Company Details
queensland-university-of-technology
9,347
298,222
6113
qut.edu.au
0
QUT_3391107
In-progress


QUT (Queensland University of Technology) Vendor Cyber Rating & Cyber Score
qut.edu.auQUT (Queensland University of Technology) is a highly successful Australian university with an applied emphasis in courses and research. Based in Brisbane, the university has a global outlook, some 50,000 students, including 9000 from overseas, and an annual budget of more than AU$750 million. Courses are in high demand and its graduate employment rate is well above the national average for Australian universities. TEQSA PRV12079 | CRICOS No. 00213J
Company Details
queensland-university-of-technology
9,347
298,222
6113
qut.edu.au
0
QUT_3391107
In-progress
Between 750 and 799

Q Global Score (TPRM)XXXX



No incidents recorded for QUT (Queensland University of Technology) in 2026.
No incidents recorded for QUT (Queensland University of Technology) in 2026.
No incidents recorded for QUT (Queensland University of Technology) in 2026.
Q cyber incidents detection timeline including parent company and subsidiaries

QUT (Queensland University of Technology) is a highly successful Australian university with an applied emphasis in courses and research. Based in Brisbane, the university has a global outlook, some 50,000 students, including 9000 from overseas, and an annual budget of more than AU$750 million. Courses are in high demand and its graduate employment rate is well above the national average for Australian universities. TEQSA PRV12079 | CRICOS No. 00213J


Northwestern is one of the nation’s premier research universities, combining innovative teaching and pioneering research in a highly collaborative, multidisciplinary, and diverse environment. Northwestern provides both students and faculty exceptional opportunities for intellectual, personal, and pr

Founded in 1889, The University of New Mexico now occupies 600 acres along old Route 66 in the heart of Albuquerque, a city of more than 700,000 people. From the magnificent mesas to the west, past the banks of the historic Rio Grande to the Sandia Mountains to the east, Albuquerque is a blend of cu

No other university does as much for so many as the University of California. For almost 150 years, the University of California has educated the brightest minds and helped California become a beacon of innovation. Our campuses routinely are ranked among the best in the world. But our reach extends

Queen’s University has a long history of scholarship, discovery, and innovation that shapes our collective knowledge and helps address some of the world’s most pressing challenges. Home to more than 25,000 students, Queen’s offers a comprehensive research-intensive environment. Diverse perspectives

University of Waterloo is a leader in innovation that drives economic and social prosperity for Canada and the world. We are home to a renowned talent pipeline, game-changing research and technology, and unmatched entrepreneurial culture, that together create solutions to tackle today’s and tomorrow

Amity University is India's top ranked non-profit private University where more emphasis is given on not only making you academically brilliant, but true leaders and team players, thus preparing you for the real life corporate world. Amity is the leading education group of India with Most Hi-tech Ca

Florida State University offers a unique academic environment built on our cherished values, distinctive heritage, and welcoming campus. Florida State has it all, offering nationally-ranked academics, world-renowned faculty, championship athletics, and a prime location in the heart of the state capi

Apollo Education Group, Inc. was founded in 1973 in response to a gradual shift in higher education demographics from a student population dominated by youth to one in which approximately half the students are adults and over 80 percent of whom work full-time. Apollo's founder, John Sperling, believ

On our beautiful campus spanning the Iowa River, our faculty and staff enjoy access to an array of cultural, educational, and recreational activities. With more than 30,000 students, more than 14,000 employees, and a budget of $3 billion, the University of Iowa is one of the nation's top public rese
.png)
A team from Queensland University of Technology has taken out the inaugural Capture the Narrative competition.
A new R&D collaboration between Port of Brisbane, QUT and iMOVE Australia will simulate autonomous container transfers using low and...
There truly isn't a more flexible degree out there than one in Information Technology (IT). Job security is on everyone's mind right now,...
MediSecure, an Australian prescription delivery service provider, experienced a ransomware attack in April 2024 (timeline shown in Table 1).
QUT has opened a new avenue in its multi-year digital connections program, using data and AI to improve the ability of frontline agents to support future...
Researchers from the Australian Centre for Robotics at the University of Sydney and the QUT Centre for Robotics (QCR) at Queensland...
The new Perth Tech Hub will offer employment opportunities across data science, cybersecurity, and software engineering.
The cyber attack was identified after QUT campus printers began to spit out bulk ransomware notes, which led the university to shut down a...
Queensland's second largest university has suffered a major cyber attack, impeding IT systems and leaving students unable to receive Centrelink payments for...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of QUT (Queensland University of Technology) is http://www.qut.edu.au/.
According to Rankiteo, QUT (Queensland University of Technology)’s AI-generated cybersecurity score is 796, reflecting their Fair security posture.
According to Rankiteo, QUT (Queensland University of Technology) currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, QUT (Queensland University of Technology) has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, QUT (Queensland University of Technology) is not certified under SOC 2 Type 1.
According to Rankiteo, QUT (Queensland University of Technology) does not hold a SOC 2 Type 2 certification.
According to Rankiteo, QUT (Queensland University of Technology) is not listed as GDPR compliant.
According to Rankiteo, QUT (Queensland University of Technology) does not currently maintain PCI DSS compliance.
According to Rankiteo, QUT (Queensland University of Technology) is not compliant with HIPAA regulations.
According to Rankiteo,QUT (Queensland University of Technology) is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
QUT (Queensland University of Technology) operates primarily in the Higher Education industry.
QUT (Queensland University of Technology) employs approximately 9,347 people worldwide.
QUT (Queensland University of Technology) presently has no subsidiaries across any sectors.
QUT (Queensland University of Technology)’s official LinkedIn profile has approximately 298,222 followers.
QUT (Queensland University of Technology) is classified under the NAICS code 6113, which corresponds to Colleges, Universities, and Professional Schools.
No, QUT (Queensland University of Technology) does not have a profile on Crunchbase.
Yes, QUT (Queensland University of Technology) maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/queensland-university-of-technology.
As of April 02, 2026, Rankiteo reports that QUT (Queensland University of Technology) has not experienced any cybersecurity incidents.
QUT (Queensland University of Technology) has an estimated 15,823 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, QUT (Queensland University of Technology) has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.