ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

For 100 years, DEKRA has been a trusted name in safety. Founded in 1925 with the original goal of improving road safety through vehicle inspections, DEKRA has grown to become the world's largest independent, non-listed expert organization in the field of testing, inspection, and certification. Today, as a global partner, the company supports its customers with comprehensive services and solutions to drive safety and sustainability forward—fully aligned with DEKRA’s anniversary motto, "Securing the Future." In 2024, DEKRA generated revenue of 4.3 billion euros. Around 48,000 employees are providing qualified and independent expert services in approximately 60 countries across five continents. DEKRA holds a Platinum rating from EcoVadis, placing it among the top 1% of the world’s most sustainable companies. IMPRINT / PRIVACY STATEMENT: https://www.dekra.com/en/data-protection-social-media/

DEKRA A.I CyberSecurity Scoring

DEKRA

Company Details

Linkedin ID:

dekra

Employees number:

10,096

Number of followers:

103,693

NAICS:

92219

Industry Type:

Public Safety

Homepage:

dekra.com

IP Addresses:

0

Company ID:

DEK_2561597

Scan Status:

In-progress

AI scoreDEKRA Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/dekra.jpeg
DEKRA Public Safety
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreDEKRA Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/dekra.jpeg
DEKRA Public Safety
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

DEKRA Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

DEKRA Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for DEKRA

Incidents vs Public Safety Industry Average (This Year)

No incidents recorded for DEKRA in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for DEKRA in 2025.

Incident Types DEKRA vs Public Safety Industry Avg (This Year)

No incidents recorded for DEKRA in 2025.

Incident History — DEKRA (X = Date, Y = Severity)

DEKRA cyber incidents detection timeline including parent company and subsidiaries

DEKRA Company Subsidiaries

SubsidiaryImage

For 100 years, DEKRA has been a trusted name in safety. Founded in 1925 with the original goal of improving road safety through vehicle inspections, DEKRA has grown to become the world's largest independent, non-listed expert organization in the field of testing, inspection, and certification. Today, as a global partner, the company supports its customers with comprehensive services and solutions to drive safety and sustainability forward—fully aligned with DEKRA’s anniversary motto, "Securing the Future." In 2024, DEKRA generated revenue of 4.3 billion euros. Around 48,000 employees are providing qualified and independent expert services in approximately 60 countries across five continents. DEKRA holds a Platinum rating from EcoVadis, placing it among the top 1% of the world’s most sustainable companies. IMPRINT / PRIVACY STATEMENT: https://www.dekra.com/en/data-protection-social-media/

Loading...
similarCompanies

DEKRA Similar Companies

TÜV SÜD

TÜV SÜD is the trusted partner of choice for safety, security and sustainability solutions. Our community of experts is passionate about technology and united by the belief that technology should better people’s lives. We work alongside our customers to anticipate and capitalize on technological d

TÜV Rheinland Group

Neutral, independent third party For more than 150 years, TÜV Rheinland has stood for ensuring quality, safety, and efficiency in conjunction with people, the environment, and technology. As a neutral, independent third party, we test, accompany, develop, promote and certify products, plants, proc

GNR - Guarda Nacional Republicana

A Guarda Nacional Republicana é uma força de segurança de natureza militar, que tem por missão, no âmbito dos sistemas nacionais de segurança e proteção, assegurar a legalidade democrática, garantir a segurança interna e os direitos dos cidadãos, bem como colaborar na execução da polít

DNV is the independent expert in risk management and assurance, operating in more than 100 countries. Through its broad experience and deep expertise DNV advances safety and sustainable performance, sets industry benchmarks, and inspires and invents solutions. Whether assessing a new ship design,

newsone

DEKRA CyberSecurity News

September 16, 2025 07:00 AM
Easee achieves EU cybersecurity compliance across its full charger range

EV charging technology company Easee has announced that its portfolio of smart EV chargers has fulfilled the EU Radio Equipment Directive...

September 08, 2025 07:00 AM
Automakers join organization to standardize vehicle cybersecurity

Stellantis has joined GlobalPlatform, a growing community of automakers, cybersecurity firms, silicon vendors, and academic institutions...

August 14, 2025 07:00 AM
Google Announces That Android’s pKVM Framework Achieves SESIP Level 5 Certification

Android's pKVM earns SESIP Level 5, setting a new mobile security benchmark after rigorous Dekra testing under EN-17927 standards.

August 13, 2025 07:00 AM
Android’s pKVM Framework Earns Top-Tier SESIP Level 5 Certification from Google

Android pKVM SESIP - Google has achieved a significant milestone in mobile security by securing SESIP Level 5 certification for its...

August 13, 2025 07:00 AM
Google’s Android pKVM Framework Achieves SESIP Level 5 Certification

Google has revealed that protected KVM (pKVM), the hypervisor that powers the Android Virtualization Framework (AVF), has achieved.

July 12, 2025 07:00 AM
Expert Organization Celebrates Centennial

DEKRA celebrated its 100th anniversary – with a clear focus on the future. What began in 1925 with voluntary vehicle inspections is now a global expert...

May 27, 2025 07:00 AM
DEKRA starts testing EV components at new lab in the USA

The testing organisation DEKRA has opened a new test centre in the USA. The Michigan Automotive Testing Laboratory in Plymouth in the US...

May 22, 2025 07:00 AM
DEKRA Opens U.S. Automotive Test Center of Excellence in Michigan to Advance Future Mobility

Plymouth, MI, May 22, 2025 (GLOBE NEWSWIRE) -- DEKRA, a global leader in safety, security, sustainability, testing and certification,...

April 30, 2025 07:00 AM
DEKRA Celebrates Grand Opening of Michigan Automotive Advanced Testing Laboratory for Future Mobility

DEKRA's Initial $22.8 Million Investment Supports Advancements in EV, Cybersecurity, and Automotive Innovation....

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

DEKRA CyberSecurity History Information

Official Website of DEKRA

The official website of DEKRA is http://www.dekra.com.

DEKRA’s AI-Generated Cybersecurity Score

According to Rankiteo, DEKRA’s AI-generated cybersecurity score is 779, reflecting their Fair security posture.

How many security badges does DEKRA’ have ?

According to Rankiteo, DEKRA currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does DEKRA have SOC 2 Type 1 certification ?

According to Rankiteo, DEKRA is not certified under SOC 2 Type 1.

Does DEKRA have SOC 2 Type 2 certification ?

According to Rankiteo, DEKRA does not hold a SOC 2 Type 2 certification.

Does DEKRA comply with GDPR ?

According to Rankiteo, DEKRA is not listed as GDPR compliant.

Does DEKRA have PCI DSS certification ?

According to Rankiteo, DEKRA does not currently maintain PCI DSS compliance.

Does DEKRA comply with HIPAA ?

According to Rankiteo, DEKRA is not compliant with HIPAA regulations.

Does DEKRA have ISO 27001 certification ?

According to Rankiteo,DEKRA is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of DEKRA

DEKRA operates primarily in the Public Safety industry.

Number of Employees at DEKRA

DEKRA employs approximately 10,096 people worldwide.

Subsidiaries Owned by DEKRA

DEKRA presently has no subsidiaries across any sectors.

DEKRA’s LinkedIn Followers

DEKRA’s official LinkedIn profile has approximately 103,693 followers.

NAICS Classification of DEKRA

DEKRA is classified under the NAICS code 92219, which corresponds to Other Justice, Public Order, and Safety Activities.

DEKRA’s Presence on Crunchbase

No, DEKRA does not have a profile on Crunchbase.

DEKRA’s Presence on LinkedIn

Yes, DEKRA maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/dekra.

Cybersecurity Incidents Involving DEKRA

As of December 02, 2025, Rankiteo reports that DEKRA has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

DEKRA has an estimated 2,027 peer or competitor companies worldwide.

DEKRA CyberSecurity History Information

How many cyber incidents has DEKRA faced ?

Total Incidents: According to Rankiteo, DEKRA has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at DEKRA ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

vLLM is an inference and serving engine for large language models (LLMs). Prior to 0.11.1, vllm has a critical remote code execution vector in a config class named Nemotron_Nano_VL_Config. When vllm loads a model config that contains an auto_map entry, the config class resolves that mapping with get_class_from_dynamic_module(...) and immediately instantiates the returned class. This fetches and executes Python from the remote repository referenced in the auto_map string. Crucially, this happens even when the caller explicitly sets trust_remote_code=False in vllm.transformers_utils.config.get_config. In practice, an attacker can publish a benign-looking frontend repo whose config.json points via auto_map to a separate malicious backend repo; loading the frontend will silently run the backend’s code on the victim host. This vulnerability is fixed in 0.11.1.

Risk Information
cvss3
Base: 7.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Description

fastify-reply-from is a Fastify plugin to forward the current HTTP request to another server. Prior to 12.5.0, by crafting a malicious URL, an attacker could access routes that are not allowed, even though the reply.from is defined for specific routes in @fastify/reply-from. This vulnerability is fixed in 12.5.0.

Risk Information
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to 21.0.2, 20.3.15, and 19.2.17, A Stored Cross-Site Scripting (XSS) vulnerability has been identified in the Angular Template Compiler. It occurs because the compiler's internal security schema is incomplete, allowing attackers to bypass Angular's built-in security sanitization. Specifically, the schema fails to classify certain URL-holding attributes (e.g., those that could contain javascript: URLs) as requiring strict URL security, enabling the injection of malicious scripts. This vulnerability is fixed in 21.0.2, 20.3.15, and 19.2.17.

Risk Information
cvss4
Base: 8.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Gin-vue-admin is a backstage management system based on vue and gin. In 2.8.6 and earlier, attackers can delete any file on the server at will, causing damage or unavailability of server resources. Attackers can control the 'FileMd5' parameter to delete any file and folder.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Portkey.ai Gateway is a blazing fast AI Gateway with integrated guardrails. Prior to 1.14.0, the gateway determined the destination baseURL by prioritizing the value in the x-portkey-custom-host request header. The proxy route then appends the client-specified path to perform an external fetch. This can be maliciously used by users for SSRF attacks. This vulnerability is fixed in 1.14.0.

Risk Information
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=dekra' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge