Company Details
merrilllynch
34,603
748,637
52
ml.com
0
MER_1750983
In-progress


Merrill Lynch Vendor Cyber Rating & Cyber Score
ml.comFounded in 1914, Merrill is one of the largest wealth management businesses in the world. Merrill financial advisors combine financial knowledge and experience with a deep understanding of their clients’ needs to help their clients pursue the lives they want. With a deep commitment to placing their clients' interests first, Merrill financial advisors draw upon the investment insights of Merrill and the banking insights of Bank of America to unlock opportunities tailored to their clients’ needs in many areas of their financial lives. The strategies our financial advisors offer go beyond investment management to include college savings strategies, retirement planning, eldercare, philanthropy, estate planning services, small business services, and access to cash management & banking strategies. Any opinions, views, statements, estimates or projections ("posts") posted on this web page are solely those of the author(s). Merrill Lynch Global Wealth Management is part of Bank of America Corporation's Global Wealth & Investment Management business. Additional Terms, Conditions & Disclaimers found here: https://www.ml.com/social-media/merrill-lynch-on-twitter.html Disclaimer The site is maintained by a third party that has no affiliation with Merrill Lynch, Pierce, Fenner & Smith Incorporated ("MLPF&S" or "Merrill"). The recommendations posted to this page by or about Merrill employees, are not endorsed by, and may not represent the views. This material is not intended to constitute a recommendation, offer or solicitation for the purchase or sale of any security financial instrument. or strategy. Always consult with your independent attorney, tax advisor, investment managers, and insurance agent for final recommendations and before changing or implementing any financial, tax, or estate planning strategy. Bank of America Linkedin Community Guidelines: http://about.bankofamerica.com/en-us/social-media/linkedin-communityguidelines.html
Company Details
merrilllynch
34,603
748,637
52
ml.com
0
MER_1750983
In-progress
Between 800 and 849

Merrill Lynch Global Score (TPRM)XXXX

Description: Sophisticated Keylogger Attack Targets Major U.S. Bank’s Employee Store, Exposing 200,000 to Credential Theft Cybersecurity researchers have identified a highly targeted keylogger attack on the employee store of one of America’s largest banks, compromising sensitive data for over 200,000 employees. The malware intercepted all form inputs including login credentials, payment card details, and personal information raising concerns about potential lateral movement into the bank’s internal systems. The attack exploited a critical gap in enterprise security: employee-facing ecommerce platforms, which often fall outside standard security audits despite handling corporate credentials. Since bank employees frequently have elevated access to financial systems, such platforms become prime targets for threat actors seeking initial footholds in banking infrastructure. The malware used a two-stage loader to evade detection. The first stage employed character code obfuscation to verify users had reached checkout pages before fetching a secondary harvesting script from *js-csp.com/getInjector/*. The second stage systematically extracted form data including input fields, dropdown menus, and text areas before exfiltrating stolen credentials via image beacon requests to bypass security controls. At the time of discovery, only 1 of 97 security vendors on VirusTotal flagged the malicious infrastructure, highlighting a significant detection gap for ecommerce-specific threats. The attack pattern mirrors previous campaigns, including one targeting the Green Bay Packers, and marks the fifth *getInjector* campaign detected in the past year. The *js-csp.com* domain was registered in late December 2025, with the compromise identified within weeks of deployment. The bank’s response was delayed due to the absence of a *security.txt* file, a standard channel for responsible disclosure. Despite researchers’ attempts to notify the bank via email and LinkedIn, the lack of formal security contacts hindered remediation efforts. The incident underscores the need for organizations to monitor client-side scripts, include internal ecommerce platforms in security audits, and deploy specialized threat detection for this emerging attack surface.
Description: The Maine Office of the Attorney General reported a data breach related to Bank of America on March 3, 2025, involving an inadvertent disclosure that occurred on February 18, 2025. One individual was affected, and the compromised information included personal details such as names and Social Security numbers. Bank of America offered a complimentary two-year identity theft protection service by Experian.
Description: The Maine Office of the Attorney General disclosed a data breach affecting Bank of America, detected on October 1, 2024, and reported on January 3, 2025. The incident involved unauthorized access to sensitive personal information, compromising 414 individuals, including at least one Maine resident. While the exact nature of the exposed data was not fully detailed, the breach was severe enough to warrant 24 months of free identity theft protection services via Experian, suggesting the exposure of personally identifiable information (PII) that could facilitate fraud or identity theft. The breach highlights vulnerabilities in Bank of America’s data security measures, raising concerns over potential financial fraud, reputational damage, and regulatory scrutiny. Although the scale (414 individuals) is relatively contained compared to mass breaches, the provision of long-term identity protection indicates a high-risk exposure likely involving financial or identity-related data (e.g., Social Security numbers, account details, or addresses). The incident underscores the persistent threat of cyber intrusions targeting financial institutions, where even limited breaches can have cascading consequences for affected individuals, including phishing attacks, unauthorized transactions, or credit fraud.
Description: On April 16, 2024, the Maine Office of the Attorney General disclosed that Bank of America suffered an inadvertent data breach caused by a Merrill employee’s email error, leading to the unauthorized exposure of customer information. The incident impacted 2,676 individuals, including 18 Maine residents, though the exact nature of the exposed data (e.g., financial details, personal identifiers) was not fully specified. In response, Bank of America offered affected individuals two years of complimentary identity theft protection via Experian IdentityWorks™ to mitigate potential risks such as fraud or identity misuse. The breach did not involve malicious cyber activity like hacking or ransomware but stemmed from human error, highlighting vulnerabilities in internal data-handling protocols. While no evidence suggested exploitation of the exposed data, the incident underscored the reputational and operational risks associated with employee-driven data leaks, particularly for a major financial institution. The breach’s scope though limited in scale raised concerns about compliance with data protection regulations and the bank’s ability to safeguard sensitive customer information.
Description: Business clients applying for Paycheck Protection Program (PPP) loans with Bank of America have had their personal and business information exposed in a data breach. The data breach occurred on April 22 as Bank of America uploaded customers’ PPP loan applications to the Small Business Administration’s (SBA) online testing system, which allowed lenders to test application submissions. During the testing process, Application information was potentially visible to other lenders and their third-party vendors. The exposed data included both business and clients’ personal information. The affected business data may include business names, addresses, and tax identification numbers. Affected personal data may include names, addresses, Social Security numbers, phone numbers, email addresses, and citizenship information.


