Company Details
deutscher-bundestag
2,941
7,882
92112
bundestag.de
0
DEU_8483051
In-progress

Deutscher Bundestag Company CyberSecurity Posture
bundestag.deDie Abgeordneten des Deutschen Bundestages werden in allgemeiner, unmittelbarer, freier, gleicher und geheimer Wahl gewählt. Sie sind Vertreter des ganzen Volkes, an Aufträge und Weisungen nicht gebunden und nur ihrem Gewissen unterworfen.
Company Details
deutscher-bundestag
2,941
7,882
92112
bundestag.de
0
DEU_8483051
In-progress
Between 750 and 799

Deutscher Bundestag Global Score (TPRM)XXXX

Description: Bundestag – the lower house of Germany’s parliament suffered a cyber attack in June 2015. Bundestag shut down its systems including the drives of the parliamentary committee investigating allegations of BND surveillance on behalf of the NSA as a precaution. The experts from the Bundestag and the Federal Office for Information Security investigated the incident.


No incidents recorded for Deutscher Bundestag in 2025.
No incidents recorded for Deutscher Bundestag in 2025.
No incidents recorded for Deutscher Bundestag in 2025.
Deutscher Bundestag cyber incidents detection timeline including parent company and subsidiaries

Die Abgeordneten des Deutschen Bundestages werden in allgemeiner, unmittelbarer, freier, gleicher und geheimer Wahl gewählt. Sie sind Vertreter des ganzen Volkes, an Aufträge und Weisungen nicht gebunden und nur ihrem Gewissen unterworfen.


The U.S. House of Representatives is one of two chambers in the United States Congress and part of the federal government’s legislative branch. For more information on the House of Representatives, please visit the House Explained website. The House offers a variety of exciting job opportunities an

The U.S. House of Representatives is one of two chambers in the United States Congress and part of the federal government’s legislative branch. For more information on the House of Representatives, please visit the House Explained website. The House offers a variety of exciting job opportunities an
.png)
Attacks “also come from China from time to time,” Olaf Scholz told lawmakers in parliament.
The German government has announced the creation of a federal agency tasked with creating cutting-edge defense technology.
German security services have admitted they uncovered a cyberattack on the government in December. Sources say the malware had been planted...
There are a number of measures the Bundeswehr needs to take to fill the ranks of its planned cyber command.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Deutscher Bundestag is https://www.bundestag.de/.
According to Rankiteo, Deutscher Bundestag’s AI-generated cybersecurity score is 752, reflecting their Fair security posture.
According to Rankiteo, Deutscher Bundestag currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Deutscher Bundestag is not certified under SOC 2 Type 1.
According to Rankiteo, Deutscher Bundestag does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Deutscher Bundestag is not listed as GDPR compliant.
According to Rankiteo, Deutscher Bundestag does not currently maintain PCI DSS compliance.
According to Rankiteo, Deutscher Bundestag is not compliant with HIPAA regulations.
According to Rankiteo,Deutscher Bundestag is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Deutscher Bundestag operates primarily in the Legislative Offices industry.
Deutscher Bundestag employs approximately 2,941 people worldwide.
Deutscher Bundestag presently has no subsidiaries across any sectors.
Deutscher Bundestag’s official LinkedIn profile has approximately 7,882 followers.
Deutscher Bundestag is classified under the NAICS code 92112, which corresponds to Legislative Bodies.
No, Deutscher Bundestag does not have a profile on Crunchbase.
Yes, Deutscher Bundestag maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/deutscher-bundestag.
As of December 17, 2025, Rankiteo reports that Deutscher Bundestag has experienced 1 cybersecurity incidents.
Deutscher Bundestag has an estimated 115 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with federal office for information security, and containment measures with systems shutdown..
Title: Cyber Attack on Bundestag
Description: Bundestag – the lower house of Germany’s parliament suffered a cyber attack in June 2015. Bundestag shut down its systems including the drives of the parliamentary committee investigating allegations of BND surveillance on behalf of the NSA as a precaution. The experts from the Bundestag and the Federal Office for Information Security investigated the incident.
Date Detected: June 2015
Type: Cyber Attack
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Systems Affected: Parliamentary systemsDrives of the parliamentary committee
Operational Impact: Systems shutdown

Entity Name: Bundestag
Entity Type: Government
Industry: Parliamentary
Location: Germany

Third Party Assistance: Federal Office for Information Security
Containment Measures: Systems shutdown
Third-Party Assistance: The company involves third-party assistance in incident response through Federal Office for Information Security.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by systems shutdown.

Investigation Status: Investigated by experts from the Bundestag and the Federal Office for Information Security
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Federal Office for Information Security.
Most Recent Incident Detected: The most recent incident detected was on June 2015.
Most Significant System Affected: The most significant system affected in an incident was Parliamentary systemsDrives of the parliamentary committee.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Federal Office for Information Security.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Systems shutdown.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Investigated by experts from the Bundestag and the Federal Office for Information Security.
.png)
Nagios XI versions prior to 2026R1.1 are vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A user‑accessible maintenance script may be executed as root via sudo and includes an application file that is writable by a lower‑privileged user. A local attacker with access to the application account can modify this file to introduce malicious code, which is then executed with elevated privileges when the script is run. Successful exploitation results in arbitrary code execution as the root user.
Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
SIPGO is a library for writing SIP services in the GO language. Starting in version 0.3.0 and prior to version 1.0.0-alpha-1, a nil pointer dereference vulnerability is in the SIPGO library's `NewResponseFromRequest` function that affects all normal SIP operations. The vulnerability allows remote attackers to crash any SIP application by sending a single malformed SIP request without a To header. The vulnerability occurs when SIP message parsing succeeds for a request missing the To header, but the response creation code assumes the To header exists without proper nil checks. This affects routine operations like call setup, authentication, and message handling - not just error cases. This vulnerability affects all SIP applications using the sipgo library, not just specific configurations or edge cases, as long as they make use of the `NewResponseFromRequest` function. Version 1.0.0-alpha-1 contains a patch for the issue.
GLPI is a free asset and IT management software package. Starting in version 9.1.0 and prior to version 10.0.21, an unauthorized user with an API access can read all knowledge base entries. Users should upgrade to 10.0.21 to receive a patch.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.