Company Details
inetum
20,907
1,338,181
5415
inetum.com
0
INE_3250303
In-progress


Inetum Vendor Cyber Rating & Cyber Score
inetum.comInetum is a European leader in digital services. Inetum’s team of 27,000 consultants and specialists strive every day to make a digital impact for businesses, public sector entities and society. Inetum’s solutions aim at contributing to its clients’ performance and innovation as well as the common good. Present in 19 countries with a dense network of sites, Inetum partners with major software publishers to meet the challenges of digital transformation with proximity and flexibility. Driven by its ambition for growth and scale, Inetum generated sales of 2.4 billion euros in 2024. 🏅 Top Employer Europe 2025
Company Details
inetum
20,907
1,338,181
5415
inetum.com
0
INE_3250303
In-progress
Between 750 and 799

Inetum Global Score (TPRM)XXXX

Description: French IT services firm Inetum Group fell victim to a ransomware attack by the BlackCat ransomware, in December 2021. The attack impacted its operations in France, but soon the company isolated all affected servers and switched off client VPNs. The company immediately took the help of cyber security experts to investigate the incident.


No incidents recorded for Inetum in 2026.
No incidents recorded for Inetum in 2026.
No incidents recorded for Inetum in 2026.
Inetum cyber incidents detection timeline including parent company and subsidiaries

Inetum is a European leader in digital services. Inetum’s team of 27,000 consultants and specialists strive every day to make a digital impact for businesses, public sector entities and society. Inetum’s solutions aim at contributing to its clients’ performance and innovation as well as the common good. Present in 19 countries with a dense network of sites, Inetum partners with major software publishers to meet the challenges of digital transformation with proximity and flexibility. Driven by its ambition for growth and scale, Inetum generated sales of 2.4 billion euros in 2024. 🏅 Top Employer Europe 2025


We bring together the right people, the right technology and the right partners to create innovative solutions that make positive impact and address some of the most urgent and complex challenges facing the modern world. With a focus on serving governments globally, Serco’s services span justice,

TELUS Digital crafts unique and enduring experiences for customers and employees, and creates future-focused digital transformations that stand the test of time. We are the brand behind the brands. Our global team members are both passionate ambassadors of our clients’ products and services, and vis

Bring teams together, reimagine workspaces, engage new audiences, and delight your customers –– all on the Zoom AI-first work platform you know and love. 💙 Zoomies help people stay connected so they can get more done together. We set out on a mission to make video communications frictionless and se

Reply [EXM, STAR: REY] specialises in the design and implementation of solutions based on new communication channels and digital media. As a network of highly specialised companies, Reply defines and develops business models enabled by the new models of AI, big data, cloud computing, digital media a

HCLTech is a global technology company, home to more than 226,300 people across 60 countries, delivering industry-leading capabilities centered around AI, digital, engineering, cloud and software, powered by a broad portfolio of technology services and products. We work with clients across all major

Artificial Intelligence. Automation. Cloud Engineering. Advanced Analytics. For Enterprises, these are key factors of success. For us, they’re our core expertise. We work with global iconic brands. We bring them a unique value proposition through market-leading technologies and business process e

Apex Systems is a leading global technology services firm that incorporates industry insights and experience to deliver solutions that fulfill our clients’ digital visions. We offer a continuum of services, specializing in strategy, transformation, and managed services across application development

Almaviva is the Italian digital innovation group that supports the country’s growth by helping enterprises meet the challenges of staying competitive in the digital age. The Group helps organizations transform their business models, operational structures, corporate culture, and ICT systems. Buildi

Founded in 1982 by a small group of entrepreneurs, Softtek started out in Mexico providing local IT services, and today is a global leader in next-generation digital solutions. The first company to introduce the Nearshore model, Softtek helps Global 2000 organizations build their digital capabilitie
.png)
Inetum, under the leadership of Kathy Quashie and Hemant Lamba, positions itself as a trustworthy partner in digital transformation for...
Q: How is Inetum positioned in the Mexican market compared to other consulting and digital service players? A: Inetum has a comprehensive...
The key role of compliance and cybersecurity according to Inetum's general legal & compliance counsel (Iberia & Latam), José María Balboa-...
The EU-funded CyberKit4SME project sought to democratise cybersecurity methods, by adapting certain online cybersecurity tools to fit the specific needs of...
We are pleased to announce our Broadcom Partner Awards, where we are recognizing key partners for their outstanding accomplishments and contributions in 2023.
They all helped develop software tools with EU funding to counter cyber and physical threats to e-commerce in the European single market.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Inetum is http://www.inetum.com.
According to Rankiteo, Inetum’s AI-generated cybersecurity score is 773, reflecting their Fair security posture.
According to Rankiteo, Inetum currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Inetum has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Inetum is not certified under SOC 2 Type 1.
According to Rankiteo, Inetum does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Inetum is not listed as GDPR compliant.
According to Rankiteo, Inetum does not currently maintain PCI DSS compliance.
According to Rankiteo, Inetum is not compliant with HIPAA regulations.
According to Rankiteo,Inetum is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Inetum operates primarily in the IT Services and IT Consulting industry.
Inetum employs approximately 20,907 people worldwide.
Inetum presently has no subsidiaries across any sectors.
Inetum’s official LinkedIn profile has approximately 1,338,181 followers.
Inetum is classified under the NAICS code 5415, which corresponds to Computer Systems Design and Related Services.
No, Inetum does not have a profile on Crunchbase.
Yes, Inetum maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/inetum.
As of March 28, 2026, Rankiteo reports that Inetum has experienced 1 cybersecurity incidents.
Inetum has an estimated 39,816 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with cybersecurity experts, and containment measures with isolated affected servers, containment measures with switched off client vpns..
Title: Inetum Group Ransomware Attack
Description: French IT services firm Inetum Group fell victim to a ransomware attack by the BlackCat ransomware in December 2021. The attack impacted its operations in France, but soon the company isolated all affected servers and switched off client VPNs. The company immediately took the help of cybersecurity experts to investigate the incident.
Date Detected: December 2021
Type: Ransomware
Threat Actor: BlackCat
Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Systems Affected: Servers, VPNs
Operational Impact: Impacted operations in France

Entity Name: Inetum Group
Entity Type: IT Services Firm
Industry: Information Technology
Location: France

Third Party Assistance: Cybersecurity experts
Containment Measures: Isolated affected serversSwitched off client VPNs
Third-Party Assistance: The company involves third-party assistance in incident response through Cybersecurity experts.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by isolated affected servers, switched off client vpns and .

Ransomware Strain: BlackCat
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Cybersecurity experts.
Last Attacking Group: The attacking group in the last incident was an BlackCat.
Most Recent Incident Detected: The most recent incident detected was on December 2021.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Cybersecurity experts.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Isolated affected serversSwitched off client VPNs.
.png)
A flaw has been found in Tenda AC5 15.03.06.47. This vulnerability affects the function formQuickIndex of the file /goform/QuickIndex of the component POST Request Handler. This manipulation of the argument PPPOEPassword causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been published and may be used.
A vulnerability was detected in Tenda AC5 15.03.06.47. This affects the function fromAddressNat of the file /goform/addressNat of the component POST Request Handler. The manipulation of the argument page results in stack-based buffer overflow. The attack can be launched remotely. The exploit is now public and may be used.
In TigerVNC before 1.16.2, Image.cxx in x0vncserver allows other users to observe or manipulate the screen contents, or cause an application crash, because of incorrect permissions.
Incus is a system container and virtual machine manager. Prior to version 6.23.0, instance template files can be used to cause arbitrary read or writes as root on the host server. Incus allows for pongo2 templates within instances which can be used at various times in the instance lifecycle to template files inside of the instance. This particular implementation of pongo2 within Incus allowed for file read/write but with the expectation that the pongo2 chroot feature would isolate all such access to the instance's filesystem. This was allowed such that a template could theoretically read a file and then generate a new version of said file. Unfortunately the chroot isolation mechanism is entirely skipped by pongo2 leading to easy access to the entire system's filesystem with root privileges. Version 6.23.0 patches the issue.
Incus is a system container and virtual machine manager. Prior to version 6.23.0, a specially crafted storage bucket backup can be used by an user with access to Incus' storage bucket feature to crash the Incus daemon. Repeated use of this attack can be used to keep the server offline causing a denial of service of the control plane API. This does not impact any running workload, existing containers and virtual machines will keep operating. Version 6.23.0 fixes the issue.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.