Company Details
englobal
1,145
14,413
211
englobal.com
0
ENG_2470741
In-progress

ENGlobal Company CyberSecurity Posture
englobal.comWho We Are ENG Founded in 1985, ENGlobal (NASDAQ: ENG) is a specialty engineering services firm that focuses on automation solutions and select EPCM projects for the energy industry and markets throughout the world. Our Automation segment specializes in integrated services related to the design, fabrication and implementation of advanced automation, control, instrumentation and process analytical systems. The EPCM segment provides consulting services for the development, management and execution of projects requiring professional engineering, construction management, and related support services. Markets Served: • Upstream • Midstream • Downstream • Pulp and Paper • Alternative Energy • Government Core Values: • HSE (Health, Safety and Environment) commitment • Integrity and Accountability always • Teamwork in all we do • Quality throughout • Communication from the start Vision: Our vision is to become the preferred provider of innovative automation integration services and select EPCM projects to clients across the globe. Mission Statement: Our mission is to safely deliver solutions that ensure success for all stakeholders, while demonstrating good stewardship of the world around us.
Company Details
englobal
1,145
14,413
211
englobal.com
0
ENG_2470741
In-progress
Between 550 and 599

ENGlobal Global Score (TPRM)XXXX

Description: ENGlobal encountered a ransomware attack in November 2024, compromising personal information. The attack led to unauthorized IT system access and data encryption, but ENGlobal's preliminary investigation suggests no material operational impact. Despite encrypted data files, the company's quick response included containment measures, engaging cybersecurity experts, and IT systems access restrictions. The attack did not result in noticeable financial consequences or operational disruptions, with systems restored and the attacker removed. Notifications to affected individuals and regulatory bodies are planned while operations have resumed normally.
Description: ENGlobal Corporation suffered a detrimental ransomware attack that impeded its operational capabilities. The malicious actors managed to infiltrate the company's IT systems on November 25, 2024, resulting in the encryption of certain data files. Active measures were taken to contain and evaluate the incident, with the aid of external cybersecurity experts. Although brought under control to maintain core business functions, complete IT system recovery timelines remain uncertain. The potential repercussions to the company's financial stability and operational proceedings are under evaluation, and no acknowledgments have been made by any ransomware group for the attack.


No incidents recorded for ENGlobal in 2025.
No incidents recorded for ENGlobal in 2025.
No incidents recorded for ENGlobal in 2025.
ENGlobal cyber incidents detection timeline including parent company and subsidiaries

Who We Are ENG Founded in 1985, ENGlobal (NASDAQ: ENG) is a specialty engineering services firm that focuses on automation solutions and select EPCM projects for the energy industry and markets throughout the world. Our Automation segment specializes in integrated services related to the design, fabrication and implementation of advanced automation, control, instrumentation and process analytical systems. The EPCM segment provides consulting services for the development, management and execution of projects requiring professional engineering, construction management, and related support services. Markets Served: • Upstream • Midstream • Downstream • Pulp and Paper • Alternative Energy • Government Core Values: • HSE (Health, Safety and Environment) commitment • Integrity and Accountability always • Teamwork in all we do • Quality throughout • Communication from the start Vision: Our vision is to become the preferred provider of innovative automation integration services and select EPCM projects to clients across the globe. Mission Statement: Our mission is to safely deliver solutions that ensure success for all stakeholders, while demonstrating good stewardship of the world around us.


Wood Group has combined with Amec Foster Wheeler to form a new global leader in the delivery of project, engineering and technical services to energy and industrial markets. To find out more about Wood visit our new website at www.woodplc.com For all the latest updates and job news follow Wood on L

Nosso propósito é prover energia que assegure prosperidade de forma ética, justa, segura e competitiva. Queremos ser a melhor empresa diversificada e integrada de energia na geração de valor, construindo um mundo mais sustentável, conciliando o foco em óleo e gás com a diversificação em negócios de

