
Pulse Secure Company Cyber Security Posture
pulsesecure.netPulse Secure provides easy, comprehensive software-driven Secure Access solutions that provide visibility and seamless, protected connectivity between users, devices, things, andย services. Our suites uniquely integrate cloud, mobile, application, andย network access to enable hybrid IT in a Zero Trust world. Today, more than 80% of the Fortune 500 and over 20,000 enterprises (and 18M end-points) and service providers across every vertical entrust Pulse Secure to empower their mobile workforce to securely access applications and information in the data center and cloud while ensuring business compliance.
Pulse Secure Company Details
pulse-secure
138 employees
18957
none
Computer Networking Products
pulsesecure.net
Scan still pending
PUL_1437614
In-progress

Between 200 and 800
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

Pulse Secure Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 200 and 800 |
Pulse Secure Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
Ivanti | Breach | 60 | 3 | 4/2025 | IVA758042625 | Link | |
Rankiteo Explanation : Attack with significant impact with internal employee data leaksDescription: Cybersecurity threat intelligence company, GreyNoise, has reported an 800 percent increase in IP scanning on Ivanti VPN's Connect Secure and Pulse Secure systems over the past week, possibly indicating preparation for potential exploitation and public disclosure of vulnerabilities. Nearly a quarter of all scanning activity for Pulse Secure and Connect Secure endpoints recorded over the past 90 days happened in a single day, with a large proportion of IPs designated as 'suspicious' or 'malicious'. Ivanti's Connect Secure has been repeatedly targeted due to its role in enterprise remote access. The company advise customers to upgrade from end-of-life products to ensure system protection against known vulnerabilities. | |||||||
Ivanti | Ransomware | 100 | 5 | 3/2025 | IVA327032225 | Link | |
Rankiteo Explanation : Attack threatening the organizationโs existenceDescription: Ivanti, a cybersecurity firm, predicts Ransomware as a top threat for 2025, with AI enhancements escalating its danger. Despite 38% of security professionals foreseeing an increased threat level, only 29% feel very prepared, indicating a significant preparedness gap. Organizations struggle with exposure management adoption, with data blind spots and tool disparities between IT and security teams. API and software vulnerabilities remain critical threats without proper visibility. Moreover, considerable tech debt interferes with security practices, growth, and innovation, ultimately affecting the strategic role of CISOs in guiding AI adoption and supply chain risk management, despite increased board-level cybersecurity discussions. | |||||||
Ivanti Connect Secure | Ransomware | 100 | 5 | 4/2025 | PUL707041025 | Link | |
Rankiteo Explanation : Attack threatening the organizationโs existenceDescription: In the first quarter of 2025, Ivanti Connect Secure suffered a significant ransomware attack. Threat actors targeted the company with a zero-day exploit purchased for $200,000, resulting in unauthorized remote code execution. The attack led to sensitive data exfiltration and resulted in leak site posts threatening to disclose the information if the ransom was not paid. The attack demonstrated the financial maturity of the ransomware groups, showing their ability to reinvest in sophisticated tools to perpetrate more advanced attacks. Ivanti Connect Secure experienced substantial data compromise, reputational damage, and financial implications due to the breach. This incident underscores the urgent need for enhanced cyber defenses and proactive security measures. | |||||||
Ivanti | Vulnerability | 100 | 5 | 3/2025 | IVA000033125 | Link | |
Rankiteo Explanation : Attack threatening the organizationโs existenceDescription: Ivanti suffered a security breach due to the exploitation of the vulnerability CVE-2025-0282, which affected Ivanti Connect Secure appliances. An advanced malware known as RESURGE targeted this flaw, providing unauthorized remote code execution and privilege escalation. There were a limited number of customers directly impacted by the breach. The exploitation of this vulnerability enabled the installation of persistent web shells, credential harvesting, account creation, and elevation of attacker privileges, posing a significant threat to the confidentiality, integrity, and availability of the organization's systems and data. | |||||||
Ivanti | Vulnerability | 100 | 5 | 4/2025 | IVA1001040225 | Link | |
Rankiteo Explanation : Attack threatening the organizationโs existenceDescription: Chinese espionage threat actors exploited a vulnerability in Ivanti's security products, leading to the deployment of powerful malware known as Resurge. This malware campaign, detailed by the Cybersecurity and Infrastructure Security Agency (CISA) and cybersecurity firm Mandiant, has resulted in compromised system integrity and data breaches. The malware's capability to modify files, harvest credentials, create accounts, reset passwords, and escalate permissions poses a significant security threat. Ivanti has advised customers to reset devices and credentials, evidencing the severity of this security breach. | |||||||
Ivanti | Vulnerability | 100 | 5 | 4/2025 | IVA916041125 | Link | |
Rankiteo Explanation : Attack threatening the organizationโs existenceDescription: Ivanti experienced a severe security breach due to an unauthenticated remote code execution vulnerability, CVE-2025-22457, exploited by a China-nexus threat actor. This vulnerability, impacting Ivanti Connect Secure, Pulse Connect Secure, Ivanti Policy Secure, and ZTA Gateways, allowed attackers to execute arbitrary code remotely via a complex heap spray technique. The exploitation resulted from a failure to check buffer lengths within the application's web server binary. With patches released for some products and others pending, the incident underscores the critical importance of applying security updates promptly to avoid potential data breaches and system compromisation. | |||||||
Ivanti | Vulnerability | 25 | 1 | 5/2025 | IVA554051425 | Link | |
Rankiteo Explanation : Attack without any consequencesDescription: Ivanti has released security updates for its Neurons for ITSM IT service management solution to mitigate a critical authentication bypass vulnerability. Tracked as CVE-2025-22462, this flaw allows unauthenticated attackers to gain administrative access to unpatched systems in low-complexity attacks. Ivanti also patched a default credentials security flaw in its Cloud Services Appliance (CSA) and a critical Connect Secure zero-day exploited by the UNC5221 China-linked espionage group. Multiple other Ivanti security flaws have been exploited in zero-day attacks over the last year. | |||||||
Ivanti | Vulnerability | 100 | 5/2025 | IVA357052325 | Link | ||
Rankiteo Explanation : Attack threatening the organizationโs existenceDescription: The vulnerabilities CVE-2025-4427 and CVE-2025-4428 in Ivanti Endpoint Manager Mobile (EPMM) were exploited by a Chinese cyber espionage group. The attackers achieved remote code execution on internet-exposed Ivanti EPMM deployments, set up a reverse shell, deployed malware, and extracted data including IMEI, phone numbers, location, LDAP users, and Office 365 tokens. The attack affected various entities globally, including government authorities, healthcare organizations, research institutes, legal firms, telcos, manufacturers, aerospace companies, healthcare providers, and more. |
Pulse Secure Company Subsidiaries

Pulse Secure provides easy, comprehensive software-driven Secure Access solutions that provide visibility and seamless, protected connectivity between users, devices, things, andย services. Our suites uniquely integrate cloud, mobile, application, andย network access to enable hybrid IT in a Zero Trust world. Today, more than 80% of the Fortune 500 and over 20,000 enterprises (and 18M end-points) and service providers across every vertical entrust Pulse Secure to empower their mobile workforce to securely access applications and information in the data center and cloud while ensuring business compliance.
Access Data Using Our API

Get company history
.png)
Pulse Secure Cyber Security News
CISA adds Ivanti Connect Secure vulnerability to KEV catalog
CVE-2025-22457 is a critical stack buffer-overflow vulnerability. Ivanti had initially assessed as a low-level product bug that could not beย ...
Ivanti Connect Secure RCE Vulnerability Actively Exploited in the Wild - Apply Patch Now!
This stack-based buffer overflow flaw, with a CVSS score of 9.0, has been actively exploited since mid-March 2025, posing significant risks toย ...
Ivanti VPN customers targeted via unrecognized RCE vulnerability (CVE-2025-22457)
A suspected Chinese APT group has exploited CVE-2025-22457 โ a buffer overflow bug that was previously thought not to be exploitable โ toย ...
Hackers Use 1000+ IP Addresses to Target Ivanti VPN Vulnerabilities
A sweeping wave of suspicious online activity is putting organizations on alert as hackers ramp up their efforts to probe vulnerabilities inย ...
DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks
The malware, along with a web shell, were "installed by exploiting a zero-day vulnerability at that time, CVE-2025-0282, during attacks againstย ...
WARNING: Critical Ivanti Vulnerability Actively Exploited
Organizations are urged to act immediately to mitigate vulnerabilities in Ivanti Connect Secure, Policy Secure, and ZTA Gatewaysย ...
Cybersecurity Pulse Report 2025: Security Implications of AI
AI is reshaping cybersecurity, emerging as both a powerful defense mechanism and a sophisticated tool for cyber adversaries.
Resonance Security Unveils Pulsecheck: A Free Cybersecurity Assessment Tool
In an era of escalating cyber threats, Resonance Security's Pulsecheck offers an unmatched combination of accessibility, speed,ย ...
Threat Actors Exploit Multiple Vulnerabilities in Ivanti Connect Secure and Policy Secure Gateways
The vulnerabilities impact all supported versions (9.x and 22.x) and can be used in a chain of exploits to enable malicious cyber threat actorsย ...

Pulse Secure Similar Companies

Epic
Join us in our mission to help the world get well, help the world stay well, and help future generations be healthier. We hire smart and motivated people from all academic majors to code, test, and implement healthcare software that hundreds of millions of patients and doctors rely on to improve ca

Databricks
Databricks is the Data and AI company. More than 10,000 organizations worldwide โ including Block, Comcast, Condรฉ Nast, Rivian, Shell and over 60% of the Fortune 500 โ rely on the Databricks Data Intelligence Platform to take control of their data and put it to work with AI. Databricks is headquarte

IDEMIA
IDEMIA Group unlocks simpler and safer ways to pay, connect, access, identify, travel and protect public places. With its long-standing expertise in biometrics and cryptography, IDEMIA develops technologies of excellence with an impactful, ethical, and socially responsible approach. Every day, IDEMI

Baidu, Inc.
Baidu is a leading AI company with strong Internet foundation, driven by our mission to โmake the complicated world simpler through technologyโ. Founded in 2000 as a search engine platform, we were an early adopter of artificial intelligence in 2010. Since then, we have established a full AI stack,

The Facebook company is now Meta. Meta builds technologies that help people connect, find communities, and grow businesses. When Facebook launched in 2004, it changed the way people connect. Apps like Messenger, Instagram and WhatsApp further empowered billions around the world. Now, Meta is moving

Alibaba.com
The first business of Alibaba Group, Alibaba.com (www.alibaba.com) is the leading platform for global wholesale trade serving millions of buyers and suppliers around the world. Through Alibaba.com, small businesses can sell their products to companies in other countries. Sellers on Alibaba.com are t

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
Pulse Secure CyberSecurity History Information
How many cyber incidents has Pulse Secure faced?
Total Incidents: According to Rankiteo, Pulse Secure has faced 8 incidents in the past.
What types of cybersecurity incidents have occurred at Pulse Secure?
Incident Types: The types of cybersecurity incidents that have occurred incidents .
Additional Questions
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
