Company Details
asahi-kasei
10,499
121,458
325
asahi-kasei.com
0
ASA_7533034
In-progress

Asahi Kasei Company CyberSecurity Posture
asahi-kasei.comThe Asahi Kasei Group contributes to life and living for people around the world. Since its foundation in 1922 with ammonia and cellulose fiber business, Asahi Kasei has consistently grown through the proactive transformation of its business portfolio to meet the evolving needs of every age. With more than 48,000 employees around the world, the company contributes to sustainable society by providing solutions to the world’s challenges through its three business sectors of Material, Homes, and Health Care.
Company Details
asahi-kasei
10,499
121,458
325
asahi-kasei.com
0
ASA_7533034
In-progress
Between 750 and 799

Asahi Kasei Global Score (TPRM)XXXX

Description: On December 18, 2023, the Vermont Office of the Attorney General reported a data breach at ZOLL Medical Corporation due to a phishing attack that potentially affected personal information of individuals, including names, addresses, and Social Security numbers. The incident was discovered on or about November 1, 2023, but the number of individuals affected is not specified.
Description: The California Office of the Attorney General reported on December 18, 2023, that ZOLL Medical Corporation experienced a phishing attack on August 2, 2023, potentially affecting personal information of individuals, including names, addresses, and Social Security numbers. The exact number of individuals affected is unknown, and no misuse of information has been indicated.
Description: The Maine Office of the Attorney General reported that ZOLL Medical Corporation experienced a data breach involving an external system hack, disclosed on March 10, 2023. The breach occurred between January 28, 2023, and January 29, 2023, potentially affecting the personal information of 1,004,443 individuals, including Social Security numbers.
Description: The California Office of the Attorney General reported that ZOLL Services LLC experienced a data security incident potentially exposing personal information from November 8, 2018, to December 28, 2018. The breach involved an external third-party vendor and may have included names, addresses, dates of birth, limited medical information, and Social Security numbers of individuals. Approximately UNKN individuals are impacted.
Description: ZOLL discovered that some emails archived by an unnamed third-party service provider had been exposed during a server migration. At this point, the company is not aware of any fraud or identity theft to any individual as a result of this exposure. The compromised information includes patient names, addresses, dates of birth, and limited medical information. A small percentage of patients also had Social Security numbers exposed. ZOLL offered free credit and identity monitoring services for one year to impacted patients where available.


No incidents recorded for Asahi Kasei in 2025.
No incidents recorded for Asahi Kasei in 2025.
No incidents recorded for Asahi Kasei in 2025.
Asahi Kasei cyber incidents detection timeline including parent company and subsidiaries

The Asahi Kasei Group contributes to life and living for people around the world. Since its foundation in 1922 with ammonia and cellulose fiber business, Asahi Kasei has consistently grown through the proactive transformation of its business portfolio to meet the evolving needs of every age. With more than 48,000 employees around the world, the company contributes to sustainable society by providing solutions to the world’s challenges through its three business sectors of Material, Homes, and Health Care.

We are a global manufacturer of raw materials and a producer of energy used in everyday life. From medicines to mobile phones, agriculture to automotive, our products enhance standards of living for everyone around the world. We understand the challenge the world is facing, and we are working hard
Since 1792, we’ve been supplying the innovative paints and coatings that help to color people’s lives and protect what matters most. Our world class portfolio of brands – including Dulux, International, Sikkens and Interpon – is trusted by customers around the globe. We’re active in more than 150 co

Bayer is a global enterprise with core competencies in the life science fields of healthcare and nutrition. We design our products and services to serve the most essential human needs of health and nutrition. At the same time, we strive to address some of the world’s biggest challenges presented by

Givaudan is a global leader in Fragrance & Beauty and Taste & Wellbeing. We celebrate the beauty of human experience by creating for happier, healthier lives with love for nature. Together with our customers we deliver food experiences, craft inspired fragrances, and develop beauty and wellbeing sol

We are dsm-firmenich – innovators in nutrition, health, and beauty. We bring progress to life by combining the essential, the desirable, and the sustainable. From our master perfumers and flavorists to our expert nutritionists and scientists, our trailblazing teams work closely with customers, sup
Covestro is one of the world’s leading manufacturers of high-quality polymer materials and their components. With its innovative products, processes and methods, the company helps enhance sustainability and the quality of life in many areas. Covestro supplies customers around the world in key indust
Linde is a leading global industrial gases and engineering company with 2023 sales of $33 billion. We live our mission of making our world more productive every day by providing high-quality solutions, technologies and services which are making our customers more successful and helping to sustain, d
Air Liquide is a world leader in gases, technologies and services for industry and healthcare. Present in 72 countries with 67,800 employees, the Group serves more than 4 million customers and patients. Oxygen, nitrogen and hydrogen are essential small molecules for life, matter and energy. They emb

A trusted partner for millions of customers, Ecolab (NYSE:ECL) is a global sustainability leader offering water, hygiene and infection prevention solutions and services that protect people and the resources vital to life. Building on more than a century of innovation, Ecolab has annual sales of $16
.png)
Rockwell Automation, the world's largest company dedicated to industrial automation and digital transformation launch of SecureOT solution.
Asahi is still investigating the full impact of the attack which stalled all its Japanese production.
Ransomware gang Qilin took credit on Tuesday for a data breach at Asahi Group Holdings that forced the company to suspend orders, shipments,...
New facility sets benchmark for energy efficiency, sustainability, and decarbonization in the European chemical industry.
The three companies have advanced discussions on specific measures to promote the carbon neutrality of ethylene manufacturing facilities.
Diversified global manufacturer Asahi Kasei will increase PIMEL photosensitive polyimide (PSPI) production capacity at its Fuji City...
Sunfort dry film photoresist is a mainstay of Asahi Kasei's Electronics business, comprising electronic materials and electronic components.
Asahi Kasei Corporation and Honda Motor have signed a shareholders' agreement to convert an existing Asahi Kasei subsidiary in Canada into a joint venture...
Zoll Medical — an Asahi Kasei company — characterized the incident as a "sophisticated email phishing attack" that targeted a Zoll employee.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Asahi Kasei is https://www.asahi-kasei.com.
According to Rankiteo, Asahi Kasei’s AI-generated cybersecurity score is 783, reflecting their Fair security posture.
According to Rankiteo, Asahi Kasei currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Asahi Kasei is not certified under SOC 2 Type 1.
According to Rankiteo, Asahi Kasei does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Asahi Kasei is not listed as GDPR compliant.
According to Rankiteo, Asahi Kasei does not currently maintain PCI DSS compliance.
According to Rankiteo, Asahi Kasei is not compliant with HIPAA regulations.
According to Rankiteo,Asahi Kasei is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Asahi Kasei operates primarily in the Chemical Manufacturing industry.
Asahi Kasei employs approximately 10,499 people worldwide.
Asahi Kasei presently has no subsidiaries across any sectors.
Asahi Kasei’s official LinkedIn profile has approximately 121,458 followers.
Asahi Kasei is classified under the NAICS code 325, which corresponds to Chemical Manufacturing.
No, Asahi Kasei does not have a profile on Crunchbase.
Yes, Asahi Kasei maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/asahi-kasei.
As of November 27, 2025, Rankiteo reports that Asahi Kasei has experienced 5 cybersecurity incidents.
Asahi Kasei has an estimated 4,121 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach and Data Leak.
Title: ZOLL Data Exposure Incident
Description: ZOLL discovered that some emails archived by an unnamed third-party service provider had been exposed during a server migration.
Type: Data Exposure
Attack Vector: Server Migration
Vulnerability Exploited: Improper Data Handling
Title: Data Breach at ZOLL Medical Corporation
Description: A phishing attack at ZOLL Medical Corporation potentially affected personal information of individuals, including names, addresses, and Social Security numbers.
Date Detected: 2023-11-01
Date Publicly Disclosed: 2023-12-18
Type: Data Breach
Attack Vector: Phishing
Title: ZOLL Medical Corporation Data Breach
Description: The Maine Office of the Attorney General reported that ZOLL Medical Corporation experienced a data breach involving an external system hack, disclosed on March 10, 2023. The breach occurred between January 28, 2023, and January 29, 2023, potentially affecting the personal information of 1,004,443 individuals, including Social Security numbers.
Date Publicly Disclosed: 2023-03-10
Type: Data Breach
Attack Vector: External System Hack
Title: ZOLL Services LLC Data Security Incident
Description: The California Office of the Attorney General reported that ZOLL Services LLC experienced a data security incident potentially exposing personal information from November 8, 2018, to December 28, 2018. The breach involved an external third-party vendor and may have included names, addresses, dates of birth, limited medical information, and Social Security numbers of individuals. Approximately UNKN individuals are impacted.
Date Detected: 2018-11-08
Date Resolved: 2018-12-28
Type: Data Breach
Attack Vector: Third-party vendor
Title: Phishing Attack on ZOLL Medical Corporation
Description: The California Office of the Attorney General reported on December 18, 2023, that ZOLL Medical Corporation experienced a phishing attack on August 2, 2023, potentially affecting personal information of individuals, including names, addresses, and Social Security numbers. The exact number of individuals affected is unknown, and no misuse of information has been indicated.
Date Detected: 2023-08-02
Date Publicly Disclosed: 2023-12-18
Type: Phishing Attack
Attack Vector: Phishing
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Patient names, Addresses, Dates of birth, Limited medical information, Social security numbers

Data Compromised: Names, Addresses, Social security numbers

Data Compromised: Personal information, Social security numbers

Data Compromised: Names, Addresses, Dates of birth, Limited medical information, Social security numbers

Data Compromised: Names, Addresses, Social security numbers
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Patient Names, Addresses, Dates Of Birth, Limited Medical Information, Social Security Numbers, , Names, Addresses, Social Security Numbers, , Personal Information, Social Security Numbers, , Names, Addresses, Dates Of Birth, Limited Medical Information, Social Security Numbers, , Names, Addresses, Social Security Numbers and .

Entity Name: ZOLL Medical Corporation
Entity Type: Company
Industry: Medical

Entity Name: ZOLL Medical Corporation
Entity Type: Corporation
Industry: Medical
Customers Affected: 1004443

Entity Name: ZOLL Services LLC
Entity Type: Company
Industry: Healthcare
Customers Affected: UNKN

Entity Name: ZOLL Medical Corporation
Entity Type: Corporation
Industry: Medical

Type of Data Compromised: Patient names, Addresses, Dates of birth, Limited medical information, Social security numbers
Sensitivity of Data: High
Personally Identifiable Information: patient namesaddressesdates of birthsocial security numbers

Type of Data Compromised: Names, Addresses, Social security numbers

Type of Data Compromised: Personal information, Social security numbers
Number of Records Exposed: 1004443
Sensitivity of Data: High

Type of Data Compromised: Names, Addresses, Dates of birth, Limited medical information, Social security numbers
Number of Records Exposed: UNKN
Sensitivity of Data: High

Type of Data Compromised: Names, Addresses, Social security numbers

Source: Vermont Office of the Attorney General
Date Accessed: 2023-12-18

Source: Maine Office of the Attorney General

Source: California Office of the Attorney General

Source: California Office of the Attorney General
Date Accessed: 2023-12-18
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Vermont Office of the Attorney GeneralDate Accessed: 2023-12-18, and Source: Maine Office of the Attorney General, and Source: California Office of the Attorney General, and Source: California Office of the Attorney GeneralDate Accessed: 2023-12-18.
Most Recent Incident Detected: The most recent incident detected was on 2023-11-01.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2023-12-18.
Most Recent Incident Resolved: The most recent incident resolved was on 2018-12-28.
Most Significant Data Compromised: The most significant data compromised in an incident were patient names, addresses, dates of birth, limited medical information, social security numbers, , names, addresses, Social Security numbers, , Personal Information, Social Security Numbers, , names, addresses, dates of birth, limited medical information, Social Security numbers, , names, addresses, Social Security numbers and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were dates of birth, Social Security Numbers, social security numbers, patient names, Personal Information, names, addresses, limited medical information and Social Security numbers.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 547.0.
Most Recent Source: The most recent source of information about an incident are Maine Office of the Attorney General, Vermont Office of the Attorney General and California Office of the Attorney General.
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.