Ville d'Alfortville Company Cyber Security Posture

alfortville.fr

Compte officiel de la ville d'Alfortville

Ville d'Alfortville Company Details

Linkedin ID:

alfortville

Employees number:

146 employees

Number of followers:

912

NAICS:

none

Industry Type:

Government Relations

Homepage:

alfortville.fr

IP Addresses:

Scan still pending

Company ID:

VIL_2109444

Scan Status:

In-progress

AI scoreVille d'Alfortville Risk Score (AI oriented)

Between 200 and 800

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

globalscoreVille d'Alfortville Global Score
blurone
Ailogo

Ville d'Alfortville Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 200 and 800

Ville d'Alfortville Company Cyber Security News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
Ville d'AlfortvilleRansomware85311/2020VIL23771022Link
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: Alfortville (Val-de-Marne) suffered a ransomware attack which suddenly paralyzed its municipal computers. The hackers managed to enter its computer system and exfiltrate the data, before encrypting all the data. The hackers sent a ransom note to the city asking a ransom in Bitcoin in exchange for a decryption key that makes access to files that have become unreadable

Ville d'Alfortville Company Subsidiaries

SubsidiaryImage

Compte officiel de la ville d'Alfortville

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=alfortville' -H 'apikey: YOUR_API_KEY_HERE'
newsone

Ville d'Alfortville Cyber Security News

2025-07-31T06:01:00.000Z
Chinaโ€™s Cybersecurity Regulator Summons Nvidia Over Chip-Security Issue - WSJ

China's cybersecurity regulator has summoned Nvidia to discuss security risks of AI chips sold in China. The Cyberspace Administration of Chinaย ...

2025-07-30T13:46:54.000Z
The top 3 cybersecurity risks posed by the Online Safety Act and age verification

1: Data breaches, identity theft and fraud ยท 2: Data risks posed by third-party services ยท 3: More realistic phishing campaigns.

2025-08-02T16:30:00.000Z
CL-STA-0969 Installs Covert Malware in Telecom Networks During 10-Month Espionage Campaign

State-backed hackers breached Southeast Asia telecoms using advanced toolsโ€”no data stolen, but stealth access achieved.

2025-07-31T11:00:00.000Z
I'm a cybersecurity CEO who advises over 9,000 agencies and Sam Altman is wrong that the AI fraud crisis is comingโ€”itโ€™s already here

Sam Altman recently warned that AI-powered fraud is coming โ€œvery soon,โ€ and it will break the systems we rely on to verify identity.

2025-07-31T15:38:08.000Z
Getting a Cybersecurity Vibe Check on Vibe Coding

Vibe coding, the act of using natural language to instruct large language models (LLMs) to generate code, is on the rise.

2025-07-31T18:52:27.000Z
Army secretary directs West Point to rescind appointment of Biden-era cybersecurity director

The Secretary of the Army on Wednesday directed the U.S. Military Academy at West Point to review its hiring practices.

2025-07-30T14:53:38.000Z
CISAโ€™s Joint Cyber Defense Collaborative takes major personnel hit

The Cybersecurity and Infrastructure Security Agency's marquee program for collaborating with the private sector to thwart hackers has beenย ...

2025-07-31T22:17:35.000Z
Cybersecurity report probes Supt. Walters' TV history: 'We may never know what actually happened'

A newly released cybersecurity report was conducted to support the investigation from law enforcement, by performing a forensic examinationย ...

2025-07-30T17:00:00.000Z
AI Threats Raise Demand for Cybersecurity Products That Donโ€™t Exist (Yet)

Artificial intelligence that handles complex tasks with minimal human oversight, also known as an agent, is creating a bevy of securityย ...

similarCompanies

Ville d'Alfortville Similar Companies

NEYVELI LIGNITE CORPORATION

NLC is a 'MINI RATNA' Government of India Enterprise falling under Public Sector Enterprises. NLC is involved in Mining (specialised open cast mining) and production of Electricity.NLC has 4 nos. of Thermal Power Stations in Neyveli itself with a total production capacity of around 3000MW.Apart fro

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Ville d'Alfortville CyberSecurity History Information

How many cyber incidents has Ville d'Alfortville faced?

Total Incidents: According to Rankiteo, Ville d'Alfortville has faced 1 incident in the past.

What types of cybersecurity incidents have occurred at Ville d'Alfortville?

Incident Types: The types of cybersecurity incidents that have occurred incident Ransomware.

Incident Details

Can you provide details on each incident?

Incident : Ransomware

Title: Ransomware Attack on Alfortville

Description: Alfortville (Val-de-Marne) suffered a ransomware attack which suddenly paralyzed its municipal computers. The hackers managed to enter its computer system and exfiltrate the data, before encrypting all the data. The hackers sent a ransom note to the city asking a ransom in Bitcoin in exchange for a decryption key that makes access to files that have become unreadable.

Type: Ransomware

Motivation: Financial

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Impact of the Incidents

What was the impact of each incident?

Incident : Ransomware VIL23771022

Data Compromised: Municipal data

Systems Affected: Municipal computers

Operational Impact: Systems paralyzed

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Municipal data.

Which entities were affected by each incident?

Incident : Ransomware VIL23771022

Entity Type: Municipality

Industry: Public Sector

Location: Val-de-Marne

Data Breach Information

What type of data was compromised in each breach?

Incident : Ransomware VIL23771022

Type of Data Compromised: Municipal data

Data Exfiltration: Yes

Data Encryption: Yes

Ransomware Information

Was ransomware involved in any of the incidents?

Incident : Ransomware VIL23771022

Ransom Demanded: Yes

Data Encryption: Yes

Data Exfiltration: Yes

Additional Questions

General Information

What was the amount of the last ransom demanded?

Last Ransom Demanded: The amount of the last ransom demanded was Yes.

Impact of the Incidents

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident was Municipal data.

What was the most significant system affected in an incident?

Most Significant System Affected: The most significant system affected in an incident was Municipal computers.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Municipal data.

Ransomware Information

What was the highest ransom demanded in a ransomware incident?

Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was Yes.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge