Company Details
vois
20,303
459,249
5415
vodafone.com
0
VOI_5470264
In-progress


VOIS Vendor Cyber Rating & Cyber Score
vodafone.comVOIS (Vodafone Intelligent Solutions) is a strategic arm of Vodafone Group Plc, creating value for customers by delivering intelligent solutions through Talent, Technology & Transformation. As the largest shared services organisation in the global telco industry, our portfolio of next-generation solutions and services are designed in partnership with customers across Vodafone Group, local markets, and partner markets to simplify and drive growth. We are pioneering a new Partnership model for the Telco industry, where the sharing of ideas, innovation, platforms and services will unlock opportunities for our people and value for our customers. With our strategic partner Accenture, we work alongside our Vodafone customers, other Telco and tech companies to drive transformation, meet the challenges of our industry and ensure we stay relevant and resilient. This partnership is a unique, industry-first model which brings together the best of in-house and 3rd party capability. We deliver value and results at scale by leveraging technology, data and our talented international team of 30K professionals in the following services: Technology, Business, B2B, Corporate Services, Customer Care. Our commercial model creates clear, benchmarked and competitively-priced services so that we can offer guaranteed outcomes for customers with flexibility and optionality. Bringing together our combined strengths with our strategic partner Accenture our strategy is to: Commercialise: Create cost transparency and foster trust and growth for our customers Re-platform: To simplify, streamline and scale our business Extend beyond our borders: deepening our relationships, growing our services and expanding our customer base across new customers & new geographies We work with customers across 28 countries from 10 VOIS locations: Albania, Egypt, Hungary, India, Romania, Spain, Turkey, UK, Germany, Ireland, and with a network of teams in Czech Republic, Italy, Greece, and Portugal.
Company Details
vois
20,303
459,249
5415
vodafone.com
0
VOI_5470264
In-progress
Between 750 and 799

VOIS Global Score (TPRM)XXXX

Description: Vodafone realised they suffered a data breach after that cybercriminals have broken into a sales partner and copied sensitive data. There has been a cyber issue at Vodafone's partner Vertriebswerk in which critical data leaked; this is not a phishing email; many Vodafone customers are currently receiving emails requesting them to set a new password. Name, birthday, email address, mobile phone number, address, bank information (IBAN/BIC), and customer password are all impacted, according to Vodafone in the email that is available online. Vodafone promptly reported the occurrence to the Federal Commissioner for Data Protection and Freedom of Information.
Description: Vodafone's online sales of "Callya" prepaid cards were impacted by the purported ransomware attack on the IT service company Materna. The Vodafone website stopped selling the SIM cards, just after Materna had given the business permission to launch a "professionally elaborated cyber attack. Both businesses emphasise that there hasn't been any determination of a consumer data leak. "Restrictions on online sales and online registration of Callya products" should be lifted soon, according to Vodafone. Until then, there would be other ways to make the reservation. Many clients' systems were also impacted by the Materna security breach. There were Materna-operated check-in machine outages at several German airports. Workers were "equipped with newly installed or completely newly configured systems," which had never been linked to the impacted infrastructure.
Description: Vodafone Italia suffered a data breach incident after one of its commercial partners, FourB S.p.A., which operates as a reseller of telecommunications services in the country, suffered a cyberattack. The cyberattack took place in the first week of September and resulted in the compromise of sensitive subscriber details. The exposed information includes subscription details, identity documents with sensitive data, and contact details. Even KelvinSecurity offered to sell a collection of 295,000 files totalling 310 GB of data they allegedly stole from Vodafone Italia and advertised the cache on messaging platforms and at least one hacker forum.
Description: The customer data services of Vodafone Portugal went down recently in several areas as it was targeted in a malicious cyberattack. The 3G network was fixed in the entire county while services like 4G and 5G mobile networks, fixed voice, television, SMS, and voice/digital answering services are still offline. The company is investigating the largest cybersecurity incident with the help of local and international cyber security teams.
Description: Vodafone realised they suffered a data breach after one of its customers recieved the personal details of 18 other Vodafone customers. The details included name, address and phone numbers for 18 customer accounts along with her e-bill. The company investigated the incident and found out that the issue was a result of an isolated technical glitch which they fixed afterwards.
Description: Vodafone claims that hackers attempted to access consumers' accounts by using the emails and passwords they had taken from an unidentified source. At that moment, the business started a thorough investigation to get all the information needed to provide the best guidance possible to any impacted clients. The telecoms provider claims that 1,827 customer accounts were hacked by the crooks, who obtained the last four digits of the consumers' bank accounts, their names, and their mobile phone numbers. Although credit or debit card numbers or other information were not acquired, it is crucial to remember that information that is accessible by thieves may be utilized for fraudulent purposes.
Description: An intruder hacked into a Vodafone Group Plc (VOD) server in Germany and gained access to 2 million customers’ personal details and banking information. A person stole data including names, addresses, birth dates, and bank account information. However, the hacker had no access to credit card information, passwords, PIN numbers or mobile-phone numbers.


No incidents recorded for VOIS in 2026.
No incidents recorded for VOIS in 2026.
No incidents recorded for VOIS in 2026.
VOIS cyber incidents detection timeline including parent company and subsidiaries

VOIS (Vodafone Intelligent Solutions) is a strategic arm of Vodafone Group Plc, creating value for customers by delivering intelligent solutions through Talent, Technology & Transformation. As the largest shared services organisation in the global telco industry, our portfolio of next-generation solutions and services are designed in partnership with customers across Vodafone Group, local markets, and partner markets to simplify and drive growth. We are pioneering a new Partnership model for the Telco industry, where the sharing of ideas, innovation, platforms and services will unlock opportunities for our people and value for our customers. With our strategic partner Accenture, we work alongside our Vodafone customers, other Telco and tech companies to drive transformation, meet the challenges of our industry and ensure we stay relevant and resilient. This partnership is a unique, industry-first model which brings together the best of in-house and 3rd party capability. We deliver value and results at scale by leveraging technology, data and our talented international team of 30K professionals in the following services: Technology, Business, B2B, Corporate Services, Customer Care. Our commercial model creates clear, benchmarked and competitively-priced services so that we can offer guaranteed outcomes for customers with flexibility and optionality. Bringing together our combined strengths with our strategic partner Accenture our strategy is to: Commercialise: Create cost transparency and foster trust and growth for our customers Re-platform: To simplify, streamline and scale our business Extend beyond our borders: deepening our relationships, growing our services and expanding our customer base across new customers & new geographies We work with customers across 28 countries from 10 VOIS locations: Albania, Egypt, Hungary, India, Romania, Spain, Turkey, UK, Germany, Ireland, and with a network of teams in Czech Republic, Italy, Greece, and Portugal.


GDIT is a global technology and professional services company that delivers solutions, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solut

Infosys is a global leader in next-generation digital services and consulting. We enable clients in more than 50 countries to navigate their digital transformation. With over three decades of experience in managing the systems and workings of global enterprises, we expertly steer our clients through

Líder em transformação digital nos mercados de Customer Experience e Debt Collection na América Latina. Combinamos tecnologia, inteligência e excelência operacional para entregar soluções completas que antecipam as necessidades dos nossos Clientes. São mais de 530 milhões de interações anuais, met
Dimension Data is a leading African born technology provider operating in the Middle East and Africa, offering a portfolio of services including systems integration, managed services infrastructure, cloud solutions, business applications, customer experience, and intelligent security solutions. We p

In a rapidly changing world, technology is everything. It's in the fabric of society. In every part of every business. At the very heart of human evolution. It’s a great power that comes with great responsibility. At Tietoevry, we believe it’s time to shift perspective. It’s not about what technolo

Launched in 2006, Amazon Web Services (AWS) began exposing key infrastructure services to businesses in the form of web services -- now widely known as cloud computing. The ultimate benefit of cloud computing, and AWS, is the ability to leverage a new business model and turn capital infrastructure e

Navigating Change. Powering Progress. | Reimagining the Future with Birlasoft Birlasoft, a powerhouse where domain expertise, enterprise solutions, and digital technologies converge to redefine business processes. We take pride in our consultative and design thinking approach, driving societal pro
Atos Group is a global leader in digital transformation with c. 67,000 employees and annual revenue of c. €10 billion, operating in 61 countries under two brands — Atos for services and Eviden for products. European number one in cybersecurity, cloud and high performance computing, Atos Group is com

TELUS Digital crafts unique and enduring experiences for customers and employees, and creates future-focused digital transformations that stand the test of time. We are the brand behind the brands. Our global team members are both passionate ambassadors of our clients’ products and services, and vis
.png)
Today's telecom news includes announcements on MWC 2026, GSMA, Eoptolink Technology, Comcast, among others.
The global voice biometrics market size is valued at USD 3.61 billion in 2026 and is projected to reach USD 22.76 billion by 2034,...
Enterprise mobility management provider, vMOX, LLC has officially merged with established global connectivity managed service provider (MSP)...
Ask an Advisor: I'm 58 With $700k...
According to ICT PS John Tanui, the agency will strengthen coordination in responding to cyber threats and complement existing structures...
After continued success, Telkom Business has quickly become known as a trusted ICT integration leader in South Africa.
VOIS Romania, one of the largest IT&C employers locally, has announced the opening of a new office in Iasi.
06 Nov 2025. Kube Networks Limited (“KubeNet”), a leading Glasgow-based ISP and award-winning provider of managed IT & infrastructure services, cloud,...
Generative AI has moved beyond the "model arms race" into practical deployment, and Taiwan Mobile (TWM) is moving quickly to capitalize on...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of VOIS is https://www.vodafone.com/what-we-do/services/vois.
According to Rankiteo, VOIS’s AI-generated cybersecurity score is 787, reflecting their Fair security posture.
According to Rankiteo, VOIS currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, VOIS has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, VOIS is not certified under SOC 2 Type 1.
According to Rankiteo, VOIS does not hold a SOC 2 Type 2 certification.
According to Rankiteo, VOIS is not listed as GDPR compliant.
According to Rankiteo, VOIS does not currently maintain PCI DSS compliance.
According to Rankiteo, VOIS is not compliant with HIPAA regulations.
According to Rankiteo,VOIS is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
VOIS operates primarily in the IT Services and IT Consulting industry.
VOIS employs approximately 20,303 people worldwide.
VOIS presently has no subsidiaries across any sectors.
VOIS’s official LinkedIn profile has approximately 459,249 followers.
VOIS is classified under the NAICS code 5415, which corresponds to Computer Systems Design and Related Services.
No, VOIS does not have a profile on Crunchbase.
Yes, VOIS maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/vois.
As of March 28, 2026, Rankiteo reports that VOIS has experienced 7 cybersecurity incidents.
VOIS has an estimated 39,819 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware, Data Leak, Cyber Attack and Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with local and international cyber security teams, and remediation measures with technical glitch fixed, and communication strategy with notified customers via email to reset their passwords, and communication strategy with informing affected customers and providing guidance, and remediation measures with newly installed or completely newly configured systems for workers, and communication strategy with vodafone's statement about lifting restrictions soon..
Title: Vodafone Portugal Cyberattack
Description: The customer data services of Vodafone Portugal went down recently in several areas as it was targeted in a malicious cyberattack. The 3G network was fixed in the entire county while services like 4G and 5G mobile networks, fixed voice, television, SMS, and voice/digital answering services are still offline. The company is investigating the largest cybersecurity incident with the help of local and international cyber security teams.
Type: Cyberattack
Title: Vodafone Data Breach
Description: Vodafone suffered a data breach when a customer received the personal details of 18 other Vodafone customers due to a technical glitch.
Type: Data Breach
Vulnerability Exploited: Technical Glitch
Title: Vodafone Italia Data Breach Incident
Description: Vodafone Italia suffered a data breach incident after one of its commercial partners, FourB S.p.A., which operates as a reseller of telecommunications services in the country, suffered a cyberattack.
Type: Data Breach
Threat Actor: FourB S.p.A.Even KelvinSecurity
Title: Vodafone Data Breach
Description: An intruder hacked into a Vodafone Group Plc (VOD) server in Germany and gained access to 2 million customers’ personal details and banking information.
Type: Data Breach
Attack Vector: Server Hack
Threat Actor: Unknown
Title: Vodafone Data Breach via Vertriebswerk
Description: Vodafone experienced a data breach after cybercriminals infiltrated a sales partner, Vertriebswerk, and copied sensitive data. The breach involved the leakage of critical customer information, prompting Vodafone to notify affected customers and request password resets.
Type: Data Breach
Attack Vector: Data Breach
Threat Actor: Cybercriminals
Motivation: Unauthorized Access to Sensitive Data
Title: Vodafone Data Breach
Description: Hackers attempted to access consumers' accounts by using the emails and passwords they had taken from an unidentified source. The telecoms provider claims that 1,827 customer accounts were hacked by the crooks, who obtained the last four digits of the consumers' bank accounts, their names, and their mobile phone numbers. Although credit or debit card numbers or other information were not acquired, it is crucial to remember that information that is accessible by thieves may be utilized for fraudulent purposes.
Type: Data Breach
Attack Vector: Stolen Credentials
Threat Actor: Unknown Hackers
Motivation: Data Theft
Title: Ransomware Attack on Materna Affects Vodafone and German Airports
Description: Vodafone's online sales of 'Callya' prepaid cards were impacted by the purported ransomware attack on the IT service company Materna. The Vodafone website stopped selling the SIM cards, just after Materna had given the business permission to launch a 'professionally elaborated cyber attack.' Both businesses emphasise that there hasn't been any determination of a consumer data leak. 'Restrictions on online sales and online registration of Callya products' should be lifted soon, according to Vodafone. Until then, there would be other ways to make the reservation. Many clients' systems were also impacted by the Materna security breach. There were Materna-operated check-in machine outages at several German airports. Workers were 'equipped with newly installed or completely newly configured systems,' which had never been linked to the impacted infrastructure.
Type: Ransomware Attack
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Sales Partner (Vertriebswerk) and Stolen Credentials.

Systems Affected: 4G and 5G mobile networksfixed voicetelevisionSMSvoice/digital answering services

Data Compromised: Personal details including name, address, and phone numbers

Data Compromised: Subscription details, Identity documents with sensitive data, Contact details

Data Compromised: Names, Addresses, Birth dates, Bank account information

Data Compromised: Name, Birthday, Email address, Mobile phone number, Address, Bank information (iban/bic), Customer password

Data Compromised: Names, Mobile phone numbers, Last four digits of bank account numbers
Identity Theft Risk: High
Payment Information Risk: Low

Systems Affected: Vodafone's online sales of 'Callya' prepaid cardsMaterna-operated check-in machines at German airports
Operational Impact: Suspension of online sales and registration of Callya productsCheck-in machine outages at German airports
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Identifiable Information, Subscription Details, Identity Documents With Sensitive Data, Contact Details, , Personal Identifiable Information, Bank Account Information, , Personally Identifiable Information, Bank Information, , Personally Identifiable Information, Bank Account Information and .

Entity Name: Vodafone Portugal
Entity Type: Telecommunications
Industry: Telecommunications
Location: Portugal

Entity Name: Vodafone
Entity Type: Telecommunications Company
Industry: Telecommunications
Customers Affected: 18

Entity Name: Vodafone Italia
Entity Type: Telecommunications
Industry: Telecommunications
Location: Italy

Entity Name: FourB S.p.A.
Entity Type: Reseller
Industry: Telecommunications
Location: Italy

Entity Name: Vodafone Group Plc
Entity Type: Telecommunications Company
Industry: Telecommunications
Location: Germany
Customers Affected: 2 million

Entity Name: Vodafone
Entity Type: Telecommunications Company
Industry: Telecommunications

Entity Name: Vodafone
Entity Type: Telecommunications Provider
Industry: Telecommunications
Customers Affected: 1827

Entity Name: Vodafone
Entity Type: Telecommunications Company
Industry: Telecommunications

Entity Name: Materna
Entity Type: IT Service Company
Industry: Information Technology

Entity Name: German Airports
Entity Type: Airport
Industry: Aviation
Location: Germany

Third Party Assistance: Local And International Cyber Security Teams.

Remediation Measures: Technical glitch fixed

Communication Strategy: Notified customers via email to reset their passwords

Communication Strategy: Informing affected customers and providing guidance

Remediation Measures: Newly installed or completely newly configured systems for workers
Communication Strategy: Vodafone's statement about lifting restrictions soon
Third-Party Assistance: The company involves third-party assistance in incident response through local and international cyber security teams, .

Type of Data Compromised: Personal Identifiable Information
Number of Records Exposed: 18
Sensitivity of Data: Medium
Personally Identifiable Information: Name, Address, Phone Numbers

Type of Data Compromised: Subscription details, Identity documents with sensitive data, Contact details
Number of Records Exposed: 295,000
Sensitivity of Data: High
Data Exfiltration: Yes
Personally Identifiable Information: Yes

Type of Data Compromised: Personal identifiable information, Bank account information
Number of Records Exposed: 2 million
Sensitivity of Data: High
Personally Identifiable Information: namesaddressesbirth dates

Type of Data Compromised: Personally identifiable information, Bank information
Sensitivity of Data: High

Type of Data Compromised: Personally identifiable information, Bank account information
Number of Records Exposed: 1827
Sensitivity of Data: High
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Technical glitch fixed, Newly installed or completely newly configured systems for workers, .

Regulatory Notifications: Reported to the Federal Commissioner for Data Protection and Freedom of Information

Source: Online Email Notification
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Online Email Notification.

Investigation Status: Ongoing

Investigation Status: Ongoing
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notified customers via email to reset their passwords, Informing affected customers and providing guidance and Vodafone'S Statement About Lifting Restrictions Soon.

Customer Advisories: Emails requesting password resets

Customer Advisories: Guidance provided to affected customers
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Emails requesting password resets and Guidance provided to affected customers.

Entry Point: Sales Partner (Vertriebswerk)

Entry Point: Stolen Credentials

Root Causes: Technical Glitch
Corrective Actions: Technical glitch fixed
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Local And International Cyber Security Teams, .
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Technical glitch fixed.
Last Attacking Group: The attacking group in the last incident were an FourB S.p.A.Even KelvinSecurity, Unknown, Cybercriminals and Unknown Hackers.
Most Significant Data Compromised: The most significant data compromised in an incident were Personal details including name, address, and phone numbers, subscription details, identity documents with sensitive data, contact details, , names, addresses, birth dates, bank account information, , Name, Birthday, Email Address, Mobile Phone Number, Address, Bank Information (IBAN/BIC), Customer Password, , Names, Mobile Phone Numbers, Last Four Digits of Bank Account Numbers and .
Most Significant System Affected: The most significant system affected in an incident was 4G and 5G mobile networksfixed voicetelevisionSMSvoice/digital answering services and Vodafone's online sales of 'Callya' prepaid cardsMaterna-operated check-in machines at German airports.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was local and international cyber security teams, .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were identity documents with sensitive data, subscription details, Address, Personal details including name, address, and phone numbers, Birthday, Mobile Phone Number, Email Address, addresses, contact details, birth dates, Name, bank account information, Customer Password, Bank Information (IBAN/BIC), Names, Last Four Digits of Bank Account Numbers, names and Mobile Phone Numbers.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 2.3M.
Most Recent Source: The most recent source of information about an incident is Online Email Notification.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Most Recent Customer Advisory: The most recent customer advisory issued were an Emails requesting password resets and Guidance provided to affected customers.
Most Recent Entry Point: The most recent entry point used by an initial access broker were an Stolen Credentials and Sales Partner (Vertriebswerk).
.png)
A flaw has been found in wandb OpenUI up to 1.0. This affects the function create_share/get_share of the file backend/openui/server.py of the component HTMLAnnotator Component. Executing a manipulation of the argument ID can lead to HTML injection. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was detected in QDOCS Smart School Management System up to 7.2. The impacted element is an unknown function of the file /admin/enquiry of the component Admission Enquiry Module. Performing a manipulation of the argument Note results in cross site scripting. The attack is possible to be carried out remotely.
The Ultimate Member plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.11.2. This is due to the '{usermeta:password_reset_link}' template tag being processed within post content via the '[um_loggedin]' shortcode, which generates a valid password reset token for the currently logged-in user viewing the page. This makes it possible for authenticated attackers, with Contributor-level access and above, to craft a malicious pending post that, when previewed by an Administrator, generates a password reset token for the Administrator and exfiltrates it to an attacker-controlled server, leading to full account takeover.
LibJWT is a C JSON Web Token Library. Starting in version 3.0.0 and prior to version 3.3.0, the JWK parsing for RSA-PSS did not protect against a NULL value when expecting to parse JSON string values. A specially crafted JWK file could exploit this behavior by using integers in places where the code expected a string. This was fixed in v3.3.0. A workaround is available. Users importing keys through a JWK file should not do so from untrusted sources. Use the `jwk2key` tool to check for validity of a JWK file. Likewise, if possible, do not use JWK files with RSA-PSS keys.
Locutus brings stdlibs of other programming languages to JavaScript for educational purposes. Starting in version 2.0.39 and prior to version 3.0.25, a prototype pollution vulnerability exists in the `parse_str` function of the npm package locutus. An attacker can pollute `Object.prototype` by overriding `RegExp.prototype.test` and then passing a crafted query string to `parse_str`, bypassing the prototype pollution guard. This vulnerability stems from an incomplete fix for CVE-2026-25521. The CVE-2026-25521 patch replaced the `String.prototype.includes()`-based guard with a `RegExp.prototype.test()`-based guard. However, `RegExp.prototype.test` is itself a writable prototype method that can be overridden, making the new guard bypassable in the same way as the original — trading one hijackable built-in for another. Version 3.0.25 contains an updated fix.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.