Company Details
eskom
42,043
581,702
22
eskom.co.za
0
ESK_6298407
In-progress


Eskom Holdings SOC Ltd Company CyberSecurity Posture
eskom.co.zaCompany profile Eskom Holdings generates, transports and distributes approximately 95% of South Africa’s electricity – making up 60% of the total electricity consumed on the African continent. Eskom is the world’s eleventh-largest power utility in terms of generating capacity, ranks ninth in terms of sales, and boasts the world's largest dry-cooling power station. Eskom Holdings’ Enterprises Division designs, builds and refurbishes Eskom’s assets, and acts as a catalyst for project development for the group. Eskom Enterprises’ main focus is to support Eskom Holdings and be the custodian of non-regulated businesses and offer strategic and commercial lifecycle services to the line divisions.
Company Details
eskom
42,043
581,702
22
eskom.co.za
0
ESK_6298407
In-progress
Between 750 and 799

EHSL Global Score (TPRM)XXXX

Description: Eskom, power utility organisation had security incident at its data center. The working of the systems were affected. The system worked slower than usual. Eskom had stage four load-shedding and increased power cuts.


No incidents recorded for Eskom Holdings SOC Ltd in 2026.
No incidents recorded for Eskom Holdings SOC Ltd in 2026.
No incidents recorded for Eskom Holdings SOC Ltd in 2026.
EHSL cyber incidents detection timeline including parent company and subsidiaries

Company profile Eskom Holdings generates, transports and distributes approximately 95% of South Africa’s electricity – making up 60% of the total electricity consumed on the African continent. Eskom is the world’s eleventh-largest power utility in terms of generating capacity, ranks ninth in terms of sales, and boasts the world's largest dry-cooling power station. Eskom Holdings’ Enterprises Division designs, builds and refurbishes Eskom’s assets, and acts as a catalyst for project development for the group. Eskom Enterprises’ main focus is to support Eskom Holdings and be the custodian of non-regulated businesses and offer strategic and commercial lifecycle services to the line divisions.


We are one of Europe's largest energy companies with the business areas of energy networks, energy infrastructure solutions and energy sales. It’s on us to make new energy work, and we are actively leading energy’s future – putting our customers first and delivering innovative solutions that help ad
NTPC Limited is India’s largest power generation utility with roots planted way back in 1975 to accelerate power development in India. Since then it has established itself as the dominant power major with a presence in the entire value chain of the power generation business. From fossil fuels, it ha
Tata Power is one of India’s largest integrated power companies and together with its subsidiaries and jointly controlled entities, has an installed/managed capacity of 14,294 MW. The Company has a presence across the entire power value chain - generation of renewable as well as conventional power i

A Xunta aparece definida no Estatuto de Autonomía, aprobado en 1981, como órgano colexiado do Goberno de Galicia. Na actualidade, a Xunta está composta polo presidente e dez conselleiros. A comunidade exerce as súas funcións administrativas a través da Xunta e dos seus entes e órganos dependentes.

NextEra Energy, Inc. (NYSE: NEE) is one of the largest electric power and energy infrastructure companies in North America and is a leading provider of electricity to American homes and businesses. Headquartered in Juno Beach, Florida, NextEra Energy is a Fortune 200 company that owns Florida Power

Somos la empresa líder en comunicaciones físicas, digitales y de paquetería. Nuestra misión es prestar un servicio integral de calidad, ofreciendo soluciones y servicios en toda la cadena de valor del ecommerce con el objetivo de facilitar la vida a nuestros clientes. Distribuimos más de 5.100 millo
Pacific Gas and Electric Company, incorporated in California in 1905, is one of the largest combination natural gas and electric utilities in the United States. Based in San Francisco, the company is a subsidiary of PG&E Corporation. There are approximately 20,000 employees who carry out Pacific

Together with our subsidiaries, we deliver clean, safe, reliable and affordable energy to our 9 million customers. Our focus is doing so with service excellence. That means we are leaders who take action to meet our customers’ and communities’ needs while advancing our commitment to net zero emiss

Indonesia State Electricity Corporation PLN has a long history in electricity industry of Indonesia. As the sole provider of electricity in Indonesia, PLN is striving to increase quality of services to all Indonesian. In 1972, in accordance with Government Regulation No.17, the State-owned Electric
.png)
The Africa Tech Festival Awards 2025 (https://AfricaTechFestival.com/), held on Wednesday, 12 November 2025 in Cape Town, brought together technology...
Cabinet has greenlit Eskom's new board, which remains chaired by Dr Mthetho Nyati as his term is yet to expire.
One of South Africa's top courts on Wednesday annulled a government permit allowing state utility Eskom to build a large power plant burning...
Lyra Energy, a renewable energy platform supplying power to industries, has been granted an electricity trading license in South Africa.
Last week, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) released five ICS (industrial control systems) advisories...
South Africa said on Wednesday that it would reduce its debt relief package for state power utility Eskom by a further 20 billion rand ($1.1...
South Africa's Eskom has managed to restore eight units at power plants after implementing its highest stage of controlled power cuts early...
South Africa's government has warned that power utility Eskom is facing an “existential crisis” after the amount of unpaid bills owed by local municipalities...
The power utility yielding a profit of more than R10 billion in the 2024-25 financial year. This comes after a tumultuous 2023-24 year marred by 329 days of...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Eskom Holdings SOC Ltd is https://http://www.eskom.co.za.
According to Rankiteo, Eskom Holdings SOC Ltd’s AI-generated cybersecurity score is 797, reflecting their Fair security posture.
According to Rankiteo, Eskom Holdings SOC Ltd currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Eskom Holdings SOC Ltd has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Eskom Holdings SOC Ltd is not certified under SOC 2 Type 1.
According to Rankiteo, Eskom Holdings SOC Ltd does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Eskom Holdings SOC Ltd is not listed as GDPR compliant.
According to Rankiteo, Eskom Holdings SOC Ltd does not currently maintain PCI DSS compliance.
According to Rankiteo, Eskom Holdings SOC Ltd is not compliant with HIPAA regulations.
According to Rankiteo,Eskom Holdings SOC Ltd is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Eskom Holdings SOC Ltd operates primarily in the Utilities industry.
Eskom Holdings SOC Ltd employs approximately 42,043 people worldwide.
Eskom Holdings SOC Ltd presently has no subsidiaries across any sectors.
Eskom Holdings SOC Ltd’s official LinkedIn profile has approximately 581,702 followers.
Eskom Holdings SOC Ltd is classified under the NAICS code 22, which corresponds to Utilities.
Yes, Eskom Holdings SOC Ltd has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/eskom.
Yes, Eskom Holdings SOC Ltd maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/eskom.
As of January 25, 2026, Rankiteo reports that Eskom Holdings SOC Ltd has experienced 1 cybersecurity incidents.
Eskom Holdings SOC Ltd has an estimated 4,236 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.
Title: Eskom Data Center Security Incident
Description: Eskom, a power utility organisation, experienced a security incident at its data center. The working of the systems was affected, and they operated slower than usual. This led to stage four load-shedding and increased power cuts.
Type: Security Incident
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Systems Affected: Data Center
Operational Impact: Slower system performanceStage four load-sheddingIncreased power cuts

Entity Name: Eskom
Entity Type: Power Utility
Industry: Energy
Most Significant System Affected: The most significant system affected in an incident was Data Center.
.png)
The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the processBackgroundAction() function in all versions up to, and including, 10.0.04. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify global map engine settings.
The Save as PDF Plugin by PDFCrowd plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘options’ parameter in all versions up to, and including, 4.5.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. NOTE: Successful exploitation of this vulnerability requires that the PDFCrowd API key is blank (also known as "demo mode", which is the default configuration when the plugin is installed) or known.
The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the action_import_module() function in all versions up to, and including, 7.8.9.2. This makes it possible for authenticated attackers, with a lower-privileged role (e.g., Subscriber-level access and above), to upload arbitrary files on the affected site's server which may make remote code execution possible. Successful exploitation requires an admin to grant Hustle module permissions (or module edit access) to the low-privileged user so they can access the Hustle admin page and obtain the required nonce.
The WP Directory Kit plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.9 via the wdk_public_action AJAX handler. This makes it possible for unauthenticated attackers to extract email addresses for users with Directory Kit-specific user roles.
The Meta-box GalleryMeta plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 3.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with editor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.