Badge
11,371 badges added since 01 January 2025
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions

Rogers is Canada’s communications and entertainment company, driven to connect and entertain Canadians. For more information, please visit rogers.com or investors.rogers.com. Déterminée à connecter et à divertir les Canadiens et Canadiennes, Rogers est la référence canadienne en matière de communications et de divertissement. Pour en savoir plus, visitez rogers.com ou investisseurs.rogers.com. This LinkedIn company page is moderated. For more info, please review our commenting policy here: http://roge.rs/2ofPXLN

Rogers Communications A.I CyberSecurity Scoring

Rogers Communications

Company Details

Linkedin ID:

rogers-communications

Employees number:

28,375

Number of followers:

305,765

NAICS:

517

Industry Type:

Telecommunications

Homepage:

rogers.com

IP Addresses:

0

Company ID:

ROG_1402873

Scan Status:

In-progress

AI scoreRogers Communications Risk Score (AI oriented)

Between 600 and 649

https://images.rankiteo.com/companyimages/rogers-communications.jpeg
Rogers Communications Telecommunications
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
Get a Score Increase
globalscoreRogers Communications Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/rogers-communications.jpeg
Rogers Communications Telecommunications
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Rogers Communications Company CyberSecurity News & History

Past Incidents
2
Attack Types
2
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
Rogers CommunicationsBreach8543/2026NA
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Rogers and Fido Hit by Data Breach Exposing Customer Information Rogers Communications and its subsidiary Fido disclosed a data breach on Friday after detecting unauthorized access to customer information through internal security monitoring. The compromised data includes names, contact details, account numbers, and language preferences, though the company confirmed that sensitive information such as social insurance numbers, dates of birth, passwords, and financial details remained secure. In a statement to *The Globe and Mail*, Rogers spokesperson Zac Carreiro acknowledged the incident, stating that immediate action was taken to investigate and bolster protections. The company is still determining the full scope of the breach and has not yet disclosed the number of affected customers or how long the unauthorized access persisted. Notably, Rogers did not address whether the breach was connected to recent IT layoffs or how the exposed account numbers could be exploited in future phishing attacks. The incident follows similar breaches at other Canadian telecoms, including Freedom Mobile and Telus Digital. Rogers continues its investigation and plans to notify impacted customers.

Rogers CommunicationsRansomware10061/2026NA
Rankiteo Explanation :
Attack threatening the economy of geographical region

Description: Ransomware Surge in January 2026: Shifting Targets and Emerging Threats January 2026 marked a sharp rise in ransomware activity, with 711 attacks recorded down slightly from December 2025’s 783 but 33% higher than January 2025 and well above the 2025 monthly average of 620. While attacks on manufacturers plateaued, finance and tech sectors became prime targets, seeing 24% and 12% increases, respectively. ### Key Trends and Impact - Geographic Shifts: The UK saw an 83% surge in attacks (42 in January vs. 23 in December), while the US declined by 8% (329 attacks) and Germany dropped 38%. Canada and Australia also experienced increases. - New Threat Actor: A group called 0APT claimed over 80 attacks, but most were unverified and later removed from tracking databases. - Data Theft: Over 104 TB of data was stolen, with Sinobi leading in total volume (13.6 TB) and Everest claiming the largest single breach (1.4 TB from Iron Mountain). ### Sector Breakdown - Healthcare: Attacks fell 27% (36 vs. 49 in December), but confirmed incidents rose. Notable breaches included Mt. Spokane Pediatrics (LockBit) and Pecan Tree Dental (Sinobi), exposing 13,300 records. - Government: Attacks remained steady (31 vs. 30 in December), with 10 confirmed. The Gentlemen targeted Spain’s Ayuntamiento de Beniel and South Africa’s Witzenberg Municipality, while Qilin hit Tulsa International Airport. - Education: Attacks dropped 45% (16 vs. 29), with no confirmed incidents. However, delayed disclosures revealed breaches at Clackamas Community College (Medusa) and Trocaire College (INC). - Businesses: Attacks decreased 7%, but finance and tech saw spikes. The Gentlemen breached Rogers Capital Credit (Mauritius), exposing banking data, while Rhysida demanded $392,000 from Elabs AG (Germany). ### Top Ransomware Gangs - Qilin led with 108 attacks (6 confirmed), followed by Clop (90, none confirmed) and Akira (72, 3 confirmed). - The Gentlemen had the highest confirmation rate (5 of 48 claims), targeting businesses and governments. ### Notable Incidents - Iron Mountain (US): Everest claimed 1.4 TB stolen, though the breach was limited to market materials. - AZ Monica (Belgium): A ransomware attack forced operation cancellations and patient transfers via the Red Cross. - Sanxenxo (Spain): Hackers demanded $5,000, which was refused. The data underscores evolving ransomware tactics, with gangs shifting focus to high-value sectors and leveraging delayed disclosures to obscure attack timelines.

Rogers Communications and Fido: Rogers and Fido Confirm Data Breach Affecting Customer Information
Breach
Severity: 85
Impact: 4
Seen: 3/2026
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Rogers and Fido Hit by Data Breach Exposing Customer Information Rogers Communications and its subsidiary Fido disclosed a data breach on Friday after detecting unauthorized access to customer information through internal security monitoring. The compromised data includes names, contact details, account numbers, and language preferences, though the company confirmed that sensitive information such as social insurance numbers, dates of birth, passwords, and financial details remained secure. In a statement to *The Globe and Mail*, Rogers spokesperson Zac Carreiro acknowledged the incident, stating that immediate action was taken to investigate and bolster protections. The company is still determining the full scope of the breach and has not yet disclosed the number of affected customers or how long the unauthorized access persisted. Notably, Rogers did not address whether the breach was connected to recent IT layoffs or how the exposed account numbers could be exploited in future phishing attacks. The incident follows similar breaches at other Canadian telecoms, including Freedom Mobile and Telus Digital. Rogers continues its investigation and plans to notify impacted customers.

Witzenberg Municipality, Trocaire College and Rogers Capital Credit: Ransomware roundup: January 2026
Ransomware
Severity: 100
Impact: 6
Seen: 1/2026
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack threatening the economy of geographical region

Description: Ransomware Surge in January 2026: Shifting Targets and Emerging Threats January 2026 marked a sharp rise in ransomware activity, with 711 attacks recorded down slightly from December 2025’s 783 but 33% higher than January 2025 and well above the 2025 monthly average of 620. While attacks on manufacturers plateaued, finance and tech sectors became prime targets, seeing 24% and 12% increases, respectively. ### Key Trends and Impact - Geographic Shifts: The UK saw an 83% surge in attacks (42 in January vs. 23 in December), while the US declined by 8% (329 attacks) and Germany dropped 38%. Canada and Australia also experienced increases. - New Threat Actor: A group called 0APT claimed over 80 attacks, but most were unverified and later removed from tracking databases. - Data Theft: Over 104 TB of data was stolen, with Sinobi leading in total volume (13.6 TB) and Everest claiming the largest single breach (1.4 TB from Iron Mountain). ### Sector Breakdown - Healthcare: Attacks fell 27% (36 vs. 49 in December), but confirmed incidents rose. Notable breaches included Mt. Spokane Pediatrics (LockBit) and Pecan Tree Dental (Sinobi), exposing 13,300 records. - Government: Attacks remained steady (31 vs. 30 in December), with 10 confirmed. The Gentlemen targeted Spain’s Ayuntamiento de Beniel and South Africa’s Witzenberg Municipality, while Qilin hit Tulsa International Airport. - Education: Attacks dropped 45% (16 vs. 29), with no confirmed incidents. However, delayed disclosures revealed breaches at Clackamas Community College (Medusa) and Trocaire College (INC). - Businesses: Attacks decreased 7%, but finance and tech saw spikes. The Gentlemen breached Rogers Capital Credit (Mauritius), exposing banking data, while Rhysida demanded $392,000 from Elabs AG (Germany). ### Top Ransomware Gangs - Qilin led with 108 attacks (6 confirmed), followed by Clop (90, none confirmed) and Akira (72, 3 confirmed). - The Gentlemen had the highest confirmation rate (5 of 48 claims), targeting businesses and governments. ### Notable Incidents - Iron Mountain (US): Everest claimed 1.4 TB stolen, though the breach was limited to market materials. - AZ Monica (Belgium): A ransomware attack forced operation cancellations and patient transfers via the Red Cross. - Sanxenxo (Spain): Hackers demanded $5,000, which was refused. The data underscores evolving ransomware tactics, with gangs shifting focus to high-value sectors and leveraging delayed disclosures to obscure attack timelines.

Ailogo

Rogers Communications Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Rogers Communications

Incidents vs Telecommunications Industry Average (This Year)

Rogers Communications has 11.11% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

Rogers Communications has 70.94% more incidents than the average of all companies with at least one recorded incident.

Incident Types Rogers Communications vs Telecommunications Industry Avg (This Year)

Rogers Communications reported 2 incidents this year: 0 cyber attacks, 1 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.

Incident History — Rogers Communications (X = Date, Y = Severity)

Rogers Communications cyber incidents detection timeline including parent company and subsidiaries

Rogers Communications Company Subsidiaries

SubsidiaryImage

Rogers is Canada’s communications and entertainment company, driven to connect and entertain Canadians. For more information, please visit rogers.com or investors.rogers.com. Déterminée à connecter et à divertir les Canadiens et Canadiennes, Rogers est la référence canadienne en matière de communications et de divertissement. Pour en savoir plus, visitez rogers.com ou investisseurs.rogers.com. This LinkedIn company page is moderated. For more info, please review our commenting policy here: http://roge.rs/2ofPXLN

Loading...
similarCompanies

Rogers Communications Similar Companies

Bouygues Telecom

🤝Ce qui fait notre singularité ? Chez Bouygues Telecom, nous croyons que les relations humaines sont un besoin vital. La qualité de nos relations avec notre famille, nos amis, ceux qui nous entourent est déterminante pour notre bien-être, notre santé et même notre espérance de vie. Ce sont ces rela

We believe it’s people who give purpose to our technology. So we’re committed to staying close to our customers and providing them the best experience. And delivering the best tech. On the best network. Because our purpose is to build a connected future so everyone can thrive. We build techno

Ciena

Ciena (NYSE:CIEN) is the global leader in high-speed connectivity. We build advanced networks to support exponential growth in bandwidth demand—empowering our customers, partners, and communities to thrive in the AI era. With unparalleled expertise and innovation, our networking systems, interconnec

Telenor

EMPOWERING SOCIETIES. CONNECTING YOU TO WHAT MATTERS MOST. Telenor Group is a leading telecommunications company across the Nordics and Asia with 158 million subscribers and annual sales of around NOK 99 billions (2022).  We are committed to responsible business conduct and driven by the ambition

VEON is a global digital operator headquartered in Dubai, providing connectivity and digital services across dynamic frontier markets that are home to more than 6% of the world’s population. With our digital operators, we transform lives through technology-driven services that empower millions and

EE, part of BT Group, is the largest and most advanced mobile communications company in the UK, delivering mobile and fixed communications services to consumers. We run the UK's biggest and fastest mobile network, having pioneered the UK's first superfast 4G mobile service in October 2012 and was

MTS Group

Mobile TeleSystems OJSC ("MTS") is the leading telecommunications group in Russia, Eastern Europe and Central Asia, offering mobile and fixed voice, broadband, pay TV as well as content and entertainment services in one of the world's fastest growing regions. Including its subsidiaries, as of Decemb

תכירו את השחקנים הראשיים שלנו: העובדות והעובדים. אנחנו לא עובדים עם תסריט קבוע, חושבים מחוץ לקופסא, ומייצרים ז'אנר משלנו. כש-יס קמה, בשנת 1998, הבאנו את בשורת הלווין אל עולם שידורי הטלוויזיה והיינו הראשונים להציע שידורים דיגיטליים ושירותי טלוויזיה אינטראקטיביים - כשבחירת התכנים היא בידיים של הלקוח

TELUS

At TELUS, our purpose-driven team works together every day to innovate and do good. From providing technology solutions that make our lives safer and easier, to supporting those who need it most, our inclusive, spirited and giving people are passionate about empowering our customers, communities and

newsone

Rogers Communications CyberSecurity News

March 27, 2026 09:49 PM
Rogers and Freedom Mobile say they suffered data breaches in recent weeks

Quebecor Inc. QBR-B-T and Rogers Communications Inc. RCI-B-T have both suffered breaches of their systems in recent weeks, the latest attack...

March 22, 2026 08:03 AM
Digital Crown Jewels - It's a High Stakes Game

Companies are increasingly relying on digital assets to drive growth as part of digital transformations."Digital Crown Jewels" or DCJ are the most valuable...

January 22, 2026 08:06 AM
BlackBerry and CompTIA Partner to Upskill Malaysia's Workforce Through Cybersecurity Center of Excellence

BlackBerry partners with the world's leading IT certification and training body to build the cyber workforce.

October 20, 2025 07:00 AM
The bizarre history of internet outages

In a world where a single point of failure can throw our machines into chaos, everything from sharks to authoritarian governments and old...

September 26, 2025 07:00 AM
Federal cyber agency warns of 'serious and urgent' attack on tech used by remote workers

Government cyber agencies around the world are rushing to clamp down on what appears to be an advanced and sophisticated espionage campaign...

September 05, 2025 07:00 AM
China-backed hackers 'almost certainly' targeted Canada during theft of millions of Americans' data

A Chinese hacking group that may have stolen information from nearly every American "almost certainly" targeted a Canadian...

August 26, 2025 07:00 AM
Cybersecurity jobs available right now: August 26, 2025

Here are the worldwide cybersecurity job openings available as of August 26, 2025, including on-site, hybrid, and remote roles.

July 07, 2025 07:00 AM
B.C. woman lost over $500K in bitcoin in 2021 SIM swap fraud scheme, lawsuit alleges

A judge has ordered a B.C. woman who allegedly lost $530000 worth of bitcoin in a fraud attack to resolve her lawsuit out of the courts.

June 09, 2025 07:00 AM
US agencies assessed Chinese telecom hackers likely hit data center and residential internet providers

Data center giant Digital Realty and mass media titan Comcast were documented as likely victims of the Salt Typhoon cyberespionage group,...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Rogers Communications CyberSecurity History Information

Official Website of Rogers Communications

The official website of Rogers Communications is http://www.rogers.com.

Rogers Communications’s AI-Generated Cybersecurity Score

According to Rankiteo, Rogers Communications’s AI-generated cybersecurity score is 642, reflecting their Poor security posture.

How many security badges does Rogers Communications’ have ?

According to Rankiteo, Rogers Communications currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has Rogers Communications been affected by any supply chain cyber incidents ?

According to Rankiteo, Rogers Communications has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.

Does Rogers Communications have SOC 2 Type 1 certification ?

According to Rankiteo, Rogers Communications is not certified under SOC 2 Type 1.

Does Rogers Communications have SOC 2 Type 2 certification ?

According to Rankiteo, Rogers Communications does not hold a SOC 2 Type 2 certification.

Does Rogers Communications comply with GDPR ?

According to Rankiteo, Rogers Communications is not listed as GDPR compliant.

Does Rogers Communications have PCI DSS certification ?

According to Rankiteo, Rogers Communications does not currently maintain PCI DSS compliance.

Does Rogers Communications comply with HIPAA ?

According to Rankiteo, Rogers Communications is not compliant with HIPAA regulations.

Does Rogers Communications have ISO 27001 certification ?

According to Rankiteo,Rogers Communications is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Rogers Communications

Rogers Communications operates primarily in the Telecommunications industry.

Number of Employees at Rogers Communications

Rogers Communications employs approximately 28,375 people worldwide.

Subsidiaries Owned by Rogers Communications

Rogers Communications presently has no subsidiaries across any sectors.

Rogers Communications’s LinkedIn Followers

Rogers Communications’s official LinkedIn profile has approximately 305,765 followers.

NAICS Classification of Rogers Communications

Rogers Communications is classified under the NAICS code 517, which corresponds to Telecommunications.

Rogers Communications’s Presence on Crunchbase

No, Rogers Communications does not have a profile on Crunchbase.

Rogers Communications’s Presence on LinkedIn

Yes, Rogers Communications maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/rogers-communications.

Cybersecurity Incidents Involving Rogers Communications

As of April 02, 2026, Rankiteo reports that Rogers Communications has experienced 2 cybersecurity incidents.

Number of Peer and Competitor Companies

Rogers Communications has an estimated 10,042 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Rogers Communications ?

Incident Types: The types of cybersecurity incidents that have occurred include Ransomware and Breach.

How does Rogers Communications detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with yes, and containment measures with investigation and bolstered protections, and communication strategy with public disclosure via statement to the globe and mail..

Incident Details

Can you provide details on each incident ?

Incident : Ransomware

Title: Ransomware Surge in January 2026: Shifting Targets and Emerging Threats

Description: January 2026 marked a sharp rise in ransomware activity, with 711 attacks recorded. Finance and tech sectors became prime targets, seeing 24% and 12% increases, respectively. The UK saw an 83% surge in attacks, while the US and Germany declined. Over 104 TB of data was stolen, with notable breaches including Iron Mountain, Mt. Spokane Pediatrics, and Pecan Tree Dental.

Date Detected: 2026-01

Type: Ransomware

Threat Actor: QilinClopAkiraThe GentlemenSinobiEverestRhysidaMedusaINC0APTLockBit

Motivation: Financial gainData theft

Incident : Data Breach

Title: Rogers and Fido Data Breach Exposing Customer Information

Description: Rogers Communications and its subsidiary Fido disclosed a data breach after detecting unauthorized access to customer information through internal security monitoring. The compromised data includes names, contact details, account numbers, and language preferences. Sensitive information such as social insurance numbers, dates of birth, passwords, and financial details remained secure.

Type: Data Breach

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident ?

Incident : Ransomware ROGCYBTES1770724900

Data Compromised: 104 TB

Operational Impact: Operation cancellationsPatient transfers via Red Cross

Payment Information Risk: ['Banking data exposed']

Incident : Data Breach ROGFID1774708017

Data Compromised: Names, contact details, account numbers, language preferences

Payment Information Risk: None (financial details remained secure)

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Market Materials, Patient Records, Banking Data, and Customer information.

Which entities were affected by each incident ?

Incident : Ransomware ROGCYBTES1770724900

Entity Name: Iron Mountain

Entity Type: Business

Industry: Data Management

Location: US

Incident : Ransomware ROGCYBTES1770724900

Entity Name: Mt. Spokane Pediatrics

Entity Type: Healthcare

Industry: Pediatrics

Location: US

Customers Affected: 13,300 records

Incident : Ransomware ROGCYBTES1770724900

Entity Name: Pecan Tree Dental

Entity Type: Healthcare

Industry: Dental

Location: US

Customers Affected: 13,300 records

Incident : Ransomware ROGCYBTES1770724900

Entity Name: Rogers Capital Credit

Entity Type: Business

Industry: Finance

Location: Mauritius

Incident : Ransomware ROGCYBTES1770724900

Entity Name: Elabs AG

Entity Type: Business

Industry: Tech

Location: Germany

Incident : Ransomware ROGCYBTES1770724900

Entity Name: Ayuntamiento de Beniel

Entity Type: Government

Industry: Municipality

Location: Spain

Incident : Ransomware ROGCYBTES1770724900

Entity Name: Witzenberg Municipality

Entity Type: Government

Industry: Municipality

Location: South Africa

Incident : Ransomware ROGCYBTES1770724900

Entity Name: Tulsa International Airport

Entity Type: Government

Industry: Transportation

Location: US

Incident : Ransomware ROGCYBTES1770724900

Entity Name: Clackamas Community College

Entity Type: Education

Industry: Higher Education

Location: US

Incident : Ransomware ROGCYBTES1770724900

Entity Name: Trocaire College

Entity Type: Education

Industry: Higher Education

Location: US

Incident : Ransomware ROGCYBTES1770724900

Entity Name: AZ Monica

Entity Type: Healthcare

Industry: Hospital

Location: Belgium

Incident : Ransomware ROGCYBTES1770724900

Entity Name: Sanxenxo

Entity Type: Government

Industry: Municipality

Location: Spain

Incident : Data Breach ROGFID1774708017

Entity Name: Rogers Communications

Entity Type: Telecommunications

Industry: Telecom

Location: Canada

Incident : Data Breach ROGFID1774708017

Entity Name: Fido

Entity Type: Telecommunications

Industry: Telecom

Location: Canada

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Data Breach ROGFID1774708017

Incident Response Plan Activated: Yes

Containment Measures: Investigation and bolstered protections

Communication Strategy: Public disclosure via statement to The Globe and Mail

What is the company's incident response plan?

Incident Response Plan: The company's incident response plan is described as Yes.

Data Breach Information

What type of data was compromised in each breach ?

Incident : Ransomware ROGCYBTES1770724900

Type of Data Compromised: Market materials, Patient records, Banking data

Number of Records Exposed: 13,300 (Mt. Spokane Pediatrics and Pecan Tree Dental)

Sensitivity of Data: Personally identifiable informationBanking data

Data Exfiltration: 104 TB

Personally Identifiable Information: Yes

Incident : Data Breach ROGFID1774708017

Type of Data Compromised: Customer information

Sensitivity of Data: Non-sensitive (names, contact details, account numbers, language preferences)

Personally Identifiable Information: Names, contact details, account numbers

How does the company handle incidents involving personally identifiable information (PII) ?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by investigation and bolstered protections.

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : Ransomware ROGCYBTES1770724900

Ransom Demanded: $392,000 (Elabs AG), $5,000 (Sanxenxo)

Ransomware Strain: LockBitSinobiQilinRhysidaMedusaINC

Data Encryption: Yes

Data Exfiltration: Yes

Lessons Learned and Recommendations

What lessons were learned from each incident ?

Incident : Ransomware ROGCYBTES1770724900

Lessons Learned: Evolving ransomware tactics, shifting focus to high-value sectors, and delayed disclosures obscuring attack timelines.

What are the key lessons learned from past incidents ?

Key Lessons Learned: The key lessons learned from past incidents are Evolving ransomware tactics, shifting focus to high-value sectors, and delayed disclosures obscuring attack timelines.

References

Where can I find more information about each incident ?

Incident : Ransomware ROGCYBTES1770724900

Source: Cyber Incident Report - January 2026

Incident : Data Breach ROGFID1774708017

Source: The Globe and Mail

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Cyber Incident Report - January 2026, and Source: The Globe and Mail.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Data Breach ROGFID1774708017

Investigation Status: Ongoing

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public disclosure via statement to The Globe and Mail.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Data Breach ROGFID1774708017

Customer Advisories: Plans to notify impacted customers

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Plans to notify impacted customers.

Additional Questions

General Information

What was the amount of the last ransom demanded ?

Last Ransom Demanded: The amount of the last ransom demanded was $392,000 (Elabs AG), $5,000 (Sanxenxo).

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident was an QilinClopAkiraThe GentlemenSinobiEverestRhysidaMedusaINC0APTLockBit.

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2026-01.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were 104 TB, Names, contact details, account numbers and language preferences.

Response to the Incidents

What containment measures were taken in the most recent incident ?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Investigation and bolstered protections.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were 104 TB, Names, contact details, account numbers and language preferences.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 13.3K.

Ransomware Information

What was the highest ransom demanded in a ransomware incident ?

Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was $392,000 (Elabs AG), $5,000 (Sanxenxo).

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents ?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was Evolving ransomware tactics, shifting focus to high-value sectors, and delayed disclosures obscuring attack timelines.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are The Globe and Mail and Cyber Incident Report - January 2026.

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.

Stakeholder and Customer Advisories

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued was an Plans to notify impacted customers.

cve

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:N/A:P
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=rogers-communications' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge