Company Details
cipla
50,326
2,062,749
3254
cipla.com
0
CIP_8144792
In-progress


Cipla Company CyberSecurity Posture
cipla.comCipla is a leading global pharmaceutical company trusted by healthcare professionals and patients across the world since 1935. A compassionate approach to healthcare that goes beyond the pursuit of profit and growth has been the force impelling Cipla’s history over the years. Our credo and our purpose of ‘Caring for Life' continues to guide our actions towards our people and the planet for creating a sustainable future. Cipla today has presence in 80+ countries, providing over 1,500 products across various therapeutic categories in 50+ dosage forms. Keeping with our legacy of care, we constantly strive to ensure access to high-quality medicines that make a difference in the lives of patients. Our paradigm-changing offer of a triple anti-retroviral (ARV) therapy in HIV/AIDS at less than a dollar a day in Africa in 2001 was pivotal in bringing inclusiveness, accessibility and affordability to the centre of the HIV movement. An unmatched presence across the care continuum (awareness, prevention, diagnosis, treatment and adherence) and the widest range of drug-device combinations has established Cipla’s respiratory leadership in India and other key emerging markets. Armed with this legacy and a deep understanding of the lungs, we have articulated our aspiration to become a global lung leader and help millions breathe free.
Company Details
cipla
50,326
2,062,749
3254
cipla.com
0
CIP_8144792
In-progress
Between 750 and 799

Cipla Global Score (TPRM)XXXX



No incidents recorded for Cipla in 2026.
No incidents recorded for Cipla in 2026.
No incidents recorded for Cipla in 2026.
Cipla cyber incidents detection timeline including parent company and subsidiaries

Cipla is a leading global pharmaceutical company trusted by healthcare professionals and patients across the world since 1935. A compassionate approach to healthcare that goes beyond the pursuit of profit and growth has been the force impelling Cipla’s history over the years. Our credo and our purpose of ‘Caring for Life' continues to guide our actions towards our people and the planet for creating a sustainable future. Cipla today has presence in 80+ countries, providing over 1,500 products across various therapeutic categories in 50+ dosage forms. Keeping with our legacy of care, we constantly strive to ensure access to high-quality medicines that make a difference in the lives of patients. Our paradigm-changing offer of a triple anti-retroviral (ARV) therapy in HIV/AIDS at less than a dollar a day in Africa in 2001 was pivotal in bringing inclusiveness, accessibility and affordability to the centre of the HIV movement. An unmatched presence across the care continuum (awareness, prevention, diagnosis, treatment and adherence) and the widest range of drug-device combinations has established Cipla’s respiratory leadership in India and other key emerging markets. Armed with this legacy and a deep understanding of the lungs, we have articulated our aspiration to become a global lung leader and help millions breathe free.

For almost 50 years, we’ve been creating high-quality medicines and making them accessible to the people who need them. We are a trusted, reliable partner and dependable source of over 800* high-quality generic, specialty and branded pharmaceutical products that hospitals, physicians and pharmacists

A vertically integrated, Global Pharmaceutical Company. Established in 1989, we are engaged in developing, manufacturing, and marketing a wide range of formulations across several major therapeutic areas including anti-infectives, cardiovascular, anti-diabetic, dermatology, and hormone treatment.

Aurobindo Pharma Limited (NSE: AUROPHARMA, BSE: 524804, Reuters: ARBN.NS, Bloomberg: ARBP IN) is an integrated global pharmaceutical company headquartered in Hyderabad, India. The Company develops, manufactures, and markets a wide range of generic pharmaceuticals, branded specialty drugs, and active

A consumer-led global pharmaceutical company, creating healthy doses of life since 1949. When you operate in an industry like pharmaceuticals, your work goes way beyond creating ‘products for customers’. It is different from any other domain – there lies a higher sense of responsibiliti and a need
At Bristol Myers Squibb, we work every day to transform patients’ lives through science. That work inspires some of the most interesting, meaningful, and life-changing careers you’ll experience. Join us and pursue innovative ideas alongside some of the brightest minds in biopharma, collaborating wit

The Zydus Group with an overarching purpose of empowering people with freedom to live healthier and more fulfilled lives, is an innovative, global life-sciences company that discovers, develops, manufactures, and markets a broad range of healthcare therapies. The group employs over 27000 people worl

Teva Pharmaceuticals is a leading innovative biopharmaceutical company, enabled by a world-class generics business. For over 120 years, Teva’s commitment has never wavered. From innovating in the fields of neuroscience and immunology to providing complex generic medicines, biosimilars and pharmacy b

The world’s leading animal health company. We’ve been innovating ways to predict, prevent, detect, and treat animal illness for over 70 years, and we continue to stand by those raising and caring for animals worldwide – from veterinarians and pet owners to livestock farmers. Our leading portfolio an
We strive to transform lives. While the science we advance is constantly evolving, our core purpose is enduring. For more than two centuries, our values have guided us to do what’s right for patients and for society. We know that changing lives requires us to do things differently. We start by list
.png)
TAC InfoSec share price hit a new high of Rs 1112.45, locked in an upper circuit for the 9th straight day, and surged 46 per cent during the...
Cipla, one of India's leading pharmaceutical companies, has reportedly been targeted by the Akira ransomware group in a cyberattack that allegedly resulted in...
Tech Mahindra India's former president Jagdish Mitra has announced his entrepreneurial venture with the launch of Humanize, a Generative AI-powered software-as...
Cipla announced that the United States Food and Drug Administration (USFDA) had conducted an inspection at its wholly-owned subsidiary, InvaGen Pharmaceuticals.
Leqembi scored an FDA priority review. Enhertu showed pan-tumor activity in a key trial. The FDA sent a long Form 483 to Cipla. Plus more.
A third-generation heir to Cipla and a fitness enthusiast, Samina Hamied is a marathon runner both in the business world and on the track.
Edgile's cybersecurity and risk management professionals are expected to allow Wipro to further enhance its cybersecurity and risk...
Cipla Ltd has asked its information technology team to be “paranoid" about its cybersecurity following attacks on two large pharmaceutical firms.
Cipla CFO Kedar Upadhye has asked his IT team to be as paranoid as possible and take the help of experts, and continue to track some hostile activities.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Cipla is http://www.cipla.com.
According to Rankiteo, Cipla’s AI-generated cybersecurity score is 786, reflecting their Fair security posture.
According to Rankiteo, Cipla currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Cipla has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Cipla is not certified under SOC 2 Type 1.
According to Rankiteo, Cipla does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Cipla is not listed as GDPR compliant.
According to Rankiteo, Cipla does not currently maintain PCI DSS compliance.
According to Rankiteo, Cipla is not compliant with HIPAA regulations.
According to Rankiteo,Cipla is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Cipla operates primarily in the Pharmaceutical Manufacturing industry.
Cipla employs approximately 50,326 people worldwide.
Cipla presently has no subsidiaries across any sectors.
Cipla’s official LinkedIn profile has approximately 2,062,749 followers.
Cipla is classified under the NAICS code 3254, which corresponds to Pharmaceutical and Medicine Manufacturing.
No, Cipla does not have a profile on Crunchbase.
Yes, Cipla maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/cipla.
As of January 22, 2026, Rankiteo reports that Cipla has not experienced any cybersecurity incidents.
Cipla has an estimated 5,507 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Cipla has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Backstage is an open framework for building developer portals, and @backstage/backend-defaults provides the default implementations and setup for a standard Backstage backend app. Prior to versions 0.12.2, 0.13.2, 0.14.1, and 0.15.0, the `FetchUrlReader` component, used by the catalog and other plugins to fetch content from URLs, followed HTTP redirects automatically. This allowed an attacker who controls a host listed in `backend.reading.allow` to redirect requests to internal or sensitive URLs that are not on the allowlist, bypassing the URL allowlist security control. This is a Server-Side Request Forgery (SSRF) vulnerability that could allow access to internal resources, but it does not allow attackers to include additional request headers. This vulnerability is fixed in `@backstage/backend-defaults` version 0.12.2, 0.13.2, 0.14.1, and 0.15.0. Users should upgrade to this version or later. Some workarounds are available. Restrict `backend.reading.allow` to only trusted hosts that you control and that do not issue redirects, ensure allowed hosts do not have open redirect vulnerabilities, and/or use network-level controls to block access from Backstage to sensitive internal endpoints.
