Company Details
ip-com-networks-co-ltd
22
0
51125
ip-com.com.cn
0
IP-_2801743
In-progress

IP-COM NETWORKS CO., LTD Company CyberSecurity Posture
ip-com.com.cnIP-COM Networks Co., Ltd, commonly known as IP-COM, is a leading global supplier of SMB networking solutions. Headquartered in Shenzhen, IP-COM has 13 offices across the country. IP-COM is committed to providing the networking solutions with most professional and competitive-price for SMB, keeping leading the way in WLAN coverage area. There are over 600 R&D engineers, 30% of whom is from World-Top-500 enterprises like HUAWEI, and over 20% are Postgraduate or PhD. Plus, IP-COM owns the advanced wireless-testing labs and keeps to invest 20% of sales revenue in R&D. These enable IP-COM to develop 10 new products with its advanced technology each month to meet the customers' increasing needs and lead the way in WLAN area. IP-COM has provided networking solutions with most professional and competitive-price for over 5000 hotels such as CAPITAL HOTEL, Country Garden Silver Beach Hotel, Hilton Hotel, JINJIANG INN, 7 Days INN etc., which greatly improves the hotel experience and helps these hotels to set a good image.
Company Details
ip-com-networks-co-ltd
22
0
51125
ip-com.com.cn
0
IP-_2801743
In-progress
Between 800 and 849

INCL Global Score (TPRM)XXXX



No incidents recorded for IP-COM NETWORKS CO., LTD in 2025.
No incidents recorded for IP-COM NETWORKS CO., LTD in 2025.
No incidents recorded for IP-COM NETWORKS CO., LTD in 2025.
INCL cyber incidents detection timeline including parent company and subsidiaries

IP-COM Networks Co., Ltd, commonly known as IP-COM, is a leading global supplier of SMB networking solutions. Headquartered in Shenzhen, IP-COM has 13 offices across the country. IP-COM is committed to providing the networking solutions with most professional and competitive-price for SMB, keeping leading the way in WLAN coverage area. There are over 600 R&D engineers, 30% of whom is from World-Top-500 enterprises like HUAWEI, and over 20% are Postgraduate or PhD. Plus, IP-COM owns the advanced wireless-testing labs and keeps to invest 20% of sales revenue in R&D. These enable IP-COM to develop 10 new products with its advanced technology each month to meet the customers' increasing needs and lead the way in WLAN area. IP-COM has provided networking solutions with most professional and competitive-price for over 5000 hotels such as CAPITAL HOTEL, Country Garden Silver Beach Hotel, Hilton Hotel, JINJIANG INN, 7 Days INN etc., which greatly improves the hotel experience and helps these hotels to set a good image.


We are a professional networking site for the cannabis industry. We are providing a website and mobile app that are in a safe, encrypted environment where “all things cannabis” can be shared, discovered and connected. Dispensaries can communicate with vendors, cultivators, post jobs, gain exposu

Focused on Silicon Valley's professional service firms (i.e., medical, legal, insurance, accounting, and finance), but open to others as well. The company serves clients of 20 to 250 employees within the Silicon Valley region. Sagacent offers technology management and support, including proactive/

Hawassa University (HU) is one of the leading public Universities in Ethiopia. It has four campuses – three in Hawassa city and one at Wondogenet. It has more than 20,000 students enrolled in different fields of study and programs. More than 1,000 instructors and around 2,000 administrative staff

Are you a small business owner in Metro Detroit frustrated by unresponsive IT support? TAZ Networks completely manages small business computer networks so you can stop wasting time chasing your "IT guy" and focus on growing your business. Outsource your IT! TAZ Networks provides IT support for busi

Sometimes the harmony between business and technology gets disrupted. Business Network Consulting helps your organization rediscover that rhythm and reap the full benefits of your technology. We’re passionate about IT and know that getting the most from your technology requires expert knowledge and

Konnect Up is a telecommunications company in the I.T. and Communications industry offering a suite of solutions, including a compilation of voice carrier and data services, hosted software to manage your network across multiple service providers, customizable hosted applications to track telecom i
.png)
A more than year-long digital intrusion into cybersecurity company F5 , publicized last week and blamed on Chinese spies, has defenders...
Weekly Recap: F5 Breached, Linux Rootkits, Pixnapping Attack, EtherHiding & More | Read more hacking news on The Hacker News cybersecurity...
State-sponsored hackers believed to be linked to China infiltrated systems at cybersecurity firm F5 (NASDAQ:FFIV) in late 2023 and remained...
The enterprise device vendor has patched several vulnerabilities that hackers discovered after breaching its networks.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued Emergency Directive 26-01 in response to a serious cyber threat...
Cybersecurity company F5's stocks dropped 12% after disclosing a system breach by a "highly sophisticated nation-state threat actor.
A potentially “catastrophic” breach of a major US-based cybersecurity provider has been blamed on state-backed hackers from China,...
A potentially “catastrophic” breach of a major US-based cybersecurity provider has been blamed on state-backed hackers from China,...
Networking software company F5 disclosed a long-term breach of its systems this week. The fallout could be severe.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of IP-COM NETWORKS CO., LTD is http://www.ip-com.com.cn/en/.
According to Rankiteo, IP-COM NETWORKS CO., LTD’s AI-generated cybersecurity score is 808, reflecting their Good security posture.
According to Rankiteo, IP-COM NETWORKS CO., LTD currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, IP-COM NETWORKS CO., LTD is not certified under SOC 2 Type 1.
According to Rankiteo, IP-COM NETWORKS CO., LTD does not hold a SOC 2 Type 2 certification.
According to Rankiteo, IP-COM NETWORKS CO., LTD is not listed as GDPR compliant.
According to Rankiteo, IP-COM NETWORKS CO., LTD does not currently maintain PCI DSS compliance.
According to Rankiteo, IP-COM NETWORKS CO., LTD is not compliant with HIPAA regulations.
According to Rankiteo,IP-COM NETWORKS CO., LTD is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
IP-COM NETWORKS CO., LTD operates primarily in the Computer Networking Products industry.
IP-COM NETWORKS CO., LTD employs approximately 22 people worldwide.
IP-COM NETWORKS CO., LTD presently has no subsidiaries across any sectors.
IP-COM NETWORKS CO., LTD’s official LinkedIn profile has approximately 0 followers.
IP-COM NETWORKS CO., LTD is classified under the NAICS code 51125, which corresponds to Software Publishers.
No, IP-COM NETWORKS CO., LTD does not have a profile on Crunchbase.
Yes, IP-COM NETWORKS CO., LTD maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/ip-com-networks-co-ltd.
As of November 28, 2025, Rankiteo reports that IP-COM NETWORKS CO., LTD has not experienced any cybersecurity incidents.
IP-COM NETWORKS CO., LTD has an estimated 949 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, IP-COM NETWORKS CO., LTD has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.