Company Details
connexxion
10,001
8,758
None
connexxion.nl
0
CON_2305483
In-progress

Connexxion Company CyberSecurity Posture
connexxion.nlConnexxion wil de beste keuze zijn op het gebied van regionaal personenvervoer in Nederland. Met zorg brengen wij mensen op hun bestemming met toegankelijk, duurzaam en veilig vervoer! Wij willen mobiliteit voor iedereen toegankelijk en beschikbaar houden. Want wij geloven dat mobiliteit essentieel is in ieders leven. Het verbindt je met de wereld om je heen en geeft je de vrijheid om te gaan en staan waar je wilt. Met onze innovatieve diensten bieden wij comfort en gemak afgestemd op individuele behoeften. Binnen Connexxion leveren wij de volgende diensten: • Connexxion Openbaar Vervoer verzorgt dagelijks het vervoer per bus in diverse regio’s en per trein over vier regionale lijnen. • Connexxion Taxi verzorgt, verspreid over heel Nederland, het taxivervoer voor speciale doelgroepen, zoals leerlingen in het bijzonder onderwijs en gebruikers van het wmo-vervoer. Ook Schiphol Taxi en business taxi zijn diensten die Connexxion Taxi levert. Connexxion maakt, samen met Witte Kruis, onderdeel uit van Transdev. Transdev is een wereldwijde speler op het gebied van personenvervoer en zorg.
Company Details
connexxion
10,001
8,758
None
connexxion.nl
0
CON_2305483
In-progress
Between 750 and 799

Connexxion Global Score (TPRM)XXXX



No incidents recorded for Connexxion in 2025.
No incidents recorded for Connexxion in 2025.
No incidents recorded for Connexxion in 2025.
Connexxion cyber incidents detection timeline including parent company and subsidiaries

Connexxion wil de beste keuze zijn op het gebied van regionaal personenvervoer in Nederland. Met zorg brengen wij mensen op hun bestemming met toegankelijk, duurzaam en veilig vervoer! Wij willen mobiliteit voor iedereen toegankelijk en beschikbaar houden. Want wij geloven dat mobiliteit essentieel is in ieders leven. Het verbindt je met de wereld om je heen en geeft je de vrijheid om te gaan en staan waar je wilt. Met onze innovatieve diensten bieden wij comfort en gemak afgestemd op individuele behoeften. Binnen Connexxion leveren wij de volgende diensten: • Connexxion Openbaar Vervoer verzorgt dagelijks het vervoer per bus in diverse regio’s en per trein over vier regionale lijnen. • Connexxion Taxi verzorgt, verspreid over heel Nederland, het taxivervoer voor speciale doelgroepen, zoals leerlingen in het bijzonder onderwijs en gebruikers van het wmo-vervoer. Ook Schiphol Taxi en business taxi zijn diensten die Connexxion Taxi levert. Connexxion maakt, samen met Witte Kruis, onderdeel uit van Transdev. Transdev is een wereldwijde speler op het gebied van personenvervoer en zorg.


Russian Post is one of the largest internationally operating logistics groups and the national postal service provider of the Russian Federation. We offer a broad and multimodal portfolio of domestic and international e-commerce, parcel shipping and logistics solutions, by road, sea and air. With a

We shape the mobility of the future – simple, personal, connected. SBB’s comprehensive service contract allows us to offer a wide range of exciting careers in all areas of business. Thanks to this variety, many different career paths are possible, which we support through education and training o

Swift Transportation is the largest full-truckload motor carrier in North America. Based in Phoenix, Arizona, the Swift terminal network includes over thirty full-service facilities in the United States and Mexico. Swift provides a full line of service solutions, including linehaul, flatbed, intermo
.png)
This paper aims to explore the connection between ESG and cybersecurity. It delves into the advantages of managing these issues in unison.
As AI transforms cybersecurity, brands must prioritize clarity, transparency and human connection over technical specs alone.
Trusted Connection secures the connection and endpoints from any user device to any digital resource, spanning web/cloud, SaaS, private apps and more.
Verizon Business launches Trusted Connection cybersecurity solution · Security Service Edge (SSE) capabilities facilitating access to digital...
Trusted Connection secures the connection and endpoints from any user device to any digital resource, spanning web/cloud, SaaS, private apps and more.
Over 1000 malicious domains have been identified that impersonate popular platforms like Reddit and WeTransfer to distribute malware.
Cybersecurity firm SentinelOne has announced that its Singularity Platform is now accessible on Google Cloud Marketplace.
Movistar Spain (Telefonica) is phasing out its Contrato 2 mobile-only postpay plan and replacing it with a new rate that includes unlimited...
Introducing new security solutions, including Digital Secure Home and a refreshed Verizon Protect App, for more control over your home, devices and digital...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Connexxion is http://www.connexxion.nl.
According to Rankiteo, Connexxion’s AI-generated cybersecurity score is 758, reflecting their Fair security posture.
According to Rankiteo, Connexxion currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Connexxion is not certified under SOC 2 Type 1.
According to Rankiteo, Connexxion does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Connexxion is not listed as GDPR compliant.
According to Rankiteo, Connexxion does not currently maintain PCI DSS compliance.
According to Rankiteo, Connexxion is not compliant with HIPAA regulations.
According to Rankiteo,Connexxion is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Connexxion operates primarily in the Transportation/Trucking/Railroad industry.
Connexxion employs approximately 10,001 people worldwide.
Connexxion presently has no subsidiaries across any sectors.
Connexxion’s official LinkedIn profile has approximately 8,758 followers.
No, Connexxion does not have a profile on Crunchbase.
Yes, Connexxion maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/connexxion.
As of November 27, 2025, Rankiteo reports that Connexxion has not experienced any cybersecurity incidents.
Connexxion has an estimated 1,660 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Connexxion has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.