Company Details
alecholdings
10,308
710,905
23
alec.ae
0
ALE_2696417
In-progress


ALEC Holdings Company CyberSecurity Posture
alec.aeALEC Holdings, part of the Investment Corporate of Dubai (ICD), is a leading construction and related businesses group operating in the UAE and KSA. The company builds and provides construction solutions that set industry benchmarks for quality, safety, functionality, and aesthetics. ALEC Holdings offers its clients complete turnkey solutions in construction, MEP, fit-out, marine, oil & gas, modular construction, energy efficiency and solar projects, heavy equipment rental, technology systems, data centers and asset maintenance. With these capabilities, the company successfully serves a diverse range of sectors including airports, retail, hotels & resorts, high-rise buildings, and themed projects.
Company Details
alecholdings
10,308
710,905
23
alec.ae
0
ALE_2696417
In-progress
Between 750 and 799

ALEC Holdings Global Score (TPRM)XXXX



No incidents recorded for ALEC Holdings in 2026.
No incidents recorded for ALEC Holdings in 2026.
No incidents recorded for ALEC Holdings in 2026.
ALEC Holdings cyber incidents detection timeline including parent company and subsidiaries

ALEC Holdings, part of the Investment Corporate of Dubai (ICD), is a leading construction and related businesses group operating in the UAE and KSA. The company builds and provides construction solutions that set industry benchmarks for quality, safety, functionality, and aesthetics. ALEC Holdings offers its clients complete turnkey solutions in construction, MEP, fit-out, marine, oil & gas, modular construction, energy efficiency and solar projects, heavy equipment rental, technology systems, data centers and asset maintenance. With these capabilities, the company successfully serves a diverse range of sectors including airports, retail, hotels & resorts, high-rise buildings, and themed projects.


With 32,500 employees working in 60 countries, Bouygues Construction designs, builds and rehabilitates the infrastructures and buildings that are essential for a sustainable society. All over the world, the teams support the development of low-carbon energy production and public transport infrastruc

🏗️ Building a sustainable tomorrow at BAM! As leaders in the construction industry, we are committed to pioneering sustainable practices that not only enhance our projects but also contribute to a better future for generations to come. Our strategy revolves around focusing to protect profitabilit

Holcim is the leading partner for sustainable construction, creating value across the built environment from infrastructure and industry to buildings. We offer high-value end-to-end Building Materials and Building Solutions - from foundations and flooring to roofing and walling - powered by premium
Fluor Corporation is a global engineering, procurement and construction company. We work with leaders in the energy, infrastructure, life sciences, advanced technologies, mining and metals industries, as well as government agencies, to build a better world. Since our founding in 1912, we have been

At Burns & McDonnell, our engineers, construction professionals, architects, planners, technologists and scientists do more than plan, design and construct. With a mission unchanged since 1898 — make our clients successful — we partner with you on the toughest challenges, constantly working to make
America's Builder is a lofty title, but it's a goal we work toward every day. D.R. Horton started in 1978 in Fort Worth, Texas, and has grown into a national Fortune 500 company. Since 2002, D.R. Horton has been the number one homebuilder in America. We build across the country, bringing our home
Our purpose is to sustainably deliver infrastructure which is vital to the UK. As a leading provider of infrastructure services, construction and property developments, we are committed to delivering for communities and leaving lasting legacies through our work. We are committed to attracting, reta

NCC is one of the leading construction companies in the Nordics. Based on its expertise in managing complex construction processes, NCC contributes to a positive impact of construction for its customers and society. NCC is one of the largest players in the Nordic construction market, and operates

Premier groupe français et acteur mondial de premier plan de la construction, VINCI Construction réunit plus de 830 entreprises et près de 69000 collaborateurs dans une centaine de pays. Ses expertises s’étendent à l’ensemble des métiers du bâtiment, du génie civil, et des activités spécialisées ass
.png)
Dubai contractor Alec Holdings says its IPO was oversubscribed 21 times across all tranches, with demand reaching $8.1 billion.
Dubai contractor Alec Holdings has set the price range for its initial public offering (IPO), raising between AED1.35 billion and AED1.40...
Dubai contractor Alec Holdings will sell 20 percent of its shares on the Dubai Financial Market (DFM), with subscriptions starting next...
Construction company Alec Holdings has said data centres in the UAE and Saudi Arabia are one of its most important future growth sectors.
Dubai is hoping to raise up to $500 million from the initial public offering of Alec Engineering and Contracting, according to media reports.
Khazna Data Centres' Bart Holsters talks about the data centre market, Khazna's operations and plans, and sustainably operating data...
Chastened by the conservative movement's startling success at using national money to dominate state legislatures, liberal activists this...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of ALEC Holdings is http://www.alec.ae.
According to Rankiteo, ALEC Holdings’s AI-generated cybersecurity score is 787, reflecting their Fair security posture.
According to Rankiteo, ALEC Holdings currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, ALEC Holdings has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, ALEC Holdings is not certified under SOC 2 Type 1.
According to Rankiteo, ALEC Holdings does not hold a SOC 2 Type 2 certification.
According to Rankiteo, ALEC Holdings is not listed as GDPR compliant.
According to Rankiteo, ALEC Holdings does not currently maintain PCI DSS compliance.
According to Rankiteo, ALEC Holdings is not compliant with HIPAA regulations.
According to Rankiteo,ALEC Holdings is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
ALEC Holdings operates primarily in the Construction industry.
ALEC Holdings employs approximately 10,308 people worldwide.
ALEC Holdings presently has no subsidiaries across any sectors.
ALEC Holdings’s official LinkedIn profile has approximately 710,905 followers.
ALEC Holdings is classified under the NAICS code 23, which corresponds to Construction.
No, ALEC Holdings does not have a profile on Crunchbase.
Yes, ALEC Holdings maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/alecholdings.
As of January 21, 2026, Rankiteo reports that ALEC Holdings has not experienced any cybersecurity incidents.
ALEC Holdings has an estimated 39,305 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, ALEC Holdings has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g., execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.