Get report
Get Your Free Report
Need help in fixing issues? Contact us and we will help you prepare an action plan to improve your risk rating.
Loading captcha...
By submitting this form, you agree to our Terms & Conditions and Privacy Policy .
Is Internet Soft safe?

Internet Soft risk score

Get detailed report
f

57/100

overall score

Total issues found:

153
Updated on: December 29, 2025
Data we analyse
Phishing and malware
141 issues

Network security
1 issue

Email security
1 issue

Website security
10 issues
Recent critical risk issues we found
170 corporate credentials stolen
Recent data breach: 24 days ago
71% employees reuse breached passwords
1 domains vulnerable to email spoofing
What information we check
Software patching
Web application security
Email security
Dark web exposure
Cybersecurity Benchmark
A comparison of this company’s cybersecurity ranking with industry averages and peer organizations
Phishing and malware
0 vs. 50

Network security
100 vs. 89

Email security
1 vs. 52

Website security
72 vs. 68
Get Your Free Report
Need help in fixing issues? Contact us and we will help you prepare an action plan to improve your risk rating.
Loading captcha...
By submitting this form, you agree to our Terms & Conditions and Privacy Policy .
Company overview
Section 1: Company Overview
Internet Soft is a technology firm operating in the financial software and services space, providing banking integrations, account aggregation, and data-processing platforms for consumer and corporate clients. Serving a broad client base, the company supports account verification, transaction enrichment, and API-driven connectivity for banks, lenders, and fintechs. Given its role in handling sensitive financial data and integrating with regulated institutions, Internet Soft is subject to rigorous compliance expectations and must maintain strong information security controls to protect customer privacy and institutional trust.

Section 2: Historical Data Breaches
The company’s incident history as described shows multiple types of exposure typical for firms in this sector. In an early third-party access incident, an external information provider used Internet Soft credentials to obtain consumer records, impacting several thousand individuals and prompting engagement with law enforcement. A separate disclosure occurred during litigation when a large volume of client records was transmitted without sufficient protections, resulting in the exposure of personally identifiable information and wealth-management details. These events highlight two recurring vectors: insufficient third-party credential management and failures in secure handling of sensitive documents during legal processes.

Section 3: Recent Security Breach
A recent internal-control failure in mid-2023 involved an employee transmitting confidential customer data to a personal account, affecting roughly 10,000 customer records. This was not an external intrusion but an insider misuse event that resulted in customer notifications, termination of the employee involved, and heightened monitoring of impacted accounts. The incident underscores elevated insider risk and weaknesses in controls preventing data exfiltration via employee-managed channels.

Section 4: Evaluation of Digital Security
An independent assessment of Internet Soft’s security posture indicates material gaps across several domains. The evaluation assigns an overall security score of 71/100, below commonly accepted benchmarks for firms handling financial data. Key findings include:

- Phishing and Malware Defenses: Approximately 1,000 vulnerabilities were identified in mechanisms designed to detect and prevent phishing and malware, suggesting an elevated probability of successful social-engineering campaigns against staff or systems.

- Website and Transport Layer Security: Analysis found 1,866 website-related issues, with roughly 1,865 tied to SSL/TLS configuration weaknesses. Such misconfigurations can undermine the confidentiality and integrity of data in transit, enable man-in-the-middle attacks, and erode trust in API endpoints.

- Network Security: At least one network-layer weakness was noted, indicating potential gaps in segmentation, monitoring, or perimeter controls; while not necessarily critical in isolation, it contributes to overall exposure when combined with other findings.

- Credential and Password Hygiene: The report identified that about 15% of employees reuse passwords that have previously appeared in breaches, and a significant corpus of 16,390 corporate credentials were found compromised externally. This substantially raises the likelihood of account takeover and unauthorized access.

These findings point to systemic challenges: inadequate crypto/configuration hygiene, weak identity and access management, and insufficient detection and response capabilities. Remediation priorities should include immediate hardening of TLS/SSL settings, revocation and rotation of exposed credentials, and implementation of stronger authentication controls (e.g., enforced MFA and password hygiene policies). In addition, bolstering phishing-resistant controls—advanced email filtering, targeted user training, simulated phishing campaigns, and EDR deployment—would reduce attack surface from human-targeted vectors.

Comparative context: while some peer fintechs demonstrate robust scores and fewer critical TLS issues, other financial institutions have historically experienced similar insider- and process-driven exposures that resulted in regulatory action or fines. Internet Soft’s combination of technical misconfigurations and human-factor weaknesses places it at heightened risk relative to best-in-class benchmarks.

Conclusion: Is Internet Soft Safe?
Internet Soft currently exhibits a concerning security posture. Past incidents—including unauthorized third-party access, an unprotected legal disclosure, and a sizable insider-driven leak—combined with a security assessment score of 71/100, significant SSL/TLS misconfigurations, rampant credential compromise, and numerous phishing vulnerabilities indicate material exposure to financial, privacy, and reputational harm. Immediate remediation should prioritize credential rotation and MFA enforcement, SSL/TLS reconfiguration, enhanced DLP/insider-threat controls, and targeted staff training. Longer-term investments should target identity governance, continuous monitoring, third-party risk management, and an incident response program aligned to regulatory expectations to reduce recurrence and restore stakeholder confidence.
Details
Industries:
Artificial Intelligence
Company size:
201-500 employees
Founded:
2010
Headquarters:
75 Broadway #2022; San Francisco, California 94111, US

Outcome reliability

We analyze billions of signals from publicly available sources to deliver validated insights into how your company is perceived externally by threat actors. These insights help security teams respond more quickly to risks, manage zero-day incidents effectively, and reduce overall exposure.

This is an inline graph showing outcome reliability scores. The grades are as follows: F is between 0 and 70, D is between 70 and 78, C is between 79 and 85, B is between 85 and 95, and A is above 95.