
Lumen Technologies Company Cyber Security Posture
lumen.comLumen connects the world. We digitally connect people, data and applications โ quickly, securely and effortlessly. Everything we do at Lumen takes advantage of our network strength. From metro connectivity to long-haul data transport to our edge cloud, security, and managed service capabilities, we meet our customersโ needs today and as they build for tomorrow.
Lumen Technologies Company Details
lumentechnologies
50072 employees
551657.0
517
Telecommunications
lumen.com
Scan still pending
LUM_6397940
In-progress

Between 900 and 1000
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

Lumen Technologies Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 900 and 1000 |
Lumen Technologies Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
CenturyLink | Data Leak | 85 | 3 | 10/2019 | CEN32023423 | Link | |
Rankiteo Explanation : Attack with significant impact with internal employee data leaksDescription: The personal information of hundreds of thousands of CenturyLink customers, including names, addresses, email addresses, and phone numbers was exposed online. A database of 2.8m records containing sensitive information regarding hundreds of thousands of CenturyLinkโs customers was left open online for anyone with internet access to see. They included multiple pieces of personal information including name, email address, phone number, and address, along with account-specific information. The database comprised API logs with customer information and contained more than 2.8 million records in total. CenturyLink said to the affected customers. "We will continue to work to protect customer information, takes the protection of our customersโ information seriously, and we will work to ensure that we earn our customersโ trust. | |||||||
lumentechnologies | Ransomware | 75 | 2 | 03/2023 | LUM33321023 | Link | |
Rankiteo Explanation : Attack limited on finance or reputationDescription: Lumen Technologies, a leading provider of telecommunications services, identified two cybersecurity issues, including a ransomware attack. One of the events involved a ransomware attack on a small number of its servers that operate a segmented hosting service. The corporation simply acknowledged that the issue "is currently impairing the operations of a small number of the Company's enterprise customers." It gave no further information regarding the family of ransomware that infected its systems. Lumen developed improved security software following the ransomware attack's detection, which enabled the business to identify a different incursion. |
Lumen Technologies Company Subsidiaries

Lumen connects the world. We digitally connect people, data and applications โ quickly, securely and effortlessly. Everything we do at Lumen takes advantage of our network strength. From metro connectivity to long-haul data transport to our edge cloud, security, and managed service capabilities, we meet our customersโ needs today and as they build for tomorrow.
Access Data Using Our API

Get company history
.png)
Lumen Technologies Cyber Security News
Lumen Technologies Data Breach Class Action
This data breach was disclosed following a cyber security incident at Lumen Technologies, which may have affected numerous individuals.
AT&T, Verizon, and Lumen in Hot Seat After China Cyberattack
AT&T, Verizon, and Lumen in Hot Seat After China Cyberattack. Lawmakers want answers from the three companies about alleged Chinese cyberattacksย ...
Lumen Unveils Defender Plus to Stop Cyber Threats at the Network Edge
Lumen Technologies has introduced a new cybersecurity solution called Defender Plus, designed to automatically intercept and neutralize onlineย ...
Chinese hackers exploited bug to compromise internet companies, cybersecurity firm says
A Chinese hacking group exploited a software bug to compromise several internet companies in the United States and abroad, a cybersecurity firm said on Tuesday.
Chinese Hackers Breach US Wiretapping Data, Expose Vulnerabilities
In a significant cybersecurity breach โ not as big as the NPD breach, though โ Chinese hackers recently infiltrated the networks of major U.S.ย ...
U.S. officials urge Americans to use encrypted apps amid cyberattack
The hacking campaign, nicknamed Salt Typhoon by Microsoft, is one of the largest intelligence compromises in U.S. history, and it has not yetย ...
Lumen Secures Microsoft Partnership Despite Being Affected by Two Security Incidents
Microsoft has partnered with Lumen to expand its AI workload capacity with powerful new datacenter infrastructure.
Exclusive | U.S. Wiretap Systems Targeted in China-Linked Hack
Salt Typhoon has been active since 2020 and is a nation-state hacking group based out of China that focuses on espionage and data theft,ย ...
Chinese hackers exploit vulnerability to breach internet firms
A cybersecurity firm, Lumen Technologies, has reported that a Chinese hacking group exploited a software vulnerability to breach severalย ...

Lumen Technologies Similar Companies

T-Mobile
T-Mobile US, Inc. (NASDAQ: TMUS) is Americaโs supercharged Un-carrier, delivering an advanced 4G LTE and transformative nationwide 5G network that will offer reliable connectivity for all. T-Mobileโs customers benefit from its unmatched combination of value and quality, unwavering obsession with off

Ooredoo Group
We are an award-winning international communications company operating across the Middle East, North Africa and Southeast Asia. Serving consumers and businesses in 10 countries, we deliver a leading data experience through a broad range of content and services via our advanced, data-centric mob

MTNL
MTNL was set up on 1st April, 1986 by the Government of India to upgrade the quality of telecom services, expand the telecom network, introduce new services and to raise revenue for telecom development needs of India's key metros . Delhi, the political capital and Mumbai, the business capital of Ind

Proximus Group
Proximus Group is a provider of future-proof connectivity and digital services, operating in the Benelux as well as global markets. As a major economic player in Belgium, we make the most of every opportunity to positively impact the world around us. The investments we make in our open fixed and mob

Tata Communications
Tata Communications is a digital ecosystem enabler that powers todayโs fast-growing digital economy. We enable the digital transformation of enterprises globally, including 300 of the Fortune 500. We carry around 30% of the worldโs internet routes and connects businesses to 60% of the worldโs cloud

KDDI Corporation
We are Japanโรรดs global telecommunications pioneer and a Global Fortune 500 company providing our international customer base with data centers, networks, content delivery, system integration, and more around the world. If your business needs telecom support internationally, we are here at your serv

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
Lumen Technologies CyberSecurity History Information
How many cyber incidents has Lumen Technologies faced?
Total Incidents: According to Rankiteo, Lumen Technologies has faced 2 incidents in the past.
What types of cybersecurity incidents have occurred at Lumen Technologies?
Incident Types: The types of cybersecurity incidents that have occurred incidents Data Leak and Ransomware.
How does Lumen Technologies detect and respond to cybersecurity incidents?
Detection and Response: The company detects and responds to cybersecurity incidents through remediation measures with Developed improved security software and communication strategy with CenturyLink informed affected customers.
Incident Details
Can you provide details on each incident?

Incident : Ransomware
Title: Ransomware Attack on Lumen Technologies
Description: Lumen Technologies, a leading provider of telecommunications services, identified two cybersecurity issues, including a ransomware attack. One of the events involved a ransomware attack on a small number of its servers that operate a segmented hosting service. The corporation simply acknowledged that the issue 'is currently impairing the operations of a small number of the Company's enterprise customers.' It gave no further information regarding the family of ransomware that infected its systems. Lumen developed improved security software following the ransomware attack's detection, which enabled the business to identify a different incursion.
Type: Ransomware

Incident : Data Breach
Title: CenturyLink Customer Data Exposure
Description: The personal information of hundreds of thousands of CenturyLink customers, including names, addresses, email addresses, and phone numbers was exposed online.
Type: Data Breach
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Data Leak.
Impact of the Incidents
What was the impact of each incident?

Incident : Ransomware LUM33321023
Systems Affected: Segmented hosting service servers
Operational Impact: Impairing the operations of a small number of the Company's enterprise customers

Incident : Data Breach CEN32023423
Data Compromised: names, addresses, email addresses, phone numbers, account-specific information
Systems Affected: database
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information and Account-specific Information.
Which entities were affected by each incident?

Incident : Ransomware LUM33321023
Entity Type: Corporation
Industry: Telecommunications
Customers Affected: Small number of enterprise customers

Incident : Data Breach CEN32023423
Entity Type: Corporation
Industry: Telecommunications
Customers Affected: hundreds of thousands
Response to the Incidents
What measures were taken in response to each incident?

Incident : Ransomware LUM33321023
Remediation Measures: Developed improved security software

Incident : Data Breach CEN32023423
Communication Strategy: CenturyLink informed affected customers
Data Breach Information
What type of data was compromised in each breach?

Incident : Data Breach CEN32023423
Type of Data Compromised: Personal Information, Account-specific Information
Number of Records Exposed: 2.8 million
File Types Exposed: API logs
Personally Identifiable Information: names, addresses, email addresses, phone numbers
What measures does the company take to prevent data exfiltration?
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Developed improved security software.
Investigation Status
How does the company communicate the status of incident investigations to stakeholders?
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through was CenturyLink informed affected customers.
Stakeholder and Customer Advisories
Were there any advisories issued to stakeholders or customers for each incident?

Incident : Data Breach CEN32023423
Customer Advisories: CenturyLink informed affected customers
What advisories does the company provide to stakeholders and customers following an incident?
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was CenturyLink informed affected customers.
Additional Questions
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were names, addresses, email addresses, phone numbers and account-specific information.
What was the most significant system affected in an incident?
Most Significant System Affected: The most significant system affected in an incident was Segmented hosting service servers and database.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were names, addresses, email addresses, phone numbers and account-specific information.
What was the number of records exposed in the most significant breach?
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 2.8M.
Stakeholder and Customer Advisories
What was the most recent customer advisory issued?
Most Recent Customer Advisory: The most recent customer advisory issued was was an CenturyLink informed affected customers.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
