Company Details
russian-business-council
3
1,817
522293
rbcdubai.org
0
RUS_6389374
In-progress

Russian Business Council in the United Arab Emirates Company CyberSecurity Posture
rbcdubai.orgThe Russian Business Council (RBC) serves as a bridge between Russia and the United Arab Emirates, and is the only Russian business association in the GCC countries. It facilitates trade and business relations between the UAE and Russia, while providing channels for people interested in enhancing trade and investment ties to communicate and meet. Apart from creating opportunities where investors, business people, and decision-makers and influencers can network and meet, RBC also identifies and encourages the development of information sources relating to trade and investment opportunities. The organization also offers advice on practices and regulations for businesses wanting to enter GCC markets. RBC was formed in 2010 under the umbrella of Dubai Chamber of Commerce. Members of RBC represent a large number of companies, co-owned and operated by Russian businessmen, as well as regional and international companies.
Company Details
russian-business-council
3
1,817
522293
rbcdubai.org
0
RUS_6389374
In-progress
Between 650 and 699

RBCUAE Global Score (TPRM)XXXX

Description: Russian enterprises using unlicensed business automation software were targeted by a RedLine info-stealer campaign. The attackers disseminated pirated software via online forums, embedding RedLine malware to masquerade as a licensing tool. This malware, disguised as the HPDxLIB activator, replaced the legitimate techsys.dll library, leading to the execution of the info-stealer via the 1cv8.exe process. Victims were manipulated into disabling their security systems, which facilitated the theft of sensitive data like credentials, credit card information, and crypto-wallets. This incident highlights the risks associated with using unlicensed software, as businesses inadvertently opened their systems to cyber threats, potentially leading to financial loss and data breaches.


No incidents recorded for Russian Business Council in the United Arab Emirates in 2025.
No incidents recorded for Russian Business Council in the United Arab Emirates in 2025.
No incidents recorded for Russian Business Council in the United Arab Emirates in 2025.
RBCUAE cyber incidents detection timeline including parent company and subsidiaries

The Russian Business Council (RBC) serves as a bridge between Russia and the United Arab Emirates, and is the only Russian business association in the GCC countries. It facilitates trade and business relations between the UAE and Russia, while providing channels for people interested in enhancing trade and investment ties to communicate and meet. Apart from creating opportunities where investors, business people, and decision-makers and influencers can network and meet, RBC also identifies and encourages the development of information sources relating to trade and investment opportunities. The organization also offers advice on practices and regulations for businesses wanting to enter GCC markets. RBC was formed in 2010 under the umbrella of Dubai Chamber of Commerce. Members of RBC represent a large number of companies, co-owned and operated by Russian businessmen, as well as regional and international companies.


Swire is a highly diversified global business group which has been in operation for over 200 years. It employs over 121,000 people across the world. Swire Group’s businesses span Property, Beverages & Food Chain, Aviation, Marine Services, Trading & Industrial, as well as Healthcare. Whilst Swire op

Intertek is a leading Total Quality Assurance provider to industries worldwide. Our network of more than 1,000 laboratories and offices in more than 100 countries, delivers innovative and bespoke Assurance, Testing, Inspection and Certification solutions for our customers’ operations and supply chai

Marubeni Corporation (TSE securities code: 8002) is one of Japan’s largest trading companies (sogo shosha) with more than 165 years of history. Headquartered in Tokyo, Marubeni continues to expand its businesses across the globe, with 130 branches and offices worldwide. Marubeni is involved in th
Our business involves every part of the palm oil supply chain: from managing plantations and mills to refining crude palm oil and manufacturing palm-based products, supported by an extensive fleet of ship tankers and barges that enhances our logistical capability. We have over 38,000 employees in 13
Intertek is a leading Total Quality Assurance provider to industries worldwide. Our network of more than 1,000 laboratories and offices in more than 100 countries, delivers innovative and bespoke Assurance, Testing, Inspection and Certification solutions for our customers' operations and supply cha
The World Bank is a vital source of financial and technical assistance to developing countries around the world. Our vision is to create a world free of poverty on a livable planet. We are not a bank in the common sense; we are made up of two unique development institutions owned by 189 member coun

ALS is a global leader in scientific testing, providing comprehensive testing solutions to clients in more than 60 countries across a wide range of industries, including environment, food and beverage, mining, personal care, pharmaceutical, healthcare and equipment reliability. Using state-of-the-ar
As a service provider in the field of international cooperation for sustainable development and international education work, we are dedicated to shaping a future worth living around the world. GIZ has over 50 years of experience in a wide variety of areas, including economic development and employm

¿Sabés lo importante que es para nosotros que formes parte de COTO? Te proponemos superarte con proyectos arquitectónicos increíbles como, por ejemplo, la construcción de un mega centro comercial, o profesionalizarte en Comercio Exterior interactuando con los mercados del mundo más importantes. Ta
.png)
As 2025 draws to a close, the strategic trade and economic exchanges between Russia and the Gulf Cooperation Council (GCC) have reached...
The Sharjah Research, Technology and Innovation Park (SPARK) and the Russia–UAE Business Council (RBC) have firmed up a partnership that...
Alexander Vinokurov, Chairman of the Russia–UAE Business Council, said the UAE is a strategic long term partner of Russia, not only in trade...
While all eyes are on competing global powers such as the United States, China, and Russia, “middle powers” such as Turkey, the United Arab...
A two-day international summit on technology in the Middle East and Africa kicked off on Thursday in Abu Dhabi, the capital of the United...
The Saudi–Russia Business Forum, which is currently taking place in Riyadh, is setting the stage to link Russia's Eurasian ambitions with...
Council of the European Union EU announces 19th package of sanctions against Russia for multiple industries, including energy,...
Amid major geo-economic and geopolitical shifts, compounded by rapid technological advancements, the need for agile, collaborative and...
That's it from us at Euronews and Africanews from the Global Cybersecurity Forum. I hope you enjoyed our live coverage and learned a little...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Russian Business Council in the United Arab Emirates is http://rbcdubai.org/en/.
According to Rankiteo, Russian Business Council in the United Arab Emirates’s AI-generated cybersecurity score is 697, reflecting their Weak security posture.
According to Rankiteo, Russian Business Council in the United Arab Emirates currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Russian Business Council in the United Arab Emirates is not certified under SOC 2 Type 1.
According to Rankiteo, Russian Business Council in the United Arab Emirates does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Russian Business Council in the United Arab Emirates is not listed as GDPR compliant.
According to Rankiteo, Russian Business Council in the United Arab Emirates does not currently maintain PCI DSS compliance.
According to Rankiteo, Russian Business Council in the United Arab Emirates is not compliant with HIPAA regulations.
According to Rankiteo,Russian Business Council in the United Arab Emirates is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Russian Business Council in the United Arab Emirates operates primarily in the International Trade and Development industry.
Russian Business Council in the United Arab Emirates employs approximately 3 people worldwide.
Russian Business Council in the United Arab Emirates presently has no subsidiaries across any sectors.
Russian Business Council in the United Arab Emirates’s official LinkedIn profile has approximately 1,817 followers.
Russian Business Council in the United Arab Emirates is classified under the NAICS code 522293, which corresponds to International Trade Financing.
No, Russian Business Council in the United Arab Emirates does not have a profile on Crunchbase.
Yes, Russian Business Council in the United Arab Emirates maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/russian-business-council.
As of December 24, 2025, Rankiteo reports that Russian Business Council in the United Arab Emirates has experienced 1 cybersecurity incidents.
Russian Business Council in the United Arab Emirates has an estimated 2,053 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Total Financial Loss: The total financial loss from these incidents is estimated to be $0.
Title: RedLine Info-Stealer Campaign Targeting Russian Enterprises
Description: Russian enterprises using unlicensed business automation software were targeted by a RedLine info-stealer campaign. The attackers disseminated pirated software via online forums, embedding RedLine malware to masquerade as a licensing tool. This malware, disguised as the HPDxLIB activator, replaced the legitimate techsys.dll library, leading to the execution of the info-stealer via the 1cv8.exe process. Victims were manipulated into disabling their security systems, which facilitated the theft of sensitive data like credentials, credit card information, and crypto-wallets. This incident highlights the risks associated with using unlicensed software, as businesses inadvertently opened their systems to cyber threats, potentially leading to financial loss and data breaches.
Type: Malware
Attack Vector: Pirated Software Distribution
Vulnerability Exploited: Use of Unlicensed Software
Motivation: Financial Gain
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Pirated Software.

Financial Loss: Potential
Data Compromised: Credentials, Credit card information, Crypto-wallets
Average Financial Loss: The average financial loss per incident is $0.00.
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Credentials, Credit Card Information, Crypto-Wallets and .

Entity Type: Enterprises
Industry: Business Automation
Location: Russia

Type of Data Compromised: Credentials, Credit card information, Crypto-wallets
Sensitivity of Data: High

Lessons Learned: The risks associated with using unlicensed software include potential financial loss and data breaches.

Recommendations: Avoid using unlicensed software and ensure security systems are not disabled.
Key Lessons Learned: The key lessons learned from past incidents are The risks associated with using unlicensed software include potential financial loss and data breaches.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Avoid using unlicensed software and ensure security systems are not disabled..

Entry Point: Pirated Software

Root Causes: Use of unlicensed software and disabling security systems
Highest Financial Loss: The highest financial loss from an incident was Potential.
Most Significant Data Compromised: The most significant data compromised in an incident were Credentials, Credit Card Information, Crypto-Wallets and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Credit Card Information, Crypto-Wallets and Credentials.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was The risks associated with using unlicensed software include potential financial loss and data breaches.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Avoid using unlicensed software and ensure security systems are not disabled..
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Pirated Software.
.png)
Marshmallow is a lightweight library for converting complex objects to and from simple Python datatypes. In versions from 3.0.0rc1 to before 3.26.2 and from 4.0.0 to before 4.1.2, Schema.load(data, many=True) is vulnerable to denial of service attacks. A moderately sized request can consume a disproportionate amount of CPU time. This issue has been patched in version 3.26.2 and 4.1.2.
KEDA is a Kubernetes-based Event Driven Autoscaling component. Prior to versions 2.17.3 and 2.18.3, an Arbitrary File Read vulnerability has been identified in KEDA, potentially affecting any KEDA resource that uses TriggerAuthentication to configure HashiCorp Vault authentication. The vulnerability stems from an incorrect or insufficient path validation when loading the Service Account Token specified in spec.hashiCorpVault.credential.serviceAccount. An attacker with permissions to create or modify a TriggerAuthentication resource can exfiltrate the content of any file from the node's filesystem (where the KEDA pod resides) by directing the file's content to a server under their control, as part of the Vault authentication request. The potential impact includes the exfiltration of sensitive system information, such as secrets, keys, or the content of files like /etc/passwd. This issue has been patched in versions 2.17.3 and 2.18.3.
Fedify is a TypeScript library for building federated server apps powered by ActivityPub. Prior to versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2, a Regular Expression Denial of Service (ReDoS) vulnerability exists in Fedify's document loader. The HTML parsing regex at packages/fedify/src/runtime/docloader.ts:259 contains nested quantifiers that cause catastrophic backtracking when processing maliciously crafted HTML responses. This issue has been patched in versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2.
Authenticated Remote Code Execution (RCE) in PluXml CMS 5.8.22 allows an attacker with administrator panel access to inject a malicious PHP webshell into a theme file (e.g., home.php).
An issue was discovered in Xiongmai XM530 IP cameras on firmware V5.00.R02.000807D8.10010.346624.S.ONVIF 21.06. The GetStreamUri exposes RTSP URIs containing hardcoded credentials enabling direct unauthorized video stream access.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.