Company Details
tinexta
2,198
27,400
5415
tinexta.com
0
TIN_1842742
In-progress

TINEXTA S.P.A. Company CyberSecurity Posture
tinexta.comTinexta is an industrial Group that offers innovative solutions for the digital transformation and growth of companies, professionals and institutions. Listed on the Euronext STAR Milan, it is included in the European Tech Leader index as a high-growth tech company. Based in Italy and present in 9 countries from Europe to Latin America with over 2,000 employees, Tinexta is active in the strategic Digital Trust, Cyber Security and Business Innovation sectors.
Company Details
tinexta
2,198
27,400
5415
tinexta.com
0
TIN_1842742
In-progress
Between 750 and 799

TINEXTA S.P.A. Global Score (TPRM)XXXX

Description: A critical security vulnerability was discovered in **GoSign Desktop**, a widely used electronic signature solution by Tinexta InfoCert. The flaws include **disabled TLS certificate validation** and an **unverified update mechanism**, enabling attackers to intercept sensitive data (e.g., credentials, documents, authentication tokens) via man-in-the-middle (MitM) attacks or deliver malicious updates. Since GoSign Desktop is often deployed in **government agencies, enterprises, and legal workflows**—sometimes with **administrator-level privileges**—exploitation could lead to **document tampering, fraud, or legal liability**. The lack of public patches or remediation timelines from InfoCert exacerbates the risk, leaving organizations exposed unless they implement compensating controls (e.g., network isolation, migration to the SaaS version). The vulnerability undermines trust in digital signature workflows, particularly in sectors where **legally binding documents** are processed.


TINEXTA S.P.A. has 85.19% more incidents than the average of same-industry companies with at least one recorded incident.
TINEXTA S.P.A. has 56.25% more incidents than the average of all companies with at least one recorded incident.
TINEXTA S.P.A. reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 1 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
TINEXTA S.P.A. cyber incidents detection timeline including parent company and subsidiaries

Tinexta is an industrial Group that offers innovative solutions for the digital transformation and growth of companies, professionals and institutions. Listed on the Euronext STAR Milan, it is included in the European Tech Leader index as a high-growth tech company. Based in Italy and present in 9 countries from Europe to Latin America with over 2,000 employees, Tinexta is active in the strategic Digital Trust, Cyber Security and Business Innovation sectors.


Accenture is a global professional services company with leading capabilities in digital, cloud and security. Combining unmatched experience and specialized skills across more than 40 industries, we offer Strategy and Consulting, Interactive, Technology and Operations services — all powered by the w

Bring teams together, reimagine workspaces, engage new audiences, and delight your customers –– all on the Zoom AI-first work platform you know and love. 💙 Zoomies help people stay connected so they can get more done together. We set out on a mission to make video communications frictionless and se

CenturyLink (NYSE: CTL) is a technology leader delivering hybrid networking, cloud connectivity, and security solutions to customers around the world. Through its extensive global fiber network, CenturyLink provides secure and reliable services to meet the growing digital demands of businesses and c

We’re TD SYNNEX (NYSE: SNX), a leading distributor and solutions aggregator for the IT ecosystem. We’re 23,000 of the IT industry’s best and brightest, who share an unwavering passion for bringing compelling technology products, services and solutions to the world. We’re an innovative partner that

We make the experience of travel better for everyone, everywhere by inspiring innovation, partnerships and responsibility to people, places and planet. Our technology powers the travel and tourism industry. We inspire more connected ways of thinking, centered around the traveler. Our platform c

A Stefanini é uma multinacional brasileira que atua no setor de serviços em TI. Com um suporte em mais de 30 idiomas, a Stefanini, 5ª empresa mais internacionalizada, segundo a Fundação Dom Cabral, atua em mais de 35 países e e está entre as 100 maiores empresas de TI do mundo (BBC News). Uma das ma
Dimension Data is a leading African born technology provider operating in the Middle East and Africa, offering a portfolio of services including systems integration, managed services infrastructure, cloud solutions, business applications, customer experience, and intelligent security solutions. We p

ASGN Incorporated (NYSE: ASGN) is a leading provider of IT services and solutions across the commercial and government sectors. ASGN helps corporate enterprises and government organizations develop, implement and operate critical IT and business solutions through its integrated offerings. For more i

Somos especializados em integrar tecnologia com inteligência humana, oferecendo soluções digitais que promovem transformação e eficiência operacional. Nosso foco é gerar valor por meio de resultados reais, utilizando inteligência digital para atender às necessidades específicas de cada cliente. Merg
.png)
Italy is considering the creation of a government-backed cybersecurity entity, a project that would potentially use acquisitions to...
Tinexta SpA reported significant revenue growth in its Q3 2025 earnings call, with a 13% year-over-year increase.
The organising committee has added the cybersecurity and business innovation company as an official supporter of the 2026 Winter Olympics.
Tinexta S.p.A., a leading company in Digital Trust, Cybersecurity, Credit Information & Management and Innovation & Marketing services,...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of TINEXTA S.P.A. is http://www.tinexta.com.
According to Rankiteo, TINEXTA S.P.A.’s AI-generated cybersecurity score is 751, reflecting their Fair security posture.
According to Rankiteo, TINEXTA S.P.A. currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, TINEXTA S.P.A. is not certified under SOC 2 Type 1.
According to Rankiteo, TINEXTA S.P.A. does not hold a SOC 2 Type 2 certification.
According to Rankiteo, TINEXTA S.P.A. is not listed as GDPR compliant.
According to Rankiteo, TINEXTA S.P.A. does not currently maintain PCI DSS compliance.
According to Rankiteo, TINEXTA S.P.A. is not compliant with HIPAA regulations.
According to Rankiteo,TINEXTA S.P.A. is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
TINEXTA S.P.A. operates primarily in the IT Services and IT Consulting industry.
TINEXTA S.P.A. employs approximately 2,198 people worldwide.
TINEXTA S.P.A. presently has no subsidiaries across any sectors.
TINEXTA S.P.A.’s official LinkedIn profile has approximately 27,400 followers.
TINEXTA S.P.A. is classified under the NAICS code 5415, which corresponds to Computer Systems Design and Related Services.
No, TINEXTA S.P.A. does not have a profile on Crunchbase.
Yes, TINEXTA S.P.A. maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/tinexta.
As of December 04, 2025, Rankiteo reports that TINEXTA S.P.A. has experienced 1 cybersecurity incidents.
TINEXTA S.P.A. has an estimated 36,938 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with disconnect gosign desktop from internet-facing services, containment measures with restrict network access of the application, containment measures with monitor for unexpected update activity, and remediation measures with transition to saas version (if feasible), and network segmentation with recommended as mitigation, and enhanced monitoring with recommended for update activity..
Title: Critical Vulnerabilities in GoSign Desktop Allow Man-in-the-Middle Attacks and Arbitrary Code Execution
Description: A significant security vulnerability has been discovered in GoSign Desktop, a widely used solution for qualified electronic signatures developed by Tinexta InfoCert S.p.A. The flaws concern improper TLS (Transport Layer Security) certificate validation and an unverified update mechanism. Together, these issues could allow attackers to intercept data or deliver malicious updates. The TLS certificate validation flaw leaves sessions vulnerable to man-in-the-middle (MitM) attacks, enabling attackers to intercept or tamper with encrypted traffic, including credentials, authentication tokens, or documents. The lack of cryptographic verification in the update mechanism allows arbitrary code execution via malicious update packages. The risk is amplified due to GoSign Desktop's widespread use in government agencies and enterprises, often with administrator-level permissions. The SaaS/web version is reportedly unaffected, but the Desktop version remains vulnerable pending patches.
Type: Vulnerability
Attack Vector: Network-based (MitM)Unverified Software Updates
Vulnerability Exploited: Improper TLS Certificate Validation (CWE-295)Unverified Update Mechanism (Lack of Code Signing)
Common Attack Types: The most common types of attacks the company has faced is Vulnerability.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Network interception (MitM)Compromised update server.

Data Compromised: Credentials, Authentication tokens, Digitally signed documents, Sensitive business/government data
Systems Affected: GoSign Desktop (Windows/macOS/Linux - assumed)
Operational Impact: Potential fraud via manipulated digital signaturesLegal liability from compromised documentsLoss of trust in electronic signature workflows
Brand Reputation Impact: High (trust in digital signature provider eroded)Potential loss of government/enterprise contracts
Legal Liabilities: Fraudulent transactionsRegulatory non-compliance for digital signaturesContract disputes
Identity Theft Risk: ['High (if credentials intercepted)']
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Potential: Credentials, Authentication Tokens, Digitally Signed Documents and .

Entity Name: Tinexta InfoCert S.p.A.
Entity Type: Private Company, Digital Signature Provider
Industry: Cybersecurity, Digital Trust Services, eIDAS Qualified Trust Service Provider
Location: Italy (HQ)European Union (operational scope)
Customers Affected: Public administrations, Businesses, Professionals using GoSign Desktop

Containment Measures: Disconnect GoSign Desktop from internet-facing servicesRestrict network access of the applicationMonitor for unexpected update activity
Remediation Measures: Transition to SaaS version (if feasible)
Network Segmentation: ['Recommended as mitigation']
Enhanced Monitoring: Recommended for update activity

Type of Data Compromised: Potential: credentials, Authentication tokens, Digitally signed documents
Sensitivity of Data: High (legally binding digital signatures)Confidential business/government documents
Data Exfiltration: Possible via MitM attacks
Data Encryption: ['TLS encryption bypassed due to validation flaw']
File Types Exposed: Digital signature filesPDF/Document formats (assumed)
Personally Identifiable Information: Potential (if documents contain PII)
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Transition to SaaS version (if feasible), .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by disconnect gosign desktop from internet-facing services, restrict network access of the application, monitor for unexpected update activity and .

Regulations Violated: Potential: eIDAS Regulation (EU No 910/2014), Local data protection laws (if PII exposed),

Lessons Learned: Critical importance of TLS certificate validation in security-sensitive applications, Mandatory code signing for software updates, especially in high-trust contexts, Need for transparent vulnerability disclosure and patch timelines, Risks of desktop applications in regulated workflows (vs. SaaS alternatives)

Recommendations: Immediate: Isolate GoSign Desktop from untrusted networks, Short-term: Migrate to SaaS version (QC2-certified) where possible, Long-term: Implement rigorous code signing and TLS validation in development lifecycle, Policy: Require third-party audits for electronic signature software, Architectural: Prefer zero-trust models for high-value document workflowsImmediate: Isolate GoSign Desktop from untrusted networks, Short-term: Migrate to SaaS version (QC2-certified) where possible, Long-term: Implement rigorous code signing and TLS validation in development lifecycle, Policy: Require third-party audits for electronic signature software, Architectural: Prefer zero-trust models for high-value document workflowsImmediate: Isolate GoSign Desktop from untrusted networks, Short-term: Migrate to SaaS version (QC2-certified) where possible, Long-term: Implement rigorous code signing and TLS validation in development lifecycle, Policy: Require third-party audits for electronic signature software, Architectural: Prefer zero-trust models for high-value document workflowsImmediate: Isolate GoSign Desktop from untrusted networks, Short-term: Migrate to SaaS version (QC2-certified) where possible, Long-term: Implement rigorous code signing and TLS validation in development lifecycle, Policy: Require third-party audits for electronic signature software, Architectural: Prefer zero-trust models for high-value document workflowsImmediate: Isolate GoSign Desktop from untrusted networks, Short-term: Migrate to SaaS version (QC2-certified) where possible, Long-term: Implement rigorous code signing and TLS validation in development lifecycle, Policy: Require third-party audits for electronic signature software, Architectural: Prefer zero-trust models for high-value document workflows
Key Lessons Learned: The key lessons learned from past incidents are Critical importance of TLS certificate validation in security-sensitive applications,Mandatory code signing for software updates, especially in high-trust contexts,Need for transparent vulnerability disclosure and patch timelines,Risks of desktop applications in regulated workflows (vs. SaaS alternatives).

Source: Security Research Report (unspecified)

Source: eIDAS Regulation (EU No 910/2014)
URL: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32014R0910
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Security Research Report (unspecified), and Source: eIDAS Regulation (EU No 910/2014)Url: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32014R0910.

Investigation Status: Ongoing (no public patch timeline from vendor)

Stakeholder Advisories: Recommended: Notify All Gosign Desktop Users Of Risks, Coordinate With Legal Teams On Signature Validity.
Customer Advisories: Urgent: Avoid using GoSign Desktop until patchedVerify all digitally signed documents created during vulnerability window
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Recommended: Notify All Gosign Desktop Users Of Risks, Coordinate With Legal Teams On Signature Validity, Urgent: Avoid Using Gosign Desktop Until Patched, Verify All Digitally Signed Documents Created During Vulnerability Window and .

Entry Point: Network Interception (Mitm), Compromised Update Server,
Backdoors Established: ['Potential via malicious updates']
High Value Targets: Digitally Signed Contracts, Government/Legal Documents, Financial Approvals,
Data Sold on Dark Web: Digitally Signed Contracts, Government/Legal Documents, Financial Approvals,

Root Causes: Lack Of Tls Certificate Validation In Network Communications, Absence Of Cryptographic Verification For Software Updates, Insufficient Secure Coding Practices For High-Trust Application, Delayed Public Disclosure And Patching Process,
Corrective Actions: Implement Proper Tls Certificate Validation (Rfc 5280 Compliance), Enforce Code Signing For All Update Packages, Conduct Third-Party Security Audit Of Gosign Desktop, Establish Transparent Vulnerability Management Process,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Recommended For Update Activity, .
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Implement Proper Tls Certificate Validation (Rfc 5280 Compliance), Enforce Code Signing For All Update Packages, Conduct Third-Party Security Audit Of Gosign Desktop, Establish Transparent Vulnerability Management Process, .
Most Significant Data Compromised: The most significant data compromised in an incident were Credentials, Authentication Tokens, Digitally Signed Documents, Sensitive Business/Government Data and .
Most Significant System Affected: The most significant system affected in an incident was GoSign Desktop (Windows/macOS/Linux - assumed).
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Disconnect GoSign Desktop from internet-facing servicesRestrict network access of the applicationMonitor for unexpected update activity.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Authentication Tokens, Sensitive Business/Government Data, Credentials and Digitally Signed Documents.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Risks of desktop applications in regulated workflows (vs. SaaS alternatives).
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Long-term: Implement rigorous code signing and TLS validation in development lifecycle, Architectural: Prefer zero-trust models for high-value document workflows, Short-term: Migrate to SaaS version (QC2-certified) where possible, Immediate: Isolate GoSign Desktop from untrusted networks and Policy: Require third-party audits for electronic signature software.
Most Recent Source: The most recent source of information about an incident are eIDAS Regulation (EU No 910/2014) and Security Research Report (unspecified).
Most Recent URL for Additional Resources: The most recent URL for additional resources on cybersecurity best practices is https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32014R0910 .
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (no public patch timeline from vendor).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Recommended: Notify all GoSign Desktop users of risks, Coordinate with legal teams on signature validity, .
Most Recent Customer Advisory: The most recent customer advisory issued was an Urgent: Avoid using GoSign Desktop until patchedVerify all digitally signed documents created during vulnerability window.
.png)
MCP Server Kubernetes is an MCP Server that can connect to a Kubernetes cluster and manage it. Prior to 2.9.8, there is a security issue exists in the exec_in_pod tool of the mcp-server-kubernetes MCP Server. The tool accepts user-provided commands in both array and string formats. When a string format is provided, it is passed directly to shell interpretation (sh -c) without input validation, allowing shell metacharacters to be interpreted. This vulnerability can be exploited through direct command injection or indirect prompt injection attacks, where AI agents may execute commands without explicit user intent. This vulnerability is fixed in 2.9.8.
XML external entity (XXE) injection in eyoucms v1.7.1 allows remote attackers to cause a denial of service via crafted body of a POST request.
An issue was discovered in Fanvil x210 V2 2.12.20 allowing unauthenticated attackers on the local network to access administrative functions of the device (e.g. file upload, firmware update, reboot...) via a crafted authentication bypass.
Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.
Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.