Company Details
aecom
74,394
2,372,600
237
aecom.com
0
AEC_2367159
In-progress


AECOM Vendor Cyber Rating & Cyber Score
aecom.comAECOM is the global infrastructure leader, committed to delivering a better world. As a trusted professional services firm powered by deep technical abilities, we solve our clients’ complex challenges in water, environment, energy, transportation and buildings. Our teams partner with public- and private-sector clients to create innovative, sustainable and resilient solutions throughout the project lifecycle – from advisory, planning, design and engineering to program and construction management. AECOM is a Fortune 500 firm that had revenue of $16.1 billion in fiscal year 2024. Learn more at aecom.com.
Company Details
aecom
74,394
2,372,600
237
aecom.com
0
AEC_2367159
In-progress
Between 750 and 799

AECOM Global Score (TPRM)XXXX

Description: The California Office of the Attorney General reported a data breach involving AECOM Technology Corporation on July 8, 2014. The breach potentially exposed employee personal information, including names, addresses, Social Security numbers, and bank account details, although it is unknown how many individuals were affected.


No incidents recorded for AECOM in 2026.
No incidents recorded for AECOM in 2026.
No incidents recorded for AECOM in 2026.
AECOM cyber incidents detection timeline including parent company and subsidiaries

AECOM is the global infrastructure leader, committed to delivering a better world. As a trusted professional services firm powered by deep technical abilities, we solve our clients’ complex challenges in water, environment, energy, transportation and buildings. Our teams partner with public- and private-sector clients to create innovative, sustainable and resilient solutions throughout the project lifecycle – from advisory, planning, design and engineering to program and construction management. AECOM is a Fortune 500 firm that had revenue of $16.1 billion in fiscal year 2024. Learn more at aecom.com.


Founded in 1944, Parsons Corporation, a digitally enabled solutions provider, is focused on creating the future of the defense, intelligence, and critical infrastructure markets. From Earth to outer space, we deliver tomorrow’s solutions today. Equipped with the capabilities required to take on any

SNC Lavalin is now AtkinsRéalis. Please follow AtkinsRéalis on LinkedIn. We are a world-class engineering services and nuclear organization. We connect people, data and technology to transform the world’s infrastructure and energy systems. Together, with our industry partners and clients, and our
Egis is a leading global architectural, consulting, construction engineering, operations and mobility services firm. We create and operate intelligent infrastructure and buildings that both respond to the climate emergency and contribute to balanced, sustainable and resilient development. Our 22,00

Performance to succeed today. Technology to lead tomorrow. Epiroc is your partner for mining and infrastructure equipment. We're excited to build on proven expertise and performance with the same people and a bold new drive to make what's good even better. Just like our name ‘Epiroc’ says, we w
Some 45 years ago, we set out with the ambitious goal of providing affordable housing, working to make Brazilian dreams come true. Over the last few years, we have crafted and shaped our story, becoming a brand-leading platform that offers a variety of housing solutions for individuals and families

We are an engineering, management and development consultancy and one of the largest wholly employee-owned firms of our kind. We plan, design, deliver and maintain the transport, energy, water, defence and security, and buildings infrastructure that is integral to people's daily lives. Our core

Ventia provides essential services to make infrastructure work for communities in Australia and New Zealand. We pride ourselves on safe and sustainable services for our corporate and government clients across a broad range of sectors, including transport, telecommunications, utilities, defence, wa

A civil engineer is a person who practices civil engineering – the application of planning, designing, constructing, maintaining, and operating infrastructures while protecting the public and environmental health, as well as improving existing infrastructures that have been neglected. Civil enginee

Enabling communities to thrive. It’s what we’ve done for more than 150 years. Solving problems. Making the extraordinary run smoothly every day. We’re keeping the lights on and the water flowing. Running the hospitals that take care of us. Delivering the transport that takes us from A to B. Mainta
.png)
AECOM (NYSE: ACM), the trusted global infrastructure leader, today announced it was awarded a position on the U.S. Missile Defense Agency's...
DALLAS (February 11, 2026) — AECOM, the trusted global infrastructure leader, today announced it will deliver detailed design services for...
A cybersecurity firm that said it was certified to work on a $60-million contract from electric utility Seattle City Light filed suit Jan.
AECOM will provide technical advice and support for the development and delivery of VicGrid's energy infrastructure program.
The 10-year, $81.3-million single award is one of the largest optimized remediation contracts awarded by the USACE Los Angeles District.
Role models for students, parents, educators, and the cybersecurity community Sponsored by Secureworks.
AECOM (NYSE: ACM), the trusted global infrastructure leader, today announced it has acquired Scotland-based Allen Gordon LLP, a leading provider of technical...
AECOM (NYSE: ACM), the trusted global infrastructure leader, today announced it has been awarded a position on Network Rail's Asset Protection (ASPRO) support...
AECOM (NYSE: ACM), the trusted global infrastructure leader, today announced it has been selected as a Design Development Partner for Sydney Water.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of AECOM is http://www.aecom.com.
According to Rankiteo, AECOM’s AI-generated cybersecurity score is 782, reflecting their Fair security posture.
According to Rankiteo, AECOM currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, AECOM has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, AECOM is not certified under SOC 2 Type 1.
According to Rankiteo, AECOM does not hold a SOC 2 Type 2 certification.
According to Rankiteo, AECOM is not listed as GDPR compliant.
According to Rankiteo, AECOM does not currently maintain PCI DSS compliance.
According to Rankiteo, AECOM is not compliant with HIPAA regulations.
According to Rankiteo,AECOM is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
AECOM operates primarily in the Civil Engineering industry.
AECOM employs approximately 74,394 people worldwide.
AECOM presently has no subsidiaries across any sectors.
AECOM’s official LinkedIn profile has approximately 2,372,600 followers.
AECOM is classified under the NAICS code 237, which corresponds to Heavy and Civil Engineering Construction.
No, AECOM does not have a profile on Crunchbase.
Yes, AECOM maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/aecom.
As of April 04, 2026, Rankiteo reports that AECOM has experienced 1 cybersecurity incidents.
AECOM has an estimated 5,874 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Title: AECOM Technology Corporation Data Breach
Description: The California Office of the Attorney General reported a data breach involving AECOM Technology Corporation on July 8, 2014. The breach potentially exposed employee personal information, including names, addresses, Social Security numbers, and bank account details, although it is unknown how many individuals were affected.
Date Publicly Disclosed: 2014-07-08
Type: Data Breach
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Names, Addresses, Social security numbers, Bank account details
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Addresses, Social Security Numbers, Bank Account Details and .

Entity Name: AECOM Technology Corporation
Entity Type: Corporation

Type of Data Compromised: Names, Addresses, Social security numbers, Bank account details
Sensitivity of Data: High

Source: California Office of the Attorney General
Date Accessed: 2014-07-08
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney GeneralDate Accessed: 2014-07-08.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2014-07-08.
Most Significant Data Compromised: The most significant data compromised in an incident were names, addresses, Social Security numbers, bank account details and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were bank account details, names, Social Security numbers and addresses.
Most Recent Source: The most recent source of information about an incident is California Office of the Attorney General.
.png)
nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake protocol based on the Albatross consensus algorithm. Prior to version 1.3.0, two peer-facing consensus request handlers assume that the history index is always available and call blockchain.history_store.history_index().unwrap() directly. That assumption is false by construction. HistoryStoreProxy::history_index() explicitly returns None for the valid HistoryStoreProxy::WithoutIndex state. when a full node is syncing or otherwise running without the history index, a remote peer can send RequestTransactionsProof or RequestTransactionReceiptsByAddress and trigger an Option::unwrap() panic on the request path. This issue has been patched in version 1.3.0.
PraisonAI is a multi-agent teams system. Prior to version 1.5.95, FileTools.download_file() in praisonaiagents validates the destination path but performs no validation on the url parameter, passing it directly to httpx.stream() with follow_redirects=True. An attacker who controls the URL can reach any host accessible from the server including cloud metadata services and internal network services. This issue has been patched in version 1.5.95.
PraisonAI is a multi-agent teams system. Prior to version 4.5.97, OAuthManager.validate_token() returns True for any token not found in its internal store, which is empty by default. Any HTTP request to the MCP server with an arbitrary Bearer token is treated as authenticated, granting full access to all registered tools and agent capabilities. This issue has been patched in version 4.5.97.
PraisonAI is a multi-agent teams system. Prior to version 4.5.97, the PraisonAI Gateway server accepts WebSocket connections at /ws and serves agent topology at /info with no authentication. Any network client can connect, enumerate registered agents, and send arbitrary messages to agents and their tool sets. This issue has been patched in version 4.5.97.
PraisonAI is a multi-agent teams system. Prior to version 4.5.90, MCPToolIndex.search_tools() compiles a caller-supplied string directly as a Python regular expression with no validation, sanitization, or timeout. A crafted regex causes catastrophic backtracking in the re engine, blocking the Python thread for hundreds of seconds and causing a complete service outage. This issue has been patched in version 4.5.90.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.