ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Kontron AG (www.kontron.ag, ISIN AT0000A0E9W5, WKN A0X9EJ, SANT/ as of 2 June 2022 KTN) - previously S&T AG - is a growing IoT technology group with almost 7,000 employees and subsidiaries in over 20 countries around the world. The company is listed on the TecDAX® and SDAX® of the German Stock Exchange and is one of the leading providers of smart solutions for a host of industries. With a well-known brand and its own technologies in the fields of smart factory, railway communication systems, communication solutions and smart energy, Kontron is the well-trusted partner helping businesses undertake their digital transformation journeys in a wide range of industries to achieve their future ambitions.

Kontron AG | Kontron Group A.I CyberSecurity Scoring

KAKG

Company Details

Linkedin ID:

kontronag

Employees number:

107

Number of followers:

6,120

NAICS:

51122

Industry Type:

Embedded Software Products

Homepage:

kontron.com

IP Addresses:

0

Company ID:

KON_8737247

Scan Status:

In-progress

AI scoreKAKG Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/kontronag.jpeg
KAKG Embedded Software Products
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreKAKG Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/kontronag.jpeg
KAKG Embedded Software Products
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

KAKG Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

KAKG Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for KAKG

Incidents vs Embedded Software Products Industry Average (This Year)

No incidents recorded for Kontron AG | Kontron Group in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Kontron AG | Kontron Group in 2025.

Incident Types KAKG vs Embedded Software Products Industry Avg (This Year)

No incidents recorded for Kontron AG | Kontron Group in 2025.

Incident History — KAKG (X = Date, Y = Severity)

KAKG cyber incidents detection timeline including parent company and subsidiaries

KAKG Company Subsidiaries

SubsidiaryImage

Kontron AG (www.kontron.ag, ISIN AT0000A0E9W5, WKN A0X9EJ, SANT/ as of 2 June 2022 KTN) - previously S&T AG - is a growing IoT technology group with almost 7,000 employees and subsidiaries in over 20 countries around the world. The company is listed on the TecDAX® and SDAX® of the German Stock Exchange and is one of the leading providers of smart solutions for a host of industries. With a well-known brand and its own technologies in the fields of smart factory, railway communication systems, communication solutions and smart energy, Kontron is the well-trusted partner helping businesses undertake their digital transformation journeys in a wide range of industries to achieve their future ambitions.

Loading...
similarCompanies

KAKG Similar Companies

700Credit

700Credit is the leading source of credit reports, soft pull credit data, compliance, identity verification, fraud detection and compliance solutions designed for automotive, RV, Powersports and Marine dealerships across the US. Simple yet powerful, 700Credit offers quick and easy access to the in

Qrvey

As the first and only embedded analytics solution built exclusively for SaaS applications, Qrvey's multi-tenant analytics platform enables SaaS companies to create richer customer-facing analytics experiences and bring them to market faster, while lowering development costs. What makes Qrvey diffe

PlayOn|Younify

MediaMall Technologies is the company behind PlayOn and Younify. PlayOn's apps offer consumers a DVR for streaming video. Younify offers the Younify Connect SDK, a technology platform for applications to connect with a user's video streaming accounts. It allows consumers to view their personalized

Call Loop

Call Loop is an all-in-one SMS, voice broadcast, and ringless voicemail software for businesses. https://www.CallLoop.com Better yet... test It out yourself, simply text the keyword "Loop"​ to 38470! Call Loop has more integration partners than other SMS marketing platform on the market. Here a

Navirec Estonia

Navirec is based on 100% Estonian capital. Offering innovative solutions on the logistic market for more than 15 years, we have the experience needed to provide top-notch service both in Estonia and globally. We offer high-quality GPS tracking service & asset, logistics, transportation, and work man

GLOBAL RED TECNOLOGIA

A Global Red é uma integradora de soluções em TI e Comunicações com grande foco no Mercado Governo. Flexível, ágil e moderna, reúne aos seus 05 anos de mercado, a experiência de cada um de seus integrantes. SINERGIA é a palavra que melhor define esta equipe, pois sinergia é quando o todo é mai

newsone

KAKG CyberSecurity News

November 11, 2025 08:00 AM
Kontron to Power Multinational Energy Equipment Manufacturer with Control Systems in a Market Poised for $100M in Growth

SAN DIEGO--(BUSINESS WIRE)--Kontron, a leading global provider of IoT/Embedded Computer Technology (ECT), announced a new development of...

November 04, 2025 08:00 AM
Kontron Achieves Strong Margin Growth

Kontron AG/ Key word(s): Quarter Results Kontron Achieves Strong Margin Growth 05.11.2025 / 07:00 CET/CESTThe issuer is solely responsible...

July 16, 2025 07:00 AM
Italian cybersecurity firm Exein sees defence boost as it closes funding round

Italian cybersecurity firm Exein has raised €70 million in a Series C funding round, poised for international expansion as demand for...

June 03, 2025 07:00 AM
Kontron announces VX3406 ethernet board for harsh defence and aerospace environments

Kontron has announced the VX3406, a 3U VPX Ethernet board for harsh environments and the first to offer up to six 1000BASE-T ports each managed by a dedicated...

May 23, 2025 07:00 AM
German firm shipped restricted tech to Russia — after EU sanctions kicked in

Calls for tightening of bloc's sanctions regime after Kontron was able to export millions in sensitive telecoms tech to its Russian arm in...

May 23, 2025 07:00 AM
German company shipped restricted technology to Russia despite EU sanctions, Politico reports

German-based tech company Kontron exported sensitive technology to Russia via its Slovenian subsidiary, Kontron doo, despite a new round of EU sanctions.

May 13, 2025 07:00 AM
Kontron launches µDARC ruggedized Microserver for defense networked operations

Kontron μDARC is the most compact, lightweight and energy efficient Microserver solution on the market and is designed for harsh tactical edge computing...

April 07, 2025 07:00 AM
Rail Baltica signalling contract enters negotiation phase

RB Rail AS has commenced a one-month negotiation phase with all shortlisted tenderers in the Design and Build (D&B) tender for the Control-Command and...

June 07, 2024 07:00 AM
Kontron Introduces the VX6096

High-End 6U VPX Computing Board for Imaging, Radar, and Embedded Server Applications. TOULON, France–(BUSINESS WIRE)–Kontron,...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

KAKG CyberSecurity History Information

Official Website of Kontron AG | Kontron Group

The official website of Kontron AG | Kontron Group is https://www.kontron.com.

Kontron AG | Kontron Group’s AI-Generated Cybersecurity Score

According to Rankiteo, Kontron AG | Kontron Group’s AI-generated cybersecurity score is 758, reflecting their Fair security posture.

How many security badges does Kontron AG | Kontron Group’ have ?

According to Rankiteo, Kontron AG | Kontron Group currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Kontron AG | Kontron Group have SOC 2 Type 1 certification ?

According to Rankiteo, Kontron AG | Kontron Group is not certified under SOC 2 Type 1.

Does Kontron AG | Kontron Group have SOC 2 Type 2 certification ?

According to Rankiteo, Kontron AG | Kontron Group does not hold a SOC 2 Type 2 certification.

Does Kontron AG | Kontron Group comply with GDPR ?

According to Rankiteo, Kontron AG | Kontron Group is not listed as GDPR compliant.

Does Kontron AG | Kontron Group have PCI DSS certification ?

According to Rankiteo, Kontron AG | Kontron Group does not currently maintain PCI DSS compliance.

Does Kontron AG | Kontron Group comply with HIPAA ?

According to Rankiteo, Kontron AG | Kontron Group is not compliant with HIPAA regulations.

Does Kontron AG | Kontron Group have ISO 27001 certification ?

According to Rankiteo,Kontron AG | Kontron Group is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Kontron AG | Kontron Group

Kontron AG | Kontron Group operates primarily in the Embedded Software Products industry.

Number of Employees at Kontron AG | Kontron Group

Kontron AG | Kontron Group employs approximately 107 people worldwide.

Subsidiaries Owned by Kontron AG | Kontron Group

Kontron AG | Kontron Group presently has no subsidiaries across any sectors.

Kontron AG | Kontron Group’s LinkedIn Followers

Kontron AG | Kontron Group’s official LinkedIn profile has approximately 6,120 followers.

NAICS Classification of Kontron AG | Kontron Group

Kontron AG | Kontron Group is classified under the NAICS code 51122, which corresponds to Software Publishers.

Kontron AG | Kontron Group’s Presence on Crunchbase

No, Kontron AG | Kontron Group does not have a profile on Crunchbase.

Kontron AG | Kontron Group’s Presence on LinkedIn

Yes, Kontron AG | Kontron Group maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/kontronag.

Cybersecurity Incidents Involving Kontron AG | Kontron Group

As of December 03, 2025, Rankiteo reports that Kontron AG | Kontron Group has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

Kontron AG | Kontron Group has an estimated 69 peer or competitor companies worldwide.

Kontron AG | Kontron Group CyberSecurity History Information

How many cyber incidents has Kontron AG | Kontron Group faced ?

Total Incidents: According to Rankiteo, Kontron AG | Kontron Group has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at Kontron AG | Kontron Group ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-9 and 6.9.13-34, there is a vulnerability in ImageMagick’s Magick++ layer that manifests when Options::fontFamily is invoked with an empty string. Clearing a font family calls RelinquishMagickMemory on _drawInfo->font, freeing the font string but leaving _drawInfo->font pointing to freed memory while _drawInfo->family is set to that (now-invalid) pointer. Any later cleanup or reuse of _drawInfo->font re-frees or dereferences dangling memory. DestroyDrawInfo and other setters (Options::font, Image::font) assume _drawInfo->font remains valid, so destruction or subsequent updates trigger crashes or heap corruption. This vulnerability is fixed in 7.1.2-9 and 6.9.13-34.

Risk Information
cvss3
Base: 4.9
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
Description

FeehiCMS version 2.1.1 has a Remote Code Execution via Unrestricted File Upload in Ad Management. FeehiCMS version 2.1.1 allows authenticated remote attackers to upload files that the server later executes (or stores in an executable location) without sufficient validation, sanitization, or execution restrictions. An authenticated remote attacker can upload a crafted PHP file and cause the application or web server to execute it, resulting in remote code execution (RCE).

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Description

PHPGurukul Billing System 1.0 is vulnerable to SQL Injection in the admin/index.php endpoint. Specifically, the username parameter accepts unvalidated user input, which is then concatenated directly into a backend SQL query.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Description

NMIS/BioDose software V22.02 and previous versions contain executable binaries with plain text hard-coded passwords. These hard-coded passwords could allow unauthorized access to both the application and database.

Risk Information
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

NMIS/BioDose V22.02 and previous versions' installation directory paths by default have insecure file permissions, which in certain deployment scenarios can enable users on client workstations to modify the program executables and libraries.

Risk Information
cvss3
Base: 8.0
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
cvss4
Base: 7.1
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=kontronag' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge