink

Ivanti Wavelink operates primarily in the Software Development industry.

Number of Employees at Ivanti Wavelink

Ivanti Wavelink employs approximately None employees people worldwide.

Subsidiaries Owned by Ivanti Wavelink

Ivanti Wavelink presently has no subsidiaries across any sectors.

Ivanti Wavelink’s LinkedIn Followers

Ivanti Wavelink’s official LinkedIn profile has approximately 1,716 followers.

NAICS Classification of Ivanti Wavelink

Ivanti Wavelink is classified under the NAICS code 5112, which corresponds to Software Publishers.

Ivanti Wavelink’s Presence on Crunchbase

No, Ivanti Wavelink does not have a profile on Crunchbase.

Ivanti Wavelink’s Presence on LinkedIn

Yes, Ivanti Wavelink maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/ivanti-wavelink.

Cybersecurity Incidents Involving Ivanti Wavelink

As of April 02, 2026, Rankiteo reports that Ivanti Wavelink has experienced 15 cybersecurity incidents.

Number of Peer and Competitor Companies

Ivanti Wavelink has an estimated 29,306 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Ivanti Wavelink ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

A security flaw has been discovered in itsourcecode Payroll Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /manage_user.php of the component Parameter Handler. Performing a manipulation of the argument ID results in sql injection. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in Axiomatic Bento4 up to 1.6.0-641. Affected is the function AP4_BitReader::SkipBits of the file Ap4Dac4Atom.cpp of the component DSI v1 Parser. Such manipulation of the argument n_presentations leads to heap-based buffer overflow. The attack needs to be performed locally. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.

Risk Information
cvss2
Base: 4.3
Severity: LOW
AV:L/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 4.8
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was determined in Axiomatic Bento4 up to 1.6.0-641. This impacts the function AP4_BitReader::ReadCache of the file Ap4Dac4Atom.cpp of the component MP4 File Parser. This manipulation causes heap-based buffer overflow. The attack needs to be launched locally. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.

Risk Information
cvss2
Base: 4.3
Severity: LOW
AV:L/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 4.8
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, there is a heap-buffer-overflow (HBO) in icAnsiToUtf8() in the XML conversion path. The issue is triggered by a crafted ICC profile which causes icAnsiToUtf8(std::string&, char const*) to treat an input buffer as a C-string and call operations that rely on strlen()/null-termination. AddressSanitizer reports an out-of-bounds READ of size 115 past a 114-byte heap allocation, with the failure observed while running the iccToXml tool. This issue has been patched in version 2.3.1.6.

Risk Information
cvss3
Base: 6.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, there is a stack-buffer-overflow (SBO) in CIccTagFixedNum<>::GetValues() and a related bug chain. The primary crash is an AddressSanitizer-reported WRITE of size 4 that overflows a 4-byte stack variable (rv) via the call chain CIccTagFixedNum::GetValues() -> CIccTagStruct::GetElemNumberValue(). This issue has been patched in version 2.3.1.6.

Risk Information
cvss3
Base: 6.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=ivanti-wavelink' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge