
International Company Cyber Security Posture
international.comWe build International trucks and engines and IC Busยฎ school and commercial buses that are as tough and as smart as the people who drive them. Our solutions deliver greater uptime and productivity to fleets across North America. We also develop Fleetriteยฎ aftermarket parts. In everything we do, our vision is to accelerate the impact of sustainable mobility to create the cleaner, safer world we all deserve. We are part of the TRATON Group, one of the world's leading commercial vehicle manufacturers.
International Company Details
theinternationalmotors
10340 employees
162232.0
336
Motor Vehicle Manufacturing
international.com
Scan still pending
INT_4730611
In-progress

Between 900 and 1000
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

International Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 900 and 1000 |
International Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
Navistar Inc | Breach | 50 | 2 | 05/2021 | NAV165711123 | Link | |
Rankiteo Explanation : Attack limited on finance or reputationDescription: US truck and military vehicle maker Navistar suffered from a data breach incident after an unknown attacker have stolen data from its network. The company disclosed the attack in an 8-K report filed with the Securities and Exchange Commission (SEC). Despite the security compromise, Navistar claims that there has been no impact on its business because all of its IT systems are up and running. Several other steps were taken by the business to lessen the effects of the security compromise that occurred. |
International Company Subsidiaries

We build International trucks and engines and IC Busยฎ school and commercial buses that are as tough and as smart as the people who drive them. Our solutions deliver greater uptime and productivity to fleets across North America. We also develop Fleetriteยฎ aftermarket parts. In everything we do, our vision is to accelerate the impact of sustainable mobility to create the cleaner, safer world we all deserve. We are part of the TRATON Group, one of the world's leading commercial vehicle manufacturers.
Access Data Using Our API

Get company history
.png)
International Cyber Security News
International News: Vol. 61
A global perspective on the international legal landscape for privacy and cybersecurity laws, featuring insights from McDermott lawyers.
ICC detects and contains new sophisticated cyber security incident
Late last week, the International Criminal Court (โICCโ or โthe Courtโ) detected a new, sophisticated and targeted cyber security incident,ย ...
NKU celebrates first graduates of international cybersecurity partnership with SANGU in Tbilisi, Georgia
In 2023, the two universities launched a dual, hybrid master's degree program. Since then, 120 Georgian students have enrolled in the College ofย ...
International Criminal Court hit with cyber security attack
The International Criminal Court says it has been hit by a โsophisticatedโ cyberattack. The court said Monday the incident, which happenedย ...
CISA Restarts Seaport Cybersecurity Exercises
The Cybersecurity and Infrastructure Security Agency's proof-of-concept exercises aim to enhance cybersecurity at U.S. ports.
The growing complexity of global cybersecurity: Moving from challenges to action
The cybersecurity landscape is becoming more complex. Yet through collaboration and innovation, cybersecurity can become a source ofย ...
Cybersecurity Market Size, Share, Analysis | Global Report 2032
The global cybersecurity market size is projected to grow from $193.73 billion in 2024 to $562.72 billion by 2032, at a CAGR of 14.3% duringย ...
Why international alignment of cybersecurity regulations needs to be a priority - Microsoft On the Issues
Greater alignment of cybersecurity regulations is a growing priority for industry leaders. More than 50 Chief Information Security Officers (ย ...
ICC says new cybersecurity incident has been contained
The International Criminal Court (ICC) said on Monday it had detected a "new, sophisticated and targeted" cybersecurity incident late lastย ...

International Similar Companies

LEONI
LEONI is a global provider of products, solutions and services for energy and data management in the automotive industry. The group of companies has around 95,000 employees in 26 countries and generated consolidated sales of EUR 5.5 billion in 2023. LEONI's largest customer group comprises the glo

Marcopolo S.A.
A Marcopolo S.A รฉ uma empresa brasileira fundada em 1949 que participa ativamente no desenvolvimento de soluรงรตes para a mobilidade nos principais mercados mundiais. Atualmente com 11 unidades fabris no exterior, รฉ composta por empresas dedicadas ร fabricaรงรฃo de รดnibus, micro-รดnibus e peรงas, soluรงรตes

Hyundai Motor India Ltd.
Hyundai Motor India Limited (HMIL) is a wholly-owned subsidiary of Hyundai Motor Company (HMC). HMIL is Indiaโs first smart mobility solutions provider and the number one car exporter since its inception in India. It currently has 12 car models across segments GRAND i10 NIOS, All New i20, i20 N Line

Honda Cars India Ltd
Honda Cars India Ltd. (HCIL), a leading manufacturer of premium cars in India, was established in December 1995 with a commitment to provide Hondaโs passenger car models and technologies, to the Indian customers. HCILโs corporate office is based in Greater Noida, UP and its state-of-the-art manufact

Goodyear Germany GmbH
Ein Konzern mit starken Marken Die Goodyear Dunlop Tires Germany GmbH ist Teil des weltweit agierenden Reifenherstellers Goodyear. Rund 70.000 Menschen auf der ganzen Welt arbeiten tรคglich daran, unsere Erfolgsgeschichte fortzuschreiben. In Deutschland betreiben wir an sieben Standorten sechs Pro

Tenneco
Driven by our Core Values and our winning mindset, weโre relentless in our pursuit to become the most trusted partner and best manufacturer and distributer to the transportation industry. Our employees are the changemakers of this ambition, bringing drive, passion and dedication to everything we d

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
International CyberSecurity History Information
How many cyber incidents has International faced?
Total Incidents: According to Rankiteo, International has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at International?
Incident Types: The types of cybersecurity incidents that have occurred incident Breach.
How does International detect and respond to cybersecurity incidents?
Detection and Response: The company detects and responds to cybersecurity incidents through recovery measures with All IT systems are up and running, Several steps taken to lessen the effects and communication strategy with Disclosed the attack in an 8-K report filed with the SEC.
Incident Details
Can you provide details on each incident?

Incident : Data Breach
Title: Navistar Data Breach Incident
Description: US truck and military vehicle maker Navistar suffered from a data breach incident after an unknown attacker have stolen data from its network.
Type: Data Breach
Threat Actor: Unknown
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Breach.
Impact of the Incidents
What was the impact of each incident?

Incident : Data Breach NAV165711123
Operational Impact: No impact on business operations
Which entities were affected by each incident?

Incident : Data Breach NAV165711123
Entity Type: Corporation
Industry: Automotive, Defense
Location: United States
Response to the Incidents
What measures were taken in response to each incident?

Incident : Data Breach NAV165711123
Recovery Measures: All IT systems are up and running, Several steps taken to lessen the effects
Communication Strategy: Disclosed the attack in an 8-K report filed with the SEC
Ransomware Information
How does the company recover data encrypted by ransomware?
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through All IT systems are up and running, Several steps taken to lessen the effects.
References
Where can I find more information about each incident?

Incident : Data Breach NAV165711123
Source: SEC 8-K Report
Where can stakeholders find additional resources on cybersecurity best practices?
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: SEC 8-K Report.
Investigation Status
How does the company communicate the status of incident investigations to stakeholders?
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through was Disclosed the attack in an 8-K report filed with the SEC.
Additional Questions
General Information
Who was the attacking group in the last incident?
Last Attacking Group: The attacking group in the last incident was an Unknown.
References
What is the most recent source of information about an incident?
Most Recent Source: The most recent source of information about an incident is SEC 8-K Report.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
