Company Details
dupont
24,437
1,018,323
30
dupont.com
85
DUP_9877259
Completed

DuPont Company CyberSecurity Posture
dupont.comBeware of recruitment scams! Please read important information for job seekers: https://www.dupont.com/careers/hiring-faqs.html It's a time of incredible progress at DuPont — a time of momentum. It's the time for change makers, for the doers and pioneers, to create essential innovations the world needs. We aren’t just creating a better future, we’re working together to invent a better now. So bring your best self and join us in uncovering insights that will transform the world. Why wait for a better future? Invent a better now. Learn more at dupont.com. Please take the time to review our comments policy before commenting on our page. http://dptn.ws/policy
Company Details
dupont
24,437
1,018,323
30
dupont.com
85
DUP_9877259
Completed
Between 750 and 799

DuPont Global Score (TPRM)XXXX



No incidents recorded for DuPont in 2025.
No incidents recorded for DuPont in 2025.
No incidents recorded for DuPont in 2025.
DuPont cyber incidents detection timeline including parent company and subsidiaries

Beware of recruitment scams! Please read important information for job seekers: https://www.dupont.com/careers/hiring-faqs.html It's a time of incredible progress at DuPont — a time of momentum. It's the time for change makers, for the doers and pioneers, to create essential innovations the world needs. We aren’t just creating a better future, we’re working together to invent a better now. So bring your best self and join us in uncovering insights that will transform the world. Why wait for a better future? Invent a better now. Learn more at dupont.com. Please take the time to review our comments policy before commenting on our page. http://dptn.ws/policy


Electrolux Group is a leading global appliance company that has shaped living for the better for more than 100 years. We reinvent taste, care and wellbeing experiences for millions of people, always striving to be at the forefront of sustainability in society through our solutions and operations. Un

Godrej is one of India’s most trusted brands serving over 1.1bn customers worldwide, every day. Godrej & Boyce, a Godrej group company, began it's journey in 1897 with the manufacture of high quality locks and continues with its outstanding engineering capabilities across diverse categories – from

More than just numbers, what truly defines Tramontina is the constant effort to make people's lives better. The small iron mill founded by Valentin and Elisa Tramontina in 1911 in southern Brazil was the beginning of a group that now encompasses 9 manufacturing units and has kept the century-old tra

We empower generations to explore the wonder of childhood and reach their full potential. We treat play as if the future depends on it — because it does. Play is our language, and we speak to our consumers authentically by representing the world as they see and imagine it. Mattel is a leading glob

As a company, we dream big to create a future with more cheers. We are always looking to serve up new ways to meet life’s moments, move our industry forward and make a meaningful impact in the world. We are committed to building great brands that stand the test of time and to brewing the best beers

We’re a community of creators. Status quo busters. Difference makers. For the past 150 years, we’ve built our business on a singular mission—helping people live gracious, healthy, and sustainable lives. Thanks to the passion, craftsmanship, and ingenuity of our associates around the world, our b
Newell Brands (NASDAQ: NWL) is a leading global consumer goods company with a strong portfolio of well-known brands, including Rubbermaid, Sharpie, Graco, Coleman, Rubbermaid Commercial Products, Yankee Candle, Paper Mate, FoodSaver, Dymo, EXPO, Elmer’s, Oster, NUK, Spontex and Campingaz. We are f

Group Snef is a French leader in the field of electrical installation and, more broadly, the management of finishing turnkey projects and operations. Group Snef operates in the fields of high- and low-voltage installations, industrial processes, HVAC and maintenance. Its services cover technic
Founded in 1946 by Pietro and Giovanni Ferrero, the Ferrero Group is a family-owned business in its third generation. It has been built by talented people who share a commitment towards continuous improvement to achieve the highest quality and care. This same commitment is put into everything we do
.png)
Carneys Point Township, New Jersey, is aiming to intervene in the state's federal suit against E.I. du Pont de Nemours & Co. and others over...
The wealthier you are, the bigger the target. Cybercriminals don't just hack businesses; they go after individuals.
In a new office space in Dupont Circle, D.C. Mayor Muriel Bowser told a packed reception, “D.C. is open for business!”.
DuPont and a handful of related companies have agreed to provide New Jersey with more than $2 billion to clean up pollution,...
A 2018 incident at TSMC was just one of multiple costly issues for the sector in recent years. The industry has since pulled together to...
GREENWIRE | HOOSICK FALLS, New York — Chemical maker DuPont has agreed to a $27 million settlement to resolve a nearly decadelong lawsuit...
DuPont launched a bold initiative: retire all 17 legacy SAP systems and archive more than 50 terabytes of historical data, including hundreds of ADK and...
GOAL. Enhance threat research and disrupt adversaries. CHALLENGE. Empower new SOC with the ability to triage, mitigate, and remediate threats faster.
New Jersey's environmental regulators have tried to force EIDP and DuPont Chemours to begin remediation efforts on "forever chemical"...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of DuPont is http://www.dupont.com.
According to Rankiteo, DuPont’s AI-generated cybersecurity score is 798, reflecting their Fair security posture.
According to Rankiteo, DuPont currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, DuPont is not certified under SOC 2 Type 1.
According to Rankiteo, DuPont does not hold a SOC 2 Type 2 certification.
According to Rankiteo, DuPont is not listed as GDPR compliant.
According to Rankiteo, DuPont does not currently maintain PCI DSS compliance.
According to Rankiteo, DuPont is not compliant with HIPAA regulations.
According to Rankiteo,DuPont is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
DuPont operates primarily in the Manufacturing industry.
DuPont employs approximately 24,437 people worldwide.
DuPont presently has no subsidiaries across any sectors.
DuPont’s official LinkedIn profile has approximately 1,018,323 followers.
DuPont is classified under the NAICS code 30, which corresponds to Manufacturing.
No, DuPont does not have a profile on Crunchbase.
Yes, DuPont maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/dupont.
As of December 03, 2025, Rankiteo reports that DuPont has not experienced any cybersecurity incidents.
DuPont has an estimated 7,695 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, DuPont has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-9 and 6.9.13-34, there is a vulnerability in ImageMagick’s Magick++ layer that manifests when Options::fontFamily is invoked with an empty string. Clearing a font family calls RelinquishMagickMemory on _drawInfo->font, freeing the font string but leaving _drawInfo->font pointing to freed memory while _drawInfo->family is set to that (now-invalid) pointer. Any later cleanup or reuse of _drawInfo->font re-frees or dereferences dangling memory. DestroyDrawInfo and other setters (Options::font, Image::font) assume _drawInfo->font remains valid, so destruction or subsequent updates trigger crashes or heap corruption. This vulnerability is fixed in 7.1.2-9 and 6.9.13-34.
FeehiCMS version 2.1.1 has a Remote Code Execution via Unrestricted File Upload in Ad Management. FeehiCMS version 2.1.1 allows authenticated remote attackers to upload files that the server later executes (or stores in an executable location) without sufficient validation, sanitization, or execution restrictions. An authenticated remote attacker can upload a crafted PHP file and cause the application or web server to execute it, resulting in remote code execution (RCE).
PHPGurukul Billing System 1.0 is vulnerable to SQL Injection in the admin/index.php endpoint. Specifically, the username parameter accepts unvalidated user input, which is then concatenated directly into a backend SQL query.
NMIS/BioDose software V22.02 and previous versions contain executable binaries with plain text hard-coded passwords. These hard-coded passwords could allow unauthorized access to both the application and database.
NMIS/BioDose V22.02 and previous versions' installation directory paths by default have insecure file permissions, which in certain deployment scenarios can enable users on client workstations to modify the program executables and libraries.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.