Company Details
international-criminal-court---cour-p-nale-internationale
1,535
302,608
92211
icc-cpi.int
0
INT_1797085
In-progress

International Criminal Court Company CyberSecurity Posture
icc-cpi.intThe International Criminal Court (ICC), governed by the Rome Statute, is the first permanent, treaty-based, international criminal court established to help end impunity for the perpetrators of the most serious crimes of concern to the international community. The ICC is an independent international organisation, and is not part of the United Nations system. Its seat is at The Hague in the Netherlands.
Company Details
international-criminal-court---cour-p-nale-internationale
1,535
302,608
92211
icc-cpi.int
0
INT_1797085
In-progress
Between 750 and 799

ICC Global Score (TPRM)XXXX

Description: The International Criminal Court (ICC) recently experienced a sophisticated and targeted cyberattack. The attack was detected late last week and has been contained. The Court is currently assessing the full impact of the incident. This marks the second major cyber security challenge for the ICC in recent years. The attack occurred around the same time as the NATO summit in The Hague, and Dutch cybersecurity officials reported various DDoS attacks against local government and other organizations.


International Criminal Court has 66.67% more incidents than the average of same-industry companies with at least one recorded incident.
International Criminal Court has 53.85% more incidents than the average of all companies with at least one recorded incident.
International Criminal Court reported 1 incidents this year: 1 cyber attacks, 0 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
ICC cyber incidents detection timeline including parent company and subsidiaries

The International Criminal Court (ICC), governed by the Rome Statute, is the first permanent, treaty-based, international criminal court established to help end impunity for the perpetrators of the most serious crimes of concern to the international community. The ICC is an independent international organisation, and is not part of the United Nations system. Its seat is at The Hague in the Netherlands.


Fundada em 1.965 e atuando nas mais diversas áreas do Direito, a firma posiciona-se como uma boutique de assessoria jurídica empresarial, com foco tanto no investidor nacional ou estrangeiro que busca as melhores oportunidades de mercado, quanto nas empresas que visam expandir suas operações e asseg

The Arizona Judicial Branch is an integrated, but decentralized, judicial system implementing its constitutional and statutory responsibilities throughout all levels of government - state, county, and city. The Judicial Branch consists of the Supreme Court, Court of Appeals, Superior Court, and limi

El Tribunal Supremo de Justicia, (TSJ) es el máximo órgano del sistema judicial de Venezuela. El Máximo Tribunal es la cabeza del Poder Judicial de la República Bolivariana de Venezuela, sustituyendo en 1999 a la Corte Suprema de Justicia. El mismo se divide en 6 salas o instancias las cuales se

Mission & Vision: Mission The Maryland Judiciary provides fair, efficient and effective justice for all. Vision The Maryland Judiciary advances justice for all who come to Maryland’s courts. We are an efficient, innovative and accessible court system that works collaboratively with justice partner

Following is a brief overview of the Wisconsin Court System. Municipal courts -237 municipal courts -240 municipal judges -Milwaukee has the largest municipal court and three full-time municipal judges. Madison has the only other full-time municipal court. Circuit courts -Single level trial court

Il sito Giurisprudenza delle Imprese si pone l’obiettivo di mettere a disposizione con la massima tempestività tutte le sentenze, i provvedimenti e gli altri materiali dei Tribunali delle Imprese di Milano, Roma, Bologna, Genova, Venezia, Napoli, Catania, Palermo, Catanzaro e Torino. Tutti i provved
.png)
What is Cyber Law? Get complete information on Cyber Law course including fees, syllabus, subjects, top colleges and admission process for...
More cyber litigation will appear on the docket as pathways to legal accountability for unlawful State-sponsored cyber operations...
The legal landscape for international cybersecurity operations received a major reinforcement this month as the Cyber Law Toolkit,...
MOUNTAIN VIEW, Calif.--(BUSINESS WIRE)--SentinelOne® (NYSE: S), the global leader in AI-native security, today announced the lineup of...
The UN has agreed on a global cybersecurity mechanism, but consensus may come at a cost, ignoring divides and risking deadlock.
The International Criminal Court (ICC) recently announced it was hit by a sophisticated cyberattack. The attack, detected late last week, has been contained.
The International Criminal Court (ICC) in The Hague detected and contained a “new, sophisticated and targeted” cybersecurity incident, marking the second major...
Chrome Zero-Day under active attack, International Criminal Court targeted, Kelly Benefits says 2024 data breach impacts 550K customers.
The International Criminal Court announced on Monday that it had detected a “new, sophisticated and targeted cyber security incident” which it said was spotted...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of International Criminal Court is https://www.icc-cpi.int/Pages/Main.aspx.
According to Rankiteo, International Criminal Court’s AI-generated cybersecurity score is 752, reflecting their Fair security posture.
According to Rankiteo, International Criminal Court currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, International Criminal Court is not certified under SOC 2 Type 1.
According to Rankiteo, International Criminal Court does not hold a SOC 2 Type 2 certification.
According to Rankiteo, International Criminal Court is not listed as GDPR compliant.
According to Rankiteo, International Criminal Court does not currently maintain PCI DSS compliance.
According to Rankiteo, International Criminal Court is not compliant with HIPAA regulations.
According to Rankiteo,International Criminal Court is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
International Criminal Court operates primarily in the Administration of Justice industry.
International Criminal Court employs approximately 1,535 people worldwide.
International Criminal Court presently has no subsidiaries across any sectors.
International Criminal Court’s official LinkedIn profile has approximately 302,608 followers.
International Criminal Court is classified under the NAICS code 92211, which corresponds to Courts.
No, International Criminal Court does not have a profile on Crunchbase.
Yes, International Criminal Court maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/international-criminal-court---cour-p-nale-internationale.
As of December 08, 2025, Rankiteo reports that International Criminal Court has experienced 1 cybersecurity incidents.
International Criminal Court has an estimated 330 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with swift confirmation and containment, and recovery measures with steps are already being taken to reduce any negative outcomes, and communication strategy with informing the public and its member countries..
Title: International Criminal Court (ICC) Cyberattack
Description: The International Criminal Court (ICC) was hit by a sophisticated cyberattack detected late last week. The attack has been contained, and the Court is assessing its full impact. This marks the second major cyber security challenge for the ICC in recent years.
Date Detected: Late last week
Date Publicly Disclosed: Monday
Type: Cyberattack
Attack Vector: Unknown
Motivation: EspionageDisruption
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Entity Name: International Criminal Court (ICC)
Entity Type: Government
Industry: Judicial
Location: The Hague

Incident Response Plan Activated: True
Containment Measures: Swift confirmation and containment
Recovery Measures: Steps are already being taken to reduce any negative outcomes
Communication Strategy: Informing the public and its member countries
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by swift confirmation and containment.
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Steps are already being taken to reduce any negative outcomes.

Investigation Status: Analysis underway
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Informing the public and its member countries.

Stakeholder Advisories: Continued support to maintain its vital work of justice
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Continued support to maintain its vital work of justice.
Most Recent Incident Detected: The most recent incident detected was on Late last week.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on Monday.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Swift confirmation and containment.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Analysis underway.
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Continued support to maintain its vital work of justice, .
.png)
A vulnerability has been found in TykoDev cherry-studio-TykoFork 0.1. This issue affects the function redirectToAuthorization of the file /.well-known/oauth-authorization-server of the component OAuth Server Discovery. Such manipulation of the argument authorizationUrl leads to os command injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.
A flaw has been found in code-projects Question Paper Generator up to 1.0. This vulnerability affects unknown code of the file /selectquestionuser.php. This manipulation of the argument subid causes sql injection. Remote exploitation of the attack is possible. The exploit has been published and may be used.
A vulnerability was found in alokjaiswal Hotel-Management-services-using-MYSQL-and-php up to 5f8b60a7aa6c06a5632de569d4e3f6a8cd82f76f. Affected by this vulnerability is an unknown functionality of the file /dishsub.php. The manipulation of the argument item.name results in cross site scripting. It is possible to launch the attack remotely. The exploit has been made public and could be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability has been found in alokjaiswal Hotel-Management-services-using-MYSQL-and-php up to 5f8b60a7aa6c06a5632de569d4e3f6a8cd82f76f. Affected is an unknown function of the file /usersub.php of the component Request Pending Page. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
A flaw has been found in Verysync 微力同步 up to 2.21.3. This impacts an unknown function of the file /rest/f/api/resources/f96956469e7be39d/tmp/text.txt?override=false of the component Web Administration Module. Executing manipulation can lead to unrestricted upload. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.