News Corp Company Cyber Security Posture

newscorp.com

News Corp is a global, diversified media and information services company focused on creating and distributing authoritative and engaging content and other products and services. The company comprises businesses across a range of media, including: digital real estate services, subscription video services in Australia, news and information services and book publishing. Headquartered in New York, News Corp operates primarily in the United States, Australia, and the United Kingdom, and its content and other products and services are distributed and consumed worldwide.

News Corp Company Details

Linkedin ID:

newscorp

Employees number:

6487 employees

Number of followers:

89600.0

NAICS:

51

Industry Type:

Technology, Information and Media

Homepage:

newscorp.com

IP Addresses:

471

Company ID:

NEW_2574861

Scan Status:

In-progress

AI scoreNews Corp Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

globalscoreNews Corp Global Score
blurone
Ailogo

News Corp Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

News Corp Company Cyber Security News & History

Past Incidents
2
Attack Types
2
EntityTypeSeverityImpactSeenUrl IDDetailsView
News CorpBreach60302/2023NEW194781023Link
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: The American media and publishing behemoth News Corp disclosed it had been the target of an advanced persistent threat actor's cyberattack. The attackers gained access to some employees' emails and documents after breaking into one of the company's systems. Initial research into the incident found that a nation-state actor engaged in cyber espionage when launching the attack. Mandiant, a cybersecurity and incident response company, has been engaged by News Corp to help with the probe. Mandiant experts believe an APT outfit with ties to China was responsible for the attack.

News CorpCyber Attack100502/2022NEW235222Link
Rankiteo Explanation :
Attack threatening the organization's existence

Description: News Corp was targeted as a part of a cyberattack that accessed the data of some employees. The main aim of the attack was likely to gather intelligence to benefit Chinaโ€™s interests. The data like a limited number of business email accounts and documents were taken from News Corp headquarters.

News Corp Company Subsidiaries

SubsidiaryImage

News Corp is a global, diversified media and information services company focused on creating and distributing authoritative and engaging content and other products and services. The company comprises businesses across a range of media, including: digital real estate services, subscription video services in Australia, news and information services and book publishing. Headquartered in New York, News Corp operates primarily in the United States, Australia, and the United Kingdom, and its content and other products and services are distributed and consumed worldwide.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=newscorp' -H 'apikey: YOUR_API_KEY_HERE'
newsone

News Corp Cyber Security News

2025-06-01T07:00:00.000Z
Credential-Harvesting Blitz Puts Tinder, News Corp, Chick-fil-A on Alert

The hacking group known as โ€œScattered Spiderโ€ has had a busy year. The gang recently breached the systems of British retailer Marks & Spencer (M&S).

2025-03-25T07:00:00.000Z
Researchers back claim of Oracle Cloud breach despite companyโ€™s denials

CloudSEK said the hacker accessed login.us2.oraclecloud.com, a production SSO server that was active about 30 days before researchers discoveredย ...

2025-06-15T07:00:00.000Z
Exclusive | Cyberattack on Washington Post Strikes Journalistsโ€™ Email Accounts - WSJ

A cyberattack on the Washington Post compromised email accounts of several journalists and was potentially the work of a foreign government,ย ...

2025-02-27T08:00:00.000Z
8 Worrying Cybersecurity Statistics You Need to Know in 2025

The cybersecurity statistics you really need to know in 2025, based on our original report that spoke to over 1000 US business leaders.

2025-04-03T07:00:00.000Z
Oracle Acknowledges Data Breach and Starts Informing Affected Clients

Oracle Corporation has confirmed a data breach involving its older Gen 1 servers, marking the second cybersecurity incident disclosed by theย ...

2025-05-14T07:00:00.000Z
Steel giant Nucor Corporation facing disruptions after cyberattack

A cybersecurity incident on Nucor Corporation's systems, the largest steel producer in the U.S., forced the company to take offline parts of itsย ...

2025-01-03T08:00:00.000Z
Treasury Dept. Hits Chinese Tech Company With Sanctions After Breach

The agency imposed penalties on a company it blamed for supporting the Chinese hacking group Flax Typhoon in a 2022-23 infiltration.

2025-05-06T07:00:00.000Z
CISO: Leading cybersecurity provider entering new growth phase with high margin, recurring revenue software offerings.

CISO Global, Inc. (NASDAQ:CISO) is an industry leader in AI-powered cybersecurity software, managed cybersecurity and compliance services thatย ...

2025-03-18T07:00:00.000Z
Google to buy cybersecurity firm Wiz for $32 billion in the biggest deal in companyโ€™s history

The all-cash deal is set to boost Alphabet's profile in the cloud computing market, a space currently led by Amazon and Microsoft.

similarCompanies

News Corp Similar Companies

Cox Enterprises

Thousands of employees, one goal: empower people today to build a better future for the next generation. How do we do that? By disrupting industries. By treating our employees as our most important resource. By improving the quality of life in our communities and by protecting our planet. We crea

Globo

A globo โˆšยฉ feita de gente que quer fazer diferente, fazer junto, fazer o futuro. Gente espalhada por todo o paโˆšโ‰ s (e mundo!) trabalhando com conteโˆšโˆซdo, notโˆšโ‰ cias, negโˆšโ‰ฅcios, tecnologia e brasilidade de sobra. Canais na TV aberta e por assinatura, produtos digitais como globoplay, Cartola, g1, ge,

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

News Corp CyberSecurity History Information

How many cyber incidents has News Corp faced?

Total Incidents: According to Rankiteo, News Corp has faced 2 incidents in the past.

What types of cybersecurity incidents have occurred at News Corp?

Incident Types: The types of cybersecurity incidents that have occurred incidents Breach and Cyber Attack.

How does News Corp detect and respond to cybersecurity incidents?

Detection and Response: The company detects and responds to cybersecurity incidents through third party assistance with Mandiant.

Incident Details

Can you provide details on each incident?

Incident : Cyber Espionage

Title: News Corp Cyberattack

Description: The American media and publishing behemoth News Corp disclosed it had been the target of an advanced persistent threat actor's cyberattack. The attackers gained access to some employees' emails and documents after breaking into one of the company's systems. Initial research into the incident found that a nation-state actor engaged in cyber espionage when launching the attack. Mandiant, a cybersecurity and incident response company, has been engaged by News Corp to help with the probe. Mandiant experts believe an APT outfit with ties to China was responsible for the attack.

Type: Cyber Espionage

Threat Actor: Nation-state actor, APT outfit with ties to China

Motivation: Cyber Espionage

Incident : Data Breach

Title: Cyberattack on News Corp

Description: News Corp was targeted as a part of a cyberattack that accessed the data of some employees. The main aim of the attack was likely to gather intelligence to benefit Chinaโ€™s interests. The data like a limited number of business email accounts and documents were taken from News Corp headquarters.

Type: Data Breach

Threat Actor: China-linked actors

Motivation: Intelligence gathering to benefit Chinaโ€™s interests

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident?

Incident : Cyber Espionage NEW194781023

Data Compromised: Emails, Documents

Systems Affected: Company's systems

Incident : Data Breach NEW235222

Data Compromised: business email accounts, documents

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Emails, Documents, business email accounts and documents.

Which entities were affected by each incident?

Incident : Cyber Espionage NEW194781023

Entity Type: Media and Publishing Company

Industry: Media and Publishing

Location: American

Incident : Data Breach NEW235222

Entity Type: Company

Industry: Media

Location: Headquarters

Response to the Incidents

What measures were taken in response to each incident?

Incident : Cyber Espionage NEW194781023

Third Party Assistance: Mandiant

How does the company involve third-party assistance in incident response?

Third-Party Assistance: The company involves third-party assistance in incident response through Mandiant.

Data Breach Information

What type of data was compromised in each breach?

Incident : Cyber Espionage NEW194781023

Type of Data Compromised: Emails, Documents

Incident : Data Breach NEW235222

Type of Data Compromised: business email accounts, documents

Data Exfiltration: True

Post-Incident Analysis

What is the company's process for conducting post-incident analysis?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Mandiant.

Additional Questions

General Information

Who was the attacking group in the last incident?

Last Attacking Group: The attacking group in the last incident were an Nation-state actor, APT outfit with ties to China and China-linked actors.

Impact of the Incidents

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident were Emails, Documents, business email accounts and documents.

What was the most significant system affected in an incident?

Most Significant System Affected: The most significant system affected in an incident was Company's systems.

Response to the Incidents

What third-party assistance was involved in the most recent incident?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Mandiant.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Emails, Documents, business email accounts and documents.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge