Company Details
icemarkets
11,585
273,178
52
ice.com
831
ICE_3272944
Completed


ICE Vendor Cyber Rating & Cyber Score
ice.comICE (NYSE: ICE) connects people to data, technology and expertise that create opportunity and inspire innovation. For terms of use, visit www.ice.com/privacy-security-center/terms-of-use
Company Details
icemarkets
11,585
273,178
52
ice.com
831
ICE_3272944
Completed
Between 800 and 849

ICE Global Score (TPRM)XXXX



No incidents recorded for ICE in 2026.
No incidents recorded for ICE in 2026.
No incidents recorded for ICE in 2026.
ICE cyber incidents detection timeline including parent company and subsidiaries

ICE (NYSE: ICE) connects people to data, technology and expertise that create opportunity and inspire innovation. For terms of use, visit www.ice.com/privacy-security-center/terms-of-use

Tata Capital Limited is a subsidiary of Tata Sons Limited. The Company is registered with the Reserve Bank of India as a Core Investment Company and offers through itself and its subsidiaries fund and fee-based financial services to its customers, under the Tata Capital brand. As a trusted and custo

From local communities to global markets, we are dedicated to shaping the future responsibly and helping clients thrive in a changing world. “Bank of America Merrill Lynch” is the marketing name for the global banking and global markets businesses of Bank of America Corporation. Bank of America is

Fannie Mae creates opportunities for people to buy, refinance, or rent a home. We are a leading source of mortgage financing in all markets and at all times. We ensure the availability of affordable mortgage loans. The financing solutions we develop make homeownership and workforce rental housing a

Primerica is a leading provider of financial products and services in North America, with over 2,800 corporate employees who support over 151,000 licensed independent representatives providing financial education and offering financial products and services to their clients. Primerica was founded 48
Founded in April 2007, Bajaj Finserv is the financial arm of the Bajaj group. We believe in a simple philosophy to never settle for good and go for great. This reflects in our extensive product portfolio that spans across 3 broad categories- lending, insurance and wealth advisory. With 24 products s

Max Group is a $7 billion diversified Indian conglomerate founded by Mr. Analjit Singh with a strong presence across Senior Care, Life Insurance, and Real Estate. Guided by a purpose-driven approach, we aim to create meaningful solutions that improve lives and deliver lasting value. Max India Lim

Navy Federal is the world’s largest credit union, with more than 15 million members, $190 billion+ in assets and 25,000+ employees. Throughout campuses in Vienna, VA Pensacola, FL and Winchester, VA, as well as 370 branches, we serve the Armed Forces, Department of Defense, Veterans and their famili

Mahindra & Mahindra Financial Services Limited (Mahindra Finance), part of the Mahindra Group, is one of India's leading non-banking finance companies. Focused on the rural and semi-urban sector, the Company has over 10 million customers and has an AUM of over USD 11 Billion. The company is a lead
Manappuram Finance Ltd. is one of India’s largest and most trusted gold loan companies, with 4,199 branches across the length and breadth of the country. It currently has nearly Rs. 157.65 billion worth assets under management (AUM), and 20,185 employees. Promoted by Shri. V.P. Nandakumar, the curr
.png)
A persistent threat actor known as Larva-26002 has been continuously targeting poorly managed Microsoft SQL (MS-SQL) servers,...
House Appropriations Committee Ranking Member Rosa DeLauro (D-CT-03) released a fact sheet detailing how the Trump Administration under the...
China asks Costa Rica for evidence over the ICE cyberattack tied to UNC2814 after hackers extracted 9GB of internal ICE email data.
Career paths in management, information technology, law, mission support, public affairs and community outreach are available within the agency.
Note: The ACLU report "Deputized for Disaster" is available to read here. This embed will serve content from www.youtube.com.
DHS shutdown deepens as ICE reform fight stalls. The Department of Homeland Security shutdown has entered its second week, with Democrats...
The lapse in funding probably won't bring immigration enforcement operations to a screeching halt, but the department is also home to other...
And, After major Poland energy grid cyberattack, CISA issues warning to U.S. audience.
Today, House Appropriations Committee Ranking Member Rosa DeLauro (D-CT-03) introduced a bill to fully fund every agency under the...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of ICE is http://www.ice.com.
According to Rankiteo, ICE’s AI-generated cybersecurity score is 823, reflecting their Good security posture.
According to Rankiteo, ICE currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, ICE has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, ICE is not certified under SOC 2 Type 1.
According to Rankiteo, ICE does not hold a SOC 2 Type 2 certification.
According to Rankiteo, ICE is not listed as GDPR compliant.
According to Rankiteo, ICE does not currently maintain PCI DSS compliance.
According to Rankiteo, ICE is not compliant with HIPAA regulations.
According to Rankiteo,ICE is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
ICE operates primarily in the Financial Services industry.
ICE employs approximately 11,585 people worldwide.
ICE presently has no subsidiaries across any sectors.
ICE’s official LinkedIn profile has approximately 273,178 followers.
ICE is classified under the NAICS code 52, which corresponds to Finance and Insurance.
No, ICE does not have a profile on Crunchbase.
Yes, ICE maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/icemarkets.
As of April 02, 2026, Rankiteo reports that ICE has not experienced any cybersecurity incidents.
ICE has an estimated 31,538 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, ICE has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.