Pulse Secure Company Cyber Security Posture

pulsesecure.net

Pulse Secure provides easy, comprehensive software-driven Secure Access solutions that provide visibility and seamless, protected connectivity between users, devices, things, andย services. Our suites uniquely integrate cloud, mobile, application, andย network access to enable hybrid IT in a Zero Trust world. Today, more than 80% of the Fortune 500 and over 20,000 enterprises (and 18M end-points) and service providers across every vertical entrust Pulse Secure to empower their mobile workforce to securely access applications and information in the data center and cloud while ensuring business compliance.

Pulse Secure Company Details

Linkedin ID:

pulse-secure

Employees number:

138 employees

Number of followers:

18957

NAICS:

none

Industry Type:

Computer Networking Products

Homepage:

pulsesecure.net

IP Addresses:

Scan still pending

Company ID:

PUL_1437614

Scan Status:

In-progress

AI scorePulse Secure Risk Score (AI oriented)

Between 200 and 800

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

globalscorePulse Secure Global Score
blurone
Ailogo

Pulse Secure Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 200 and 800

Pulse Secure Company Cyber Security News & History

Past Incidents
8
Attack Types
3
EntityTypeSeverityImpactSeenUrl IDDetailsView
IvantiBreach6034/2025IVA758042625Link
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: Cybersecurity threat intelligence company, GreyNoise, has reported an 800 percent increase in IP scanning on Ivanti VPN's Connect Secure and Pulse Secure systems over the past week, possibly indicating preparation for potential exploitation and public disclosure of vulnerabilities. Nearly a quarter of all scanning activity for Pulse Secure and Connect Secure endpoints recorded over the past 90 days happened in a single day, with a large proportion of IPs designated as 'suspicious' or 'malicious'. Ivanti's Connect Secure has been repeatedly targeted due to its role in enterprise remote access. The company advise customers to upgrade from end-of-life products to ensure system protection against known vulnerabilities.

IvantiRansomware10053/2025IVA327032225Link
Rankiteo Explanation :
Attack threatening the organizationโ€™s existence

Description: Ivanti, a cybersecurity firm, predicts Ransomware as a top threat for 2025, with AI enhancements escalating its danger. Despite 38% of security professionals foreseeing an increased threat level, only 29% feel very prepared, indicating a significant preparedness gap. Organizations struggle with exposure management adoption, with data blind spots and tool disparities between IT and security teams. API and software vulnerabilities remain critical threats without proper visibility. Moreover, considerable tech debt interferes with security practices, growth, and innovation, ultimately affecting the strategic role of CISOs in guiding AI adoption and supply chain risk management, despite increased board-level cybersecurity discussions.

Ivanti Connect SecureRansomware10054/2025PUL707041025Link
Rankiteo Explanation :
Attack threatening the organizationโ€™s existence

Description: In the first quarter of 2025, Ivanti Connect Secure suffered a significant ransomware attack. Threat actors targeted the company with a zero-day exploit purchased for $200,000, resulting in unauthorized remote code execution. The attack led to sensitive data exfiltration and resulted in leak site posts threatening to disclose the information if the ransom was not paid. The attack demonstrated the financial maturity of the ransomware groups, showing their ability to reinvest in sophisticated tools to perpetrate more advanced attacks. Ivanti Connect Secure experienced substantial data compromise, reputational damage, and financial implications due to the breach. This incident underscores the urgent need for enhanced cyber defenses and proactive security measures.

IvantiVulnerability10053/2025IVA000033125Link
Rankiteo Explanation :
Attack threatening the organizationโ€™s existence

Description: Ivanti suffered a security breach due to the exploitation of the vulnerability CVE-2025-0282, which affected Ivanti Connect Secure appliances. An advanced malware known as RESURGE targeted this flaw, providing unauthorized remote code execution and privilege escalation. There were a limited number of customers directly impacted by the breach. The exploitation of this vulnerability enabled the installation of persistent web shells, credential harvesting, account creation, and elevation of attacker privileges, posing a significant threat to the confidentiality, integrity, and availability of the organization's systems and data.

IvantiVulnerability10054/2025IVA1001040225Link
Rankiteo Explanation :
Attack threatening the organizationโ€™s existence

Description: Chinese espionage threat actors exploited a vulnerability in Ivanti's security products, leading to the deployment of powerful malware known as Resurge. This malware campaign, detailed by the Cybersecurity and Infrastructure Security Agency (CISA) and cybersecurity firm Mandiant, has resulted in compromised system integrity and data breaches. The malware's capability to modify files, harvest credentials, create accounts, reset passwords, and escalate permissions poses a significant security threat. Ivanti has advised customers to reset devices and credentials, evidencing the severity of this security breach.

IvantiVulnerability10054/2025IVA916041125Link
Rankiteo Explanation :
Attack threatening the organizationโ€™s existence

Description: Ivanti experienced a severe security breach due to an unauthenticated remote code execution vulnerability, CVE-2025-22457, exploited by a China-nexus threat actor. This vulnerability, impacting Ivanti Connect Secure, Pulse Connect Secure, Ivanti Policy Secure, and ZTA Gateways, allowed attackers to execute arbitrary code remotely via a complex heap spray technique. The exploitation resulted from a failure to check buffer lengths within the application's web server binary. With patches released for some products and others pending, the incident underscores the critical importance of applying security updates promptly to avoid potential data breaches and system compromisation.

IvantiVulnerability2515/2025IVA554051425Link
Rankiteo Explanation :
Attack without any consequences

Description: Ivanti has released security updates for its Neurons for ITSM IT service management solution to mitigate a critical authentication bypass vulnerability. Tracked as CVE-2025-22462, this flaw allows unauthenticated attackers to gain administrative access to unpatched systems in low-complexity attacks. Ivanti also patched a default credentials security flaw in its Cloud Services Appliance (CSA) and a critical Connect Secure zero-day exploited by the UNC5221 China-linked espionage group. Multiple other Ivanti security flaws have been exploited in zero-day attacks over the last year.

IvantiVulnerability1005/2025IVA357052325Link
Rankiteo Explanation :
Attack threatening the organizationโ€™s existence

Description: The vulnerabilities CVE-2025-4427 and CVE-2025-4428 in Ivanti Endpoint Manager Mobile (EPMM) were exploited by a Chinese cyber espionage group. The attackers achieved remote code execution on internet-exposed Ivanti EPMM deployments, set up a reverse shell, deployed malware, and extracted data including IMEI, phone numbers, location, LDAP users, and Office 365 tokens. The attack affected various entities globally, including government authorities, healthcare organizations, research institutes, legal firms, telcos, manufacturers, aerospace companies, healthcare providers, and more.

Pulse Secure Company Subsidiaries

SubsidiaryImage

Pulse Secure provides easy, comprehensive software-driven Secure Access solutions that provide visibility and seamless, protected connectivity between users, devices, things, andย services. Our suites uniquely integrate cloud, mobile, application, andย network access to enable hybrid IT in a Zero Trust world. Today, more than 80% of the Fortune 500 and over 20,000 enterprises (and 18M end-points) and service providers across every vertical entrust Pulse Secure to empower their mobile workforce to securely access applications and information in the data center and cloud while ensuring business compliance.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=pulse-secure' -H 'apikey: YOUR_API_KEY_HERE'
newsone

Pulse Secure Cyber Security News

2025-04-07T07:00:00.000Z
CISA adds Ivanti Connect Secure vulnerability to KEV catalog

CVE-2025-22457 is a critical stack buffer-overflow vulnerability. Ivanti had initially assessed as a low-level product bug that could not beย ...

2025-04-04T07:00:00.000Z
Ivanti Connect Secure RCE Vulnerability Actively Exploited in the Wild - Apply Patch Now!

This stack-based buffer overflow flaw, with a CVSS score of 9.0, has been actively exploited since mid-March 2025, posing significant risks toย ...

2025-04-03T07:00:00.000Z
Ivanti VPN customers targeted via unrecognized RCE vulnerability (CVE-2025-22457)

A suspected Chinese APT group has exploited CVE-2025-22457 โ€“ a buffer overflow bug that was previously thought not to be exploitable โ€“ toย ...

2025-04-24T07:00:00.000Z
Hackers Use 1000+ IP Addresses to Target Ivanti VPN Vulnerabilities

A sweeping wave of suspicious online activity is putting organizations on alert as hackers ramp up their efforts to probe vulnerabilities inย ...

2025-04-25T07:00:00.000Z
DslogdRAT Malware Deployed via Ivanti ICS Zero-Day CVE-2025-0282 in Japan Attacks

The malware, along with a web shell, were "installed by exploiting a zero-day vulnerability at that time, CVE-2025-0282, during attacks againstย ...

2025-01-09T08:00:00.000Z
WARNING: Critical Ivanti Vulnerability Actively Exploited

Organizations are urged to act immediately to mitigate vulnerabilities in Ivanti Connect Secure, Policy Secure, and ZTA Gatewaysย ...

2025-04-08T07:00:00.000Z
Cybersecurity Pulse Report 2025: Security Implications of AI

AI is reshaping cybersecurity, emerging as both a powerful defense mechanism and a sophisticated tool for cyber adversaries.

2024-12-27T08:00:00.000Z
Resonance Security Unveils Pulsecheck: A Free Cybersecurity Assessment Tool

In an era of escalating cyber threats, Resonance Security's Pulsecheck offers an unmatched combination of accessibility, speed,ย ...

2024-02-29T08:00:00.000Z
Threat Actors Exploit Multiple Vulnerabilities in Ivanti Connect Secure and Policy Secure Gateways

The vulnerabilities impact all supported versions (9.x and 22.x) and can be used in a chain of exploits to enable malicious cyber threat actorsย ...

similarCompanies

Pulse Secure Similar Companies

Join us in our mission to help the world get well, help the world stay well, and help future generations be healthier. We hire smart and motivated people from all academic majors to code, test, and implement healthcare software that hundreds of millions of patients and doctors rely on to improve ca

Databricks

Databricks is the Data and AI company. More than 10,000 organizations worldwide โ€” including Block, Comcast, Condรฉ Nast, Rivian, Shell and over 60% of the Fortune 500 โ€” rely on the Databricks Data Intelligence Platform to take control of their data and put it to work with AI. Databricks is headquarte

IDEMIA

IDEMIA Group unlocks simpler and safer ways to pay, connect, access, identify, travel and protect public places. With its long-standing expertise in biometrics and cryptography, IDEMIA develops technologies of excellence with an impactful, ethical, and socially responsible approach. Every day, IDEMI

Baidu, Inc.

Baidu is a leading AI company with strong Internet foundation, driven by our mission to โ€œmake the complicated world simpler through technologyโ€. Founded in 2000 as a search engine platform, we were an early adopter of artificial intelligence in 2010. Since then, we have established a full AI stack,

Facebook

The Facebook company is now Meta. Meta builds technologies that help people connect, find communities, and grow businesses. When Facebook launched in 2004, it changed the way people connect. Apps like Messenger, Instagram and WhatsApp further empowered billions around the world. Now, Meta is moving

Alibaba.com

The first business of Alibaba Group, Alibaba.com (www.alibaba.com) is the leading platform for global wholesale trade serving millions of buyers and suppliers around the world. Through Alibaba.com, small businesses can sell their products to companies in other countries. Sellers on Alibaba.com are t

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Pulse Secure CyberSecurity History Information

How many cyber incidents has Pulse Secure faced?

Total Incidents: According to Rankiteo, Pulse Secure has faced 8 incidents in the past.

What types of cybersecurity incidents have occurred at Pulse Secure?

Incident Types: The types of cybersecurity incidents that have occurred incidents .

Additional Questions

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge