ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Iran Telecom Research Center (ITRC), as the most experienced research entity in the Information and Communication Technology (ICT) field, with more than 39 years of scientific experience in research and acting as mother consultant to the Ministry of ICT, is the main ICT research base of the country . ITRC boasts highly experienced researchers who are skilled in different ICT fields and possesses advanced research facilities as well as dedicated laboratories that enables research teams to conduct their studies and carry out experiments, categorized under the following broad faculties : Information Technology Communication Technology ICT Security Strategic and Economical Studies

Iran Telecom Research Center A.I CyberSecurity Scoring

ITRC

Company Details

Linkedin ID:

cyber-space-research-institute-ex-itrc-

Employees number:

163

Number of followers:

0

NAICS:

None

Industry Type:

Information Technology & Services

Homepage:

ac.ir

IP Addresses:

0

Company ID:

IRA_2121578

Scan Status:

In-progress

AI scoreITRC Risk Score (AI oriented)

Between 800 and 849

https://images.rankiteo.com/companyimages/cyber-space-research-institute-ex-itrc-.jpeg
ITRC Information Technology & Services
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreITRC Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/cyber-space-research-institute-ex-itrc-.jpeg
ITRC Information Technology & Services
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

ITRC Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Iran Telecom Research Center: 10 cyber incidents that shook the world in 2025: Cloudflare, Colt, SalesforceCyber Attack100512/2025
Rankiteo Explanation :
Attack threatening the organization's existence

Description: Quantum investment must go hand-in-hand with cybersecurity, warns industry expert The UK Government’s £121 million pledge to turbocharge the quantum technology sector has been broadly welcomed by industry figures — but also comes with a word of caution. “As quantum computing advances, it’s changing how we think about data security and ensuring information remains confidential as it travels across networks,” said Paulina Gomez, senior advisor of portfolio marketing at global networking firm Ciena. “The opportunity now lies in building networks that aren’t just faster and more agile, but resilient against the future threats posed by quantum-enabled attacks.” Read full article >>> US Cyber Trust Mark launches to boost IoT device security standards The US Cyber Trust Mark is a cybersecurity labelling programme led by the Federal Communications Commission (FCC) designed to help users assess a product’s cybersecurity, similar to how EnergyStar labels help consumers identify energy-efficient appliances. At the start of the year, it was announced that makers of Internet of Things (IoT) devices ranging from smart locks to voice-activated assistants can have their products tested against cybersecurity criteria developed by the US National Institute of Standards and Technology (NIST) to earn the Cyber Trust Mark label. Read full article >>> Iran bans officials from using connected devices amid cybersecurity fears Iran’s Cybersecurity Command instructed high-ranking officials a

Iran Telecom Research Center: 10 cyber incidents that shook the world in 2025: Cloudflare, Colt, Salesforce
Cyber Attack
Severity: 100
Impact: 5
Seen: 12/2025
Blog:
Rankiteo Explanation
Attack threatening the organization's existence

Description: Quantum investment must go hand-in-hand with cybersecurity, warns industry expert The UK Government’s £121 million pledge to turbocharge the quantum technology sector has been broadly welcomed by industry figures — but also comes with a word of caution. “As quantum computing advances, it’s changing how we think about data security and ensuring information remains confidential as it travels across networks,” said Paulina Gomez, senior advisor of portfolio marketing at global networking firm Ciena. “The opportunity now lies in building networks that aren’t just faster and more agile, but resilient against the future threats posed by quantum-enabled attacks.” Read full article >>> US Cyber Trust Mark launches to boost IoT device security standards The US Cyber Trust Mark is a cybersecurity labelling programme led by the Federal Communications Commission (FCC) designed to help users assess a product’s cybersecurity, similar to how EnergyStar labels help consumers identify energy-efficient appliances. At the start of the year, it was announced that makers of Internet of Things (IoT) devices ranging from smart locks to voice-activated assistants can have their products tested against cybersecurity criteria developed by the US National Institute of Standards and Technology (NIST) to earn the Cyber Trust Mark label. Read full article >>> Iran bans officials from using connected devices amid cybersecurity fears Iran’s Cybersecurity Command instructed high-ranking officials a

Ailogo

ITRC Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for ITRC

Incidents vs Information Technology & Services Industry Average (This Year)

Iran Telecom Research Center has 13.64% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

Iran Telecom Research Center has 53.85% more incidents than the average of all companies with at least one recorded incident.

Incident Types ITRC vs Information Technology & Services Industry Avg (This Year)

Iran Telecom Research Center reported 1 incidents this year: 1 cyber attacks, 0 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.

Incident History — ITRC (X = Date, Y = Severity)

ITRC cyber incidents detection timeline including parent company and subsidiaries

ITRC Company Subsidiaries

SubsidiaryImage

Iran Telecom Research Center (ITRC), as the most experienced research entity in the Information and Communication Technology (ICT) field, with more than 39 years of scientific experience in research and acting as mother consultant to the Ministry of ICT, is the main ICT research base of the country . ITRC boasts highly experienced researchers who are skilled in different ICT fields and possesses advanced research facilities as well as dedicated laboratories that enables research teams to conduct their studies and carry out experiments, categorized under the following broad faculties : Information Technology Communication Technology ICT Security Strategic and Economical Studies

Loading...
similarCompanies

ITRC Similar Companies

VINCI Energies

In a world undergoing constant change, VINCI Energies contributes to the environmental transition by helping bring about major trends in the digital landscape and energy sector. VINCI Energies’ teams roll out technologies and integrate customised multi-technical solutions, from design to implement

Computacenter

Computacenter is a leading independent technology and services provider, trusted by large corporate and public sector organisations. We are a responsible business that believes in winning together for our people and our planet. We help our customers to Source, Transform and Manage their technol

Akka Technologies

AKKA is a European leader in engineering consulting and R&D services. Our comprehensive portfolio of digital solutions combined with our expertise in engineering, uniquely positions us to support our clients by leveraging the power of connected data to accelerate innovation and drive the future of s

Fujitsu Portugal

A Fujitsu é a companhia líder japonesa de tecnologias de informação e comunicação (TIC) disponibilizando um leque completo de produtos tecnológicos, soluções e serviços. Cerca de 132.000 colaboradores da Fujitsu prestam suporte a clientes em mais de 100 países. Utilizamos a nossa experiência e o pod

SONDA

We are at the forefront of digital transformation in the Americas, positively impacting the lives of over 500 million people. As a key player in emerging industries, we drive innovation and change through ambitious modernization projects and cutting-edge solutions. By understanding the region's chal

Exela Technologies

Exela is a business process automation (BPA) leader, leveraging a global footprint and proprietary technology to provide digital transformation solutions enhancing quality, productivity, and end-user experience. With decades of expertise operating mission-critical processes, Exela serves a growing

Thoughtworks

Thoughtworks is a pioneering global technology consultancy, leading the charge in custom software development and technology innovation. We empower ambitious businesses to thrive in a constantly evolving world. We integrate the best of strategy, design, and software engineering to provide our client

newsone

ITRC CyberSecurity News

September 20, 2025 07:00 AM
Fourth Edition of IRAN ITEX to Be Held at Sharif University of Technology

The fourth edition of the Iran ITEX 2025 exhibition will take place from October 19 to 21 at Sharif University of Technology in Tehran.

August 19, 2025 09:59 AM
Continuous strategy GRC

Capgemini's Strategy & GRC services help you manage risk, meet compliance, and enable secure growth—aligned with regulations and emerging tech.

July 28, 2025 07:00 AM
Iran’s Nahid-2 satellite in orbit: Capabilities, mission goals, and strategic significance

Nahid-2, Iran's domestically built satellite launched this week, showcases advanced telecom, propulsion, and control technologies while...

May 14, 2025 07:00 AM
Global Powers Intensify Cyber Warfare with Covert Digital Strikes on Critical Systems

State-sponsored hackers from China, Russia, North Korea, and Iran executing sophisticated attacks against energy grids, telecommunications networks, and...

April 17, 2025 07:00 AM
Iran’s AI Ambitions: National Security, Global Influence, and Strategic Challenges

Iran recognizes the vital role artificial intelligence (AI) will play in its future economic viability, regional influence, and national security.

March 29, 2025 10:51 PM
Here Is A List Of All Major Cyber Attacks On Critical Infrastructure In Last One Year

May 2021: The world's largest meat processing company, Brazilian-based JBS, was the victim of a ransomware attack. The attack shut down facilities in the...

March 20, 2025 07:00 AM
Typhoons in Cyberspace

The transformation of China's digital attack capabilities is the most important change in the cyber threat to the West in more than a decade.

March 18, 2025 07:00 AM
Denmark Issues Warning on Severe Cyber Attacks Targeting Telecommunications

Denmark's Centre for Cybersecurity (CFCS) has elevated the cyber threat level for the telecommunications sector from “medium” to “high” in its latest...

March 17, 2025 07:00 AM
Denmark warns of cyber espionage against telecom sector

A new threat assessment from the Danish Civil Protection Authority (SAMSIK) warned of cyberattacks targeting the telecommunications sector...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

ITRC CyberSecurity History Information

Official Website of Iran Telecom Research Center

The official website of Iran Telecom Research Center is http://Www.itrc.ac.ir.

Iran Telecom Research Center’s AI-Generated Cybersecurity Score

According to Rankiteo, Iran Telecom Research Center’s AI-generated cybersecurity score is 815, reflecting their Good security posture.

How many security badges does Iran Telecom Research Center’ have ?

According to Rankiteo, Iran Telecom Research Center currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Iran Telecom Research Center have SOC 2 Type 1 certification ?

