Company Details
iab
730
126,086
541613
iab.com
0
IAB_1438979
In-progress

IAB Company CyberSecurity Posture
iab.comThe Interactive Advertising Bureau (IAB) empowers the media and marketing industries to thrive in the digital economy. Its membership comprises more than 700 leading media companies, brands, agencies, and the technology firms responsible for selling, delivering, and optimizing digital ad marketing campaigns. The trade group fields critical research on interactive advertising, while also educating brands, agencies, and the wider business community on the importance of digital marketing. In affiliation with the IAB Tech Lab, IAB develops technical standards and solutions. IAB is committed to professional development and elevating the knowledge, skills, expertise, and diversity of the workforce across the industry. Through the work of its public policy office in Washington, D.C., the trade association advocates for its members and promotes the value of the interactive advertising industry to legislators and policymakers. Founded in 1996, IAB is headquartered in New York City.
Company Details
iab
730
126,086
541613
iab.com
0
IAB_1438979
In-progress
Between 650 and 699

IAB Global Score (TPRM)XXXX

Description: **Major Data Collection Practices Revealed by Leading Digital Publishers** A recent disclosure highlights how over 1,000 companies—including 242 participating in the **IAB Transparency & Consent Framework (TCF)**—collect and process user data across websites and apps. These entities store and access device information (such as cookies) and leverage **precise geolocation data, IP addresses, browsing history, and search activity** for purposes like **analytics, personalized advertising, content measurement, and audience research**. The data collection spans multiple platforms, including **Yahoo, AOL, Engadget, In The Know, and Makers**, and tracks metrics like **visitor counts, device types (iOS/Android), browser usage, and session duration**. While aggregated and not tied to individual users, the practice raises transparency concerns, particularly given the scale of third-party involvement. Users retain the ability to **withdraw consent or adjust preferences** via "Privacy & Cookie Settings" or "Privacy Dashboard" links on these platforms. However, the disclosure underscores the **extensive reach of data-sharing networks** in digital advertising and content delivery, with implications for user privacy and regulatory compliance. The incident reflects broader industry trends in **cross-site tracking and targeted advertising**, where consent frameworks play a central role in managing data access.


IAB has 7.41% fewer incidents than the average of same-industry companies with at least one recorded incident.
IAB has 28.21% more incidents than the average of all companies with at least one recorded incident.
IAB reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.
IAB cyber incidents detection timeline including parent company and subsidiaries

The Interactive Advertising Bureau (IAB) empowers the media and marketing industries to thrive in the digital economy. Its membership comprises more than 700 leading media companies, brands, agencies, and the technology firms responsible for selling, delivering, and optimizing digital ad marketing campaigns. The trade group fields critical research on interactive advertising, while also educating brands, agencies, and the wider business community on the importance of digital marketing. In affiliation with the IAB Tech Lab, IAB develops technical standards and solutions. IAB is committed to professional development and elevating the knowledge, skills, expertise, and diversity of the workforce across the industry. Through the work of its public policy office in Washington, D.C., the trade association advocates for its members and promotes the value of the interactive advertising industry to legislators and policymakers. Founded in 1996, IAB is headquartered in New York City.

Quad (NYSE: QUAD) is a global marketing experience company that helps brands make direct consumer connections, from household to in-store to online. Supported by state-of-the-art technology and data-driven intelligence, Quad uses its suite of media, creative and production solutions to streamline th

Clinic is an independent creative agency. We create bold ideas, and craft them beautifully, to get people thinking, believing and doing. All of our experience goes into what we do today, and although our world’s constantly changing, the endpoint is still people and their experience, no matter
Founded in 1926 by Marcel Bleustein-Blanchet, today Publicis Groupe is the largest communications group in the world and a leader in marketing, communication, and digital business transformation, led by Arthur Sadoun, the third CEO in its history. Publicis Groupe is positioned at every step of the

Clear Channel Europe is a division of leading global Out of Home media company, Clear Channel Outdoor Holdings, Inc. (NYSE: CCO). The Clear Channel Europe portfolio spans 14 markets with 260,000 advertising panels. Clear Channel Europe has 2,600 dedicated employees. Our Mission is To Create the fu

We are dentsu. We team together to help brands predict and plan for disruptive future opportunities and create new paths to growth in the sustainable economy. We know people better than anyone else and we use those insights to connect brand, content, commerce and experience, underpinned by modern cr

TBWA is The Disruption Company®. We are a Collective of creative minds with an unlimited creative canvas. We create brand platforms that defy convention and compete with culture. Thanks to our trademarked Disruption® methodology, we build the world’s strongest brands. Brands that own an unfair share

Ogilvy has been creating impact for brands through iconic, culture-changing, value-driving ideas since the company was founded by David Ogilvy 75 years ago. We build on that rich legacy through Borderless Creativity – innovating at the intersections of its advertising, public relations, relationship

Interpublic (NYSE: IPG) is a values-based, data-fueled, and creatively-driven provider of marketing solutions. Home to some of the world’s best-known and most innovative communications specialists, IPG global brands include Acxiom, Craft, FCB, FutureBrand, Golin, Initiative, IPG Health, IPG Mediabra

