Company Details
globallogic
32,464
1,261,521
5112
globallogic.com
0
GLO_8262068
In-progress

GlobalLogic Company CyberSecurity Posture
globallogic.comGlobalLogic, a Hitachi Group company, is a trusted partner in design, data, and digital engineering for the world’s largest and most innovative companies. Since our inception in 2000, we have been at the forefront of the digital revolution, helping to create some of the most widely used digital products and experiences. Our purpose is to positively impact society and the planet through cutting-edge technology. Together with our clients, we are engineering impact through intelligent products, platforms, and services that are designed for desirability, engineered for excellence, and curated for intelligence. Our people-first culture fosters shoulder-to-shoulder teamwork, supported by a unique lab model and flexible delivery options, including onshore, nearshore, and offshore solutions. We also prioritize environmental stewardship in our product development and are committed to leveraging the diversity of thoughts as a driver for business innovation, attracting and developing talent, and sustainable growth. We are proud of our global recognitions: Leader in the ISG Provider Lens™ Digital Engineering Services 2024 U.S. report Everest Group's Software Product Engineering Services Peak Matrix 2024 Star Performer in Major Contender in Everest Group’s Trust & Safety Peak Matrix 2024 2024 EcoVadis Silver Sustainability Rating Join us as we continue to shape the future of digital engineering and create lasting impacts for businesses and communities worldwide: globallogic.com
Company Details
globallogic
32,464
1,261,521
5112
globallogic.com
0
GLO_8262068
In-progress
Between 700 and 749

GlobalLogic Global Score (TPRM)XXXX

Description: GlobalLogic, a software development subsidiary of Hitachi, suffered a **data breach in July 2025** after hackers exploited a **zero-day vulnerability in Oracle’s E-Business Suite**, used for HR and financial management. The breach exposed **sensitive personal and financial data of 10,471 individuals**, including **names, Social Security numbers, bank details, salaries, passport info, tax identifiers, and emergency contacts**. The **Clop (Cl0p) ransomware gang** claimed responsibility, leveraging the same Oracle flaw to target multiple organizations. While GlobalLogic detected the breach in **October 2025**, the attackers had **unauthorized access since July 10, 2025**. The company offered **24 months of credit monitoring** but did not disclose ransom payments or attacker demands. Clop’s modus operandi involves **data theft and extortion**, threatening to leak or sell stolen information if ransoms remain unpaid. The breach highlights risks tied to **third-party software vulnerabilities** and the escalating threat of **ransomware-driven data extortion** in the tech sector.
Description: In October, GlobalLogic fell victim to a cyberattack where threat actors exploited a **zero-day vulnerability** in **Oracle E-Business Suite**. The breach resulted in the compromise of **personal information belonging to over 10,000 employees**, exposing sensitive data through an unpatched flaw in the enterprise software. The attack highlights the risks associated with unaddressed vulnerabilities in widely used business systems, particularly when zero-day exploits are involved. While the article does not specify ransomware or direct financial demands, the focus remains on the **large-scale internal employee data leak**, which could lead to identity theft, phishing campaigns, or reputational harm. The incident underscores the critical need for timely patch management and proactive threat detection to mitigate exposure from such vulnerabilities in third-party software.


GlobalLogic has 354.55% more incidents than the average of same-industry companies with at least one recorded incident.
GlobalLogic has 212.5% more incidents than the average of all companies with at least one recorded incident.
GlobalLogic reported 2 incidents this year: 0 cyber attacks, 1 ransomware, 1 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
GlobalLogic cyber incidents detection timeline including parent company and subsidiaries

GlobalLogic, a Hitachi Group company, is a trusted partner in design, data, and digital engineering for the world’s largest and most innovative companies. Since our inception in 2000, we have been at the forefront of the digital revolution, helping to create some of the most widely used digital products and experiences. Our purpose is to positively impact society and the planet through cutting-edge technology. Together with our clients, we are engineering impact through intelligent products, platforms, and services that are designed for desirability, engineered for excellence, and curated for intelligence. Our people-first culture fosters shoulder-to-shoulder teamwork, supported by a unique lab model and flexible delivery options, including onshore, nearshore, and offshore solutions. We also prioritize environmental stewardship in our product development and are committed to leveraging the diversity of thoughts as a driver for business innovation, attracting and developing talent, and sustainable growth. We are proud of our global recognitions: Leader in the ISG Provider Lens™ Digital Engineering Services 2024 U.S. report Everest Group's Software Product Engineering Services Peak Matrix 2024 Star Performer in Major Contender in Everest Group’s Trust & Safety Peak Matrix 2024 2024 EcoVadis Silver Sustainability Rating Join us as we continue to shape the future of digital engineering and create lasting impacts for businesses and communities worldwide: globallogic.com

PhonePe Group is India’s leading fintech company, proudly recognized as India’s #1 Trusted Digital Payments* Brand for three consecutive years. Our flagship product, the PhonePe app was launched in August 2016, has rapidly become the preferred consumer payments app in India. In just eight years, Pho

Cadence is a market leader in AI and digital twins, pioneering the application of computational software to accelerate innovation in the engineering design of silicon to systems. Our design solutions, based on Cadence’s Intelligent System Design™ strategy, are essential for the world’s leading semic

We're championing possibilities for all by making money fast, easy, and more enjoyable. Our hope is unlock opportunities for people in their everyday lives and empower the millions of people and businesses around the world who trust, rely, and use PayPal every day. For support, visit the PayPal He

Dassault Systèmes is a catalyst for human progress. Since 1981, the company has pioneered virtual worlds to improve real life for consumers, patients and citizens. With Dassault Systèmes’ 3DEXPERIENCE platform, 370,000 customers of all sizes, in all industries, can collaborate, imagine and create

On the Fulfillment Technologies & Robotics Team, we build dynamic partnerships between people and intelligent machines. This intricate collaboration helps Amazon fulfill orders with unmatched accuracy. Since we began working with robotics, we've added over a million new jobs worldwide. Working in s

Tencent is a world-leading internet and technology company that develops innovative products and services to improve the quality of life of people around the world. Founded in 1998 with its headquarters in Shenzhen, China, Tencent's guiding principle is to use technology for good. Our communication

Shopee is the leading e-commerce platform in Southeast Asia and Taiwan. It is a platform tailored for the region, providing customers with an easy, secure and fast online shopping experience through strong payment and logistical support. Shopee aims to continually enhance its platform and become th

ServiceNow (NYSE: NOW) makes the world work better for everyone. Our cloud-based platform and solutions help digitize and unify organizations so that they can find smarter, faster, better ways to make work flow. So employees and customers can be more connected, more innovative, and more agile. And w