According to Rankiteo, Iran Telecom Research Center is not certified under SOC 2 Type 1.

Does Iran Telecom Research Center have SOC 2 Type 2 certification ?

According to Rankiteo, Iran Telecom Research Center does not hold a SOC 2 Type 2 certification.

Does Iran Telecom Research Center comply with GDPR ?

According to Rankiteo, Iran Telecom Research Center is not listed as GDPR compliant.

Does Iran Telecom Research Center have PCI DSS certification ?

According to Rankiteo, Iran Telecom Research Center does not currently maintain PCI DSS compliance.

Does Iran Telecom Research Center comply with HIPAA ?

According to Rankiteo, Iran Telecom Research Center is not compliant with HIPAA regulations.

Does Iran Telecom Research Center have ISO 27001 certification ?

According to Rankiteo,Iran Telecom Research Center is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Iran Telecom Research Center

Iran Telecom Research Center operates primarily in the Information Technology & Services industry.

Number of Employees at Iran Telecom Research Center

Iran Telecom Research Center employs approximately 163 people worldwide.

Subsidiaries Owned by Iran Telecom Research Center

Iran Telecom Research Center presently has no subsidiaries across any sectors.

Iran Telecom Research Center’s LinkedIn Followers

Iran Telecom Research Center’s official LinkedIn profile has approximately 0 followers.

NAICS Classification of Iran Telecom Research Center

Iran Telecom Research Center is classified under the NAICS code None, which corresponds to Others.

Iran Telecom Research Center’s Presence on Crunchbase

No, Iran Telecom Research Center does not have a profile on Crunchbase.

Iran Telecom Research Center’s Presence on LinkedIn

Yes, Iran Telecom Research Center maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/cyber-space-research-institute-ex-itrc-.

Cybersecurity Incidents Involving Iran Telecom Research Center

As of December 08, 2025, Rankiteo reports that Iran Telecom Research Center has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Iran Telecom Research Center has an estimated 10,189 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Iran Telecom Research Center ?

Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.

Incident Details

Can you provide details on each incident ?
What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Impact of the Incidents

Which entities were affected by each incident ?

Lessons Learned and Recommendations

What lessons were learned from each incident ?
What recommendations were made to prevent future incidents ?
What are the key lessons learned from past incidents ?

Key Lessons Learned: The key lessons learned from past incidents are Quantum computing advancements necessitate resilient networks to counter future threats. IoT device security standards (e.g., US Cyber Trust Mark) can improve consumer trust and security. Government policies may restrict device usage to mitigate cybersecurity risks.

References

Where can I find more information about each incident ?
Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Industry Article.

Additional Questions

Lessons Learned and Recommendations

What was the most significant lesson learned from past incidents ?

Most Significant Lesson Learned: The most significant lesson learned from past incidents was Quantum computing advancements necessitate resilient networks to counter future threats. IoT device security standards (e.g., US Cyber Trust Mark) can improve consumer trust and security. Government policies may restrict device usage to mitigate cybersecurity risks.

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Implement government-level cybersecurity policies for high-risk devices, Invest in quantum-resilient network infrastructure and Adopt IoT security standards like the US Cyber Trust Mark.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is Industry Article.

cve

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability has been found in TykoDev cherry-studio-TykoFork 0.1. This issue affects the function redirectToAuthorization of the file /.well-known/oauth-authorization-server of the component OAuth Server Discovery. Such manipulation of the argument authorizationUrl leads to os command injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.

Risk Information
cvss2
Base: 6.5
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A flaw has been found in code-projects Question Paper Generator up to 1.0. This vulnerability affects unknown code of the file /selectquestionuser.php. This manipulation of the argument subid causes sql injection. Remote exploitation of the attack is possible. The exploit has been published and may be used.

Risk Information
cvss2
Base: 6.5
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was found in alokjaiswal Hotel-Management-services-using-MYSQL-and-php up to 5f8b60a7aa6c06a5632de569d4e3f6a8cd82f76f. Affected by this vulnerability is an unknown functionality of the file /dishsub.php. The manipulation of the argument item.name results in cross site scripting. It is possible to launch the attack remotely. The exploit has been made public and could be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 3.3
Severity: LOW
AV:N/AC:L/Au:M/C:N/I:P/A:N
cvss3
Base: 2.4
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 4.8
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability has been found in alokjaiswal Hotel-Management-services-using-MYSQL-and-php up to 5f8b60a7aa6c06a5632de569d4e3f6a8cd82f76f. Affected is an unknown function of the file /usersub.php of the component Request Pending Page. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:N/I:P/A:N
cvss3
Base: 3.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A flaw has been found in Verysync 微力同步 up to 2.21.3. This impacts an unknown function of the file /rest/f/api/resources/f96956469e7be39d/tmp/text.txt?override=false of the component Web Administration Module. Executing manipulation can lead to unrestricted upload. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 6.5
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=cyber-space-research-institute-ex-itrc-' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge