Company Details
icty
231
8,185
922
icty.org
0
ICT_1975231
In-progress

ICTY Company CyberSecurity Posture
icty.orgThe International Criminal Tribunal for the former Yugoslavia (ICTY) is a United Nations court of law dealing with war crimes that took place during the conflicts in the Balkans in the 1990’s. Since its establishment in 1993 it has irreversibly changed the landscape of international humanitarian law and provided victims an opportunity to voice the horrors they witnessed and experienced. In its precedent-setting decisions on genocide, war crimes and crimes against humanity, the Tribunal has shown that an individual’s senior position can no longer protect them from prosecution. The Tribunal has laid the foundations for what is now the accepted norm for conflict resolution and post-conflict development across the globe, specifically that leaders suspected of mass crimes will face justice. The Tribunal has proved that efficient and transparent international justice is possible. The Tribunal is based in The Hague, the Netherlands, with regional offices in Bosnia and Herzegovina, Croatia, Kosovo and Serbia.
Company Details
icty
231
8,185
922
icty.org
0
ICT_1975231
In-progress
Between 750 and 799

ICTY Global Score (TPRM)XXXX



No incidents recorded for ICTY in 2025.
No incidents recorded for ICTY in 2025.
No incidents recorded for ICTY in 2025.
ICTY cyber incidents detection timeline including parent company and subsidiaries

The International Criminal Tribunal for the former Yugoslavia (ICTY) is a United Nations court of law dealing with war crimes that took place during the conflicts in the Balkans in the 1990’s. Since its establishment in 1993 it has irreversibly changed the landscape of international humanitarian law and provided victims an opportunity to voice the horrors they witnessed and experienced. In its precedent-setting decisions on genocide, war crimes and crimes against humanity, the Tribunal has shown that an individual’s senior position can no longer protect them from prosecution. The Tribunal has laid the foundations for what is now the accepted norm for conflict resolution and post-conflict development across the globe, specifically that leaders suspected of mass crimes will face justice. The Tribunal has proved that efficient and transparent international justice is possible. The Tribunal is based in The Hague, the Netherlands, with regional offices in Bosnia and Herzegovina, Croatia, Kosovo and Serbia.


LINS SIQUEIRA LIMA ADVOGODOS é uma banca de advocacia “full-service” com atuação em diversos ramos do Direito, composta por profissionais qualificados e com vasta experiência multisetorial, que somam seus conhecimentos e agregam formas inovadoras de atuação. A excelência, a qualidade técnica e a fo

The Supreme Court of Virginia is one of the oldest continuous judicial bodies in the United States. Its roots are deep in the English legal system dating to the early seventeenth century as part of the Charter of 1606 under which Jamestown, the first permanent English settlement in North America, wa

O Tribunal de Justiça do Distrito Federal e dos Territórios (TJDFT) foi criado em 21 abril de 1960, no mesmo dia da inauguração de Brasília. Nossa missão é garantir os direitos do cidadão e a paz social por meio da solução célere, transparente e ética dos conflitos. O que fazemos? O TJDFT

The Illinois Supreme Court, in addition to being the state’s highest court, is responsible for the state’s unified trial court, one appellate court with five districts, and several supporting units. General administrative and supervisory authority over the court system is vested in the Supreme Court

The Victorian Civil and Administrative Tribunal (VCAT) provides fair, efficient and affordable justice for the Victorian community. We do this by making decisions about a wide range of cases or by helping people to resolve disputes. We're part of Victoria's court system, but less formal than a cour

Escritório de advocacia e consultoria jurídica nas áreas de seguro, responsabilidade civil, gerenciamento de crise e relações de consumo. Atua também em área de prospecção e formatação de novos negócios de seguros para seguradoras, participando de visitas técnicas a clientes e corretores de seguros
.png)
"With Tuesday as a scheduled holiday, tomorrow's closure allows our internal IT department time to secure and restore our systems and to work...
Manassas City Public Schools are closed on Monday due to a cybersecurity incident that has led to connectivity disruptions and phone outages...
Memphis, Tenn., Deputy CIO Augustine Boateng said that as cyber threats become more sophisticated, AI-powered tools can help local...
October is National Cybersecurity Awareness Month, and a great reminder for everyone to participate in growing security awareness!
The memorandum of understanding connects the two in a $7-million State bill that funds training and other security initiatives. The API failed...
The memorandum of understanding connects the two in a $7-million State bill that funds training and other security initiatives.
Carson City's Chief Information Officer Frank Abella will present his views on how to protect yourself from cyber hackers, Oct. 21. By Ronni...
A new audit shows the City of Hamilton knew it was vulnerable three years before 2024's devastating cyber attack — but did not implement...
A new report from Hamilton's auditor general shows the City already knew its IT systems had "critical weaknesses" years before being hit by...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of ICTY is http://icty.org/.
According to Rankiteo, ICTY’s AI-generated cybersecurity score is 761, reflecting their Fair security posture.
According to Rankiteo, ICTY currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, ICTY is not certified under SOC 2 Type 1.
According to Rankiteo, ICTY does not hold a SOC 2 Type 2 certification.
According to Rankiteo, ICTY is not listed as GDPR compliant.
According to Rankiteo, ICTY does not currently maintain PCI DSS compliance.
According to Rankiteo, ICTY is not compliant with HIPAA regulations.
According to Rankiteo,ICTY is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
ICTY operates primarily in the Administration of Justice industry.
ICTY employs approximately 231 people worldwide.
ICTY presently has no subsidiaries across any sectors.
ICTY’s official LinkedIn profile has approximately 8,185 followers.
No, ICTY does not have a profile on Crunchbase.
Yes, ICTY maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/icty.
As of December 08, 2025, Rankiteo reports that ICTY has not experienced any cybersecurity incidents.
ICTY has an estimated 330 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, ICTY has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
A vulnerability has been found in TykoDev cherry-studio-TykoFork 0.1. This issue affects the function redirectToAuthorization of the file /.well-known/oauth-authorization-server of the component OAuth Server Discovery. Such manipulation of the argument authorizationUrl leads to os command injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.
A flaw has been found in code-projects Question Paper Generator up to 1.0. This vulnerability affects unknown code of the file /selectquestionuser.php. This manipulation of the argument subid causes sql injection. Remote exploitation of the attack is possible. The exploit has been published and may be used.
A vulnerability was found in alokjaiswal Hotel-Management-services-using-MYSQL-and-php up to 5f8b60a7aa6c06a5632de569d4e3f6a8cd82f76f. Affected by this vulnerability is an unknown functionality of the file /dishsub.php. The manipulation of the argument item.name results in cross site scripting. It is possible to launch the attack remotely. The exploit has been made public and could be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability has been found in alokjaiswal Hotel-Management-services-using-MYSQL-and-php up to 5f8b60a7aa6c06a5632de569d4e3f6a8cd82f76f. Affected is an unknown function of the file /usersub.php of the component Request Pending Page. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
A flaw has been found in Verysync 微力同步 up to 2.21.3. This impacts an unknown function of the file /rest/f/api/resources/f96956469e7be39d/tmp/text.txt?override=false of the component Web Administration Module. Executing manipulation can lead to unrestricted upload. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.