Company Details
elsevier
11,962
737,737
5415
elsevier.com
0
ELS_1907851
In-progress

Elsevier Company CyberSecurity Posture
elsevier.comAs a global leader in information and analytics, Elsevier helps researchers and healthcare professionals advance science and improve health outcomes for the benefit of society. We do this by facilitating insights and critical decision-making for customers across the global research and health ecosystems. In everything we publish, we uphold the highest standards of quality and integrity. We bring that same rigor to our information analytics solutions for researchers, health professionals, institutions and funders. Elsevier employs 8,700 people worldwide. We have supported the work of our research and health partners for more than 140 years. Growing from our roots in publishing, we offer knowledge and valuable analytics that help our users make breakthroughs and drive societal progress. With the Elsevier Foundation and our external Inclusion & Diversity Advisory Board, we work in partnership with diverse stakeholders to advance inclusion and diversity in science, research and healthcare in developing countries and around the world.
Company Details
elsevier
11,962
737,737
5415
elsevier.com
0
ELS_1907851
In-progress
Between 750 and 799

Elsevier Global Score (TPRM)XXXX

Description: Elsevier, the company behind scientific journals such as the lancet, left a server open to the public internet, exposing user email addresses and passwords. The impacted users include people from universities and educational institutions from across the world. It’s not entirely clear how long the server was exposed or how many accounts were impacted Elsevier secured the server after Motherboard approached the company for comment, hussein also provided Elsevier with details of the security issue.


No incidents recorded for Elsevier in 2025.
No incidents recorded for Elsevier in 2025.
No incidents recorded for Elsevier in 2025.
Elsevier cyber incidents detection timeline including parent company and subsidiaries

As a global leader in information and analytics, Elsevier helps researchers and healthcare professionals advance science and improve health outcomes for the benefit of society. We do this by facilitating insights and critical decision-making for customers across the global research and health ecosystems. In everything we publish, we uphold the highest standards of quality and integrity. We bring that same rigor to our information analytics solutions for researchers, health professionals, institutions and funders. Elsevier employs 8,700 people worldwide. We have supported the work of our research and health partners for more than 140 years. Growing from our roots in publishing, we offer knowledge and valuable analytics that help our users make breakthroughs and drive societal progress. With the Elsevier Foundation and our external Inclusion & Diversity Advisory Board, we work in partnership with diverse stakeholders to advance inclusion and diversity in science, research and healthcare in developing countries and around the world.


We’re a cloud technology company that provides organizations around the world with computing infrastructure and software to help them innovate, unlock efficiencies and become more effective. We also created the world’s first – and only – autonomous database to help organize and secure our customers’

Tata Consultancy Services is an IT services, consulting and business solutions organization that has been partnering with many of the world’s largest businesses in their transformation journeys for over 56 years. Our consulting-led, cognitive powered, portfolio of business, technology and engineerin

Navigating Change. Powering Progress. | Reimagining the Future with Birlasoft Birlasoft, a powerhouse where domain expertise, enterprise solutions, and digital technologies converge to redefine business processes. We take pride in our consultative and design thinking approach, driving societal pro

SoftwareOne is a leading global software and cloud solutions provider that is redefining how companies build, buy and manage everything in the cloud. By helping clients to migrate and modernize their workloads and applications – and in parallel, to navigate and optimize the resulting software and cl
Coforge is a global digital services and solutions provider, that leverages emerging technologies and deep domain expertise to deliver real-world business impact for its clients. A focus on select industries, a deep domain understanding of the underlying processes of those industries and partners

At Hexaware, we're not just a global technology and business process services company; we're a community of 31,600+ Hexawarians dedicated to one singular purpose: creating smiles through the power of great people and technology. With a presence in 58 offices across 28 countries, we empower enterpris

VOIS (Vodafone Intelligent Solutions) is a strategic arm of Vodafone Group Plc, creating value for customers by delivering intelligent solutions through Talent, Technology & Transformation. As the largest shared services organisation in the global telco industry, our portfolio of next-generation s

Infosys BPM Ltd., the business process management subsidiary of Infosys Ltd. (NYSE: INFY), was set up in April 2002. Infosys BPM focuses on integrated end-to-end outsourcing and delivers transformational benefits to its clients through reduced costs, ongoing productivity improvements, and process re

Talent and solutions to drive innovation. When it comes to IT, having the right talent and focus means you can harness the power of technology to make smarter, faster decisions; connect more strongly with your customers; and drive innovation in your marketplace. At Experis IT, our prowess in pro
.png)
November 10, 2025. BATON ROUGE, La. – Four faculty members from the LSU E. J. Ourso College of Business have been listed on the Stanford/Elsevier global Top...
Elsevier's Researcher of the Future report reveals one in three corporate researchers have not yet used AI, citing trust, governance, and transparency...
A cyber expert from De Montfort University Leicester (DMU), specialising in a new form of data security, has been named among the world's...
JSS STU conference showcases emerging technologies in electronics and green energy with global participation and expert insights.
Also inside, Google releases most realistic AI world model to date; D-Wave releases quantum AI toolkit to enhance machine learning and more.
Prof. Michael Edeh has been ranked among Nigeria's Top 500 Authors (Research Scholars) by Scholarly Output, according to the latest data...
Internet of Medical Things (IoMT) paradigm refers to the process of collection, transmission and analysis of healthcare data using...
Ms. Achanta is a peer reviewer and author for the Cloud Security Alliance and reviewer for Elsevier, highlighting her commitment to...
Congratulations to WMG's Dr Harjinder Lallie, Director of the Academic Centre of Excellence in Cyber Security Education (ACE-CSE),...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Elsevier is https://www.elsevier.com.
According to Rankiteo, Elsevier’s AI-generated cybersecurity score is 777, reflecting their Fair security posture.
According to Rankiteo, Elsevier currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Elsevier is not certified under SOC 2 Type 1.
According to Rankiteo, Elsevier does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Elsevier is not listed as GDPR compliant.
According to Rankiteo, Elsevier does not currently maintain PCI DSS compliance.
According to Rankiteo, Elsevier is not compliant with HIPAA regulations.
According to Rankiteo,Elsevier is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Elsevier operates primarily in the IT Services and IT Consulting industry.
Elsevier employs approximately 11,962 people worldwide.
Elsevier presently has no subsidiaries across any sectors.
Elsevier’s official LinkedIn profile has approximately 737,737 followers.
Elsevier is classified under the NAICS code 5415, which corresponds to Computer Systems Design and Related Services.
Yes, Elsevier has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/elsevier.
Yes, Elsevier maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/elsevier.
As of December 11, 2025, Rankiteo reports that Elsevier has experienced 1 cybersecurity incidents.
Elsevier has an estimated 37,490 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Data Leak.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with server secured..
Title: Elsevier Server Exposure
Description: Elsevier, the company behind scientific journals such as The Lancet, left a server open to the public internet, exposing user email addresses and passwords. The impacted users include people from universities and educational institutions from across the world. It’s not entirely clear how long the server was exposed or how many accounts were impacted. Elsevier secured the server after Motherboard approached the company for comment, Hussein also provided Elsevier with details of the security issue.
Type: Data Exposure
Attack Vector: Open Server
Vulnerability Exploited: Publicly accessible server
Common Attack Types: The most common types of attacks the company has faced is Data Leak.

Data Compromised: Email addresses, Passwords
Systems Affected: Server
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Email Addresses, Passwords and .

Entity Name: Elsevier
Entity Type: Company
Industry: Scientific Publishing
Location: Global
Customers Affected: Universities and educational institutions

Containment Measures: Server secured

Type of Data Compromised: Email addresses, Passwords
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by server secured.

Source: Motherboard
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Motherboard.
Most Significant Data Compromised: The most significant data compromised in an incident were Email addresses, Passwords and .
Most Significant System Affected: The most significant system affected in an incident was Server.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Server secured.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Passwords and Email addresses.
Most Recent Source: The most recent source of information about an incident is Motherboard.
.png)
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions prior to 16.0.96 and 17.0.1 through 17.0.9 have a weak default password. By default, this is a 6 digit numeric value which can be brute forced. (This is the app_password parameter). Depending on local configuration, this password could be the extension, voicemail, user manager, DPMA or EPM phone admin password. This issue is fixed in versions 16.0.96 and 17.0.10.
Neuron is a PHP framework for creating and orchestrating AI Agents. In versions 2.8.11 and below, the MySQLWriteTool executes arbitrary SQL provided by the caller using PDO::prepare() + execute() without semantic restrictions. This is consistent with the name (“write tool”), but in an LLM/agent context it becomes a high-risk capability: prompt injection or indirect prompt manipulation can cause execution of destructive queries such as DROP TABLE, TRUNCATE, DELETE, ALTER, or privilege-related statements (subject to DB permissions). Deployments that expose an agent with MySQLWriteTool enabled to untrusted input and/or run the tool with a DB user that has broad privileges are impacted. This issue is fixed in version 2.8.12.
Neuron is a PHP framework for creating and orchestrating AI Agents. Versions 2.8.11 and below use MySQLSelectTool, which is vulnerable to Read-Only Bypass. MySQLSelectTool is intended to be a read-only SQL tool (e.g., for LLM agent querying, however, validation based on the first keyword (e.g., SELECT) and a forbidden-keyword list does not block file-writing constructs such as INTO OUTFILE / INTO DUMPFILE. As a result, an attacker who can influence the tool input (e.g., via prompt injection through a public agent endpoint) may write arbitrary files to the DB server if the MySQL/MariaDB account has the FILE privilege and server configuration permits writes to a useful location (e.g., a web-accessible directory). This issue is fixed in version 2.8.12.
Okta Java Management SDK facilitates interactions with the Okta management API. In versions 11.0.0 through 20.0.0, race conditions may arise from concurrent requests using the ApiClient class. This could cause a status code or response header from one request’s response to influence another request’s response. This issue is fixed in version 20.0.1.
The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. When using versions 4.11.0 through 4.11.2 and 4.12.0, simultaneous requests on the same client may result in improper lookups in the TokenRequestCache for the request results. This issue is fixed in versions 4.11.2 and 4.12.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.