Company Details
city-of-darwin
302
9,368
None
nt.gov.au
0
CIT_1327344
In-progress

City of Darwin Company CyberSecurity Posture
nt.gov.auOUR VISION ‘Darwin 2030 – City for People. City of Colour’. . . . By 2030 we will be even bigger and better and will be known as a vibrant, creative, innovative, connected, healthy and environmentally responsible city. OUR MISSION We will work with the community and partners, provide leadership, and deliver services that create opportunities to enhance the economic, cultural and environmental sustainability of Darwin CARES VALUES CUSTOMER SERVICE: We make customers and the community the focus of all we do; our service is fair, flexible, reliable and innovative. ACCOUNTABILITY: We honour our commitments and take responsibility for our actions. RESPECT: We seek and value the contribution of others, listen before we talk and treat others as we would like to be treated. EXCELLENCE: We strive for the highest quality in our work and dealings with community members, elected members, colleagues and business partners. We go over and above, consistently doing more than is expected. SOLIDARITY: We work together as one team; there is strength in unity and together we achieve great things. We are united in our decisions and actions.
Company Details
city-of-darwin
302
9,368
None
nt.gov.au
0
CIT_1327344
In-progress
Between 750 and 799

CD Global Score (TPRM)XXXX



No incidents recorded for City of Darwin in 2025.
No incidents recorded for City of Darwin in 2025.
No incidents recorded for City of Darwin in 2025.
CD cyber incidents detection timeline including parent company and subsidiaries

OUR VISION ‘Darwin 2030 – City for People. City of Colour’. . . . By 2030 we will be even bigger and better and will be known as a vibrant, creative, innovative, connected, healthy and environmentally responsible city. OUR MISSION We will work with the community and partners, provide leadership, and deliver services that create opportunities to enhance the economic, cultural and environmental sustainability of Darwin CARES VALUES CUSTOMER SERVICE: We make customers and the community the focus of all we do; our service is fair, flexible, reliable and innovative. ACCOUNTABILITY: We honour our commitments and take responsibility for our actions. RESPECT: We seek and value the contribution of others, listen before we talk and treat others as we would like to be treated. EXCELLENCE: We strive for the highest quality in our work and dealings with community members, elected members, colleagues and business partners. We go over and above, consistently doing more than is expected. SOLIDARITY: We work together as one team; there is strength in unity and together we achieve great things. We are united in our decisions and actions.


This is an official Marine Corps page. However, the appearance of hyperlinks does not constitute an endorsement by the U. S. Marine Corps. Any information or resources that are posted or shared here are informational and not an endorsement or partnership of the Marine for Life Network, the U.S. Ma
One Click Politics is the leading online advocacy software platform in the United States, Canada, and Australia. Our technology features robust analytics, communication tools, targeting databases and consulting services. Key features include: texting, patch-through calling, rotating messages, Facebo

At Generis, we develop economic and living spaces that offer opportunities for everyone. We achieve this with extraordinary ideas and the courage to take risks with our clients. At the interface between politics and business, we connect people with opportunities and guide organizations and regions s
Founded in 2009, the Greater Kokomo Economic Development Alliance serves the citizens and businesses of Kokomo, Indiana and Howard County through its commitment to fostering a positive economic climate and developing strategic initiatives for the area. In doing so, the Alliance serves as the lead ec

We are a leading supplier of heavy equipment sales and rentals to the federal government. We hold multiple GSA, BPA, and DLA contracts in the areas of heavy equipment and AG sales and rentals. We have a national reach, but a personal touch that makes government purchasing simple! GSA Contract: GS

PA's statewide advocacy organization for all sectors of the forest products industry, leading changes in state/local government policy and public perception that will enhance the bottom-line competitiveness, profitability and growth of its member companies. Our mission is to promote the common inter
.png)
A Cyclone Watch has been issued for the Darwin region by the Bureau of Meteorology (BoM). City of Darwin is encouraging residents to secure...
DALLAS (SMU)—Mitch Thornton, Executive Director of the Darwin Deason Institute for Cybersecurity and Cecil H. Green Chair of Engineering at...
Saraland City Schools is informing the community about a recent cybersecurity incident involving PowerSchool, the state-mandated education software provider.
In an effort to combat the rising frequency of cyberattacks, Google.org has partnered with the Aristotle University of Thessaloniki to...
A Darwin-based cyber security expert said only a tiny fraction of Territory businesses are protected against a digital attack.
A planned update to the widely used cybersecurity app Crowdstrike went haywire last night, causing a global wave of computer system outages...
The two companies are strategically partnering to build a security solution that will span the terrestrial and satellite communication channels of connected...
The municipal government of Darwin, the capital of Australia's northern territory, has announced the introduction of a smart lighting system...
New CCTV cameras rolled out across the Darwin CBD have facial recognition technology, but the city council insists that capability will not be used.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of City of Darwin is http://www.darwin.nt.gov.au.
According to Rankiteo, City of Darwin’s AI-generated cybersecurity score is 756, reflecting their Fair security posture.
According to Rankiteo, City of Darwin currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, City of Darwin is not certified under SOC 2 Type 1.
According to Rankiteo, City of Darwin does not hold a SOC 2 Type 2 certification.
According to Rankiteo, City of Darwin is not listed as GDPR compliant.
According to Rankiteo, City of Darwin does not currently maintain PCI DSS compliance.
According to Rankiteo, City of Darwin is not compliant with HIPAA regulations.
According to Rankiteo,City of Darwin is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
City of Darwin operates primarily in the Government Relations industry.
City of Darwin employs approximately 302 people worldwide.
City of Darwin presently has no subsidiaries across any sectors.
City of Darwin’s official LinkedIn profile has approximately 9,368 followers.
City of Darwin is classified under the NAICS code None, which corresponds to Others.
No, City of Darwin does not have a profile on Crunchbase.
Yes, City of Darwin maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/city-of-darwin.
As of December 17, 2025, Rankiteo reports that City of Darwin has not experienced any cybersecurity incidents.
City of Darwin has an estimated 420 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, City of Darwin has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Nagios XI versions prior to 2026R1.1 are vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A user‑accessible maintenance script may be executed as root via sudo and includes an application file that is writable by a lower‑privileged user. A local attacker with access to the application account can modify this file to introduce malicious code, which is then executed with elevated privileges when the script is run. Successful exploitation results in arbitrary code execution as the root user.
Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
SIPGO is a library for writing SIP services in the GO language. Starting in version 0.3.0 and prior to version 1.0.0-alpha-1, a nil pointer dereference vulnerability is in the SIPGO library's `NewResponseFromRequest` function that affects all normal SIP operations. The vulnerability allows remote attackers to crash any SIP application by sending a single malformed SIP request without a To header. The vulnerability occurs when SIP message parsing succeeds for a request missing the To header, but the response creation code assumes the To header exists without proper nil checks. This affects routine operations like call setup, authentication, and message handling - not just error cases. This vulnerability affects all SIP applications using the sipgo library, not just specific configurations or edge cases, as long as they make use of the `NewResponseFromRequest` function. Version 1.0.0-alpha-1 contains a patch for the issue.
GLPI is a free asset and IT management software package. Starting in version 9.1.0 and prior to version 10.0.21, an unauthorized user with an API access can read all knowledge base entries. Users should upgrade to 10.0.21 to receive a patch.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.