Company Details
acronis
1,685
151,154
5112
acronis.com
0
ACR_1571350
In-progress

Acronis Company CyberSecurity Posture
acronis.comAcronis unifies data protection and cybersecurity, delivering cyber protection that solves safety, accessibility, privacy, authenticity, and security (SAPAS) challenges. Acronis offers antivirus, backup, disaster recovery, endpoint protection management solutions, and award-winning AI-based antimalware and blockchain-based data authentication technologies through service provider and IT professional deployment models. These solutions protect data, applications, and systems in any environment. Founded in Singapore in 2003 and incorporated in Switzerland in 2008, over 5.5 million home users and 500,000 companies, including 100% of the Fortune 1,000, trust Acronis. Acronis products are available through 50,000 partners and service providers in over 150 countries and 40 languages. Community Rules: At Acronis, we value respectful, meaningful conversations. We welcome constructive feedback, questions and commentaries. We expect our community to be respectful of each other and share relevant information. We reserve the right to remove or edit any comments and posts that do not conform to these Community guidelines, including: • Profane, offensive, hateful, harassing, threatening, violent or obscene language • Discussions regarding race, ethnicity, religion, disability, sexual orientation or political beliefs • Personal attacks • Sexually explicit comments or links that contain such material • Spam or advertisements If you have a customer service issue, please visit https://www.acronis.com/support/. We will manage this page according to these guidelines and look forward to hearing from you.
Company Details
acronis
1,685
151,154
5112
acronis.com
0
ACR_1571350
In-progress
Between 700 and 749

Acronis Global Score (TPRM)XXXX

Description: Acronis minimizes the impact of the most recent security breach by saying that only one customer's account was affected. Several certificate files, command logs, system configurations, system information logs, filesystem archives, and python scripts for the company's maria.db database, backup configuration information, screenshots of backup operations, and more are all included in the Acronis breach. Their preliminary research indicates that the login information used by one particular customer to provide diagnostic data to Acronis support has been compromised. The business also stated that it is unaware of any vulnerabilities impacting its systems and that neither its products nor the security breach harmed them.


No incidents recorded for Acronis in 2025.
No incidents recorded for Acronis in 2025.
No incidents recorded for Acronis in 2025.
Acronis cyber incidents detection timeline including parent company and subsidiaries

Acronis unifies data protection and cybersecurity, delivering cyber protection that solves safety, accessibility, privacy, authenticity, and security (SAPAS) challenges. Acronis offers antivirus, backup, disaster recovery, endpoint protection management solutions, and award-winning AI-based antimalware and blockchain-based data authentication technologies through service provider and IT professional deployment models. These solutions protect data, applications, and systems in any environment. Founded in Singapore in 2003 and incorporated in Switzerland in 2008, over 5.5 million home users and 500,000 companies, including 100% of the Fortune 1,000, trust Acronis. Acronis products are available through 50,000 partners and service providers in over 150 countries and 40 languages. Community Rules: At Acronis, we value respectful, meaningful conversations. We welcome constructive feedback, questions and commentaries. We expect our community to be respectful of each other and share relevant information. We reserve the right to remove or edit any comments and posts that do not conform to these Community guidelines, including: • Profane, offensive, hateful, harassing, threatening, violent or obscene language • Discussions regarding race, ethnicity, religion, disability, sexual orientation or political beliefs • Personal attacks • Sexually explicit comments or links that contain such material • Spam or advertisements If you have a customer service issue, please visit https://www.acronis.com/support/. We will manage this page according to these guidelines and look forward to hearing from you.


Wolt is a Helsinki-based technology company with a mission to bring joy, simplicity and earnings to the neighborhoods of the world. Wolt develops a local commerce platform that connects people looking to order food, groceries, and other goods with people interested in selling and delivering them. Wo

Xiaomi Corporation was founded in April 2010 and listed on the Main Board of the Hong Kong Stock Exchange on July 9, 2018 (1810.HK). Xiaomi is a consumer electronics and smart manufacturing company with smartphones and smart hardware connected by an IoT platform at its core. Embracing our vision

Zoho offers beautifully smart software to help you grow your business. With over 100 million users worldwide, Zoho's 55+ products aid your sales and marketing, support and collaboration, finance, and recruitment needs—letting you focus only on your business. Zoho respects user privacy and does not h
Daraz is the leading e-commerce marketplace across South Asia (excluding India). Our business covers four key areas – e-commerce, logistics, payment infrastructure and financial services – providing our sellers and customers with an end-to-end commerce solution. With access to over 500 million custo
Starting our journey in 2011, today, bigbasket - a Tata Enterprise is India’s largest online supermarket with over 13 million customers and a presence in 60+ cities & towns. With our presence spanning the entire spectrum of consumer needs, we operate through a range of business lines - bigbasket, bb
Baidu is a leading AI company with strong Internet foundation, driven by our mission to “make the complicated world simpler through technology”. Founded in 2000 as a search engine platform, we were an early adopter of artificial intelligence in 2010. Since then, we have established a full AI stack,

Adobe is the global leader in digital media and digital marketing solutions. Our creative, marketing and document solutions empower everyone – from emerging artists to global brands – to bring digital creations to life and deliver immersive, compelling experiences to the right person at the right mo

About KPIT KPIT is reimagining the future of mobility, forging ahead with group companies and partners to shape a world that is cleaner, smarter, and safer. With over 25 years of specialized expertise in Mobility, KPIT is accelerating the transformation towards Software and AI-Defined Vehicles thr

The Facebook company is now Meta. Meta builds technologies that help people connect, find communities, and grow businesses. When Facebook launched in 2004, it changed the way people connect. Apps like Messenger, Instagram and WhatsApp further empowered billions around the world. Now, Meta is moving
.png)
Acronis Security Awareness Training (SAT), powered by Wizer, helps Novbox clients prevent AI-enabled and phishing threats.
Gerald Beuchelt is the Chief Information Security Officer (CISO) at Acronis, bringing decades of experience in information security,...
By uniting SIEM, AI-driven MDR, and Business Continuity Disaster Recover (BCDR) ConnectWise cuts complexity, accelerates response,...
Acronis MSP Connect 2025 sets sights on compliance-as-a-service aboard Sydney cruise.The post Acronis Targets Compliance Integration...
Built on Acronis' proven cyber protection expertise, Acronis Cyber Protect Local keeps the data securely within the customer's perimeter,...
Qilin ransomware abuses Windows Subsystem for Linux to deploy Linux encryptors on Windows, Atroposia malware includes built-in vulnerability...
Acronis launches Cyber Protect Local, an on-premises platform combining backup, recovery, and cybersecurity to ensure data sovereignty and...
Cybersecurity and data protection company Acronis International GmbH today announced the launch of Acronis Cyber Protect Local,...
All-in-one cyber protection empowers organizations with proven backup, security, and support for legacy-to-modern...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Acronis is https://www.acronis.com.
According to Rankiteo, Acronis’s AI-generated cybersecurity score is 733, reflecting their Moderate security posture.
According to Rankiteo, Acronis currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Acronis is not certified under SOC 2 Type 1.
According to Rankiteo, Acronis does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Acronis is not listed as GDPR compliant.
According to Rankiteo, Acronis does not currently maintain PCI DSS compliance.
According to Rankiteo, Acronis is not compliant with HIPAA regulations.
According to Rankiteo,Acronis is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Acronis operates primarily in the Software Development industry.
Acronis employs approximately 1,685 people worldwide.
Acronis presently has no subsidiaries across any sectors.
Acronis’s official LinkedIn profile has approximately 151,154 followers.
Acronis is classified under the NAICS code 5112, which corresponds to Software Publishers.
No, Acronis does not have a profile on Crunchbase.
Yes, Acronis maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/acronis.
As of November 29, 2025, Rankiteo reports that Acronis has experienced 1 cybersecurity incidents.
Acronis has an estimated 26,758 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Title: Acronis Security Breach
Description: Acronis faced a security breach where one customer's account was compromised. Various sensitive files, logs, and backup information were exposed. The company has stated that no vulnerabilities were found in its systems and that neither its products nor the security breach harmed them.
Type: Data Breach
Attack Vector: Compromised Credentials
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Compromised Login Credentials.

Data Compromised: Certificate files, Command logs, System configurations, System information logs, Filesystem archives, Python scripts for maria.db database, Backup configuration information, Screenshots of backup operations
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Certificate Files, Command Logs, System Configurations, System Information Logs, Filesystem Archives, Python Scripts For Maria.Db Database, Backup Configuration Information, Screenshots Of Backup Operations and .

Entity Name: Acronis
Entity Type: Company
Industry: Technology
Customers Affected: One customer

Type of Data Compromised: Certificate files, Command logs, System configurations, System information logs, Filesystem archives, Python scripts for maria.db database, Backup configuration information, Screenshots of backup operations
File Types Exposed: Certificate filesCommand logsSystem configurationsSystem information logsFilesystem archivesPython scriptsBackup configuration informationScreenshots

Entry Point: Compromised Login Credentials
Most Significant Data Compromised: The most significant data compromised in an incident were Certificate files, Command logs, System configurations, System information logs, Filesystem archives, Python scripts for maria.db database, Backup configuration information, Screenshots of backup operations and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Filesystem archives, System configurations, Python scripts for maria.db database, Command logs, System information logs, Screenshots of backup operations, Certificate files and Backup configuration information.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Compromised Login Credentials.
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.