Company Details
risk-control
1
0
5411
risk-c.ru
0
RIS_1291386
In-progress


Risk Control Vendor Cyber Rating & Cyber Score
risk-c.ruФирма «Risk Control» была создана в 2011 году в городе Екатеринбург выпускниками юридического факультета МГУ имени М.В. Ломоносова. Фактом своего создания и успешным оказанием услуг фирма Risk Control бросает вызов сложившимся стереотипам и предрассудкам: 1) Высокое качество юридических услуг, основанное на профессионализме и опыте работы, может и должно существовать не только в Москве, но и в экономически развитых региональных центрах России. 2) Реализация проектов большой степени сложности на высоком качественном уровне может осуществляться без привлечения дорогих международных и московских юридических фирм. 3) Достижение бизнес-целей и реализация бизнес-проектов могут и должны осуществляться исключительно в рамках правового поля. В своей деятельности фирма Risk Control придерживается высоких стандартов оказания юридических услуг. Приоритетами в работе с клиентами являются качество, эффективность и оперативность. Фирма руководствуется этическими стандартами ведения бизнеса и стремится поддерживать высокий уровень правовой культуры своих клиентов.
Company Details
risk-control
1
0
5411
risk-c.ru
0
RIS_1291386
In-progress
Between 750 and 799

Risk Control Global Score (TPRM)XXXX



No incidents recorded for Risk Control in 2026.
No incidents recorded for Risk Control in 2026.
No incidents recorded for Risk Control in 2026.
Risk Control cyber incidents detection timeline including parent company and subsidiaries

Фирма «Risk Control» была создана в 2011 году в городе Екатеринбург выпускниками юридического факультета МГУ имени М.В. Ломоносова. Фактом своего создания и успешным оказанием услуг фирма Risk Control бросает вызов сложившимся стереотипам и предрассудкам: 1) Высокое качество юридических услуг, основанное на профессионализме и опыте работы, может и должно существовать не только в Москве, но и в экономически развитых региональных центрах России. 2) Реализация проектов большой степени сложности на высоком качественном уровне может осуществляться без привлечения дорогих международных и московских юридических фирм. 3) Достижение бизнес-целей и реализация бизнес-проектов могут и должны осуществляться исключительно в рамках правового поля. В своей деятельности фирма Risk Control придерживается высоких стандартов оказания юридических услуг. Приоритетами в работе с клиентами являются качество, эффективность и оперативность. Фирма руководствуется этическими стандартами ведения бизнеса и стремится поддерживать высокий уровень правовой культуры своих клиентов.


The National Immigrant Women's Advocacy Project is committed to amplifying the voices of immigrant survivors of abuse while building the capacity of professionals to eliminate the systemic barriers faced by survivors. Through our technical assistance program, policy advocacy, and research, NIWAP's

Founded in 1965, Wayman, Irvin, & McAuley, LLC is a law firm devoted to the zealous representation of its clients in a diverse range of legal matters. The firm has an active practice in all state and federal trial and appellate courts in Western and Central Pennsylvania. The firm also practices in t

Judy Chang Law Firm (aka J Global Law Group) specializes in U.S. immigration and nationality law. We are advocates for our clients. We fight for the best interests of our clients with the broad society’s welfare in mind. Our clients, through their talent and efforts, have and will make contribution

Global Registration Services, Inc. helps manufacturers, importers, distributors, wholesalers and retailers of bedding & furniture articles obtain state law label licenses. We also assist with the formulation and printing of law labels. We've provided registration advice and assistance to compan

Justice HQ is a modern membership platform built for the entire legal industry. Consumer advocate attorneys, vendor partners, support professionals. There is a membership option for all. Our community is designed for those who prioritize collaboration, innovation, and ethical practice. Whether you'r

Meridian offers our clients superior customer service, a highly qualified staff, and quick and direct access to the expert. Our case managers work to seamlessly integrate the medical-legal industry with credentialed board certified physicians in all major medical fields. By having a single case mana

Valley Willwriting offers a friendly, professional and ethical willwriting service for people living in Calderdale & West Yorkshire who are considering making a Will for the first time or who are reviewing an existing one. Sally Helm set up Valley Willwriting as she wanted to provide a bespoke wil

Woods Rogers is a Virginia-based law firm delivering uncommon service and solutions. More than 135 attorneys collaborate across disciplines to provide business-focused legal advice to a diverse range of clients, from individuals to large corporations. With outstanding talent, strong relationships, a

Avensure is one of the leading service providers assisting a multitude of companies with the Health & Safety, HR, and Employment Law requirements ensuring that they are fully compliant with regulations. We can support our customers with devising solutions that offer advice & guidance, training to
.png)
Digital sovereignty is now a risk management priority. Insights from the 2026 Summit on AI, cloud security, data control,...
NIS2 and the Critical Entities Resilience Act (CER) are two closely connected pillars of the EU's drive to make essential services more...
Cyber risk is becoming harder to underwrite, with systemic disruption, third-party exposure and faster attack cycles challenging insurers'...
If the public sector had unlimited cybersecurity budgets and fully staffed SOCs, today's threat landscape would look very different.
Energy companies can no longer ask if they will face a cyberattack, but rather how they will respond when one occurs. Read our article and...
Find out why CIOs must now treat geopolitically motivated cyberattacks like the Handala wiper attack on Stryker as a distinct enterprise...
CBN introduces a cybersecurity self-assessment tool to strengthen Nigeria's financial sector, improve risk management, and protect against...
Technology is advancing at unprecedented speed, unlocking new opportunities for growth while simultaneously amplifying cyber risk.
Cybersecurity is no longer a background IT concern. Cyber risk directly affects enterprise value, regulatory exposure,...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Risk Control is http://www.risk-c.ru.
According to Rankiteo, Risk Control’s AI-generated cybersecurity score is 781, reflecting their Fair security posture.
According to Rankiteo, Risk Control currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Risk Control has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Risk Control is not certified under SOC 2 Type 1.
According to Rankiteo, Risk Control does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Risk Control is not listed as GDPR compliant.
According to Rankiteo, Risk Control does not currently maintain PCI DSS compliance.
According to Rankiteo, Risk Control is not compliant with HIPAA regulations.
According to Rankiteo,Risk Control is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Risk Control operates primarily in the Legal Services industry.
Risk Control employs approximately 1 people worldwide.
Risk Control presently has no subsidiaries across any sectors.
Risk Control’s official LinkedIn profile has approximately 0 followers.
Risk Control is classified under the NAICS code 5411, which corresponds to Legal Services.
No, Risk Control does not have a profile on Crunchbase.
Yes, Risk Control maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/risk-control.
As of April 03, 2026, Rankiteo reports that Risk Control has not experienced any cybersecurity incidents.
Risk Control has an estimated 7,768 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Risk Control has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Hirschmann EagleSDV version 05.4.01 prior to 05.4.02 contains a denial-of-service vulnerability that causes the device to crash during session establishment when using TLS 1.0 or TLS 1.1. Attackers can trigger a crash by initiating TLS connections with these protocol versions to disrupt service availability.
The stored API keys in temporary browser client is not marked as protected allowing for JavScript console or other errors to allow for extraction of the encryption credentials.
XSS vulnerability in cveInterface.js allows for inject HTML to be passed to display, as cveInterface trusts input from CVE API services
Multiple reflected cross-site scripting (XSS) vulnerabilities in the login.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda and red_url parameters.
A reflected cross-site scripting (XSS) vulnerability in the login_newpwd.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda parameter.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.