Company Details
ascom
1,549
37,287
5415
ascom.com
0
ASC_2158096
In-progress

Ascom Company CyberSecurity Posture
ascom.comOur vision is a world where the right information moves people forward. Our mission is to put the right information in the right hands at the right time so that people can make the best possible decisions. We are a global provider of communication and collaboration solutions for the acute care, long-term care and enterprise sectors. Our solutions are based on intelligent integrations with software and hardware that are open source and compatible with third party solutions. Every single second, our systems generate large amounts of data, which we then turn into useful and actionable information. This helps us to bring data to life for people in the toughest operational environments, ensuring smooth, complete, and efficient workflows. Ascom is headquartered in Baar (Switzerland), has operating businesses in 19 countries and employs around 1,400 people worldwide. Ascom registered shares (ASCN) are listed on the SIX Swiss Exchange in Zurich.
Company Details
ascom
1,549
37,287
5415
ascom.com
0
ASC_2158096
In-progress
Between 650 and 699

Ascom Global Score (TPRM)XXXX

Description: Ascom, a telecommunications solutions provider, experienced a cyberattack compromising its technical ticketing system. Hackers, identified as the HellCat group, breached Jira servers to steal around 44GB of data, potentially impacting all of Ascom’s divisions. Stolen data includes source code, project details, invoices, confidential documents, and ticketing system issues. Despite the breach, Ascom reported no impact on business operations and advised no preventive action for customers and partners. Ongoing investigations are being carried out with relevant authorities.


Ascom has 36.99% more incidents than the average of same-industry companies with at least one recorded incident.
Ascom has 28.21% more incidents than the average of all companies with at least one recorded incident.
Ascom reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.
Ascom cyber incidents detection timeline including parent company and subsidiaries

Our vision is a world where the right information moves people forward. Our mission is to put the right information in the right hands at the right time so that people can make the best possible decisions. We are a global provider of communication and collaboration solutions for the acute care, long-term care and enterprise sectors. Our solutions are based on intelligent integrations with software and hardware that are open source and compatible with third party solutions. Every single second, our systems generate large amounts of data, which we then turn into useful and actionable information. This helps us to bring data to life for people in the toughest operational environments, ensuring smooth, complete, and efficient workflows. Ascom is headquartered in Baar (Switzerland), has operating businesses in 19 countries and employs around 1,400 people worldwide. Ascom registered shares (ASCN) are listed on the SIX Swiss Exchange in Zurich.

As No. 1, we inspire people in the connected world. With the latest technologies and innovations, together we have the opportunity to shape the future. To do this, we are and act trustworthy, committed and curious. Are you with us? Join us on this exciting journey and work with us or in one of the
TransUnion is a global information and insights company that makes trust possible in the modern economy. We do this by providing an actionable picture of each person so they can be reliably represented in the marketplace. As a result, businesses and consumers can transact with confidence and achiev
Coforge is a global digital services and solutions provider, that leverages emerging technologies and deep domain expertise to deliver real-world business impact for its clients. A focus on select industries, a deep domain understanding of the underlying processes of those industries and partners

TIVIT is a Brazil-based multinational company that offers enterprise-level digital solutions, and operates in ten countries in Latin America. We help our clients develop their businesses by offering industry-leading digital solutions divided into four main categories: Digital Business, Cloud Solutio
NEC Corporation has established itself as a leader in the integration of IT and network technologies while promoting the brand statement of “Orchestrating a brighter world.” NEC enables businesses and communities to adapt to rapid changes taking place in both society and the market as it provides fo
Bring teams together, reimagine workspaces, engage new audiences, and delight your customers –– all on the Zoom platform you know and love. 💙 Zoomies help people stay connected so they can get more done together. We set out on a mission to make video communications frictionless and secure by buildi

Tech Mahindra offers technology consulting and digital solutions to global enterprises across industries, enabling transformative scale at unparalleled speed. With 150,000+ professionals across 90+ countries helping 1100+ clients, TechM provides a full spectrum of services including consulting, info

SoftwareOne is a leading global software and cloud solutions provider that is redefining how companies build, buy and manage everything in the cloud. By helping clients to migrate and modernize their workloads and applications – and in parallel, to navigate and optimize the resulting software and cl

Bring teams together, reimagine workspaces, engage new audiences, and delight your customers –– all on the Zoom AI-first work platform you know and love. 💙 Zoomies help people stay connected so they can get more done together. We set out on a mission to make video communications frictionless and se
.png)
While the world's leading businesses are scrambling to upgrade their cyber security plan, few feel confident that they can see off an...
With a spree of cyber-attacks wrong-footing large companies around the world, firms need to take stock of their cyber-defences.
Key members of Hellcat ransomware group identified, controversy around CrushFTP flaw CVE, NYU website hacked and defaced.
For the latest discoveries in cyber research for the week of 24th March, please download our Threat Intelligence Bulletin.
Swiss telecommunications solutions provider Ascom has fallen victim to a cyberattack by the notorious Hellcat ransomware group.
Ascom has confirmed a cyberattack on its IT infrastructure as a hacker group known as Hellcat targets Jira servers worldwide using compromised credentials.
Discover how National Service Cybercrime Operators SC Luke Parkin and SC Tan De Xun are tackling scams and cybercrime in Singapore.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Ascom is https://www.ascom.com.
According to Rankiteo, Ascom’s AI-generated cybersecurity score is 695, reflecting their Weak security posture.
According to Rankiteo, Ascom currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Ascom is not certified under SOC 2 Type 1.
According to Rankiteo, Ascom does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Ascom is not listed as GDPR compliant.
According to Rankiteo, Ascom does not currently maintain PCI DSS compliance.
According to Rankiteo, Ascom is not compliant with HIPAA regulations.
According to Rankiteo,Ascom is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Ascom operates primarily in the IT Services and IT Consulting industry.
Ascom employs approximately 1,549 people worldwide.
Ascom presently has no subsidiaries across any sectors.
Ascom’s official LinkedIn profile has approximately 37,287 followers.
Ascom is classified under the NAICS code 5415, which corresponds to Computer Systems Design and Related Services.
No, Ascom does not have a profile on Crunchbase.
Yes, Ascom maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/ascom.
As of December 14, 2025, Rankiteo reports that Ascom has experienced 1 cybersecurity incidents.
Ascom has an estimated 37,728 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Title: Ascom Cyberattack
Description: Ascom, a telecommunications solutions provider, experienced a cyberattack compromising its technical ticketing system. Hackers, identified as the HellCat group, breached Jira servers to steal around 44GB of data, potentially impacting all of Ascom’s divisions. Stolen data includes source code, project details, invoices, confidential documents, and ticketing system issues. Despite the breach, Ascom reported no impact on business operations and advised no preventive action for customers and partners. Ongoing investigations are being carried out with relevant authorities.
Type: Data Breach
Attack Vector: Server Breach
Threat Actor: HellCat group
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Jira servers.

Data Compromised: Source code, Project details, Invoices, Confidential documents, Ticketing system issues
Systems Affected: Jira servers
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Source Code, Project Details, Invoices, Confidential Documents, Ticketing System Issues and .

Entity Name: Ascom
Entity Type: Telecommunications solutions provider
Industry: Telecommunications


Type of Data Compromised: Source code, Project details, Invoices, Confidential documents, Ticketing system issues

Investigation Status: ongoing

Entry Point: Jira servers
Last Attacking Group: The attacking group in the last incident was an HellCat group.
Most Significant Data Compromised: The most significant data compromised in an incident were source code, project details, invoices, confidential documents, ticketing system issues and .
Most Significant System Affected: The most significant system affected in an incident was Jira servers.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were ticketing system issues, confidential documents, project details, invoices and source code.
Current Status of Most Recent Investigation: The current status of the most recent investigation is ongoing.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Jira servers.
.png)
A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.
A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.