Company Details
rogers-communications
28,375
305,765
517
rogers.com
0
ROG_1402873
In-progress


Rogers Communications Vendor Cyber Rating & Cyber Score
rogers.comRogers is Canada’s communications and entertainment company, driven to connect and entertain Canadians. For more information, please visit rogers.com or investors.rogers.com. Déterminée à connecter et à divertir les Canadiens et Canadiennes, Rogers est la référence canadienne en matière de communications et de divertissement. Pour en savoir plus, visitez rogers.com ou investisseurs.rogers.com. This LinkedIn company page is moderated. For more info, please review our commenting policy here: http://roge.rs/2ofPXLN
Company Details
rogers-communications
28,375
305,765
517
rogers.com
0
ROG_1402873
In-progress
Between 600 and 649

Rogers Communications Global Score (TPRM)XXXX

Description: Rogers and Fido Hit by Data Breach Exposing Customer Information Rogers Communications and its subsidiary Fido disclosed a data breach on Friday after detecting unauthorized access to customer information through internal security monitoring. The compromised data includes names, contact details, account numbers, and language preferences, though the company confirmed that sensitive information such as social insurance numbers, dates of birth, passwords, and financial details remained secure. In a statement to *The Globe and Mail*, Rogers spokesperson Zac Carreiro acknowledged the incident, stating that immediate action was taken to investigate and bolster protections. The company is still determining the full scope of the breach and has not yet disclosed the number of affected customers or how long the unauthorized access persisted. Notably, Rogers did not address whether the breach was connected to recent IT layoffs or how the exposed account numbers could be exploited in future phishing attacks. The incident follows similar breaches at other Canadian telecoms, including Freedom Mobile and Telus Digital. Rogers continues its investigation and plans to notify impacted customers.
Description: Ransomware Surge in January 2026: Shifting Targets and Emerging Threats January 2026 marked a sharp rise in ransomware activity, with 711 attacks recorded down slightly from December 2025’s 783 but 33% higher than January 2025 and well above the 2025 monthly average of 620. While attacks on manufacturers plateaued, finance and tech sectors became prime targets, seeing 24% and 12% increases, respectively. ### Key Trends and Impact - Geographic Shifts: The UK saw an 83% surge in attacks (42 in January vs. 23 in December), while the US declined by 8% (329 attacks) and Germany dropped 38%. Canada and Australia also experienced increases. - New Threat Actor: A group called 0APT claimed over 80 attacks, but most were unverified and later removed from tracking databases. - Data Theft: Over 104 TB of data was stolen, with Sinobi leading in total volume (13.6 TB) and Everest claiming the largest single breach (1.4 TB from Iron Mountain). ### Sector Breakdown - Healthcare: Attacks fell 27% (36 vs. 49 in December), but confirmed incidents rose. Notable breaches included Mt. Spokane Pediatrics (LockBit) and Pecan Tree Dental (Sinobi), exposing 13,300 records. - Government: Attacks remained steady (31 vs. 30 in December), with 10 confirmed. The Gentlemen targeted Spain’s Ayuntamiento de Beniel and South Africa’s Witzenberg Municipality, while Qilin hit Tulsa International Airport. - Education: Attacks dropped 45% (16 vs. 29), with no confirmed incidents. However, delayed disclosures revealed breaches at Clackamas Community College (Medusa) and Trocaire College (INC). - Businesses: Attacks decreased 7%, but finance and tech saw spikes. The Gentlemen breached Rogers Capital Credit (Mauritius), exposing banking data, while Rhysida demanded $392,000 from Elabs AG (Germany). ### Top Ransomware Gangs - Qilin led with 108 attacks (6 confirmed), followed by Clop (90, none confirmed) and Akira (72, 3 confirmed). - The Gentlemen had the highest confirmation rate (5 of 48 claims), targeting businesses and governments. ### Notable Incidents - Iron Mountain (US): Everest claimed 1.4 TB stolen, though the breach was limited to market materials. - AZ Monica (Belgium): A ransomware attack forced operation cancellations and patient transfers via the Red Cross. - Sanxenxo (Spain): Hackers demanded $5,000, which was refused. The data underscores evolving ransomware tactics, with gangs shifting focus to high-value sectors and leveraging delayed disclosures to obscure attack timelines.


Rogers Communications has 11.11% more incidents than the average of same-industry companies with at least one recorded incident.
Rogers Communications has 70.94% more incidents than the average of all companies with at least one recorded incident.
Rogers Communications reported 2 incidents this year: 0 cyber attacks, 1 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.
Rogers Communications cyber incidents detection timeline including parent company and subsidiaries

Rogers is Canada’s communications and entertainment company, driven to connect and entertain Canadians. For more information, please visit rogers.com or investors.rogers.com. Déterminée à connecter et à divertir les Canadiens et Canadiennes, Rogers est la référence canadienne en matière de communications et de divertissement. Pour en savoir plus, visitez rogers.com ou investisseurs.rogers.com. This LinkedIn company page is moderated. For more info, please review our commenting policy here: http://roge.rs/2ofPXLN

🤝Ce qui fait notre singularité ? Chez Bouygues Telecom, nous croyons que les relations humaines sont un besoin vital. La qualité de nos relations avec notre famille, nos amis, ceux qui nous entourent est déterminante pour notre bien-être, notre santé et même notre espérance de vie. Ce sont ces rela

We believe it’s people who give purpose to our technology. So we’re committed to staying close to our customers and providing them the best experience. And delivering the best tech. On the best network. Because our purpose is to build a connected future so everyone can thrive. We build techno
Ciena (NYSE:CIEN) is the global leader in high-speed connectivity. We build advanced networks to support exponential growth in bandwidth demand—empowering our customers, partners, and communities to thrive in the AI era. With unparalleled expertise and innovation, our networking systems, interconnec

EMPOWERING SOCIETIES. CONNECTING YOU TO WHAT MATTERS MOST. Telenor Group is a leading telecommunications company across the Nordics and Asia with 158 million subscribers and annual sales of around NOK 99 billions (2022). We are committed to responsible business conduct and driven by the ambition
VEON is a global digital operator headquartered in Dubai, providing connectivity and digital services across dynamic frontier markets that are home to more than 6% of the world’s population. With our digital operators, we transform lives through technology-driven services that empower millions and

EE, part of BT Group, is the largest and most advanced mobile communications company in the UK, delivering mobile and fixed communications services to consumers. We run the UK's biggest and fastest mobile network, having pioneered the UK's first superfast 4G mobile service in October 2012 and was

Mobile TeleSystems OJSC ("MTS") is the leading telecommunications group in Russia, Eastern Europe and Central Asia, offering mobile and fixed voice, broadband, pay TV as well as content and entertainment services in one of the world's fastest growing regions. Including its subsidiaries, as of Decemb

תכירו את השחקנים הראשיים שלנו: העובדות והעובדים. אנחנו לא עובדים עם תסריט קבוע, חושבים מחוץ לקופסא, ומייצרים ז'אנר משלנו. כש-יס קמה, בשנת 1998, הבאנו את בשורת הלווין אל עולם שידורי הטלוויזיה והיינו הראשונים להציע שידורים דיגיטליים ושירותי טלוויזיה אינטראקטיביים - כשבחירת התכנים היא בידיים של הלקוח

At TELUS, our purpose-driven team works together every day to innovate and do good. From providing technology solutions that make our lives safer and easier, to supporting those who need it most, our inclusive, spirited and giving people are passionate about empowering our customers, communities and
.png)
Quebecor Inc. QBR-B-T and Rogers Communications Inc. RCI-B-T have both suffered breaches of their systems in recent weeks, the latest attack...
Companies are increasingly relying on digital assets to drive growth as part of digital transformations."Digital Crown Jewels" or DCJ are the most valuable...
BlackBerry partners with the world's leading IT certification and training body to build the cyber workforce.
In a world where a single point of failure can throw our machines into chaos, everything from sharks to authoritarian governments and old...
Government cyber agencies around the world are rushing to clamp down on what appears to be an advanced and sophisticated espionage campaign...
A Chinese hacking group that may have stolen information from nearly every American "almost certainly" targeted a Canadian...
Here are the worldwide cybersecurity job openings available as of August 26, 2025, including on-site, hybrid, and remote roles.
A judge has ordered a B.C. woman who allegedly lost $530000 worth of bitcoin in a fraud attack to resolve her lawsuit out of the courts.
Data center giant Digital Realty and mass media titan Comcast were documented as likely victims of the Salt Typhoon cyberespionage group,...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Rogers Communications is http://www.rogers.com.
According to Rankiteo, Rogers Communications’s AI-generated cybersecurity score is 642, reflecting their Poor security posture.
According to Rankiteo, Rogers Communications currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Rogers Communications has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Rogers Communications is not certified under SOC 2 Type 1.
According to Rankiteo, Rogers Communications does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Rogers Communications is not listed as GDPR compliant.
According to Rankiteo, Rogers Communications does not currently maintain PCI DSS compliance.
According to Rankiteo, Rogers Communications is not compliant with HIPAA regulations.
According to Rankiteo,Rogers Communications is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Rogers Communications operates primarily in the Telecommunications industry.
Rogers Communications employs approximately 28,375 people worldwide.
Rogers Communications presently has no subsidiaries across any sectors.
Rogers Communications’s official LinkedIn profile has approximately 305,765 followers.
Rogers Communications is classified under the NAICS code 517, which corresponds to Telecommunications.
No, Rogers Communications does not have a profile on Crunchbase.
Yes, Rogers Communications maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/rogers-communications.
As of April 02, 2026, Rankiteo reports that Rogers Communications has experienced 2 cybersecurity incidents.
Rogers Communications has an estimated 10,042 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware and Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with yes, and containment measures with investigation and bolstered protections, and communication strategy with public disclosure via statement to the globe and mail..
Title: Ransomware Surge in January 2026: Shifting Targets and Emerging Threats
Description: January 2026 marked a sharp rise in ransomware activity, with 711 attacks recorded. Finance and tech sectors became prime targets, seeing 24% and 12% increases, respectively. The UK saw an 83% surge in attacks, while the US and Germany declined. Over 104 TB of data was stolen, with notable breaches including Iron Mountain, Mt. Spokane Pediatrics, and Pecan Tree Dental.
Date Detected: 2026-01
Type: Ransomware
Threat Actor: QilinClopAkiraThe GentlemenSinobiEverestRhysidaMedusaINC0APTLockBit
Motivation: Financial gainData theft
Title: Rogers and Fido Data Breach Exposing Customer Information
Description: Rogers Communications and its subsidiary Fido disclosed a data breach after detecting unauthorized access to customer information through internal security monitoring. The compromised data includes names, contact details, account numbers, and language preferences. Sensitive information such as social insurance numbers, dates of birth, passwords, and financial details remained secure.
Type: Data Breach
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: 104 TB
Operational Impact: Operation cancellationsPatient transfers via Red Cross
Payment Information Risk: ['Banking data exposed']

Data Compromised: Names, contact details, account numbers, language preferences
Payment Information Risk: None (financial details remained secure)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Market Materials, Patient Records, Banking Data, and Customer information.

Entity Name: Iron Mountain
Entity Type: Business
Industry: Data Management
Location: US

Entity Name: Mt. Spokane Pediatrics
Entity Type: Healthcare
Industry: Pediatrics
Location: US
Customers Affected: 13,300 records

Entity Name: Pecan Tree Dental
Entity Type: Healthcare
Industry: Dental
Location: US
Customers Affected: 13,300 records

Entity Name: Rogers Capital Credit
Entity Type: Business
Industry: Finance
Location: Mauritius

Entity Name: Elabs AG
Entity Type: Business
Industry: Tech
Location: Germany

Entity Name: Ayuntamiento de Beniel
Entity Type: Government
Industry: Municipality
Location: Spain

Entity Name: Witzenberg Municipality
Entity Type: Government
Industry: Municipality
Location: South Africa

Entity Name: Tulsa International Airport
Entity Type: Government
Industry: Transportation
Location: US

Entity Name: Clackamas Community College
Entity Type: Education
Industry: Higher Education
Location: US

Entity Name: Trocaire College
Entity Type: Education
Industry: Higher Education
Location: US

Entity Name: AZ Monica
Entity Type: Healthcare
Industry: Hospital
Location: Belgium

Entity Name: Sanxenxo
Entity Type: Government
Industry: Municipality
Location: Spain

Entity Name: Rogers Communications
Entity Type: Telecommunications
Industry: Telecom
Location: Canada

Entity Name: Fido
Entity Type: Telecommunications
Industry: Telecom
Location: Canada

Incident Response Plan Activated: Yes
Containment Measures: Investigation and bolstered protections
Communication Strategy: Public disclosure via statement to The Globe and Mail
Incident Response Plan: The company's incident response plan is described as Yes.

Type of Data Compromised: Market materials, Patient records, Banking data
Number of Records Exposed: 13,300 (Mt. Spokane Pediatrics and Pecan Tree Dental)
Sensitivity of Data: Personally identifiable informationBanking data
Data Exfiltration: 104 TB
Personally Identifiable Information: Yes

Type of Data Compromised: Customer information
Sensitivity of Data: Non-sensitive (names, contact details, account numbers, language preferences)
Personally Identifiable Information: Names, contact details, account numbers
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by investigation and bolstered protections.

Ransom Demanded: $392,000 (Elabs AG), $5,000 (Sanxenxo)
Ransomware Strain: LockBitSinobiQilinRhysidaMedusaINC
Data Encryption: Yes
Data Exfiltration: Yes

Lessons Learned: Evolving ransomware tactics, shifting focus to high-value sectors, and delayed disclosures obscuring attack timelines.
Key Lessons Learned: The key lessons learned from past incidents are Evolving ransomware tactics, shifting focus to high-value sectors, and delayed disclosures obscuring attack timelines.

Source: Cyber Incident Report - January 2026

Source: The Globe and Mail
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Cyber Incident Report - January 2026, and Source: The Globe and Mail.

Investigation Status: Ongoing
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public disclosure via statement to The Globe and Mail.

Customer Advisories: Plans to notify impacted customers
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Plans to notify impacted customers.
Last Ransom Demanded: The amount of the last ransom demanded was $392,000 (Elabs AG), $5,000 (Sanxenxo).
Last Attacking Group: The attacking group in the last incident was an QilinClopAkiraThe GentlemenSinobiEverestRhysidaMedusaINC0APTLockBit.
Most Recent Incident Detected: The most recent incident detected was on 2026-01.
Most Significant Data Compromised: The most significant data compromised in an incident were 104 TB, Names, contact details, account numbers and language preferences.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Investigation and bolstered protections.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were 104 TB, Names, contact details, account numbers and language preferences.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 13.3K.
Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was $392,000 (Elabs AG), $5,000 (Sanxenxo).
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Evolving ransomware tactics, shifting focus to high-value sectors, and delayed disclosures obscuring attack timelines.
Most Recent Source: The most recent source of information about an incident are The Globe and Mail and Cyber Incident Report - January 2026.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Most Recent Customer Advisory: The most recent customer advisory issued was an Plans to notify impacted customers.
.png)
A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.