Company Details
e-on
29,412
295,894
22
eon.com
61
E.O_1728271
Completed

E.ON Company CyberSecurity Posture
eon.comThe E.ON Group is one of Europe's largest operators of energy networks and energy infrastructure and a provider of innovative customer solutions for 50 million customers. Thus, we are decisively driving forward the energy transition in Europe and are committed to sustainability, climate protection, and the future of our planet.
Company Details
e-on
29,412
295,894
22
eon.com
61
E.O_1728271
Completed
Between 800 and 849

E.ON Global Score (TPRM)XXXX



No incidents recorded for E.ON in 2025.
No incidents recorded for E.ON in 2025.
No incidents recorded for E.ON in 2025.
E.ON cyber incidents detection timeline including parent company and subsidiaries

The E.ON Group is one of Europe's largest operators of energy networks and energy infrastructure and a provider of innovative customer solutions for 50 million customers. Thus, we are decisively driving forward the energy transition in Europe and are committed to sustainability, climate protection, and the future of our planet.

We are a multinational company changing the face of energy, one of the world’s leading integrated utilities. As the largest private player in producing clean energy with renewable sources we have more than 88 GW of total capacity, including around 64 GW of renewables. Distributing electricity t

Somos uma companhia de capital aberto com ações (NEOE3) negociadas na Bolsa de Valores de São Paulo. Parte do grupo espanhol Iberdrola, atuamos no Brasil desde 1997, e atualmente, somos uma das líderes do setor elétrico do país. Estamos presentes em 18 estados e no Distrito Federal, com negócios em

Company profile Eskom Holdings generates, transports and distributes approximately 95% of South Africa’s electricity – making up 60% of the total electricity consumed on the African continent. Eskom is the world’s eleventh-largest power utility in terms of generating capacity, ranks ninth in term
The Saudi Electricity Company was established on the 5th of April in the year 2000, incorporated in accordance with Council of Ministers Mandate No. 169 dated November 30th, 1998, the Saudi Electricity Company was born out of the merger of smaller regional power company in the central, eastern, west

The Government of West Bengal has restructured the erstwhile WBSEB into two successor entities, namely West Bengal State Electricity Distribution Company Limited (WBSEDCL) and West Bengal State Electricity Transmission Company Limited (WBSETCL), under the ownership of the State Government. The two C

Dominion Energy (NYSE: D), headquartered in Richmond, Va., provides regulated electricity service to 3.6 million homes and businesses in Virginia, North Carolina, and South Carolina, and regulated natural gas service to 500,000 customers in South Carolina. The company is one of the nation’s leading

Tata Power is one of India’s largest integrated power companies and together with its subsidiaries and jointly controlled entities, has an installed/managed capacity of 14,294 MW. The Company has a presence across the entire power value chain - generation of renewable as well as conventional power i
Centrica is an international energy services and solutions company, founded on a 200-year heritage of serving customers in homes and businesses. We supply energy and services to over 10 million customers, mainly in the UK and Ireland, through brands such as British Gas, Bord Gáis Energy and Centri

Hitachi Energy is a global technology leader in electrification, powering a sustainable energy future with innovative power grid technologies with digital at the core. Over three billion people depend on our technologies to power their daily lives. With over a century in pioneering mission-critical
.png)
New Delhi: The Department of Telecommunications (DoT) has confirmed that the Telecom Cyber Security Amendment Rules, 2025 are now fully in...
The cybersecurity space is constantly changing. Discover the cybersecurity trends of 2025 — and how security teams are simplifying...
By Christina Decker, Director Strategic Channels Europe, Trend Micro.
NIS-2 ushers in new cybersecurity obligations to companies in Germany through BSIG-E ... Adopted in 2022, the NIS-2 Directive (Directive (EU) 2022...
China has penetrated networks that control infrastructure systems and has hacked telecommunications companies.
Cybersecurity Awareness Month has arrived, with special offers, activities, and launches all month long.
Investors say this won't do much to encourage more cybersecurity startups to go public instead of selling to an acquirer.
Cloud security provider Netskope closed its first day of trading on the Nasdaq at $22.49, 18% higher than its IPO price of $19.
As the e-commerce ecosystem gears up for robusts festival sales companies are increasingly turning up their cybersecurity measures to...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of E.ON is https://www.eon.com/en/imprint.html.
According to Rankiteo, E.ON’s AI-generated cybersecurity score is 812, reflecting their Good security posture.
According to Rankiteo, E.ON currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, E.ON is not certified under SOC 2 Type 1.
According to Rankiteo, E.ON does not hold a SOC 2 Type 2 certification.
According to Rankiteo, E.ON is not listed as GDPR compliant.
According to Rankiteo, E.ON does not currently maintain PCI DSS compliance.
According to Rankiteo, E.ON is not compliant with HIPAA regulations.
According to Rankiteo,E.ON is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
E.ON operates primarily in the Utilities industry.
E.ON employs approximately 29,412 people worldwide.
E.ON presently has no subsidiaries across any sectors.
E.ON’s official LinkedIn profile has approximately 295,894 followers.
E.ON is classified under the NAICS code 22, which corresponds to Utilities.
Yes, E.ON has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/e-on.
Yes, E.ON maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/e-on.
As of December 10, 2025, Rankiteo reports that E.ON has not experienced any cybersecurity incidents.
E.ON has an estimated 4,176 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, E.ON has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Tuleap is a free and open source suite for management of software development and collaboration. Versions of Tuleap Community Edition prior to 17.0.99.1763126988 and Tuleap Enterprise Edition prior to 17.0-3 and 16.13-8 have missing CSRF protections which allow attackers to create or remove tracker triggers. This issue is fixed in Tuleap Community Edition version 17.0.99.1763126988 and Tuleap Enterprise Edition versions 17.0-3 and 16.13-8.
Tuleap is a free and open source suite for management of software development and collaboration. Tuleap Community Editon versions prior to 17.0.99.1762456922 and Tuleap Enterprise Edition versions prior to 17.0-2, 16.13-7 and 16.12-10 are vulnerable to CSRF attacks through planning management API. Attackers have access to create, edit or remove plans. This issue is fixed in Tuleap Community Edition version 17.0.99.1762456922 and Tuleap Enterprise Edtion versions 17.0-2, 16.13-7 and 16.12-10.
Tuleap is an Open Source Suite for management of software development and collaboration. Tuleap Community Edition versions below 17.0.99.1762444754 and Tuleap Enterprise Edition versions prior to 17.0-2, 16.13-7 and 16.12-10 allow attackers trick victims into changing tracker general settings. This issue is fixed in version Tuleap Community Edition version 17.0.99.1762444754 and Tuleap Enterprise Edition versions 17.0-2, 16.13-7 and 16.12-10.
Tuleap is an Open Source Suite for management of software development and collaboration. Versions below 17.0.99.1762431347 of Tuleap Community Edition and Tuleap Enterprise Edition below 17.0-2, 16.13-7 and 16.12-10 allow attackers to access file release system information in projects they do not have access to. This issue is fixed in version 17.0.99.1762431347 of the Tuleap Community Edition and versions 17.0-2, 16.13-7 and 16.12-10 of Tuleap Enterprise Edition.
IBM watsonx.data 2.2 through 2.2.1 could allow an authenticated user to cause a denial of service through ingestion pods due to improper allocation of resources without limits.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.