Company Details
city-of-cologne
38
364
92
koeln.business
0
CIT_1708703
In-progress

City of Cologne Company CyberSecurity Posture
koeln.businessSie möchten sich neu ansiedeln, Ihren Betrieb erweitern oder Ihr Unternehmen verlagern. Sie suchen ein neues Grundstück oder eine Immobilie. Sie möchten ein gewerblich nutzbares Grundstück vermieten, verpachten oder veräußern. Sie haben ein Anliegen an die Stadtverwaltung (zum Beispiel Planungsrecht, Baugenehmigungen, Denkmalschutz, Grünausgleich etc.). Sie möchten Ihr Netzwerk erweitern und neue Kontakte in Köln knüpfen.
Company Details
city-of-cologne
38
364
92
koeln.business
0
CIT_1708703
In-progress
Between 700 and 749

CC Global Score (TPRM)XXXX

Description: In October 2023, cyberattacks were detected in some cities, including Dortmund and Cologne. The websites were under 10,000 requests per second. The municipal website for Dortmund is no longer available. The server was severely overwhelmed as a result of numerous queries. The IT of the city administration and public data, however, are unaffected. The hosting company is collaborating on defenses with other specialists. Additionally, Cologne's server received a deluge of malicious traffic. It was also a DDoS attack.


No incidents recorded for City of Cologne in 2025.
No incidents recorded for City of Cologne in 2025.
No incidents recorded for City of Cologne in 2025.
CC cyber incidents detection timeline including parent company and subsidiaries

Sie möchten sich neu ansiedeln, Ihren Betrieb erweitern oder Ihr Unternehmen verlagern. Sie suchen ein neues Grundstück oder eine Immobilie. Sie möchten ein gewerblich nutzbares Grundstück vermieten, verpachten oder veräußern. Sie haben ein Anliegen an die Stadtverwaltung (zum Beispiel Planungsrecht, Baugenehmigungen, Denkmalschutz, Grünausgleich etc.). Sie möchten Ihr Netzwerk erweitern und neue Kontakte in Köln knüpfen.


Der Arbeitgeber Niedersachsen vereint über 2000 Dienststellen mit einem gemeinsamen Ziel: Wir gestalten das Leben in Niedersachsen verantwortungsvoll und zukunftsorientiert. Als der größte Arbeitgeber im Land Niedersachsen bieten wir sichere Arbeitsplätze, sinnstiftende Aufgaben und vielfältige Ei

Our mission is to promote student achievement and preparation for global competitiveness by fostering educational excellence and ensuring equal access. ED is dedicated to: • Establishing policies on federal financial aid for education, and distributing as well as monitoring those funds. • Collect

The Treasury Department is the executive agency responsible for promoting economic prosperity and ensuring the financial security of the United States. The Department is responsible for a wide range of activities such as advising the President on economic and financial issues, encouraging sustainabl

Social Security provides financial protection for our nation’s people, supporting more than 64 million individuals and families. With retirement, disability, and survivors benefits, Social Security is one of the most successful anti-poverty programs in our nation's history. We are there throughout

El Consejo Nacional de Investigaciones Científicas y Técnicas (CONICET) es el principal organismo dedicado a la promoción de la ciencia y la tecnología en la Argentina. Su actividad se desarrolla en cuatro grandes áreas: • Ciencias agrarias, ingeniería y de materiales • Ciencias biológicas y de la s

Californians deserve a government that works for them and with them. One that will work to ensure opportunity and justice. We are building a California not for the few, but for all — including those who have historically been left out. We are doing the work to make our state a place for every Cali

General Services Administration (GSA) is an independent agency of the United States government established in 1949 to help manage and support the basic functioning of federal agencies. Our organization includes the Public Buildings Service (PBS), Federal Acquisition Service (FAS), and a variety of S

Its main functions are to: collect and administer all national taxes, duties and levies; collect revenue that may be imposed under any other legislation, as agreed on between SARS and an organ of state or institution entitled to the revenue; provide protection against the illegal importation

CDC works 24/7 keeping America safe from health, safety and security threats, both foreign and domestic. Whether diseases start at home or abroad, are chronic or acute, curable or preventable, human error or deliberate attack, CDC fights it and supports communities and citizens to prevent it. CDC is
.png)
State and local governments are frequent targets of cyberattacks. In “City Hall Has Been Hacked! The Financial Costs of Lax Cybersecurity,”...
Incident in Düsseldorf could be first death caused by a cyber-attack, says UK's former head of cybersecurity.
Cologne, Germany, has successfully completed a pilot programme that predicts where traffic will go. Using predictive analytics the city believes the technology...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of City of Cologne is https://koeln.business/de/wirtschaft-in-koeln/.
According to Rankiteo, City of Cologne’s AI-generated cybersecurity score is 745, reflecting their Moderate security posture.
According to Rankiteo, City of Cologne currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, City of Cologne is not certified under SOC 2 Type 1.
According to Rankiteo, City of Cologne does not hold a SOC 2 Type 2 certification.
According to Rankiteo, City of Cologne is not listed as GDPR compliant.
According to Rankiteo, City of Cologne does not currently maintain PCI DSS compliance.
According to Rankiteo, City of Cologne is not compliant with HIPAA regulations.
According to Rankiteo,City of Cologne is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
City of Cologne operates primarily in the Government Administration industry.
City of Cologne employs approximately 38 people worldwide.
City of Cologne presently has no subsidiaries across any sectors.
City of Cologne’s official LinkedIn profile has approximately 364 followers.
City of Cologne is classified under the NAICS code 92, which corresponds to Public Administration.
No, City of Cologne does not have a profile on Crunchbase.
Yes, City of Cologne maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/city-of-cologne.
As of December 15, 2025, Rankiteo reports that City of Cologne has experienced 1 cybersecurity incidents.
City of Cologne has an estimated 11,663 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.
Title: DDoS Attacks on Municipal Websites in Dortmund and Cologne
Description: In October 2023, cyberattacks were detected in some cities, including Dortmund and Cologne. The websites were under 10,000 requests per second. The municipal website for Dortmund is no longer available. The server was severely overwhelmed as a result of numerous queries. The IT of the city administration and public data, however, are unaffected. The hosting company is collaborating on defenses with other specialists. Additionally, Cologne's server received a deluge of malicious traffic. It was also a DDoS attack.
Date Detected: October 2023
Type: DDoS Attack
Attack Vector: DDoS
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Systems Affected: Municipal websites
Downtime: ['Dortmund municipal website']

Entity Name: Municipal Administration of Dortmund
Entity Type: Government
Industry: Public Sector
Location: Dortmund

Entity Name: Municipal Administration of Cologne
Entity Type: Government
Industry: Public Sector
Location: Cologne

Most Recent Incident Detected: The most recent incident detected was on October 2023.
Most Significant System Affected: The most significant system affected in an incident was Municipal websites.
.png)
NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.
uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.
A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."
MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.
A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.