Company Details
irib
3,796
6,757
51211
http://www.irib.ir
0
IRI_7004611
In-progress

IRIB Company CyberSecurity Posture
http://www.irib.irIslamic Republic of Iran Broadcasting, or IRIB, (Persian: صدا و سيمای جمهوری اسلامی ايران, Sedā va Sima-ye Jomhūrī-ye Eslāmī-ye Īrān literally Voice (or Sound) and Vision of the Islamic Republic of Iran), formerly called the National Iranian Radio and Television until the Islamic revolution of 1979, is a giant Iranian corporation in control of radio and television which is among the largest media organizations in Asia and Pacific region, and a regular member of Asia-Pacific Broadcasting Union.
Company Details
irib
3,796
6,757
51211
http://www.irib.ir
0
IRI_7004611
In-progress
Between 750 and 799

IRIB Global Score (TPRM)XXXX

Description: Iran’s state-owned television station, the Islamic Republic of Iran Broadcasting (IRIB) was targeted by Adalat Ali (Ali’s Justice), a hacktivist group. The group hijacked its web-based TV and radio streaming platform,Telewebion, to broadcast an anti-regime message containing a short 50-second video. The Iran’s national TV stream hacked for the second time in a week A hacktivist group known as Adalat Ali (Ali’s Justice) has hijacked the web stream of Iran’s state-owned television station, the Islamic Republic of Iran Broadcasting (IRIB), in order to broadcast an anti-regime message earlier this week. The incident took place on Tuesday, February 1, and hit Telewebion, IRIB’s web-based TV and radio streaming platform. During a live broadcast of the Iran-UAE soccer match, the Adalat Ali group hijacked the web stream and aired a short 50-second video in which it urged Iranians to rise up in nationwide protests against the ruling Khamenei regime during the Fajr Decade, an 11-day celebration of the 1979 Revolution that takes place each year between February 1 and February 11. The message was replayed at various intervals for hours before Telewebion regained control over its platform and removed the access. This was the second hijacking incident that took place in the past few weeks.


No incidents recorded for IRIB in 2025.
No incidents recorded for IRIB in 2025.
No incidents recorded for IRIB in 2025.
IRIB cyber incidents detection timeline including parent company and subsidiaries

Islamic Republic of Iran Broadcasting, or IRIB, (Persian: صدا و سيمای جمهوری اسلامی ايران, Sedā va Sima-ye Jomhūrī-ye Eslāmī-ye Īrān literally Voice (or Sound) and Vision of the Islamic Republic of Iran), formerly called the National Iranian Radio and Television until the Islamic revolution of 1979, is a giant Iranian corporation in control of radio and television which is among the largest media organizations in Asia and Pacific region, and a regular member of Asia-Pacific Broadcasting Union.


A freelancer or freelance worker is a term commonly used for a person who is self-employed and is not necessarily committed to a particular employer long-term. Freelance workers are sometimes represented by a company or a temporary agency that resells freelance labor to clients; others work independ

Bertelsmann is a media, services and education company with more than 80,000 employees that operates in about 50 countries around the world. It includes the entertainment group RTL Group, the trade book publisher Penguin Random House, the music company BMG, the service provider Arvato Group, Bertels
.png)
Iran and Russia have signed a new cooperation agreement on artificial intelligence and cybersecurity, Iranian state media reported,...
TEHRAN – An Iranian delegation will participate in the 4th International Telecommunications and Information Technology Exhibition and...
TEHRAN –The Information and Communication Technology (ICT) Minister, Sattar Hashemi, and the Iraqi ambassador to Tehran, Naseer Abdul Mohsen...
Thousands of personal records from Saudi Games leaked by Cyber Fattah, fueling geopolitical tensions between Iran, Israel, and the U.S..
IRIB is far from an independent news channel. Rather, it is a tool of the Islamic Republic that uses torture and other unlawful and internationally condemned...
The conflict between Israel and Iran is spilling over into the digital world, inflaming a decades-long campaign of hacks and espionage between two nations.
It's the latest cyberattack on Iran claimed by a pro-Israeli hacking group since the latest flare up in tensions between the two countries.
Iran's cybersecurity command has banned the use of internet-connected devices for government officials and their security teams.
TEHRAN, May 27 (MNA) – Newly-unveiled Khorramshahr-4 missile is capable of neutralizing enemy cyber-attacks, the Iranian deputy defense...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of IRIB is http://www.irib.ir.
According to Rankiteo, IRIB’s AI-generated cybersecurity score is 767, reflecting their Fair security posture.
According to Rankiteo, IRIB currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, IRIB is not certified under SOC 2 Type 1.
According to Rankiteo, IRIB does not hold a SOC 2 Type 2 certification.
According to Rankiteo, IRIB is not listed as GDPR compliant.
According to Rankiteo, IRIB does not currently maintain PCI DSS compliance.
According to Rankiteo, IRIB is not compliant with HIPAA regulations.
According to Rankiteo,IRIB is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
IRIB operates primarily in the Media Production industry.
IRIB employs approximately 3,796 people worldwide.
IRIB presently has no subsidiaries across any sectors.
IRIB’s official LinkedIn profile has approximately 6,757 followers.
IRIB is classified under the NAICS code 51211, which corresponds to Motion Picture and Video Production.
No, IRIB does not have a profile on Crunchbase.
Yes, IRIB maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/irib.
As of December 16, 2025, Rankiteo reports that IRIB has experienced 1 cybersecurity incidents.
IRIB has an estimated 6,561 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with regained control over the platform and removed the access..
Title: Hacktivist Group Hijacks Iran’s State-Owned Television Station
Description: The hacktivist group Adalat Ali (Ali’s Justice) hijacked the web-based TV and radio streaming platform, Telewebion, of Iran’s state-owned television station, the Islamic Republic of Iran Broadcasting (IRIB), to broadcast an anti-regime message.
Date Detected: 2022-02-01
Type: Hacktivism
Attack Vector: Web-based streaming platform hijacking
Threat Actor: Adalat Ali (Ali’s Justice)
Motivation: Political activism against the ruling Khamenei regime
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Web-based streaming platform.

Systems Affected: Telewebion web-based streaming platform
Operational Impact: Interruption of live broadcast
Brand Reputation Impact: Negative impact on state-owned television's reputation

Entity Name: Islamic Republic of Iran Broadcasting (IRIB)
Entity Type: State-owned television station
Industry: Media and Broadcasting
Location: Iran

Containment Measures: Regained control over the platform and removed the access
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by regained control over the platform and removed the access.

Entry Point: Web-based streaming platform
Last Attacking Group: The attacking group in the last incident was an Adalat Ali (Ali’s Justice).
Most Recent Incident Detected: The most recent incident detected was on 2022-02-01.
Most Significant System Affected: The most significant system affected in an incident was Telewebion web-based streaming platform.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Regained control over the platform and removed the access.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Web-based streaming platform.
.png)
NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.
uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.
A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."
MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.
A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.