
WeWork India Company Cyber Security Posture
wework.co.inWeWork provides you with the space, community, and services you need to make a life, not just a living. We transform buildings into beautiful, collaborative workspaces and provide infrastructure, services, events and tech so our members can focus on doing what they love.
WeWork India Company Details
wework-india
595 employees
111954.0
none
Real Estate
wework.co.in
Scan still pending
WEW_3099753
In-progress

Between 200 and 800
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

WeWork India Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 200 and 800 |
WeWork India Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
WeWork India | Breach | 80 | 4 | 07/2022 | WEW21771122 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: WeWork India suffered a data breach after a security lapse that exposed the personal information and selfies of tens of thousands of people who visited WeWork Indiaโs coworking spaces. A bug made it possible to access the check-in record of any visitor by increasing or decreasing the userโs sequential user ID by a single digit. The incident exposed on the internet thousands of records, exposing names, phone numbers, email addresses and selfies. However, WeWork India soon fixed the bug and secured its data. |
WeWork India Company Subsidiaries

WeWork provides you with the space, community, and services you need to make a life, not just a living. We transform buildings into beautiful, collaborative workspaces and provide infrastructure, services, events and tech so our members can focus on doing what they love.
Access Data Using Our API

Get company history
.png)
WeWork India Cyber Security News
WeWork India IPO Back On Track
As per the latest update on SEBI website, the regulator is currently processing or re-evaluating the coworking major's DRHP.
WeWork's India franchisee files for Mumbai IPO
The Indian franchisee of US shared office space manager WeWork has filed for an initial public offering in Mumbai, draft papers filed by the company showed.
Mercedes or Landrover showroom Ka attitude: Startup founder slams WeWorkโs sales rep, CEO apologises
WeWork's co-working space in Gurgaon is facing criticism after a potential customer complained about the attitude of the company's salesย ...
Remote Work in Tech: Trends and Challenges in India
India has long been a powerhouse for IT and software development. The ability to work remotely has opened new doors for Indian professionalsโย ...
WeWork India exposed visitorsโ personal information and selfies
A bug in the app meant it was possible to access the check-in record of any visitor by increasing or decreasing the user's sequential user ID byย ...
WeWork Exposes Customer Contracts and Personal Data in Another Security Mishap
Rough year for WeWork as cybersecurity researcher discovers an exposed database containing customer contracts and financial data by way of aย ...
WeWork India opens new 61,000-sq ft office space in Bengaluru
OpenAI Chief Executive Officer Sam Altman has issued a cautionary statement on the unreliability of AI tools like ChatGP... By Elets News Network 01-07-ย ...
Cybersecurity startup Averlon launches from stealth with plans to grow Eastside presence
Averlon, founded in 2022, helps cybersecurity teams identify which alerts are the most important to address when stopping attackers.
Ghaziabad Namo Bharat Station to get tech-enabled co-working spaces
Co-working spaces are a comparatively affordable alternative to traditional offices. These are workspaces where professionals from any sector orย ...

WeWork India Similar Companies

Palm Beach County Board of County Commissioners
FirstService Residential is North Americaโs leading residential community manager. We are the preferred partner of all kinds of HOAs, community associations and strata corporations in the U.S. and Canada. Our managed communities include: Low-, mid- and high-rise condominiums and cooperatives Single

Empire Company Limited
Empire Company Limited (TSX: EMP.A) is a Canadian company headquartered in Stellarton, Nova Scotia. Empireโs key businesses are food retailing, through wholly-owned subsidiary Sobeys Inc., and related real estate. With approximately $30.5 billion in annual sales and $16.5 billion in assets, Empire C

Tiara Marga Trakindo
Tiara Marga Trakindo was established 16 August, 2000, as the parent company for the Tiara Marga Trakindo (TMT) Group of companies. There currently are 14 companies in the TMT Group separated into three sub-holdings: PT Trakindo Utama (the Caterpillar Equipment dealer for Indonesia); PT ABM Investama

Sue Dericks with Keller Williams Realty Services
Our mission is to improve the quality of life for our clients and those we come in contact with throughout each real estate transaction. We seek to deliver exceptional service so that our customers don't think of us as a one transaction event, but a lifetime partnership for all of their real estate

Shimao Group
Shimao Group has entered the real estate industry since 1989, After more than 30 years of development, the Group has made its layout in more than 100 core development cities across China, involving real estate, commercial, property management, hotel, theme entertainment and culture. Following the n

Keller Williams Realty, Inc.
Austin, Texas-based Keller Williams, the worldโs largest real estate franchise by agent count, has more than 1,100 offices and 176,000 agents. The franchise is also No. 1 in units and sales volume in the United States. Since 1983, the company has cultivated an agent-centric, technology-driven, and

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
WeWork India CyberSecurity History Information
How many cyber incidents has WeWork India faced?
Total Incidents: According to Rankiteo, WeWork India has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at WeWork India?
Incident Types: The types of cybersecurity incidents that have occurred incident Breach.
How does WeWork India detect and respond to cybersecurity incidents?
Detection and Response: The company detects and responds to cybersecurity incidents through remediation measures with Bug Fix.
Incident Details
Can you provide details on each incident?

Incident : Data Breach
Title: WeWork India Data Breach
Description: WeWork India suffered a data breach after a security lapse that exposed the personal information and selfies of tens of thousands of people who visited WeWork Indiaโs coworking spaces. A bug made it possible to access the check-in record of any visitor by increasing or decreasing the userโs sequential user ID by a single digit. The incident exposed on the internet thousands of records, exposing names, phone numbers, email addresses and selfies. However, WeWork India soon fixed the bug and secured its data.
Type: Data Breach
Attack Vector: Software Bug
Vulnerability Exploited: Sequential User ID Bug
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Breach.
Impact of the Incidents
What was the impact of each incident?

Incident : Data Breach WEW21771122
Data Compromised: Names, Phone Numbers, Email Addresses, Selfies
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Phone Numbers, Email Addresses and Selfies.
Which entities were affected by each incident?

Incident : Data Breach WEW21771122
Entity Type: Company
Industry: Coworking Spaces
Location: India
Customers Affected: Tens of thousands
Response to the Incidents
What measures were taken in response to each incident?

Incident : Data Breach WEW21771122
Remediation Measures: Bug Fix
Data Breach Information
What type of data was compromised in each breach?

Incident : Data Breach WEW21771122
Type of Data Compromised: Names, Phone Numbers, Email Addresses, Selfies
Number of Records Exposed: Thousands
Personally Identifiable Information: Names, Phone Numbers, Email Addresses
What measures does the company take to prevent data exfiltration?
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Bug Fix.
Post-Incident Analysis
What were the root causes and corrective actions taken for each incident?
What corrective actions has the company taken based on post-incident analysis?
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Bug Fix.
Additional Questions
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were Names, Phone Numbers, Email Addresses and Selfies.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Names, Phone Numbers, Email Addresses and Selfies.
What was the number of records exposed in the most significant breach?
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 0.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