No incidents recorded for Merrill Lynch in 2026.
No incidents recorded for Merrill Lynch in 2026.
No incidents recorded for Merrill Lynch in 2026.
Merrill Lynch cyber incidents detection timeline including parent company and subsidiaries

Founded in 1914, Merrill is one of the largest wealth management businesses in the world. Merrill financial advisors combine financial knowledge and experience with a deep understanding of their clients’ needs to help their clients pursue the lives they want. With a deep commitment to placing their clients' interests first, Merrill financial advisors draw upon the investment insights of Merrill and the banking insights of Bank of America to unlock opportunities tailored to their clients’ needs in many areas of their financial lives. The strategies our financial advisors offer go beyond investment management to include college savings strategies, retirement planning, eldercare, philanthropy, estate planning services, small business services, and access to cash management & banking strategies. Any opinions, views, statements, estimates or projections ("posts") posted on this web page are solely those of the author(s). Merrill Lynch Global Wealth Management is part of Bank of America Corporation's Global Wealth & Investment Management business. Additional Terms, Conditions & Disclaimers found here: https://www.ml.com/social-media/merrill-lynch-on-twitter.html Disclaimer The site is maintained by a third party that has no affiliation with Merrill Lynch, Pierce, Fenner & Smith Incorporated ("MLPF&S" or "Merrill"). The recommendations posted to this page by or about Merrill employees, are not endorsed by, and may not represent the views. This material is not intended to constitute a recommendation, offer or solicitation for the purchase or sale of any security financial instrument. or strategy. Always consult with your independent attorney, tax advisor, investment managers, and insurance agent for final recommendations and before changing or implementing any financial, tax, or estate planning strategy. Bank of America Linkedin Community Guidelines: http://about.bankofamerica.com/en-us/social-media/linkedin-communityguidelines.html


Dubai Holding is a diversified global investment company that continues to power Dubai’s growth across 10 key sectors, including real estate, hospitality, leisure & entertainment, media, ICT, design, education, retail, manufacturing & logistics and science. Since 2004, we have made strides with an

Old Mutual Limited is a premium pan-African financial services group that offers a broad spectrum of financial solutions to retail and corporate customers across key markets in 14 countries. We have been helping our customers achieve their lifetime financial goals for over 170 years by investing the
Sun Life is a leading financial services organization dedicated to helping people achieve lifetime financial security and live healthier lives. We provide a wide range of insurance and investment products and services in key markets around the world including Canada, the United States, the United K

KPMG is one of the world’s leading professional services firms and the fastest growing Big Four accounting firm in the United States. With 90+ offices and more than 36,000 employees and partners throughout the US, we’re leading the industry in new and exciting ways. Our size and strength make us muc

Shriram Finance is the country’s biggest retail NBFC offering credit solutions for commercial vehicles, two-wheeler loans, car loans, home loans, gold loans, personal and small business loans. We are part of the 50-year-old Shriram Group, a financial conglomerate that has emerged as a trusted partne

Mahindra & Mahindra Financial Services Limited (Mahindra Finance), part of the Mahindra Group, is one of India's leading non-banking finance companies. Focused on the rural and semi-urban sector, the Company has over 10 million customers and has an AUM of over USD 11 Billion. The company is a lead

We are a multinational regional financial services provider that is committed to deliver complete solutions to our clients through differentiated segment offerings and an ecosystem that supports simple, fast and seamless customer experience, underpinned by cohesive and inspired workforce and relatio

OTP Group is one of the fastest growing, leading independent banking groups in Central and Eastern Europe with a bridgehead in Central Asia. It operates in 11 countries - 10 in CEE region and 1 in Uzbekistan, employing nearly 40,000 people and providing universal financial services to 17 million cu

NN Group is an international financial services company, active in 10 countries, with a strong presence in a number of European countries and Japan. Our roots lie in the Netherlands, with a rich history of more than 175 years. With our 15,000 employees, NN Group provides retirement services, pensio
.png)
AI adoption in cybersecurity is still largely consumer-driven, but real growth depends on enterprise deployment.
Systems Planning & Analysis has appointed Raj Badhwar as its chief information officer, placing a longtime cybersecurity and technology...
AI tools are highly complex and may be flawed, hallucinate and reflect biases, according to Merrill.
FiT appoints cybersecurity leader Ed Moyle as CISO to advance enterprise security, strengthen product protection, and elevate industry...
Vodafone Group plans to boost business customer revenue from 25-30% to around 50% by offering AI and cybersecurity services,...
Michigan Sen. Gary Peters, the ranking Democrat on the Homeland Security and Governmental Affairs Committee, recently unveiled legislation...
October is National Cybersecurity Awareness Month, and a great reminder for everyone to participate in growing security awareness!
Booz Allen Hamilton's CTO, Bill Vass, made a deepfake video of himself to promote greater worker skepticism of video and audio content and...
Parthasarathi Chakraborty is a renowned leader with nearly 30 years of experience in cybersecurity defense and engineering.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Merrill Lynch is http://www.ml.com.
According to Rankiteo, Merrill Lynch’s AI-generated cybersecurity score is 800, reflecting their Good security posture.
According to Rankiteo, Merrill Lynch currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Merrill Lynch has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Merrill Lynch is not certified under SOC 2 Type 1.
According to Rankiteo, Merrill Lynch does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Merrill Lynch is not listed as GDPR compliant.
According to Rankiteo, Merrill Lynch does not currently maintain PCI DSS compliance.
According to Rankiteo, Merrill Lynch is not compliant with HIPAA regulations.
According to Rankiteo,Merrill Lynch is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Merrill Lynch operates primarily in the Financial Services industry.
Merrill Lynch employs approximately 34,603 people worldwide.
Merrill Lynch presently has no subsidiaries across any sectors.
Merrill Lynch’s official LinkedIn profile has approximately 748,637 followers.
Merrill Lynch is classified under the NAICS code 52, which corresponds to Finance and Insurance.
No, Merrill Lynch does not have a profile on Crunchbase.
Yes, Merrill Lynch maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/merrilllynch.
As of April 04, 2026, Rankiteo reports that Merrill Lynch has experienced 5 cybersecurity incidents.
Merrill Lynch has an estimated 31,558 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Data Leak, Breach and Cyber Attack.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with experian, and remediation measures with complimentary two-year identity theft protection service, and incident response plan activated with likely (standard protocol for data breaches), and third party assistance with experian (identityworks™ services), and remediation measures with offering 2-year complimentary identity theft protection (experian identityworks™), and communication strategy with notification to affected individuals via maine ag report, and third party assistance with experian (identity theft protection), and communication strategy with delayed due to absence of security.txt file..
Title: Bank of America PPP Loan Data Breach
Description: Business clients applying for Paycheck Protection Program (PPP) loans with Bank of America have had their personal and business information exposed in a data breach.
Date Detected: April 22, 2020
Type: Data Breach
Attack Vector: Improper Data Handling
Vulnerability Exploited: Improper Data Handling
Title: Bank of America Data Breach
Description: The Maine Office of the Attorney General reported a data breach related to Bank of America on March 3, 2025, involving an inadvertent disclosure that occurred on February 18, 2025. One individual was affected, and the compromised information included personal details such as names and Social Security numbers. Bank of America offered a complimentary two-year identity theft protection service by Experian.
Date Detected: 2025-02-18
Date Publicly Disclosed: 2025-03-03
Type: Data Breach
Attack Vector: Inadvertent Disclosure
Title: Bank of America Inadvertent Disclosure of Customer Information via Merrill Employee Email Error
Description: The Maine Office of the Attorney General reported that Bank of America experienced an inadvertent disclosure of customer information on April 16, 2024, due to a Merrill employee email error, affecting a total of 2,676 individuals, including 18 Maine residents. Bank of America is offering a complimentary two-year membership in identity theft protection services through Experian IdentityWorks™.
Date Detected: 2024-04-16
Date Publicly Disclosed: 2024-04-16
Type: Data Breach (Inadvertent Disclosure)
Attack Vector: Human Error (Email Misconfiguration)
Title: Bank of America Data Breach (2024)
Description: The Maine Office of the Attorney General reported a data breach involving Bank of America. The breach occurred on October 1, 2024, affecting 414 individuals, including 1 resident of Maine. Unauthorized access was detected, and identity theft protection services (24 months via Experian) were offered to affected individuals.
Date Detected: 2024-10-01
Date Publicly Disclosed: 2025-01-03
Type: Data Breach
Title: Sophisticated Keylogger Attack Targets Major U.S. Bank’s Employee Store, Exposing 200,000 to Credential Theft
Description: Cybersecurity researchers have identified a highly targeted keylogger attack on the employee store of one of America’s largest banks, compromising sensitive data for over 200,000 employees. The malware intercepted all form inputs including login credentials, payment card details, and personal information, raising concerns about potential lateral movement into the bank’s internal systems. The attack exploited a critical gap in enterprise security: employee-facing ecommerce platforms, which often fall outside standard security audits despite handling corporate credentials. The malware used a two-stage loader to evade detection, systematically extracting form data before exfiltrating stolen credentials via image beacon requests to bypass security controls.
Type: Keylogger Attack
Attack Vector: Malicious script injection (client-side)
Vulnerability Exploited: Lack of security audits for employee-facing ecommerce platforms
Motivation: Credential theft for potential lateral movement into banking infrastructure
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Employee-facing ecommerce platform.

Data Compromised: Business names, Addresses, Tax identification numbers, Names, Social security numbers, Phone numbers, Email addresses, Citizenship information

Data Compromised: Names, Social security numbers
Identity Theft Risk: High

Data Compromised: Customer information
Brand Reputation Impact: Potential (Mitigated by Identity Theft Protection Offer)
Identity Theft Risk: High (Mitigated by Experian IdentityWorks™ Offer)

Identity Theft Risk: True

Data Compromised: Login credentials, payment card details, personal information
Systems Affected: Employee-facing ecommerce platform
Operational Impact: Potential lateral movement into internal banking systems
Identity Theft Risk: High
Payment Information Risk: High
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Business Names, Addresses, Tax Identification Numbers, Names, Social Security Numbers, Phone Numbers, Email Addresses, Citizenship Information, , Personal Information, , Customer Information (Details Unspecified), Login Credentials, Payment Card Details, Personal Information and .

Entity Name: Bank of America
Entity Type: Financial Institution
Industry: Banking

Entity Name: Bank of America
Entity Type: Financial Institution
Industry: Banking
Customers Affected: 1

Entity Name: Bank of America (via Merrill)
Entity Type: Financial Institution
Industry: Banking/Financial Services
Location: United States (Maine residents among affected)
Size: Large (Multinational)
Customers Affected: 2,676 (including 18 Maine residents)

Entity Name: Bank of America
Entity Type: Financial Institution
Industry: Banking/Financial Services
Location: United States
Customers Affected: 414

Entity Name: Major U.S. Bank (unnamed)
Entity Type: Bank
Industry: Financial Services
Location: United States
Customers Affected: 200,000 employees

Third Party Assistance: Experian.
Remediation Measures: Complimentary two-year identity theft protection service

Incident Response Plan Activated: Likely (Standard Protocol for Data Breaches)
Third Party Assistance: Experian (Identityworks™ Services).
Remediation Measures: Offering 2-year complimentary identity theft protection (Experian IdentityWorks™)
Communication Strategy: Notification to affected individuals via Maine AG report

Third Party Assistance: Experian (Identity Theft Protection).

Communication Strategy: Delayed due to absence of security.txt file
Incident Response Plan: The company's incident response plan is described as Likely (Standard Protocol for Data Breaches).
Third-Party Assistance: The company involves third-party assistance in incident response through Experian, , Experian (IdentityWorks™ Services), , Experian (Identity Theft Protection), .

Type of Data Compromised: Business names, Addresses, Tax identification numbers, Names, Social security numbers, Phone numbers, Email addresses, Citizenship information
Sensitivity of Data: High

Type of Data Compromised: Personal information
Number of Records Exposed: 1
Sensitivity of Data: High
Personally Identifiable Information: NamesSocial Security numbers

Type of Data Compromised: Customer Information (Details Unspecified)
Number of Records Exposed: 2,676
Sensitivity of Data: Moderate to High (PII likely included)
Personally Identifiable Information: Likely (Given Identity Theft Protection Offer)

Number of Records Exposed: 414

Type of Data Compromised: Login credentials, Payment card details, Personal information
Number of Records Exposed: 200,000
Sensitivity of Data: High
Data Exfiltration: Yes (via image beacon requests)
Personally Identifiable Information: Yes
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Complimentary two-year identity theft protection service, , Offering 2-year complimentary identity theft protection (Experian IdentityWorks™), .

Regulatory Notifications: Maine Office of the Attorney General

Regulatory Notifications: Maine Office of the Attorney General

Lessons Learned: Organizations need to monitor client-side scripts, include internal ecommerce platforms in security audits, and deploy specialized threat detection for this emerging attack surface. The absence of a security.txt file hindered responsible disclosure and remediation efforts.

Recommendations: Monitor client-side scripts for malicious activity, Include employee-facing ecommerce platforms in security audits, Deploy specialized threat detection for ecommerce-specific threats, Implement a security.txt file for responsible disclosureMonitor client-side scripts for malicious activity, Include employee-facing ecommerce platforms in security audits, Deploy specialized threat detection for ecommerce-specific threats, Implement a security.txt file for responsible disclosureMonitor client-side scripts for malicious activity, Include employee-facing ecommerce platforms in security audits, Deploy specialized threat detection for ecommerce-specific threats, Implement a security.txt file for responsible disclosureMonitor client-side scripts for malicious activity, Include employee-facing ecommerce platforms in security audits, Deploy specialized threat detection for ecommerce-specific threats, Implement a security.txt file for responsible disclosure
Key Lessons Learned: The key lessons learned from past incidents are Organizations need to monitor client-side scripts, include internal ecommerce platforms in security audits, and deploy specialized threat detection for this emerging attack surface. The absence of a security.txt file hindered responsible disclosure and remediation efforts.

Source: Maine Office of the Attorney General
Date Accessed: 2025-03-03

Source: Maine Office of the Attorney General
Date Accessed: 2024-04-16

Source: Maine Office of the Attorney General
Date Accessed: 2025-01-03

Source: Cybersecurity researchers
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Maine Office of the Attorney GeneralDate Accessed: 2025-03-03, and Source: Maine Office of the Attorney GeneralDate Accessed: 2024-04-16, and Source: Maine Office of the Attorney GeneralDate Accessed: 2025-01-03, and Source: Cybersecurity researchers.

Investigation Status: Disclosed (No Further Details)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notification To Affected Individuals Via Maine Ag Report and Delayed due to absence of security.txt file.

Customer Advisories: Offer of 2-year Experian IdentityWorks™ membership

Customer Advisories: Identity theft protection services (24 months via Experian) offered to affected individuals
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Offer Of 2-Year Experian Identityworks™ Membership, , Identity Theft Protection Services (24 Months Via Experian) Offered To Affected Individuals and .

Entry Point: Employee-facing ecommerce platform
High Value Targets: Bank employees with elevated access to financial systems
Data Sold on Dark Web: Bank employees with elevated access to financial systems

Root Causes: Human Error (Merrill Employee Email Misconfiguration),

Root Causes: Lack Of Security Audits For Employee-Facing Ecommerce Platforms, Absence Of Security.Txt File For Responsible Disclosure, Detection Gap For Ecommerce-Specific Threats,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Experian, , Experian (Identityworks™ Services), , Experian (Identity Theft Protection), .
Most Recent Incident Detected: The most recent incident detected was on April 22, 2020.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-01-03.
Most Significant Data Compromised: The most significant data compromised in an incident were Business names, Addresses, Tax identification numbers, Names, Social Security numbers, Phone numbers, Email addresses, Citizenship information, , Names, Social Security numbers, , Customer Information, , , Login credentials, payment card details and personal information.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was experian, , experian (identityworks™ services), , experian (identity theft protection), .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Social Security numbers, Citizenship information, Tax identification numbers, Business names, Addresses, Phone numbers, Email addresses, Customer Information, Login credentials, payment card details, personal information and Names.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 203.1K.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Organizations need to monitor client-side scripts, include internal ecommerce platforms in security audits, and deploy specialized threat detection for this emerging attack surface. The absence of a security.txt file hindered responsible disclosure and remediation efforts.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Deploy specialized threat detection for ecommerce-specific threats, Implement a security.txt file for responsible disclosure, Monitor client-side scripts for malicious activity and Include employee-facing ecommerce platforms in security audits.
Most Recent Source: The most recent source of information about an incident are Cybersecurity researchers and Maine Office of the Attorney General.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Disclosed (No Further Details).
Most Recent Customer Advisory: The most recent customer advisory issued were an Offer of 2-year Experian IdentityWorks™ membership and Identity theft protection services (24 months via Experian) offered to affected individuals.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Employee-facing ecommerce platform.
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Human Error (Merrill Employee Email Misconfiguration), Lack of security audits for employee-facing ecommerce platformsAbsence of security.txt file for responsible disclosureDetection gap for ecommerce-specific threats.
.png)
nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake protocol based on the Albatross consensus algorithm. Prior to version 1.3.0, two peer-facing consensus request handlers assume that the history index is always available and call blockchain.history_store.history_index().unwrap() directly. That assumption is false by construction. HistoryStoreProxy::history_index() explicitly returns None for the valid HistoryStoreProxy::WithoutIndex state. when a full node is syncing or otherwise running without the history index, a remote peer can send RequestTransactionsProof or RequestTransactionReceiptsByAddress and trigger an Option::unwrap() panic on the request path. This issue has been patched in version 1.3.0.
PraisonAI is a multi-agent teams system. Prior to version 1.5.95, FileTools.download_file() in praisonaiagents validates the destination path but performs no validation on the url parameter, passing it directly to httpx.stream() with follow_redirects=True. An attacker who controls the URL can reach any host accessible from the server including cloud metadata services and internal network services. This issue has been patched in version 1.5.95.
PraisonAI is a multi-agent teams system. Prior to version 4.5.97, OAuthManager.validate_token() returns True for any token not found in its internal store, which is empty by default. Any HTTP request to the MCP server with an arbitrary Bearer token is treated as authenticated, granting full access to all registered tools and agent capabilities. This issue has been patched in version 4.5.97.
PraisonAI is a multi-agent teams system. Prior to version 4.5.97, the PraisonAI Gateway server accepts WebSocket connections at /ws and serves agent topology at /info with no authentication. Any network client can connect, enumerate registered agents, and send arbitrary messages to agents and their tool sets. This issue has been patched in version 4.5.97.
PraisonAI is a multi-agent teams system. Prior to version 4.5.90, MCPToolIndex.search_tools() compiles a caller-supplied string directly as a Python regular expression with no validation, sanitization, or timeout. A crafted regex causes catastrophic backtracking in the re engine, blocking the Python thread for hundreds of seconds and causing a complete service outage. This issue has been patched in version 4.5.90.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.