Ecopetrol (NYSE: EC) es la compañía más grande en Colombia y uno de los principales grupos de energía de Latinoamérica. Cuenta con más de 18.000 empleados y es responsable del 60% de la producción de hidrocarburos en Colombia. Es propietaria de las dos refinerías del Colombia y de la gran parte de l

TechnipFMC is a leading technology provider to the traditional and new energies industry, delivering fully integrated projects, products, and services. With our proprietary technologies and comprehensive solutions, we are transforming our clients’ project economics, helping them unlock new possibi

Hindustan Petroleum Corporation Limited (HPCL) is a Maharatna Central Public Sector Enterprise (CPSE) and a S&P Global Platts Top 250 Global Energy Company. HPCL has a strong presence in downstream hydrocarbon sector of the country with a sizable share in petroleum product marketing and also has bus

Koch Engineered Solutions (KES) provides uniquely engineered solutions in construction; mass and heat transfer; combustion and emissions controls; filtration; separation; materials applications; automation and actuation. KES is located in Wichita, Kansas, and is a subsidiary of Koch Industries, one

Petroliam Nasional Berhad (PETRONAS) is a leading global energy company committed to powering society’s progress in a responsible and sustainable manner. With close to 50,000 employees and a global reach spanning over 100 countries, we are ranked among the world’s largest corporations by revenue in

We collaborate and engineer solutions to maximize asset value for our customers. Founded in 1919, Halliburton is one of the world's largest providers of products and services to the energy industry. With more than 45,000 employees, representing 130 nationalities in more than 80 countries, the compan

Transocean is a leading international provider of offshore contract drilling services for oil and gas wells. The company specializes in technically demanding sectors of the global offshore drilling business, with a particular focus on ultra-deepwater and harsh environment drilling services and opera
.png)
ENGlobal details cybersecurity breach, as CenterPoint Energy probes potential data leak. January 30, 2025
ENGlobal revealed on Tuesday that the attackers who breached the company last November were able to access sensitive personal information from its network...
Energy contractor ENGlobal reported that sensitive personal data was stolen by threat actors, with the incident disrupting operations for...
Oklahoma-based ENGlobal Corporation said in an updated 8-K filing with the SEC that company officials were locked out of financial systems...
ENGlobal files new report with SEC detailing a ransomware attack; It said the attack forced it to shut down parts of its infrastructure...
ENGlobal faces cybersecurity breach, leads to 'limited' access to essential business operations ... ENGlobal Corporation, an engineering and...
ENGlobal files new report with SEC detailing a ransomware attack; It said the attack forced it to shut down parts of its infrastructure...
Dive Insight: · The attack targeting ENGlobal marks at least the third disruptive cybersecurity incident impacting energy sector providers since...
ENGlobal, a Texas-based engineering and automation contractor for companies in the energy sector, has had its data encrypted by attackers.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of ENGlobal is http://www.englobal.com.
According to Rankiteo, ENGlobal’s AI-generated cybersecurity score is 553, reflecting their Very Poor security posture.
According to Rankiteo, ENGlobal currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, ENGlobal is not certified under SOC 2 Type 1.
According to Rankiteo, ENGlobal does not hold a SOC 2 Type 2 certification.
According to Rankiteo, ENGlobal is not listed as GDPR compliant.
According to Rankiteo, ENGlobal does not currently maintain PCI DSS compliance.
According to Rankiteo, ENGlobal is not compliant with HIPAA regulations.
According to Rankiteo,ENGlobal is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
ENGlobal operates primarily in the Oil and Gas industry.
ENGlobal employs approximately 1,145 people worldwide.
ENGlobal presently has no subsidiaries across any sectors.
ENGlobal’s official LinkedIn profile has approximately 14,413 followers.
ENGlobal is classified under the NAICS code 211, which corresponds to Oil and Gas Extraction.
No, ENGlobal does not have a profile on Crunchbase.
Yes, ENGlobal maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/englobal.
As of December 04, 2025, Rankiteo reports that ENGlobal has experienced 2 cybersecurity incidents.
ENGlobal has an estimated 10,475 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware.
Total Financial Loss: The total financial loss from these incidents is estimated to be $0.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with external cybersecurity experts, and containment measures with active measures were taken to contain and evaluate the incident, and third party assistance with cybersecurity experts, and containment measures with it systems access restrictions, and recovery measures with systems restored, and communication strategy with notifications to affected individuals and regulatory bodies..
Title: Ransomware Attack on ENGlobal Corporation
Description: ENGlobal Corporation suffered a detrimental ransomware attack that impeded its operational capabilities. The malicious actors managed to infiltrate the company's IT systems on November 25, 2024, resulting in the encryption of certain data files. Active measures were taken to contain and evaluate the incident, with the aid of external cybersecurity experts. Although brought under control to maintain core business functions, complete IT system recovery timelines remain uncertain. The potential repercussions to the company's financial stability and operational proceedings are under evaluation, and no acknowledgments have been made by any ransomware group for the attack.
Date Detected: 2024-11-25
Type: Ransomware
Title: ENGlobal Ransomware Attack
Description: ENGlobal encountered a ransomware attack in November 2024, compromising personal information. The attack led to unauthorized IT system access and data encryption, but ENGlobal's preliminary investigation suggests no material operational impact. Despite encrypted data files, the company's quick response included containment measures, engaging cybersecurity experts, and IT systems access restrictions. The attack did not result in noticeable financial consequences or operational disruptions, with systems restored and the attacker removed. Notifications to affected individuals and regulatory bodies are planned while operations have resumed normally.
Date Detected: November 2024
Type: Ransomware Attack
Attack Vector: Unauthorized IT system access
Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Operational Impact: Impeded operational capabilities

Financial Loss: None
Data Compromised: Personal Information
Systems Affected: IT Systems
Downtime: None
Operational Impact: None
Average Financial Loss: The average financial loss per incident is $0.00.
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information.

Third Party Assistance: External cybersecurity experts
Containment Measures: Active measures were taken to contain and evaluate the incident

Third Party Assistance: Cybersecurity Experts
Containment Measures: IT systems access restrictions
Recovery Measures: Systems restored
Communication Strategy: Notifications to affected individuals and regulatory bodies
Third-Party Assistance: The company involves third-party assistance in incident response through External cybersecurity experts, Cybersecurity Experts.

Data Encryption: Certain data files were encrypted

Type of Data Compromised: Personal Information
Data Encryption: Yes
Personally Identifiable Information: Yes
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by active measures were taken to contain and evaluate the incident and it systems access restrictions.

Data Encryption: Certain data files were encrypted

Data Encryption: Yes
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Systems restored.

Regulatory Notifications: Planned

Investigation Status: Preliminary investigation
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notifications to affected individuals and regulatory bodies.
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as External cybersecurity experts, Cybersecurity Experts.
Most Recent Incident Detected: The most recent incident detected was on 2024-11-25.
Highest Financial Loss: The highest financial loss from an incident was None.
Most Significant Data Compromised: The most significant data compromised in an incident was Personal Information.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was External cybersecurity experts, Cybersecurity Experts.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Active measures were taken to contain and evaluate the incident and IT systems access restrictions.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Personal Information.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Preliminary investigation.
.png)
MCP Server Kubernetes is an MCP Server that can connect to a Kubernetes cluster and manage it. Prior to 2.9.8, there is a security issue exists in the exec_in_pod tool of the mcp-server-kubernetes MCP Server. The tool accepts user-provided commands in both array and string formats. When a string format is provided, it is passed directly to shell interpretation (sh -c) without input validation, allowing shell metacharacters to be interpreted. This vulnerability can be exploited through direct command injection or indirect prompt injection attacks, where AI agents may execute commands without explicit user intent. This vulnerability is fixed in 2.9.8.
XML external entity (XXE) injection in eyoucms v1.7.1 allows remote attackers to cause a denial of service via crafted body of a POST request.
An issue was discovered in Fanvil x210 V2 2.12.20 allowing unauthenticated attackers on the local network to access administrative functions of the device (e.g. file upload, firmware update, reboot...) via a crafted authentication bypass.
Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.
Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.