Badge
11,371 badges added since 01 January 2025
ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

We make the experience of travel better for everyone, everywhere by inspiring innovation, partnerships and responsibility to people, places and planet. Our technology powers the travel and tourism industry. We inspire more connected ways of thinking, centered around the traveler. Our platform connects the travel and hospitality ecosystem. We are making travel a force for social and environmental good. We are passionate about travel. With a unique perspective, at the heart of our industry, we are redesigning the travel of tomorrow.

Amadeus A.I CyberSecurity Scoring

Amadeus

Company Details

Linkedin ID:

amadeus

Employees number:

23,419

Number of followers:

517,888

NAICS:

5415

Industry Type:

IT Services and IT Consulting

Homepage:

amadeus.com

IP Addresses:

540

Company ID:

AMA_3012346

Scan Status:

Completed

AI scoreAmadeus Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/amadeus.jpeg
Amadeus IT Services and IT Consulting
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreAmadeus Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/amadeus.jpeg
Amadeus IT Services and IT Consulting
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Amadeus Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
AmadeusCyber Attack10069/2025NA
Rankiteo Explanation :
Attack threatening the economy of geographical region

Description: A widespread cyberattack disrupted check-in systems across major European airports, including Brussels, Berlin, and London Heathrow, leading to significant operational chaos. The attack caused mass flight cancellations, prolonged delays, and stranded thousands of passengers over a critical travel period. While the exact method of infiltration remains undisclosed, the incident highlights vulnerabilities in centralized aviation IT infrastructure, particularly in systems managing passenger processing and flight logistics.The financial repercussions include compensation claims from airlines and passengers, reputational damage to both airports and the affected IT provider, and potential regulatory scrutiny over cybersecurity lapses in critical infrastructure. Although no direct data breach (e.g., passenger PII theft) was confirmed in the article, the operational paralysis suggests a targeted disruption aimed at crippling air travel a sector vital to economic stability. The attack’s ripple effects extended beyond immediate logistical failures, eroding public trust in digital aviation systems and prompting calls for stricter cybersecurity protocols in transport hubs.

Amadeus IT Group (or its associated airport check-in systems provider)
Cyber Attack
Severity: 100
Impact: 6
Seen: 9/2025
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack threatening the economy of geographical region

Description: A widespread cyberattack disrupted check-in systems across major European airports, including Brussels, Berlin, and London Heathrow, leading to significant operational chaos. The attack caused mass flight cancellations, prolonged delays, and stranded thousands of passengers over a critical travel period. While the exact method of infiltration remains undisclosed, the incident highlights vulnerabilities in centralized aviation IT infrastructure, particularly in systems managing passenger processing and flight logistics.The financial repercussions include compensation claims from airlines and passengers, reputational damage to both airports and the affected IT provider, and potential regulatory scrutiny over cybersecurity lapses in critical infrastructure. Although no direct data breach (e.g., passenger PII theft) was confirmed in the article, the operational paralysis suggests a targeted disruption aimed at crippling air travel a sector vital to economic stability. The attack’s ripple effects extended beyond immediate logistical failures, eroding public trust in digital aviation systems and prompting calls for stricter cybersecurity protocols in transport hubs.

Ailogo

Amadeus Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Amadeus

Incidents vs IT Services and IT Consulting Industry Average (This Year)

No incidents recorded for Amadeus in 2026.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Amadeus in 2026.

Incident Types Amadeus vs IT Services and IT Consulting Industry Avg (This Year)

No incidents recorded for Amadeus in 2026.

Incident History — Amadeus (X = Date, Y = Severity)

Amadeus cyber incidents detection timeline including parent company and subsidiaries

Amadeus Company Subsidiaries

SubsidiaryImage

We make the experience of travel better for everyone, everywhere by inspiring innovation, partnerships and responsibility to people, places and planet. Our technology powers the travel and tourism industry. We inspire more connected ways of thinking, centered around the traveler. Our platform connects the travel and hospitality ecosystem. We are making travel a force for social and environmental good. We are passionate about travel. With a unique perspective, at the heart of our industry, we are redesigning the travel of tomorrow.

Loading...
similarCompanies

Amadeus Similar Companies

Tietoevry

In a rapidly changing world, technology is everything. It's in the fabric of society. In every part of every business. At the very heart of human evolution. It’s a great power that comes with great responsibility. At Tietoevry, we believe it’s time to shift perspective. It’s not about what technolo

HGS

A global leader in optimizing the customer experience lifecycle, digital transformation, and business process management, HGS is helping its clients become more competitive every day. HGS combines automation, analytics, and artificial intelligence with deep domain expertise focusing on digital custo

UST is a global digital transformation solutions provider. For more than 20 years, UST has worked side by side with the world’s best companies to make a real impact through transformation. Powered by technology, inspired by people and led by purpose, UST partners with their clients from design to

Bring teams together, reimagine workspaces, engage new audiences, and delight your customers –– all on the Zoom AI-first work platform you know and love. 💙 Zoomies help people stay connected so they can get more done together. We set out on a mission to make video communications frictionless and se

ASGN Incorporated

ASGN Incorporated (NYSE: ASGN) is a leading provider of IT services and solutions across the commercial and government sectors. ASGN helps corporate enterprises and government organizations develop, implement and operate critical IT and business solutions through its integrated offerings. For more i

Orange Business

At Orange Business, our ambition is to become the leading european Network and Digital Integrator by leveraging our proven expertise in next-generation connectivity solutions, the cloud and cybersecurity. Our 30,000 women and men are present in 65 countries, where every voice counts. Together, we a

Diebold Nixdorf

Diebold Nixdorf automates, digitizes and transforms the way people bank and shop. Its integrated solutions connect digital and physical channels conveniently, securely and efficiently for millions of consumers every day. As an innovation partner for nearly all of the world's top 100 financial inst

GFT Technologies

GFT Technologies is an AI-centric global digital transformation company. We design advanced data and AI transformation solutions, modernize technology architectures and develop next-generation core systems for industry leaders in Banking, Insurance, Manufacturing and Robotics. Partnering closely wit

Inetum

Inetum is a European leader in digital services. Inetum’s team of 27,000 consultants and specialists strive every day to make a digital impact for businesses, public sector entities and society. Inetum’s solutions aim at contributing to its clients’ performance and innovation as well as the common g

newsone

Amadeus CyberSecurity News

December 22, 2025 08:00 AM
A comprehensive list of 2025 tech layoffs

A complete list of all the known layoffs in tech, from Big Tech to startups, broken down by month throughout 2024 and 2025.

December 02, 2025 08:00 AM
Boston’s DeepTech Pitchfest Arrives at Quantum.Tech World 2026

A major highlight of Quantum.Tech World, taking place 25th - 26th June 2026 at the Encore Boston Harbour, Boston, will be the expanded...

October 10, 2025 07:00 AM
Sitehop raises £7.5m to boost quantum-safe encryption

UK cybersecurity start-up Sitehop, based in Sheffield, has raised £7.5m in a new funding round led by Northern Gritstone.

October 09, 2025 07:00 AM
Sitehop secures £7.5 million Investment led by Northern Gritstone

Startup future-proofing against quantum-powered cyber attacks raises £7.5m, led by Northern Gritstone. Sheffield-based Sitehop successfully...

October 09, 2025 07:00 AM
Sheffield cybersecurity specialist secures further £7.5m funding - round led by Northern Gritstone

A Sheffield-based company developing encryption to future-proof networks against quantum-powered cyber attacks has raised a further £7.5m in...

October 09, 2025 07:00 AM
Quantum-proof cyber startup Sitehop secures £7.5m round

Sitehop, a cyber startup building encryption future-proofed against quantum cyberattacks, has received a £7.5m seed investment.

September 23, 2025 07:00 AM
NIS2 in the Baltics: How Lithuania, Latvia, and Estonia Differ

The European Union's NIS2 Directive is set to reshape cyber security across all member states. The NIS2 Directive has been ...

September 21, 2025 07:00 AM
Cyberattack Disrupts Check-In at Major European Airports

Cyberattack disrupts check-in systems at european airports such as Heathrow, Brussels, and Berlin, exposing cybersecurity vulnerabilities.

July 13, 2025 07:00 AM
Amadeus University Post-UTME Form for 2025/2026 Admission

Amadeus University in Abia State has opened its doors to students seeking undergraduate admission for the 2025/2026 academic year.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Amadeus CyberSecurity History Information

Official Website of Amadeus

The official website of Amadeus is http://amadeus.com.

Amadeus’s AI-Generated Cybersecurity Score

According to Rankiteo, Amadeus’s AI-generated cybersecurity score is 791, reflecting their Fair security posture.

How many security badges does Amadeus’ have ?

According to Rankiteo, Amadeus currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has Amadeus been affected by any supply chain cyber incidents ?

According to Rankiteo, Amadeus has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.

Does Amadeus have SOC 2 Type 1 certification ?

According to Rankiteo, Amadeus is not certified under SOC 2 Type 1.

Does Amadeus have SOC 2 Type 2 certification ?

According to Rankiteo, Amadeus does not hold a SOC 2 Type 2 certification.

Does Amadeus comply with GDPR ?

According to Rankiteo, Amadeus is not listed as GDPR compliant.

Does Amadeus have PCI DSS certification ?

According to Rankiteo, Amadeus does not currently maintain PCI DSS compliance.

Does Amadeus comply with HIPAA ?

According to Rankiteo, Amadeus is not compliant with HIPAA regulations.

Does Amadeus have ISO 27001 certification ?

According to Rankiteo,Amadeus is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Amadeus

Amadeus operates primarily in the IT Services and IT Consulting industry.

Number of Employees at Amadeus

Amadeus employs approximately 23,419 people worldwide.

Subsidiaries Owned by Amadeus

Amadeus presently has no subsidiaries across any sectors.

Amadeus’s LinkedIn Followers

Amadeus’s official LinkedIn profile has approximately 517,888 followers.

NAICS Classification of Amadeus

Amadeus is classified under the NAICS code 5415, which corresponds to Computer Systems Design and Related Services.

Amadeus’s Presence on Crunchbase

No, Amadeus does not have a profile on Crunchbase.

Amadeus’s Presence on LinkedIn

Yes, Amadeus maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/amadeus.

Cybersecurity Incidents Involving Amadeus

As of January 25, 2026, Rankiteo reports that Amadeus has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Amadeus has an estimated 38,514 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Amadeus ?

Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.

Incident Details

Can you provide details on each incident ?

Incident : Cyberattack (likely disruptive, possibly ransomware or DDoS)

Title: Cyberattack on Major European Airports' Check-in Systems

Description: Major European airports including Brussels, Berlin, and London's Heathrow were hit by a cyberattack on check-in systems, causing cancellations and long delays for thousands of passengers.

Type: Cyberattack (likely disruptive, possibly ransomware or DDoS)

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Impact of the Incidents

What was the impact of each incident ?

Incident : Cyberattack (likely disruptive, possibly ransomware or DDoS) AMA5502055092125

Systems Affected: Check-in systems

Downtime: True

Operational Impact: Flight cancellationsLong passenger delays

Customer Complaints: True

Which entities were affected by each incident ?

Incident : Cyberattack (likely disruptive, possibly ransomware or DDoS) AMA5502055092125

Entity Name: Brussels Airport

Entity Type: Airport

Industry: Aviation/Transportation

Location: Brussels, Belgium

Customers Affected: Thousands of passengers

Incident : Cyberattack (likely disruptive, possibly ransomware or DDoS) AMA5502055092125

Entity Name: Berlin Airport

Entity Type: Airport

Industry: Aviation/Transportation

Location: Berlin, Germany

Customers Affected: Thousands of passengers

Incident : Cyberattack (likely disruptive, possibly ransomware or DDoS) AMA5502055092125

Entity Name: Heathrow Airport

Entity Type: Airport

Industry: Aviation/Transportation

Location: London, United Kingdom

Customers Affected: Thousands of passengers

References

Where can I find more information about each incident ?

Incident : Cyberattack (likely disruptive, possibly ransomware or DDoS) AMA5502055092125

Source: Agence France-Presse (AFP)

URL: https://www.afp.com

Incident : Cyberattack (likely disruptive, possibly ransomware or DDoS) AMA5502055092125

Source: Barron's (republished content)

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Agence France-Presse (AFP)Url: https://www.afp.com, and Source: Barron's (republished content).

Additional Questions

Impact of the Incidents

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident was Check-in systems.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident are Agence France-Presse (AFP) and Barron's (republished content).

What is the most recent URL for additional resources on cybersecurity best practices ?

Most Recent URL for Additional Resources: The most recent URL for additional resources on cybersecurity best practices is https://www.afp.com .

cve

Latest Global CVEs (Not Company-Specific)

Description

The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the processBackgroundAction() function in all versions up to, and including, 10.0.04. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify global map engine settings.

Risk Information
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Description

The Save as PDF Plugin by PDFCrowd plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘options’ parameter in all versions up to, and including, 4.5.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. NOTE: Successful exploitation of this vulnerability requires that the PDFCrowd API key is blank (also known as "demo mode", which is the default configuration when the plugin is installed) or known.

Risk Information
cvss3
Base: 6.1
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Description

The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the action_import_module() function in all versions up to, and including, 7.8.9.2. This makes it possible for authenticated attackers, with a lower-privileged role (e.g., Subscriber-level access and above), to upload arbitrary files on the affected site's server which may make remote code execution possible. Successful exploitation requires an admin to grant Hustle module permissions (or module edit access) to the low-privileged user so they can access the Hustle admin page and obtain the required nonce.

Risk Information
cvss3
Base: 7.5
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Description

The WP Directory Kit plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.9 via the wdk_public_action AJAX handler. This makes it possible for unauthenticated attackers to extract email addresses for users with Directory Kit-specific user roles.

Risk Information
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Description

The Meta-box GalleryMeta plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 3.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with editor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

Risk Information
cvss3
Base: 4.4
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=amadeus' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge