Lumen Technologies Company Cyber Security Posture

lumen.com

Lumen connects the world. We digitally connect people, data and applications โ€“ quickly, securely and effortlessly. Everything we do at Lumen takes advantage of our network strength. From metro connectivity to long-haul data transport to our edge cloud, security, and managed service capabilities, we meet our customersโ€™ needs today and as they build for tomorrow.

Lumen Technologies Company Details

Linkedin ID:

lumentechnologies

Employees number:

50072 employees

Number of followers:

551657.0

NAICS:

517

Industry Type:

Telecommunications

Homepage:

lumen.com

IP Addresses:

Scan still pending

Company ID:

LUM_6397940

Scan Status:

In-progress

AI scoreLumen Technologies Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

globalscoreLumen Technologies Global Score
blurone
Ailogo

Lumen Technologies Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

Lumen Technologies Company Cyber Security News & History

Past Incidents
2
Attack Types
2
EntityTypeSeverityImpactSeenUrl IDDetailsView
CenturyLinkData Leak85310/2019CEN32023423Link
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: The personal information of hundreds of thousands of CenturyLink customers, including names, addresses, email addresses, and phone numbers was exposed online. A database of 2.8m records containing sensitive information regarding hundreds of thousands of CenturyLinkโ€™s customers was left open online for anyone with internet access to see. They included multiple pieces of personal information including name, email address, phone number, and address, along with account-specific information. The database comprised API logs with customer information and contained more than 2.8 million records in total. CenturyLink said to the affected customers. "We will continue to work to protect customer information, takes the protection of our customersโ€™ information seriously, and we will work to ensure that we earn our customersโ€™ trust.

lumentechnologiesRansomware75203/2023LUM33321023Link
Rankiteo Explanation :
Attack limited on finance or reputation

Description: Lumen Technologies, a leading provider of telecommunications services, identified two cybersecurity issues, including a ransomware attack. One of the events involved a ransomware attack on a small number of its servers that operate a segmented hosting service. The corporation simply acknowledged that the issue "is currently impairing the operations of a small number of the Company's enterprise customers." It gave no further information regarding the family of ransomware that infected its systems. Lumen developed improved security software following the ransomware attack's detection, which enabled the business to identify a different incursion.

Lumen Technologies Company Subsidiaries

SubsidiaryImage

Lumen connects the world. We digitally connect people, data and applications โ€“ quickly, securely and effortlessly. Everything we do at Lumen takes advantage of our network strength. From metro connectivity to long-haul data transport to our edge cloud, security, and managed service capabilities, we meet our customersโ€™ needs today and as they build for tomorrow.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=lumentechnologies' -H 'apikey: YOUR_API_KEY_HERE'
newsone

Lumen Technologies Cyber Security News

2025-03-11T07:00:00.000Z
Lumen Technologies Data Breach Class Action

This data breach was disclosed following a cyber security incident at Lumen Technologies, which may have affected numerous individuals.

2024-10-13T07:00:00.000Z
AT&T, Verizon, and Lumen in Hot Seat After China Cyberattack

AT&T, Verizon, and Lumen in Hot Seat After China Cyberattack. Lawmakers want answers from the three companies about alleged Chinese cyberattacksย ...

2025-04-23T07:00:00.000Z
Lumen Unveils Defender Plus to Stop Cyber Threats at the Network Edge

Lumen Technologies has introduced a new cybersecurity solution called Defender Plus, designed to automatically intercept and neutralize onlineย ...

2024-08-28T07:00:00.000Z
Chinese hackers exploited bug to compromise internet companies, cybersecurity firm says

A Chinese hacking group exploited a software bug to compromise several internet companies in the United States and abroad, a cybersecurity firm said on Tuesday.

2024-10-08T07:00:00.000Z
Chinese Hackers Breach US Wiretapping Data, Expose Vulnerabilities

In a significant cybersecurity breach โ€” not as big as the NPD breach, though โ€” Chinese hackers recently infiltrated the networks of major U.S.ย ...

2024-12-03T08:00:00.000Z
U.S. officials urge Americans to use encrypted apps amid cyberattack

The hacking campaign, nicknamed Salt Typhoon by Microsoft, is one of the largest intelligence compromises in U.S. history, and it has not yetย ...

2024-07-25T07:00:00.000Z
Lumen Secures Microsoft Partnership Despite Being Affected by Two Security Incidents

Microsoft has partnered with Lumen to expand its AI workload capacity with powerful new datacenter infrastructure.

2024-10-05T07:00:00.000Z
Exclusive | U.S. Wiretap Systems Targeted in China-Linked Hack

Salt Typhoon has been active since 2020 and is a nation-state hacking group based out of China that focuses on espionage and data theft,ย ...

2024-09-02T07:00:00.000Z
Chinese hackers exploit vulnerability to breach internet firms

A cybersecurity firm, Lumen Technologies, has reported that a Chinese hacking group exploited a software vulnerability to breach severalย ...

similarCompanies

Lumen Technologies Similar Companies

T-Mobile

T-Mobile US, Inc. (NASDAQ: TMUS) is Americaโ€™s supercharged Un-carrier, delivering an advanced 4G LTE and transformative nationwide 5G network that will offer reliable connectivity for all. T-Mobileโ€™s customers benefit from its unmatched combination of value and quality, unwavering obsession with off

Ooredoo Group

We are an award-winning international communications company operating across the Middle East, North Africa and Southeast Asia. Serving consumers and businesses in 10 countries, we deliver a leading data experience through a broad range of content and services via our advanced, data-centric mob

MTNL was set up on 1st April, 1986 by the Government of India to upgrade the quality of telecom services, expand the telecom network, introduce new services and to raise revenue for telecom development needs of India's key metros . Delhi, the political capital and Mumbai, the business capital of Ind

Proximus Group

Proximus Group is a provider of future-proof connectivity and digital services, operating in the Benelux as well as global markets. As a major economic player in Belgium, we make the most of every opportunity to positively impact the world around us. The investments we make in our open fixed and mob

Tata Communications

Tata Communications is a digital ecosystem enabler that powers todayโ€™s fast-growing digital economy. We enable the digital transformation of enterprises globally, including 300 of the Fortune 500. We carry around 30% of the worldโ€™s internet routes and connects businesses to 60% of the worldโ€™s cloud

KDDI Corporation

We are Japanโ€šร„รดs global telecommunications pioneer and a Global Fortune 500 company providing our international customer base with data centers, networks, content delivery, system integration, and more around the world. If your business needs telecom support internationally, we are here at your serv

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Lumen Technologies CyberSecurity History Information

How many cyber incidents has Lumen Technologies faced?

Total Incidents: According to Rankiteo, Lumen Technologies has faced 2 incidents in the past.

What types of cybersecurity incidents have occurred at Lumen Technologies?

Incident Types: The types of cybersecurity incidents that have occurred incidents Data Leak and Ransomware.

How does Lumen Technologies detect and respond to cybersecurity incidents?

Detection and Response: The company detects and responds to cybersecurity incidents through remediation measures with Developed improved security software and communication strategy with CenturyLink informed affected customers.

Incident Details

Can you provide details on each incident?

Incident : Ransomware

Title: Ransomware Attack on Lumen Technologies

Description: Lumen Technologies, a leading provider of telecommunications services, identified two cybersecurity issues, including a ransomware attack. One of the events involved a ransomware attack on a small number of its servers that operate a segmented hosting service. The corporation simply acknowledged that the issue 'is currently impairing the operations of a small number of the Company's enterprise customers.' It gave no further information regarding the family of ransomware that infected its systems. Lumen developed improved security software following the ransomware attack's detection, which enabled the business to identify a different incursion.

Type: Ransomware

Incident : Data Breach

Title: CenturyLink Customer Data Exposure

Description: The personal information of hundreds of thousands of CenturyLink customers, including names, addresses, email addresses, and phone numbers was exposed online.

Type: Data Breach

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Data Leak.

Impact of the Incidents

What was the impact of each incident?

Incident : Ransomware LUM33321023

Systems Affected: Segmented hosting service servers

Operational Impact: Impairing the operations of a small number of the Company's enterprise customers

Incident : Data Breach CEN32023423

Data Compromised: names, addresses, email addresses, phone numbers, account-specific information

Systems Affected: database

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information and Account-specific Information.

Which entities were affected by each incident?

Incident : Ransomware LUM33321023

Entity Type: Corporation

Industry: Telecommunications

Customers Affected: Small number of enterprise customers

Incident : Data Breach CEN32023423

Entity Type: Corporation

Industry: Telecommunications

Customers Affected: hundreds of thousands

Response to the Incidents

What measures were taken in response to each incident?

Incident : Ransomware LUM33321023

Remediation Measures: Developed improved security software

Incident : Data Breach CEN32023423

Communication Strategy: CenturyLink informed affected customers

Data Breach Information

What type of data was compromised in each breach?

Incident : Data Breach CEN32023423

Type of Data Compromised: Personal Information, Account-specific Information

Number of Records Exposed: 2.8 million

File Types Exposed: API logs

Personally Identifiable Information: names, addresses, email addresses, phone numbers

What measures does the company take to prevent data exfiltration?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Developed improved security software.

Investigation Status

How does the company communicate the status of incident investigations to stakeholders?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through was CenturyLink informed affected customers.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident?

Incident : Data Breach CEN32023423

Customer Advisories: CenturyLink informed affected customers

What advisories does the company provide to stakeholders and customers following an incident?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was CenturyLink informed affected customers.

Additional Questions

Impact of the Incidents

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident were names, addresses, email addresses, phone numbers and account-specific information.

What was the most significant system affected in an incident?

Most Significant System Affected: The most significant system affected in an incident was Segmented hosting service servers and database.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were names, addresses, email addresses, phone numbers and account-specific information.

What was the number of records exposed in the most significant breach?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 2.8M.

Stakeholder and Customer Advisories

What was the most recent customer advisory issued?

Most Recent Customer Advisory: The most recent customer advisory issued was was an CenturyLink informed affected customers.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge