Company Details
kec-international-ltd.
12,425
522,406
23
kecrpg.com
0
KEC_1032221
In-progress


KEC International Ltd. Company CyberSecurity Posture
kecrpg.comKEC International Limited, the flagship company of RPG Enterprises is a diversified global infrastructure Engineering, Procurement & Construction (EPC) major, with a presence in the verticals of Power Transmission & Distribution, Railways, Civil, Urban Infrastructure, Oil & Gas Pipelines, Solar, Smart Infra and Cables. KEC is a USD 2.4 billion diversified infrastructure EPC major building infrastructure globally. With over seven decades of experience, footprint in 110+ countries and presently executing projects in 30+ countries, KEC has made an indelible mark on the world map. Through constant and consistent re-engineering KEC reinvents itself to retain its leadership position in the areas of quality, technology, capacity and capability. KEC's strengths lie in the areas of Design, Manufacturing, Supply and Construction of Turnkey Projects of Power Transmission lines of voltages up to 1,200 kV, in setting up Sub-stations and power Distribution Networks, Optical Fibre Cable (OPGW) installations, turnkey railway infrastructure, civil infrastructure projects & renewable energy projects. KEC has one of the largest global annual production capacities of 4,22,000 MTs, which includes the production of towers, poles, hardware, structures for railways & solar. The company has 8 factories in India, UAE and the Americas. The Company has over 9,000 employees from 35+ nationalities.
Company Details
kec-international-ltd.
12,425
522,406
23
kecrpg.com
0
KEC_1032221
In-progress
Between 750 and 799

KIL Global Score (TPRM)XXXX



No incidents recorded for KEC International Ltd. in 2026.
No incidents recorded for KEC International Ltd. in 2026.
No incidents recorded for KEC International Ltd. in 2026.
KIL cyber incidents detection timeline including parent company and subsidiaries

KEC International Limited, the flagship company of RPG Enterprises is a diversified global infrastructure Engineering, Procurement & Construction (EPC) major, with a presence in the verticals of Power Transmission & Distribution, Railways, Civil, Urban Infrastructure, Oil & Gas Pipelines, Solar, Smart Infra and Cables. KEC is a USD 2.4 billion diversified infrastructure EPC major building infrastructure globally. With over seven decades of experience, footprint in 110+ countries and presently executing projects in 30+ countries, KEC has made an indelible mark on the world map. Through constant and consistent re-engineering KEC reinvents itself to retain its leadership position in the areas of quality, technology, capacity and capability. KEC's strengths lie in the areas of Design, Manufacturing, Supply and Construction of Turnkey Projects of Power Transmission lines of voltages up to 1,200 kV, in setting up Sub-stations and power Distribution Networks, Optical Fibre Cable (OPGW) installations, turnkey railway infrastructure, civil infrastructure projects & renewable energy projects. KEC has one of the largest global annual production capacities of 4,22,000 MTs, which includes the production of towers, poles, hardware, structures for railways & solar. The company has 8 factories in India, UAE and the Americas. The Company has over 9,000 employees from 35+ nationalities.


Across decades, across disciplines, NCC Ltd has dedicated itself to building infrastructure of uncompromising standards. Infrastructure that is a constant reminder of the Company’s holistic construction expertise, which in turn is the result of relentless innovation and sheer dedication. Today, NCC
As North America’s largest equipment rental company, with 1500+ stores in the United States and Canada, we serve construction and industrial companies, utilities, municipalities, homeowners, and communities, with the goal of fulfilling customer needs and surpassing expectations. We go beyond equipm

Turner is a North America-based, international construction services company and is a leading builder in diverse and numerous market segments. The company has earned recognition for undertaking large, complex projects, fostering innovation, embracing emerging technologies, and making a difference fo
Fluor Corporation is a global engineering, procurement and construction company. We work with leaders in the energy, infrastructure, life sciences, advanced technologies, mining and metals industries, as well as government agencies, to build a better world. Since our founding in 1912, we have been
Our purpose is to sustainably deliver infrastructure which is vital to the UK. As a leading provider of infrastructure services, construction and property developments, we are committed to delivering for communities and leaving lasting legacies through our work. We are committed to attracting, reta

Consolidated Contractors International company is a leading diversified company carrying out construction, engineering, procurement, development and investment activities internationally. We are committed to providing reliable, amicable, and professional service to our valuable clients, and to being
GMR Group is a leading Indian infrastructure conglomerate with a diversified presence across Airports, Energy, Transportation, Urban Infrastructure, and Sports. With over two decades of experience, the Group has built world-class assets and pioneered innovations in sustainable infrastructure develop

Hassan Allam Holding is a leading group with a focus on engineering and construction, and investment and development. The Group operates in diverse sectors including infrastructure, energy, water, industrial, logistics, petrochemical, and complex large-scale projects in Egypt and the MENA region. Th

Fundada em Belo Horizonte, Minas Gerais, a Andrade Gutierrez tem reconhecida expertise no segmento de construção pesada. Na década de 1990 iniciou a diversificação dos negócios com investimentos nas áreas de Concessões e Telecomunicações. Hoje o Grupo Andrade Gutierrez é um dos maiores conglomer
.png)
Bharti Airtel announced that its enterprise arm, Airtel Business has won a multi-year contract from the Indian Railway Security Operations...
Welcoming Dr. Sanjay Kumar Das, Addl. Sec. (Science & Technology & Bio Technology Dept.) & State Information Security Officer- Govt. Of West Bengal...
Mid-tier IT firm LTIMindtree on Monday said it has signed a $450 million deal with an agri-business company, marking its largest deal since the two companies.
On the global stage, every power shift sends ripples through markets. The Indo-Pak conflict is no exception. As tensions escalate, questions...
Marksmen Daily - Your daily dose of insights and inspiration Daily Feed Digital Transformation Summit 2025: A Groundbreaking Event that...
Budget 2024 News LIVE Updates: Sectoral experts expect the government to announce policy-related measures, viability gap funding (VGF) and...
Investcorp Acquires NSEIT: NSEIT is a leading provider of advanced digital transformation and cybersecurity services focused on global...
Infrastructure and industrial growth are the keys to success for any nation. They act as twin engines for the nation's growth.
The INDIA CLOUD & DATA SECURITY SUMMIT – 2023, is a strategic event which is designed to explore and consolidate the future of Cloud & Data security...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of KEC International Ltd. is https://www.kecrpg.com/.
According to Rankiteo, KEC International Ltd.’s AI-generated cybersecurity score is 759, reflecting their Fair security posture.
According to Rankiteo, KEC International Ltd. currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, KEC International Ltd. has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, KEC International Ltd. is not certified under SOC 2 Type 1.
According to Rankiteo, KEC International Ltd. does not hold a SOC 2 Type 2 certification.
According to Rankiteo, KEC International Ltd. is not listed as GDPR compliant.
According to Rankiteo, KEC International Ltd. does not currently maintain PCI DSS compliance.
According to Rankiteo, KEC International Ltd. is not compliant with HIPAA regulations.
According to Rankiteo,KEC International Ltd. is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
KEC International Ltd. operates primarily in the Construction industry.
KEC International Ltd. employs approximately 12,425 people worldwide.
KEC International Ltd. presently has no subsidiaries across any sectors.
KEC International Ltd.’s official LinkedIn profile has approximately 522,406 followers.
KEC International Ltd. is classified under the NAICS code 23, which corresponds to Construction.
No, KEC International Ltd. does not have a profile on Crunchbase.
Yes, KEC International Ltd. maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/kec-international-ltd..
As of January 21, 2026, Rankiteo reports that KEC International Ltd. has not experienced any cybersecurity incidents.
KEC International Ltd. has an estimated 39,305 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, KEC International Ltd. has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g., execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.