Company Details
gok-government-of-kenya
186
770
92
president.go.ke
0
GOV_2825535
In-progress

Government of Kenya Company CyberSecurity Posture
president.go.keThe Government of the Republic of Kenya (GoK) is the national government of the republic of Kenya which is composed of 47 Counties, each county with its own semi-autonomous governments. The national government is composed of three arms:[1] The Legislature, the Executive and the Judiciary. Each arm is independent of the other and their individual roles are set by the Constitution of Kenya. The full name of the country is the "Republic of Kenya". Its official Swahili name is 'Jamhuri ya Kenya'. Other terms such as GoK, GK and Serikali are popularly used to refer to the Kenyan government.
Company Details
gok-government-of-kenya
186
770
92
president.go.ke
0
GOV_2825535
In-progress
Between 700 and 749

GK Global Score (TPRM)XXXX

Description: A cyberattack on **Monday, [date not specified]**, targeted multiple high-profile Kenyan government ministry websites, including the **Ministries of Interior, Health, Education, Energy, Labour, and Water**. The attack defaced these platforms with **racist and white supremacist messages** (e.g., *“We will rise again,” “White power worldwide,” “14:88 Heil Hitler”*), disrupting public access for hours. The intrusion was attributed to a group identifying itself as **‘PCP@Kenya’**, though no formal claim of responsibility was made. While **no sensitive financial data or core government systems were compromised**, the incident exposed vulnerabilities in Kenya’s **public-sector digital infrastructure**, prompting an urgent response from national cybersecurity teams (KE-CIRT). The attack was **contained quickly**, with systems restored and placed under continuous monitoring. However, the defacement of **six key ministries’ websites**—critical for public services—raised concerns about **reputational damage, public trust erosion, and potential future exploits**. No evidence linked the attack to broader regional coordination, though it followed a **Somalia e-Visa breach** reported 24 hours prior.


Government of Kenya has 51.52% more incidents than the average of same-industry companies with at least one recorded incident.
Government of Kenya has 56.25% more incidents than the average of all companies with at least one recorded incident.
Government of Kenya reported 1 incidents this year: 1 cyber attacks, 0 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
GK cyber incidents detection timeline including parent company and subsidiaries

The Government of the Republic of Kenya (GoK) is the national government of the republic of Kenya which is composed of 47 Counties, each county with its own semi-autonomous governments. The national government is composed of three arms:[1] The Legislature, the Executive and the Judiciary. Each arm is independent of the other and their individual roles are set by the Constitution of Kenya. The full name of the country is the "Republic of Kenya". Its official Swahili name is 'Jamhuri ya Kenya'. Other terms such as GoK, GK and Serikali are popularly used to refer to the Kenyan government.


Work with the Alberta government to build a stronger province for current and future generations. We offer diverse and rewarding employment opportunities in an environment that encourages continuous learning and career growth. We are one of the largest employers in Alberta with over 27,000 empl

Welcome to the official LinkedIn page for the Federal Emergency Management Agency (FEMA). When disaster strikes, America looks to FEMA to support survivors and first responders in communities all across the country. This page provides career related information, job announcements and relevant updat

Page officielle du ministère de l'Éducation nationale. Retrouvez toute l'information sur www.education.gouv.fr, twitter.com/education_gouv, facebook.com/education.gouv et dans nos lettres d'informations (bulletin hebdo et lettre education.gouv.fr). --------------------------------------------------

MINISTRY of ENVIRONMENT and URBANISM (MEU) MAIN SERVICE UNITS ================== 1) General Directorate of Construction Works 2) General Directorate of Spatial Planning 3) General Directorate of Environmental Management 4) General Directorate of EIA, Permits and Control 5) General Directo

Victorian local government jobs offer opportunities for people with diverse skills. The sector delivers more than 100 services and employs staff in the areas of health and community care, corporate and business support, engineering, planning and community development, and environment and emergency m

Bij de Vlaamse overheid geef je elke dag opnieuw het beste van jezelf, in een job die een verschil maakt in de maatschappij. Pas afgestudeerd of al een aantal jaren professionele ervaring achter de rug? Op zoek naar een job als arbeider, bediende, leidinggevende, administratief medewerker, ingenie

Welcome to the United States Department of Veterans Affairs (VA) Official LinkedIn page. We're recruiting the finest employees to care for our #Veterans. Following/engagement ≠ signify VA endorsement. This is a moderated page, meaning that all comments will be reviewed for appropriate content. Ple

The Ministry of Health (MOH), by way of its objectives, policies and projects included in this strategy, seeks to accomplish a promising future vision; namely, delivering best-quality integrated and comprehensive healthcare services. Carrying health conditions or health status of Saudi inhabitants t

The County of Santa Clara is located at the southern end of the San Francisco Bay and encompasses 1,312 square miles. It has one of the highest median family incomes in the country, and a wide diversity of cultures, backgrounds and talents. The County of Santa Clara continues to attract people fro
.png)
Kenya opened its 2025 National Cybersecurity Conference in Nairobi today, bringing together government officials, tech experts,...
Kenya, 21 November 2025 – The Government has officially launched the 2025 National Cybersecurity Conference and "FIRST" Technical Colloquium...
Azure hit by DDoS using 500K IPs, Kenyan government sites back online, EVALUSION emerges, Kraken enhances ransomware attacks.
Kenya experienced a significant cybersecurity incident on November 17, 2025, when multiple government websites were temporarily taken offline.
Cybersecurity is not merely a technical field; it is a national priority and a cornerstone of economic growth.
The cybersecurity breach on government websites was confirmed by Interior PS Raymond Omollo, who pointed an accusing finger at PCP@Kenya.
On Monday, the government admitted to a hacking attack targeting State House, the Health, Education, Labour, Environment, ICT,...
Kenya's digital platforms under siege.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Government of Kenya is https://www.president.go.ke.
According to Rankiteo, Government of Kenya’s AI-generated cybersecurity score is 735, reflecting their Moderate security posture.
According to Rankiteo, Government of Kenya currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Government of Kenya is not certified under SOC 2 Type 1.
According to Rankiteo, Government of Kenya does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Government of Kenya is not listed as GDPR compliant.
According to Rankiteo, Government of Kenya does not currently maintain PCI DSS compliance.
According to Rankiteo, Government of Kenya is not compliant with HIPAA regulations.
According to Rankiteo,Government of Kenya is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Government of Kenya operates primarily in the Government Administration industry.
Government of Kenya employs approximately 186 people worldwide.
Government of Kenya presently has no subsidiaries across any sectors.
Government of Kenya’s official LinkedIn profile has approximately 770 followers.
Government of Kenya is classified under the NAICS code 92, which corresponds to Public Administration.
No, Government of Kenya does not have a profile on Crunchbase.
Yes, Government of Kenya maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/gok-government-of-kenya.
As of December 04, 2025, Rankiteo reports that Government of Kenya has experienced 1 cybersecurity incidents.
Government of Kenya has an estimated 11,337 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with securing affected systems, containment measures with restoring access to platforms, and recovery measures with continuous monitoring to prevent further disruption, and communication strategy with public statement by interior ministry, communication strategy with encouraging citizens to report relevant information to national ke-cirt, and .
Title: Government of Kenya Cyberattack with Defacement and Racist Messages
Description: The Government of Kenya cyberattack on Monday morning left several ministry websites defaced with racist and white supremacist messages, disrupting access for hours. The attack targeted high-profile platforms, including the ministries of Interior, Health, Education, Energy, Labour, and Water. Users encountered extremist messages such as 'We will rise again,' 'White power worldwide,' and '14:88 Heil Hitler.' The suspected group, 'PCP@Kenya,' is under investigation. The incident was contained, and systems were placed under continuous monitoring. No sensitive financial data or core government systems were compromised.
Date Detected: 2023-11-13T00:00:00Z
Date Publicly Disclosed: 2023-11-13T00:00:00Z
Type: Defacement
Threat Actor: PCP@Kenya (suspected)
Motivation: Hate SpeechRacismWhite SupremacyDisruption
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Systems Affected: Ministry of Interior websiteMinistry of Health websiteMinistry of Education websiteMinistry of Energy websiteMinistry of Labour websiteMinistry of Water website
Downtime: Several hours
Operational Impact: Temporary inaccessibility of public-facing ministry websites; extremist messages displayed to users
Brand Reputation Impact: High (due to racist and extremist messaging on government platforms)

Entity Name: Government of Kenya
Entity Type: Government
Industry: Public Sector
Location: Kenya
Customers Affected: Citizens and users of ministry websites

Entity Name: Ministry of Interior (Kenya)
Entity Type: Government Ministry
Industry: Public Sector
Location: Kenya

Entity Name: Ministry of Health (Kenya)
Entity Type: Government Ministry
Industry: Healthcare
Location: Kenya

Entity Name: Ministry of Education (Kenya)
Entity Type: Government Ministry
Industry: Education
Location: Kenya

Entity Name: Ministry of Energy (Kenya)
Entity Type: Government Ministry
Industry: Energy
Location: Kenya

Entity Name: Ministry of Labour (Kenya)
Entity Type: Government Ministry
Industry: Labor
Location: Kenya

Entity Name: Ministry of Water (Kenya)
Entity Type: Government Ministry
Industry: Utilities
Location: Kenya

Incident Response Plan Activated: True
Containment Measures: Securing affected systemsRestoring access to platforms
Recovery Measures: Continuous monitoring to prevent further disruption
Communication Strategy: Public statement by Interior MinistryEncouraging citizens to report relevant information to National KE-CIRT
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by securing affected systems, restoring access to platforms and .
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Continuous monitoring to prevent further disruption, .

Source: Government of Kenya Interior Ministry Statement
Date Accessed: 2023-11-13

Source: U.S. Embassy in Somalia Advisory
Date Accessed: 2023-11-11
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Government of Kenya Interior Ministry StatementDate Accessed: 2023-11-13, and Source: U.S. Embassy in Somalia AdvisoryDate Accessed: 2023-11-11.

Investigation Status: Ongoing (suspected group 'PCP@Kenya' under investigation; no formal claim of responsibility)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public Statement By Interior Ministry and Encouraging Citizens To Report Relevant Information To National Ke-Cirt.

Stakeholder Advisories: Citizens Encouraged To Report Relevant Information To National Ke-Cirt.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Citizens Encouraged To Report Relevant Information To National Ke-Cirt.
Last Attacking Group: The attacking group in the last incident was an PCP@Kenya (suspected).
Most Recent Incident Detected: The most recent incident detected was on 2023-11-13T00:00:00Z.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2023-11-13T00:00:00Z.
Most Significant System Affected: The most significant system affected in an incident was Ministry of Interior websiteMinistry of Health websiteMinistry of Education websiteMinistry of Energy websiteMinistry of Labour websiteMinistry of Water website.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Securing affected systemsRestoring access to platforms.
Most Recent Source: The most recent source of information about an incident are Government of Kenya Interior Ministry Statement and U.S. Embassy in Somalia Advisory.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (suspected group 'PCP@Kenya' under investigation; no formal claim of responsibility).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Citizens encouraged to report relevant information to National KE-CIRT, .
.png)
MCP Server Kubernetes is an MCP Server that can connect to a Kubernetes cluster and manage it. Prior to 2.9.8, there is a security issue exists in the exec_in_pod tool of the mcp-server-kubernetes MCP Server. The tool accepts user-provided commands in both array and string formats. When a string format is provided, it is passed directly to shell interpretation (sh -c) without input validation, allowing shell metacharacters to be interpreted. This vulnerability can be exploited through direct command injection or indirect prompt injection attacks, where AI agents may execute commands without explicit user intent. This vulnerability is fixed in 2.9.8.
XML external entity (XXE) injection in eyoucms v1.7.1 allows remote attackers to cause a denial of service via crafted body of a POST request.
An issue was discovered in Fanvil x210 V2 2.12.20 allowing unauthenticated attackers on the local network to access administrative functions of the device (e.g. file upload, firmware update, reboot...) via a crafted authentication bypass.
Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.
Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.