Company Details
icrc
13,847
1,433,729
8135
icrc.org
0
INT_1824950
In-progress


International Committee of the Red Cross - ICRC Vendor Cyber Rating & Cyber Score
icrc.orgEstablished in 1863, the International Committee of the Red Cross (ICRC) works worldwide to provide humanitarian help for people affected by conflict and armed violence and to promote the laws that protect victims of war. An independent and neutral organization, its mandate stems essentially from the Geneva Conventions of 1949. It takes action in response to emergencies and promotes respect for international humanitarian law and its implementation in national law. We work closely with National Red Cross and Red Crescent Societies and with their International Federation to ensure a concerted, rational and rapid humanitarian response to the needs of the victims of armed conflict or any other situation of internal violence. Find out more about the ICRC by visiting the following links: Where we work http://www.icrc.org/en/where-we-work Working for the ICRC https://careers.icrc.org/ https://www.icrc.org/en/join-icrc-and-help-protect-lives-and-dignity Current Opportunities https://bit.ly/2GuHdZR
Company Details
icrc
13,847
1,433,729
8135
icrc.org
0
INT_1824950
In-progress
Between 750 and 799

ICRCI Global Score (TPRM)XXXX

Description: The computer servers of the International Committee of the Red Cross were targeted by a cyber attack. The attack compromised personal data and confidential information on more than 515,000 highly vulnerable people. The perpetrator of this cyberattack is yet unknown to the ICRC. There are currently no signs that the hacked data has been shared publicly or leaked. The organisation declared that they are collaborating closely with their partners in aid work across the globe to comprehend the scale of the attack and implement the necessary safeguards for our data going forward.


No incidents recorded for International Committee of the Red Cross - ICRC in 2026.
No incidents recorded for International Committee of the Red Cross - ICRC in 2026.
No incidents recorded for International Committee of the Red Cross - ICRC in 2026.
ICRCI cyber incidents detection timeline including parent company and subsidiaries

Established in 1863, the International Committee of the Red Cross (ICRC) works worldwide to provide humanitarian help for people affected by conflict and armed violence and to promote the laws that protect victims of war. An independent and neutral organization, its mandate stems essentially from the Geneva Conventions of 1949. It takes action in response to emergencies and promotes respect for international humanitarian law and its implementation in national law. We work closely with National Red Cross and Red Crescent Societies and with their International Federation to ensure a concerted, rational and rapid humanitarian response to the needs of the victims of armed conflict or any other situation of internal violence. Find out more about the ICRC by visiting the following links: Where we work http://www.icrc.org/en/where-we-work Working for the ICRC https://careers.icrc.org/ https://www.icrc.org/en/join-icrc-and-help-protect-lives-and-dignity Current Opportunities https://bit.ly/2GuHdZR


Boys & Girls Clubs of America does whatever it takes for America’s youth to have great futures. As the nation's premier (nonprofit) youth development organization, our programs, training and services support millions of kids and teens every year. We hire employees who are recognized as leaders in t
The American Red Cross prevents and alleviates human suffering in the face of emergencies by mobilizing the power of volunteers and the generosity of donors. Each day, thousands of people – people just like you – provide compassionate care to those in need. Our network of generous donors, voluntee

ALSAC is the largest healthcare-related charity in the United States. Founded in 1957 by Danny Thomas, our sole mission is to raise the funds and awareness needed to operate and maintain St. Jude Children's Research Hospital®. While our headquarters can be found in Memphis, Tennessee, we have additi

Casa de la Familia (CDLF) is a 501(c)(3) non-profit organization founded in 1996 by Clinical Psychologist Dr. Ana Nogales whose vision was to create an organization dedicated to ensuring long-lasting mental health success of children, youth, and families in response to psychological trauma. We prov

The International Rescue Committee responds to the world’s worst humanitarian crises and help people to survive, recover, and gain control of their future. Founded in 1933 at the request of Albert Einstein, the IRC offers lifesaving care and life-changing assistance to refugees and displaced peopl
Goodwill Industries is all about people working. We are North America’s leading nonprofit provider of education, training, and career services for people with disadvantages, such as welfare dependency, homelessness, and lack of education or work experience, as well as those with physical, mental an

Médecins Sans Frontières (MSF) is an international, independent, medical humanitarian organisation working to provide medical assistance to people affected by conflict, epidemics, disasters, or exclusion from healthcare. Since our founding in 1971, we’ve grown to a global movement delivering human

World Vision is the largest child-focused private charity in the world. Our 33,000+ staff members working in nearly 100 countries have united with our incredible supporters to impact the lives of over 200 million vulnerable children by tackling the root causes of poverty. Through World Vision every
IEEE is the world’s largest technical professional organization and is a public charity dedicated to advancing technological innovation and excellence for the benefit of humanity. IEEE and its members inspire a global community through its highly cited publications, conferences, technology standards
.png)
At the occasion of the Cybersecurity Month and the Autumn Edition of the Cybersecurity Week Luxembourg Campaign, the International Committee...
Riyadh, Saudi Arabia — As cyber threats increasingly endanger civilian lives, the International Committee of the Red Cross (ICRC) joined...
On 23 September 2025, on the margins of the United Nations General Assembly, the Grand Duchy of Luxembourg and the International Committee...
The International Committee of the Red Cross was the victim of a massive cyberattack in which hackers seized the data of more than 515000 extremely.
Cybersecurity and data protection in humanitarian action can't be accomplished by the humanitarian sector alone – it requires cross-sectoral and...
Misinformation, « fake news », and cybersecurity issues constitute severe threats to organizations like the International Committee of the...
This initiative unites a group of organizations dedicated to providing funding, expertise, tools, and technology to support the Global Humanitarian ISAC...
Civilian hackers must respect the law of the countries they operate in. In times of armed conflict, they must also respect international humanitarian law.
The representatives from African military and security agencies convened in Rwanda to raise awareness on emerging technologies used in warfare.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of International Committee of the Red Cross - ICRC is https://careers.icrc.org/.
According to Rankiteo, International Committee of the Red Cross - ICRC’s AI-generated cybersecurity score is 780, reflecting their Fair security posture.
According to Rankiteo, International Committee of the Red Cross - ICRC currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, International Committee of the Red Cross - ICRC has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, International Committee of the Red Cross - ICRC is not certified under SOC 2 Type 1.
According to Rankiteo, International Committee of the Red Cross - ICRC does not hold a SOC 2 Type 2 certification.
According to Rankiteo, International Committee of the Red Cross - ICRC is not listed as GDPR compliant.
According to Rankiteo, International Committee of the Red Cross - ICRC does not currently maintain PCI DSS compliance.
According to Rankiteo, International Committee of the Red Cross - ICRC is not compliant with HIPAA regulations.
According to Rankiteo,International Committee of the Red Cross - ICRC is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
International Committee of the Red Cross - ICRC operates primarily in the Non-profit Organizations industry.
International Committee of the Red Cross - ICRC employs approximately 13,847 people worldwide.
International Committee of the Red Cross - ICRC presently has no subsidiaries across any sectors.
International Committee of the Red Cross - ICRC’s official LinkedIn profile has approximately 1,433,729 followers.
International Committee of the Red Cross - ICRC is classified under the NAICS code 8135, which corresponds to Others.
No, International Committee of the Red Cross - ICRC does not have a profile on Crunchbase.
Yes, International Committee of the Red Cross - ICRC maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/icrc.
As of April 04, 2026, Rankiteo reports that International Committee of the Red Cross - ICRC has experienced 1 cybersecurity incidents.
International Committee of the Red Cross - ICRC has an estimated 21,885 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Data Leak.
Title: ICRC Cyber Attack
Description: The computer servers of the International Committee of the Red Cross (ICRC) were targeted by a cyber attack, compromising personal data and confidential information on more than 515,000 highly vulnerable people. The perpetrator of this attack is unknown. There are no signs that the hacked data has been shared publicly or leaked. The ICRC is working with partners to understand the scale of the attack and implement necessary safeguards.
Type: Data Breach
Threat Actor: Unknown
Common Attack Types: The most common types of attacks the company has faced is Data Leak.

Data Compromised: Personal data, Confidential information
Systems Affected: Computer servers
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Data, Confidential Information and .

Entity Name: International Committee of the Red Cross
Entity Type: Non-profit Organization
Industry: Humanitarian Aid
Customers Affected: 515000

Type of Data Compromised: Personal data, Confidential information
Number of Records Exposed: 515000
Last Attacking Group: The attacking group in the last incident was an Unknown.
Most Significant Data Compromised: The most significant data compromised in an incident were Personal data, Confidential information and .
Most Significant System Affected: The most significant system affected in an incident was Computer servers.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Confidential information and Personal data.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 515.0.
.png)
nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake protocol based on the Albatross consensus algorithm. Prior to version 1.3.0, two peer-facing consensus request handlers assume that the history index is always available and call blockchain.history_store.history_index().unwrap() directly. That assumption is false by construction. HistoryStoreProxy::history_index() explicitly returns None for the valid HistoryStoreProxy::WithoutIndex state. when a full node is syncing or otherwise running without the history index, a remote peer can send RequestTransactionsProof or RequestTransactionReceiptsByAddress and trigger an Option::unwrap() panic on the request path. This issue has been patched in version 1.3.0.
PraisonAI is a multi-agent teams system. Prior to version 1.5.95, FileTools.download_file() in praisonaiagents validates the destination path but performs no validation on the url parameter, passing it directly to httpx.stream() with follow_redirects=True. An attacker who controls the URL can reach any host accessible from the server including cloud metadata services and internal network services. This issue has been patched in version 1.5.95.
PraisonAI is a multi-agent teams system. Prior to version 4.5.97, OAuthManager.validate_token() returns True for any token not found in its internal store, which is empty by default. Any HTTP request to the MCP server with an arbitrary Bearer token is treated as authenticated, granting full access to all registered tools and agent capabilities. This issue has been patched in version 4.5.97.
PraisonAI is a multi-agent teams system. Prior to version 4.5.97, the PraisonAI Gateway server accepts WebSocket connections at /ws and serves agent topology at /info with no authentication. Any network client can connect, enumerate registered agents, and send arbitrary messages to agents and their tool sets. This issue has been patched in version 4.5.97.
PraisonAI is a multi-agent teams system. Prior to version 4.5.90, MCPToolIndex.search_tools() compiles a caller-supplied string directly as a Python regular expression with no validation, sanitization, or timeout. A crafted regex causes catastrophic backtracking in the re engine, blocking the Python thread for hundreds of seconds and causing a complete service outage. This issue has been patched in version 4.5.90.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.