Backstage is an open framework for building developer portals, and @backstage/cli-common provides config loading functionality used by the backend and command line interface of Backstage. Prior to version 0.1.17, the `resolveSafeChildPath` utility function in `@backstage/backend-plugin-api`, which is used to prevent path traversal attacks, failed to properly validate symlink chains and dangling symlinks. An attacker could bypass the path validation via symlink chains (creating `link1 → link2 → /outside` where intermediate symlinks eventually resolve outside the allowed directory) and dangling symlinks (creating symlinks pointing to non-existent paths outside the base directory, which would later be created during file operations). This function is used by Scaffolder actions and other backend components to ensure file operations stay within designated directories. This vulnerability is fixed in `@backstage/backend-plugin-api` version 0.1.17. Users should upgrade to this version or later. Some workarounds are available. Run Backstage in a containerized environment with limited filesystem access and/or restrict template creation to trusted users.
Backstage is an open framework for building developer portals. Multiple Scaffolder actions and archive extraction utilities were vulnerable to symlink-based path traversal attacks. An attacker with access to create and execute Scaffolder templates could exploit symlinks to read arbitrary files via the `debug:log` action by creating a symlink pointing to sensitive files (e.g., `/etc/passwd`, configuration files, secrets); delete arbitrary files via the `fs:delete` action by creating symlinks pointing outside the workspace, and write files outside the workspace via archive extraction (tar/zip) containing malicious symlinks. This affects any Backstage deployment where users can create or execute Scaffolder templates. This vulnerability is fixed in `@backstage/backend-defaults` versions 0.12.2, 0.13.2, 0.14.1, and 0.15.0; `@backstage/plugin-scaffolder-backend` versions 2.2.2, 3.0.2, and 3.1.1; and `@backstage/plugin-scaffolder-node` versions 0.11.2 and 0.12.3. Users should upgrade to these versions or later. Some workarounds are available. Follow the recommendation in the Backstage Threat Model to limit access to creating and updating templates, restrict who can create and execute Scaffolder templates using the permissions framework, audit existing templates for symlink usage, and/or run Backstage in a containerized environment with limited filesystem access.
FastAPI Api Key provides a backend-agnostic library that provides an API key system. Version 1.1.0 has a timing side-channel vulnerability in verify_key(). The method applied a random delay only on verification failures, allowing an attacker to statistically distinguish valid from invalid API keys by measuring response latencies. With enough repeated requests, an adversary could infer whether a key_id corresponds to a valid key, potentially accelerating brute-force or enumeration attacks. All users relying on verify_key() for API key authentication prior to the fix are affected. Users should upgrade to version 1.1.0 to receive a patch. The patch applies a uniform random delay (min_delay to max_delay) to all responses regardless of outcome, eliminating the timing correlation. Some workarounds are available. Add an application-level fixed delay or random jitter to all authentication responses (success and failure) before the fix is applied and/or use rate limiting to reduce the feasibility of statistical timing attacks.
The Flux Operator is a Kubernetes CRD controller that manages the lifecycle of CNCF Flux CD and the ControlPlane enterprise distribution. Starting in version 0.36.0 and prior to version 0.40.0, a privilege escalation vulnerability exists in the Flux Operator Web UI authentication code that allows an attacker to bypass Kubernetes RBAC impersonation and execute API requests with the operator's service account privileges. In order to be vulnerable, cluster admins must configure the Flux Operator with an OIDC provider that issues tokens lacking the expected claims (e.g., `email`, `groups`), or configure custom CEL expressions that can evaluate to empty values. After OIDC token claims are processed through CEL expressions, there is no validation that the resulting `username` and `groups` values are non-empty. When both values are empty, the Kubernetes client-go library does not add impersonation headers to API requests, causing them to be executed with the flux-operator service account's credentials instead of the authenticated user's limited permissions. This can result in privilege escalation, data exposure, and/or information disclosure. Version 0.40.0 patches the issue.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.