TO MAKE A MEANINGFUL DIFFERENCE TO BRANDS, TO BUSINESSES AND TO PEOPLE Founded in 1835 in Paris, Havas is one of the world’s largest global communications networks, with more than 23,000 people in over 100 markets sharing one single mission: to make a meaningful difference to brands, businesses, a
.png)
'Attacks on our public sector digital infrastructures and private sector data ecosystems could transform Ireland into a digital wasteland...
Quest pointed to Ireland's strong education background for its decision to expand AI operations here.
The initial access broker has been weaponizing endpoint detection and response (EDR) platforms and Windows utilities in recent...
IAB involvement in cybercrime expands, report finds Cyberattacks over the past two years have increasingly involved initial access brokers...
An initial access broker tracked as Storm-0249 is abusing endpoint detection and response solutions and trusted Microsoft Windows utilities...
A Russian national will likely face several years in US prison after pleading guilty to a range of offenses related to his work with...
Only half of Irish office workers are confident in their ability to identify phishing attacks; one in five admit to entering sensitive...
A widespread cybersecurity threat called SocGholish is turning basic software updates into a global trap for victims, according to new...
Cybersecurity researchers have discovered a new malware loader codenamed CountLoader that has been put to use by Russian ransomware gangs to...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of IAB is https://iab.com.
According to Rankiteo, IAB’s AI-generated cybersecurity score is 699, reflecting their Weak security posture.
According to Rankiteo, IAB currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, IAB is not certified under SOC 2 Type 1.
According to Rankiteo, IAB does not hold a SOC 2 Type 2 certification.
According to Rankiteo, IAB is not listed as GDPR compliant.
According to Rankiteo, IAB does not currently maintain PCI DSS compliance.
According to Rankiteo, IAB is not compliant with HIPAA regulations.
According to Rankiteo,IAB is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
IAB operates primarily in the Advertising Services industry.
IAB employs approximately 730 people worldwide.
IAB presently has no subsidiaries across any sectors.
IAB’s official LinkedIn profile has approximately 126,086 followers.
IAB is classified under the NAICS code 541613, which corresponds to Marketing Consulting Services.
No, IAB does not have a profile on Crunchbase.
Yes, IAB maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/iab.
As of December 23, 2025, Rankiteo reports that IAB has experienced 1 cybersecurity incidents.
IAB has an estimated 32,697 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an communication strategy with privacy & cookie settings and privacy dashboard links provided for user consent management..
Title: None
Description: A cyber incident involving the storage and/or access of information on devices (cookies), use of precise geolocation data, IP addresses, browsing and search data for analytics, personalized advertising, content measurement, and audience research. Data collected includes visitor counts, device types, browsers, and visit duration, aggregated and not tied to specific users. The incident affects multiple entities, including those part of the IAB Transparency & Consent Framework.
Type: Data Collection and Tracking
Attack Vector: Legitimate Use of Cookies and Tracking Technologies
Motivation: Analytics, Personalized Advertising, Content Measurement, Audience Research
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Device information, geolocation data, IP addresses, browsing and search data
Systems Affected: Websites and apps owned and operated by Yahoo, AOL, Engadget, In The Know, Makers
Identity Theft Risk: Potential risk due to collection of personal data
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Device information, geolocation data, IP addresses and browsing and search data.

Entity Name: Yahoo
Entity Type: Company
Industry: Technology, Media

Entity Name: AOL
Entity Type: Company
Industry: Technology, Media

Entity Name: Engadget
Entity Type: Company
Industry: Technology, Media

Entity Name: In The Know
Entity Type: Company
Industry: Media

Entity Name: Makers
Entity Type: Company
Industry: Media

Entity Name: IAB Transparency & Consent Framework Members
Entity Type: Multiple Entities
Industry: Various
Customers Affected: 242 members

Communication Strategy: Privacy & Cookie Settings and Privacy Dashboard links provided for user consent management

Type of Data Compromised: Device information, geolocation data, IP addresses, browsing and search data
Sensitivity of Data: High (personal data including precise geolocation and browsing history)
Personally Identifiable Information: Yes (IP address, browsing and search data, geolocation)

Recommendations: Users should review and manage their consent settings via 'Privacy & Cookie Settings' or 'Privacy Dashboard' links. Companies should ensure transparent data collection practices and provide clear opt-out mechanisms.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Users should review and manage their consent settings via 'Privacy & Cookie Settings' or 'Privacy Dashboard' links. Companies should ensure transparent data collection practices and provide clear opt-out mechanisms..

Source: Company Privacy Policy
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Company Privacy Policy.
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Privacy & Cookie Settings and Privacy Dashboard links provided for user consent management.

Customer Advisories: Users can withdraw consent or change choices via 'Privacy & Cookie Settings' or 'Privacy Dashboard' links.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Users can withdraw consent or change choices via 'Privacy & Cookie Settings' or 'Privacy Dashboard' links..
Most Significant Data Compromised: The most significant data compromised in an incident were Device information, geolocation data, IP addresses and browsing and search data.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Device information, geolocation data, IP addresses and browsing and search data.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Users should review and manage their consent settings via 'Privacy & Cookie Settings' or 'Privacy Dashboard' links. Companies should ensure transparent data collection practices and provide clear opt-out mechanisms..
Most Recent Source: The most recent source of information about an incident is Company Privacy Policy.
Most Recent Customer Advisory: The most recent customer advisory issued was an Users can withdraw consent or change choices via 'Privacy & Cookie Settings' or 'Privacy Dashboard' links.
.png)
A vulnerability has been found in SeaCMS up to 13.3. The affected element is an unknown function of the file js/player/dmplayer/dmku/class/mysqli.class.php. Such manipulation of the argument page/limit leads to sql injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HappyDevs TempTool allows Stored XSS.This issue affects TempTool: from n/a through 1.3.1.
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tormorten WP Microdata allows Stored XSS.This issue affects WP Microdata: from n/a through 1.0.
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in HappyDevs TempTool allows Retrieve Embedded Sensitive Data.This issue affects TempTool: from n/a through 1.3.1.
A vulnerability has been found in Tenda FH1201 1.2.0.14(408). Affected is the function sprintf of the file /goform/SetIpBind. Such manipulation of the argument page leads to stack-based buffer overflow. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.