Company Details
itc-limited
51,849
3,367,065
30
itcportal.com
0
ITC_2958051
In-progress

ITC Limited Company CyberSecurity Posture
itcportal.comITC is one of India's foremost private sector companies with a Gross Revenue of ₹ 69,446 crores and Net Profit of ₹ 20,422 crores (as on 31.03.2024). ITC has a diversified presence in FMCG, Packaging, Paperboards & Specialty Papers and Agri-Business. ITC's aspiration to be an exemplar in sustainability practices is manifest in its status as the only company in the world, of its size and diversity, to be carbon, water and solid waste recycling positive. In addition, ITC's businesses and value chains create sustainable livelihoods for more than 6 million people, a majority of whom represent the poorest in rural India.
Company Details
itc-limited
51,849
3,367,065
30
itcportal.com
0
ITC_2958051
In-progress
Between 800 and 849

ITC Limited Global Score (TPRM)XXXX



No incidents recorded for ITC Limited in 2025.
No incidents recorded for ITC Limited in 2025.
No incidents recorded for ITC Limited in 2025.
ITC Limited cyber incidents detection timeline including parent company and subsidiaries

ITC is one of India's foremost private sector companies with a Gross Revenue of ₹ 69,446 crores and Net Profit of ₹ 20,422 crores (as on 31.03.2024). ITC has a diversified presence in FMCG, Packaging, Paperboards & Specialty Papers and Agri-Business. ITC's aspiration to be an exemplar in sustainability practices is manifest in its status as the only company in the world, of its size and diversity, to be carbon, water and solid waste recycling positive. In addition, ITC's businesses and value chains create sustainable livelihoods for more than 6 million people, a majority of whom represent the poorest in rural India.


At Kellanova, our vision is to be the world’s best performing snacks-led powerhouse, unleashing the full potential of our differentiated brands and our passionate people. Powered by our strategy to Differentiate, Drive & Deliver, we are a leading company in global snacking, international cereal and

DS Smith provides innovative packaging solutions, paper products and recycling services with a commitment to sustainability and a circular economy. Our core purpose is to Redefine Packaging for a Changing World, and our expert teams work closely with like-minded partners to incorporate renewable re

Electrolux Group is a leading global appliance company that has shaped living for the better for more than 100 years. We reinvent taste, care and wellbeing experiences for millions of people, always striving to be at the forefront of sustainability in society through our solutions and operations. Un

The Schaeffler Group has been driving forward groundbreaking inventions and developments in the field of motion technology for over 75 years. With innovative technologies, products, and services for electric mobility, CO₂-efficient drives, chassis solutions and renewable energies, the company is a r

We are the LEGO Group, the company behind the world’s most loved LEGO® bricks. Our brand name derived from the two Danish words Leg Godt, which mean “Play Well”. We’ve been sparking imaginations and inspiring the builders of tomorrow since 1932. This is our mission and what motivates our colleague

Electrolux Group is a leading global appliance company that has shaped living for the better for more than 100 years. We reinvent taste, care and wellbeing experiences for millions of people, always striving to be at the forefront of sustainability in society through our solutions and operations. Un

They say home is where the heart is. Which is why, since 1942, we’ve been helping customers transform empty properties to homes by dressing them up in warm hues, pastel shades and cool colours, to create spaces that truly represent you. Asian Paints has a lot of identities. We have been India’s larg

For more than 140 years, Vorwerk has been an internationally active family-owned company focused on improving life everywhere we call home. Our superior products and services come with a human touch, from the way we develop and sell them, to the way they are used. Vorwerk is the number-one direct sa

Fondé en 1998, le groupe Cevital oeuvre pour le rayonnement et le développement de l’économie algérienne en intervenant dans des domaines variés par le biais de ses quatre pôles : le pôle agro-industrie et distribution, le pôle automotive, immobilier et services, le pôle industrie, ainsi
.png)
Under this multi-year partnership, ITC Infotech will manage and modernise NAM India's core technology operations covering applications,...
ITC Infotech has inked a multi-year deal with NAM India to revamp its core technology operations, emphasizing applications, infrastructure,...
BusinessWire India Bangalore (Karnataka) [India], November 13: ITC Infotech, a leading global technology services and solutions provider has...
As digital transformation accelerates across manufacturing, the convergence of OT (Operational Technology) and IT (Information Technology)...
NHPC Ltd is transforming operations with AI, IoT and Digital Twin technologies. Dr. Prashant Atrey shares insights into predictive...
ITC Hotels Limited has appointed Amandeep Sarna as its new Chief Digital & Information Officer (CDIO). In this role, he will spearhead the company's digital...
ITC has signed definitive agreements for the 100% acquisition of Prasuma (Ample Foods) along with Meatigo (Chao Chao Foods), a wholly owned...
The IT managed services provider ITC Service has raised £7 million from BGF, to support its organic growth and M&A strategy.
Losing precious money and information to cyber frauds is a real issue and in our modern digital era, cybersecurity professionals and experts...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of ITC Limited is https://www.itcportal.com.
According to Rankiteo, ITC Limited’s AI-generated cybersecurity score is 829, reflecting their Good security posture.
According to Rankiteo, ITC Limited currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, ITC Limited is not certified under SOC 2 Type 1.
According to Rankiteo, ITC Limited does not hold a SOC 2 Type 2 certification.
According to Rankiteo, ITC Limited is not listed as GDPR compliant.
According to Rankiteo, ITC Limited does not currently maintain PCI DSS compliance.
According to Rankiteo, ITC Limited is not compliant with HIPAA regulations.
According to Rankiteo,ITC Limited is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
ITC Limited operates primarily in the Manufacturing industry.
ITC Limited employs approximately 51,849 people worldwide.
ITC Limited presently has no subsidiaries across any sectors.
ITC Limited’s official LinkedIn profile has approximately 3,367,065 followers.
ITC Limited is classified under the NAICS code 30, which corresponds to Manufacturing.
Yes, ITC Limited has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/itc-ltd.
Yes, ITC Limited maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/itc-limited.
As of December 03, 2025, Rankiteo reports that ITC Limited has not experienced any cybersecurity incidents.
ITC Limited has an estimated 7,695 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, ITC Limited has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-9 and 6.9.13-34, there is a vulnerability in ImageMagick’s Magick++ layer that manifests when Options::fontFamily is invoked with an empty string. Clearing a font family calls RelinquishMagickMemory on _drawInfo->font, freeing the font string but leaving _drawInfo->font pointing to freed memory while _drawInfo->family is set to that (now-invalid) pointer. Any later cleanup or reuse of _drawInfo->font re-frees or dereferences dangling memory. DestroyDrawInfo and other setters (Options::font, Image::font) assume _drawInfo->font remains valid, so destruction or subsequent updates trigger crashes or heap corruption. This vulnerability is fixed in 7.1.2-9 and 6.9.13-34.
FeehiCMS version 2.1.1 has a Remote Code Execution via Unrestricted File Upload in Ad Management. FeehiCMS version 2.1.1 allows authenticated remote attackers to upload files that the server later executes (or stores in an executable location) without sufficient validation, sanitization, or execution restrictions. An authenticated remote attacker can upload a crafted PHP file and cause the application or web server to execute it, resulting in remote code execution (RCE).
PHPGurukul Billing System 1.0 is vulnerable to SQL Injection in the admin/index.php endpoint. Specifically, the username parameter accepts unvalidated user input, which is then concatenated directly into a backend SQL query.
NMIS/BioDose software V22.02 and previous versions contain executable binaries with plain text hard-coded passwords. These hard-coded passwords could allow unauthorized access to both the application and database.
NMIS/BioDose V22.02 and previous versions' installation directory paths by default have insecure file permissions, which in certain deployment scenarios can enable users on client workstations to modify the program executables and libraries.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.