Cox Automotive is the world’s largest automotive services and technology provider. Fueled by the largest breadth of first-party data fed by 2.3 billion online interactions a year, Cox Automotive tailors leading solutions for car shoppers, auto manufacturers, dealers, lenders and fleets. The company
.png)
Logitech disclosed a data breach shortly after it was named as a victim of the recent Oracle's E-Business Suite (EBS) hack.
The UK's national healthcare system is working with the country's National Cyber Security Centre to investigate the incident.
Digital engineering outfit GlobalLogic says personal data from more than 10,000 current and former employees was exposed in the wave of...
GlobalLogic, a provider of digital engineering services part of the Hitachi group, is notifying over 10000 current and former employees that...
In Ukraine, the number of people wishing to enroll in IT specialties has decreased, but leading universities say that enrollments are...
This week sees yet another 5G private network launch, in this case through collaboration between Polish operator Plus, tech giant Ericsson...
The week of September 6–12 witnessed multiple CXO-level changes across the technology sector. Leadership shifts were announced at companies...
In car news are Trimble, TDK, Dolby Atmos, Audi, Elektrobit, Foxconn, Silicon Motions, Qualcomm, GeoTab, Mercedes, PlaxidityX, GlobalLogic,...
PRNewswire/ -- PlaxidityX (formerly Argus Cyber Security), a world leader in automotive cyber security and provider of extended detection...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of GlobalLogic is http://www.globallogic.com.
According to Rankiteo, GlobalLogic’s AI-generated cybersecurity score is 716, reflecting their Moderate security posture.
According to Rankiteo, GlobalLogic currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, GlobalLogic is not certified under SOC 2 Type 1.
According to Rankiteo, GlobalLogic does not hold a SOC 2 Type 2 certification.
According to Rankiteo, GlobalLogic is not listed as GDPR compliant.
According to Rankiteo, GlobalLogic does not currently maintain PCI DSS compliance.
According to Rankiteo, GlobalLogic is not compliant with HIPAA regulations.
According to Rankiteo,GlobalLogic is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
GlobalLogic operates primarily in the Software Development industry.
GlobalLogic employs approximately 32,464 people worldwide.
GlobalLogic presently has no subsidiaries across any sectors.
GlobalLogic’s official LinkedIn profile has approximately 1,261,521 followers.
GlobalLogic is classified under the NAICS code 5112, which corresponds to Software Publishers.
No, GlobalLogic does not have a profile on Crunchbase.
Yes, GlobalLogic maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/globallogic.
As of November 27, 2025, Rankiteo reports that GlobalLogic has experienced 2 cybersecurity incidents.
GlobalLogic has an estimated 26,564 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware and Vulnerability.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with transunion (credit monitoring), and containment measures with investigation launched post-oracle advisory (2025-10-04), and recovery measures with 24 months of free credit monitoring for victims (enrollment deadline: 90 days from notice), and communication strategy with victim notification letters, communication strategy with public disclosure..
Title: GlobalLogic Data Breach via Oracle E-Business Suite Zero-Day Exploit
Description: GlobalLogic confirmed a data breach in July 2025 where hackers exploited a zero-day vulnerability in the Oracle E-Business Suite, compromising personal information of 10,471 individuals. The Clop (Cl0p) ransomware gang claimed responsibility for similar breaches exploiting the same vulnerability, though GlobalLogic has not confirmed the attacker's identity or ransom details. The breach exposed highly sensitive data, including SSNs, bank details, passport info, and salary records. GlobalLogic offered 24 months of free credit monitoring to victims.
Date Detected: 2025-10-09
Date Publicly Disclosed: 2025-10-12
Type: Data Breach
Attack Vector: Exploitation of zero-day vulnerability in Oracle E-Business Suite
Vulnerability Exploited: Zero-day vulnerability in Oracle E-Business Suite (advisory issued 2025-10-04)
Threat Actor: Name: Clop (Cl0p) Ransomware GangClaimed By Group: True
Motivation: Data TheftPotential Extortion (unconfirmed ransom demand)
Title: GlobalLogic Cyberattack Exploiting Oracle E-Business Suite Vulnerability
Description: GlobalLogic reported that in October, cyber criminals exploited a zero-day vulnerability in Oracle E-Business Suite, compromising the personal information of over 10,000 employees.
Date Detected: 2023-10
Date Publicly Disclosed: 2023-10
Type: Cyberattack (Data Breach)
Attack Vector: Exploitation of Zero-Day Vulnerability
Vulnerability Exploited: Oracle E-Business Suite (Zero-Day)
Common Attack Types: The most common types of attacks the company has faced is Ransomware.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Oracle E-Business Suite zero-day vulnerability and Oracle E-Business Suite (Zero-Day Exploit).

Systems Affected: Oracle E-Business Suite (Finance & HR modules)
Brand Reputation Impact: High (sensitive PII exposed, 10,471 individuals affected)
Legal Liabilities: Potential (PII exposure includes SSNs, financial data)
Identity Theft Risk: High (SSNs, passport info, bank details exposed)
Payment Information Risk: High (bank account numbers and routing numbers exposed)

Data Compromised: Personal Information of Employees
Systems Affected: Oracle E-Business Suite
Identity Theft Risk: High (Personal Information Compromised)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Social Security Numbers (Ssns), Tax Identifiers, Bank Account Numbers, Routing Numbers, Salary Information, Internal Employee Numbers, Passport Information, Countries Of Birth, Nationalities, Dates Of Birth, Email Addresses, Phone Numbers, Postal Addresses, Emergency Contact Names And Phone Numbers, and Personal Information.

Entity Name: GlobalLogic
Entity Type: Software Development Services Company
Industry: Technology, Automotive, Healthcare, Finance
Location: San Jose, California, USA
Size: {'employees': '20,000+', 'clients': '400+'}
Customers Affected: 10471

Entity Name: GlobalLogic
Entity Type: Company
Industry: IT Services / Software Development
Customers Affected: No (Employees Affected: 10,000+)

Incident Response Plan Activated: True
Third Party Assistance: Transunion (Credit Monitoring).
Containment Measures: Investigation launched post-Oracle advisory (2025-10-04)
Recovery Measures: 24 months of free credit monitoring for victims (enrollment deadline: 90 days from notice)
Communication Strategy: Victim notification lettersPublic disclosure
Third-Party Assistance: The company involves third-party assistance in incident response through TransUnion (credit monitoring), .

Type of Data Compromised: Names, Social security numbers (ssns), Tax identifiers, Bank account numbers, Routing numbers, Salary information, Internal employee numbers, Passport information, Countries of birth, Nationalities, Dates of birth, Email addresses, Phone numbers, Postal addresses, Emergency contact names and phone numbers
Number of Records Exposed: 10471
Sensitivity of Data: Extremely High (PII, financial data, government IDs)

Type of Data Compromised: Personal Information
Number of Records Exposed: 10,000+
Sensitivity of Data: High
Data Exfiltration: Yes
Personally Identifiable Information: Yes
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by investigation launched post-oracle advisory (2025-10-04) and .

Ransomware Strain: Clop (Cl0p) (suspected but unconfirmed)
Data Exfiltration: True
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through 24 months of free credit monitoring for victims (enrollment deadline: 90 days from notice), .

Source: Comparitech
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Comparitech, and Source: GlobalLogic Victim NoticeDate Accessed: 2025-10-12, and Source: Oracle Security AdvisoryDate Accessed: 2025-10-04.

Investigation Status: Ongoing (breach detected 2025-10-09, initial access traced to 2025-07-10)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Victim Notification Letters and Public Disclosure.

Stakeholder Advisories: Victim Notification Letters With Credit Monitoring Offer.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Victim Notification Letters With Credit Monitoring Offer.

Entry Point: Oracle E-Business Suite zero-day vulnerability
Reconnaissance Period: Potential (exploit occurred between 2025-07-10 and detection on 2025-10-09)
High Value Targets: Finance Systems, Hr Databases,
Data Sold on Dark Web: Finance Systems, Hr Databases,

Entry Point: Oracle E-Business Suite (Zero-Day Exploit)
High Value Targets: Employee Personal Data
Data Sold on Dark Web: Employee Personal Data

Root Causes: Unpatched Zero-Day Vulnerability In Oracle E-Business Suite, Delayed Detection (3-Month Gap Between Breach And Discovery),

Root Causes: Exploitation of Unpatched Zero-Day Vulnerability in Oracle E-Business Suite
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Transunion (Credit Monitoring), .
Last Attacking Group: The attacking group in the last incident was an Name: Clop (Cl0p) Ransomware GangClaimed By Group: True.
Most Recent Incident Detected: The most recent incident detected was on 2025-10-09.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2023-10.
Most Significant Data Compromised: The most significant data compromised in an incident was Personal Information of Employees.
Most Significant System Affected: The most significant system affected in an incident was Oracle E-Business Suite (Finance & HR modules) and Oracle E-Business Suite.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was transunion (credit monitoring), .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Investigation launched post-Oracle advisory (2025-10-04).
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Personal Information of Employees.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 10.2K.
Most Recent Source: The most recent source of information about an incident are Comparitech, GlobalLogic Victim Notice and Oracle Security Advisory.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (breach detected 2025-10-09, initial access traced to 2025-07-10).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Victim notification letters with credit monitoring offer, .
Most Recent Entry Point: The most recent entry point used by an initial access broker were an Oracle E-Business Suite zero-day vulnerability and Oracle E-Business Suite (Zero-Day Exploit).
Most Recent Reconnaissance Period: The most recent reconnaissance period for an incident was Potential (exploit occurred between 2025-07-10 and detection on 2025-10-09).
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Unpatched zero-day vulnerability in Oracle E-Business SuiteDelayed detection (3-month gap between breach and discovery), Exploitation of Unpatched Zero-Day Vulnerability in Oracle E-Business Suite.
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.