Company Details
aec
33,624
160,286
5415
aec.com.br
0
AEC_7609331
In-progress

AeC Company CyberSecurity Posture
aec.com.brA AeC é apontada consistentemente como a líder brasileira na entrega de soluções de experiência do cliente e gestão de processos terceirizados. Servindo as principais marcas do mercado nacional, conquistou nos três últimos anos a posição de Empresa do Ano de BPO pela conceituada Frost and Sullivan. Líder também nas práticas de ESG, recebe há oito anos consecutivos o título de Melhor Empresa de Serviços pelo Prêmio Época Negócios 360°. Com um olhar inovador, o seu diferencial está no modo como integra o cuidado com as pessoas e aplica tecnologia de ponta em seus processos, como inteligência artificial, robotic process automation, serviços em nuvem e ferramentas de analytics e segurança. Atualmente, a AeC conta com mais de 52 mil colaboradores em 20 unidades distribuídas por sete estados do país. É certificada pelo instituto Great Place to Work como uma das melhores empresas para se trabalhar. Com uma combinação única de Tecnologia e Calor Humano, a mais de 30 anos de história conquistando, apenas no último ano, 27 importantes prêmios e reconhecimentos do mercado. Venha evoluir conosco! Entre em contato com a gente através do e-mail: [email protected]
Company Details
aec
33,624
160,286
5415
aec.com.br
0
AEC_7609331
In-progress
Between 750 and 799

AeC Global Score (TPRM)XXXX



No incidents recorded for AeC in 2025.
No incidents recorded for AeC in 2025.
No incidents recorded for AeC in 2025.
AeC cyber incidents detection timeline including parent company and subsidiaries

A AeC é apontada consistentemente como a líder brasileira na entrega de soluções de experiência do cliente e gestão de processos terceirizados. Servindo as principais marcas do mercado nacional, conquistou nos três últimos anos a posição de Empresa do Ano de BPO pela conceituada Frost and Sullivan. Líder também nas práticas de ESG, recebe há oito anos consecutivos o título de Melhor Empresa de Serviços pelo Prêmio Época Negócios 360°. Com um olhar inovador, o seu diferencial está no modo como integra o cuidado com as pessoas e aplica tecnologia de ponta em seus processos, como inteligência artificial, robotic process automation, serviços em nuvem e ferramentas de analytics e segurança. Atualmente, a AeC conta com mais de 52 mil colaboradores em 20 unidades distribuídas por sete estados do país. É certificada pelo instituto Great Place to Work como uma das melhores empresas para se trabalhar. Com uma combinação única de Tecnologia e Calor Humano, a mais de 30 anos de história conquistando, apenas no último ano, 27 importantes prêmios e reconhecimentos do mercado. Venha evoluir conosco! Entre em contato com a gente através do e-mail: [email protected]


DXC Technology (NYSE: DXC) helps global companies run their mission-critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability across public, private and hybrid clouds. The world's largest companies and public sector organizations trust
We automate, digitize and transform the way people bank and shop. We offer proven expertise and comprehensive portfolios in cutting-edge product technology, multi-vendor software and service excellence for financial and retail customers. Consumer behavior is changing rapidly; people are empowered a

Launched in 2006, Amazon Web Services (AWS) began exposing key infrastructure services to businesses in the form of web services -- now widely known as cloud computing. The ultimate benefit of cloud computing, and AWS, is the ability to leverage a new business model and turn capital infrastructure e
Coforge is a global digital services and solutions provider, that leverages emerging technologies and deep domain expertise to deliver real-world business impact for its clients. A focus on select industries, a deep domain understanding of the underlying processes of those industries and partners

Capgemini is a global business and technology transformation partner, helping organizations to accelerate their dual transition to a digital and sustainable world, while creating tangible impact for enterprises and society. It is a responsible and diverse group of 340,000 team members in more than 5

iSoftStone is a global IT service and consulting company‚ÄØthat creates value and drives success through technology solutions, service excellence, and digital innovation. We specialize in web and application development, software testing and support, data and content management, digital experience,

Avanade is the world’s leading expert on Microsoft. Trusted by over 7,000 clients worldwide, we deliver AI-driven solutions that unlock the full potential of people and technology, optimize operations, foster innovation and drive growth. As Microsoft’s Global SI Partner we combine global scale with

Infinite is a global leader in technology modernization, next-gen IT services and solutions, and digital engineering, with over two decades of experience helping clients turn digital transformation into business value. Leveraging an AI-first approach, we combine leading technologies, innovative plat
As a global leader in information and analytics, Elsevier helps researchers and healthcare professionals advance science and improve health outcomes for the benefit of society. We do this by facilitating insights and critical decision-making for customers across the global research and health ecosys
.png)
A roundup of the latest executive hires from CISO appointments to cyber insurance, GRC, and resilience leadership roles.
Kaspersky, a global cybersecurity and digital privacy company, has appointed Simon Tung as its new general manager for Association of...
Kaspersky has appointed Simon Tung as its new General Manager for ASEAN and AEC (Asia Emerging Countries). In his new role, Tung will helm...
Kaspersky has appointed Simon Tung as its new General Manager for ASEAN and Asia Emerging Countries (AEC), effective October 21, to lead its...
Cybersecurity governance empowers AEC firms against evolving threats.
Saudi Arabian Military Industries (SAMI) subsidiary Advanced Electronics Company (AEC) is in talks with Thales Group to establish a joint...
Purity for Information Technology Co. signed on June 30 a contract with SAMI Advanced Electronics (SAMI-AEC) for SAR 12.63 million excluding...
As Malaysia hosts the 46th Asean Summit, a significant milestone has been announced: the Asean Economic Community (AEC) Blueprint 2025 has...
The electoral commission has started distributing preferences in the Melbourne seat of Calwell, describing it as the "most complex" vote...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of AeC is http://www.aec.com.br.
According to Rankiteo, AeC’s AI-generated cybersecurity score is 782, reflecting their Fair security posture.
According to Rankiteo, AeC currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, AeC is not certified under SOC 2 Type 1.
According to Rankiteo, AeC does not hold a SOC 2 Type 2 certification.
According to Rankiteo, AeC is not listed as GDPR compliant.
According to Rankiteo, AeC does not currently maintain PCI DSS compliance.
According to Rankiteo, AeC is not compliant with HIPAA regulations.
According to Rankiteo,AeC is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
AeC operates primarily in the IT Services and IT Consulting industry.
AeC employs approximately 33,624 people worldwide.
AeC presently has no subsidiaries across any sectors.
AeC’s official LinkedIn profile has approximately 160,286 followers.
AeC is classified under the NAICS code 5415, which corresponds to Computer Systems Design and Related Services.
No, AeC does not have a profile on Crunchbase.
Yes, AeC maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/aec.
As of November 27, 2025, Rankiteo reports that AeC has not experienced any cybersecurity incidents.
AeC has an estimated 36,296 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, AeC has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.