Company Details
cyber-space-research-institute-ex-itrc-
163
0
None
ac.ir
0
IRA_2121578
In-progress

Iran Telecom Research Center Company CyberSecurity Posture
ac.irIran Telecom Research Center (ITRC), as the most experienced research entity in the Information and Communication Technology (ICT) field, with more than 39 years of scientific experience in research and acting as mother consultant to the Ministry of ICT, is the main ICT research base of the country . ITRC boasts highly experienced researchers who are skilled in different ICT fields and possesses advanced research facilities as well as dedicated laboratories that enables research teams to conduct their studies and carry out experiments, categorized under the following broad faculties : Information Technology Communication Technology ICT Security Strategic and Economical Studies
Company Details
cyber-space-research-institute-ex-itrc-
163
0
None
ac.ir
0
IRA_2121578
In-progress
Between 800 and 849

ITRC Global Score (TPRM)XXXX

Description: Quantum investment must go hand-in-hand with cybersecurity, warns industry expert The UK Government’s £121 million pledge to turbocharge the quantum technology sector has been broadly welcomed by industry figures — but also comes with a word of caution. “As quantum computing advances, it’s changing how we think about data security and ensuring information remains confidential as it travels across networks,” said Paulina Gomez, senior advisor of portfolio marketing at global networking firm Ciena. “The opportunity now lies in building networks that aren’t just faster and more agile, but resilient against the future threats posed by quantum-enabled attacks.” Read full article >>> US Cyber Trust Mark launches to boost IoT device security standards The US Cyber Trust Mark is a cybersecurity labelling programme led by the Federal Communications Commission (FCC) designed to help users assess a product’s cybersecurity, similar to how EnergyStar labels help consumers identify energy-efficient appliances. At the start of the year, it was announced that makers of Internet of Things (IoT) devices ranging from smart locks to voice-activated assistants can have their products tested against cybersecurity criteria developed by the US National Institute of Standards and Technology (NIST) to earn the Cyber Trust Mark label. Read full article >>> Iran bans officials from using connected devices amid cybersecurity fears Iran’s Cybersecurity Command instructed high-ranking officials a


Iran Telecom Research Center has 13.64% more incidents than the average of same-industry companies with at least one recorded incident.
Iran Telecom Research Center has 53.85% more incidents than the average of all companies with at least one recorded incident.
Iran Telecom Research Center reported 1 incidents this year: 1 cyber attacks, 0 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
ITRC cyber incidents detection timeline including parent company and subsidiaries

Iran Telecom Research Center (ITRC), as the most experienced research entity in the Information and Communication Technology (ICT) field, with more than 39 years of scientific experience in research and acting as mother consultant to the Ministry of ICT, is the main ICT research base of the country . ITRC boasts highly experienced researchers who are skilled in different ICT fields and possesses advanced research facilities as well as dedicated laboratories that enables research teams to conduct their studies and carry out experiments, categorized under the following broad faculties : Information Technology Communication Technology ICT Security Strategic and Economical Studies


In a world undergoing constant change, VINCI Energies contributes to the environmental transition by helping bring about major trends in the digital landscape and energy sector. VINCI Energies’ teams roll out technologies and integrate customised multi-technical solutions, from design to implement

Computacenter is a leading independent technology and services provider, trusted by large corporate and public sector organisations. We are a responsible business that believes in winning together for our people and our planet. We help our customers to Source, Transform and Manage their technol
AKKA is a European leader in engineering consulting and R&D services. Our comprehensive portfolio of digital solutions combined with our expertise in engineering, uniquely positions us to support our clients by leveraging the power of connected data to accelerate innovation and drive the future of s

A Fujitsu é a companhia líder japonesa de tecnologias de informação e comunicação (TIC) disponibilizando um leque completo de produtos tecnológicos, soluções e serviços. Cerca de 132.000 colaboradores da Fujitsu prestam suporte a clientes em mais de 100 países. Utilizamos a nossa experiência e o pod

We are at the forefront of digital transformation in the Americas, positively impacting the lives of over 500 million people. As a key player in emerging industries, we drive innovation and change through ambitious modernization projects and cutting-edge solutions. By understanding the region's chal
Exela is a business process automation (BPA) leader, leveraging a global footprint and proprietary technology to provide digital transformation solutions enhancing quality, productivity, and end-user experience. With decades of expertise operating mission-critical processes, Exela serves a growing
Thoughtworks is a pioneering global technology consultancy, leading the charge in custom software development and technology innovation. We empower ambitious businesses to thrive in a constantly evolving world. We integrate the best of strategy, design, and software engineering to provide our client
.png)
The fourth edition of the Iran ITEX 2025 exhibition will take place from October 19 to 21 at Sharif University of Technology in Tehran.
Capgemini's Strategy & GRC services help you manage risk, meet compliance, and enable secure growth—aligned with regulations and emerging tech.
Nahid-2, Iran's domestically built satellite launched this week, showcases advanced telecom, propulsion, and control technologies while...
State-sponsored hackers from China, Russia, North Korea, and Iran executing sophisticated attacks against energy grids, telecommunications networks, and...
Iran recognizes the vital role artificial intelligence (AI) will play in its future economic viability, regional influence, and national security.
May 2021: The world's largest meat processing company, Brazilian-based JBS, was the victim of a ransomware attack. The attack shut down facilities in the...
The transformation of China's digital attack capabilities is the most important change in the cyber threat to the West in more than a decade.
Denmark's Centre for Cybersecurity (CFCS) has elevated the cyber threat level for the telecommunications sector from “medium” to “high” in its latest...
A new threat assessment from the Danish Civil Protection Authority (SAMSIK) warned of cyberattacks targeting the telecommunications sector...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Iran Telecom Research Center is http://Www.itrc.ac.ir.
According to Rankiteo, Iran Telecom Research Center’s AI-generated cybersecurity score is 815, reflecting their Good security posture.
According to Rankiteo, Iran Telecom Research Center currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Iran Telecom Research Center is not certified under SOC 2 Type 1.
According to Rankiteo, Iran Telecom Research Center does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Iran Telecom Research Center is not listed as GDPR compliant.
According to Rankiteo, Iran Telecom Research Center does not currently maintain PCI DSS compliance.
According to Rankiteo, Iran Telecom Research Center is not compliant with HIPAA regulations.
According to Rankiteo,Iran Telecom Research Center is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Iran Telecom Research Center operates primarily in the Information Technology & Services industry.
Iran Telecom Research Center employs approximately 163 people worldwide.
Iran Telecom Research Center presently has no subsidiaries across any sectors.
Iran Telecom Research Center’s official LinkedIn profile has approximately 0 followers.
Iran Telecom Research Center is classified under the NAICS code None, which corresponds to Others.
No, Iran Telecom Research Center does not have a profile on Crunchbase.
Yes, Iran Telecom Research Center maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/cyber-space-research-institute-ex-itrc-.
As of December 08, 2025, Rankiteo reports that Iran Telecom Research Center has experienced 1 cybersecurity incidents.
Iran Telecom Research Center has an estimated 10,189 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.
Key Lessons Learned: The key lessons learned from past incidents are Quantum computing advancements necessitate resilient networks to counter future threats. IoT device security standards (e.g., US Cyber Trust Mark) can improve consumer trust and security. Government policies may restrict device usage to mitigate cybersecurity risks.
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Industry Article.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Quantum computing advancements necessitate resilient networks to counter future threats. IoT device security standards (e.g., US Cyber Trust Mark) can improve consumer trust and security. Government policies may restrict device usage to mitigate cybersecurity risks.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Implement government-level cybersecurity policies for high-risk devices, Invest in quantum-resilient network infrastructure and Adopt IoT security standards like the US Cyber Trust Mark.
Most Recent Source: The most recent source of information about an incident is Industry Article.
.png)
A vulnerability has been found in TykoDev cherry-studio-TykoFork 0.1. This issue affects the function redirectToAuthorization of the file /.well-known/oauth-authorization-server of the component OAuth Server Discovery. Such manipulation of the argument authorizationUrl leads to os command injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.
A flaw has been found in code-projects Question Paper Generator up to 1.0. This vulnerability affects unknown code of the file /selectquestionuser.php. This manipulation of the argument subid causes sql injection. Remote exploitation of the attack is possible. The exploit has been published and may be used.
A vulnerability was found in alokjaiswal Hotel-Management-services-using-MYSQL-and-php up to 5f8b60a7aa6c06a5632de569d4e3f6a8cd82f76f. Affected by this vulnerability is an unknown functionality of the file /dishsub.php. The manipulation of the argument item.name results in cross site scripting. It is possible to launch the attack remotely. The exploit has been made public and could be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability has been found in alokjaiswal Hotel-Management-services-using-MYSQL-and-php up to 5f8b60a7aa6c06a5632de569d4e3f6a8cd82f76f. Affected is an unknown function of the file /usersub.php of the component Request Pending Page. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
A flaw has been found in Verysync 微力同步 up to 2.21.3. This impacts an unknown function of the file /rest/f/api/resources/f96956469e7be39d/tmp/text.txt?override=false of the component Web Administration Module. Executing manipulation can lead to unrestricted upload. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.