
Ericsson Company Cyber Security Posture
ericsson.comOur purpose To create connections that make the unimaginable possible. Our vision A world where limitless connectivity improves lives, redefines business and pioneers a sustainable future. Our values Perseverance, professionalism, respect and integrity. The future is a place for purpose & vision โ ours are clear, and we invite partners, customers and consumers to join us in our journey. For a brighter future. For all. Let's #ImaginePossible
Ericsson Company Details
ericsson
109927 employees
2098554.0
517
Telecommunications
ericsson.com
66
ERI_8911153
In-progress

Between 900 and 1000
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

Ericsson Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 900 and 1000 |
Ericsson Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
Ericsson | Vulnerability | 80 | 5 | 03/2022 | ERI1721322 | Link | |
Rankiteo Explanation : Attack threatening the organization's existenceDescription: A new bug was recently discovered in Ericsson Network Manager product by the TIM Red Team Research. The bug focuses on the CWE Exposure of Resource to Wrong Sphere and results in incorrect access-control behavior. Variuos security issues can be encountered of it gets exploited. |
Ericsson Company Subsidiaries

Our purpose To create connections that make the unimaginable possible. Our vision A world where limitless connectivity improves lives, redefines business and pioneers a sustainable future. Our values Perseverance, professionalism, respect and integrity. The future is a place for purpose & vision โ ours are clear, and we invite partners, customers and consumers to join us in our journey. For a brighter future. For all. Let's #ImaginePossible
Access Data Using Our API

Get company history
.png)
Ericsson Cyber Security News
Ericsson to lead security-first overhaul of telecom defense as nation-state cyber threats intensify in 2025
Telecom networks have become high-value targets in today's threat landscape, drawing interest from nation-state actors, cybercriminals,ย ...
Edge AI: Ericsson and Supermicro Boost Speed and Security
Edge environments โ like hospitals, factories, and traffic systems โ don't always have the luxury of robust on-site IT. That makes them primeย ...
OneLayer and Ericsson launch zero-trust security solution for private 5G networks
"Our collaboration with Ericsson is pivotal for advancing device visibility, management, and security in modern private networks. Byย ...
POST Luxembourg Deploys Ericsson Security Manager to Strengthen Mobile Cybersecurity
The joint efforts of POST Luxembourg and Ericsson exemplify a best-in-class approach to telecom cybersecurity for C-level executives, Chief Technology Officersย ...
Ericsson to deliver security automation and cyber defence for POST Luxembourg
Our cybersecurity platform Ericsson Security Manager empowers communication service providers like POST Luxembourg to address mobile networksย ...
e& strikes AI deal with Ericsson, makes 5G drone push
UAE heavyweight e& penned contracts with Ericsson and the country's Cyber Security Council, covering the development of autonomous networksย ...
Semperis Picks Ericsson Vet to Lead Global Channel
Semperis has hired Ericsson vet Eric Purcell as its new senior vice president of global partner sales and alliances.
Telecom news: Ericsson, Telefonica cybersecurity breach, 5G spectrum auction in Serbia
Today's telecom news includes announcements on Ericsson India, Telefonica faces cybersecurity breach in Peru, 5G spectrum auction in Serbia,ย ...
Huaweiโs Decline Catapults Ericsson to Top of RAN Market
Huawei's 2021 market share declines thrust Ericsson to the top of the radio access network market, according to LightCounting.

Ericsson Similar Companies

T-Mobile
T-Mobile US, Inc. (NASDAQ: TMUS) is Americaโs supercharged Un-carrier, delivering an advanced 4G LTE and transformative nationwide 5G network that will offer reliable connectivity for all. T-Mobileโs customers benefit from its unmatched combination of value and quality, unwavering obsession with off

KPN
Welkom bij de LinkedIn pagina van KPN. Sinds jaar en dag maakt KPN technologie toegankelijk. Hier leest u alles over de ontwikkelingen rondom de themaโs die KPN belangrijk vindt, zoals Het Nieuwe Leven & Werken, Veiligheid & Privacy en ICT-infrastructuur. Ook een transparante en betrouwbare dienstve

Circet
A global player in the telecom infrastructure services industry, the Circet Group provides operators, local authorities and key accounts throughout the world with an integrated turnkey offering of fixed and mobile infrastructure services, including engineering, deployment, installation and maintenan

Airtel Africa
Airtel Africa is a leading provider of telecommunications and mobile money services, with a presence in 14 countries in Africa, primarily in East Africa and Central and West Africa. Airtel Africa offers an integrated suite of telecommunications solutions to its subscribers, including mobile voice a

Vivo (Telefรดnica Brasil)
Vivo (Telefรดnica Brasil) is part of the Telefรณnica Group and with more than 94 million customers, of which 75 million mobile and 19 million fixed, we are the largest telecommunications company in Brazil, with nationwide presence and a complete, convergent portfolio of products, combining fixed, mobi

BTCC Call Center
Em breve uma nova pรกgina da BTCC Conexรฃo Cliente. Acompanhe as as atualizaรงรตes por aqui, no Linkedin. Show more Show less

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
Ericsson CyberSecurity History Information
How many cyber incidents has Ericsson faced?
Total Incidents: According to Rankiteo, Ericsson has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at Ericsson?
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.
Incident Details
Can you provide details on each incident?

Incident : Vulnerability
Title: Ericsson Network Manager Product Bug
Description: A new bug was recently discovered in Ericsson Network Manager product by the TIM Red Team Research. The bug focuses on the CWE Exposure of Resource to Wrong Sphere and results in incorrect access-control behavior. Various security issues can be encountered if it gets exploited.
Type: Vulnerability
Attack Vector: Exposure of Resource to Wrong Sphere
Vulnerability Exploited: CWE Exposure of Resource to Wrong Sphere
Threat Actor: TIM Red Team Research
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Vulnerability.
Impact of the Incidents
Which entities were affected by each incident?
Additional Questions
General Information
Who was the attacking group in the last incident?
Last Attacking Group: The attacking group in the last incident was an TIM Red Team Research.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
