Company Details
veon
13,316
129,506
517
veon.com
0
VEO_5009294
In-progress


VEON Company CyberSecurity Posture
veon.comVEON is a global digital operator headquartered in Dubai, providing connectivity and digital services across dynamic frontier markets that are home to more than 6% of the world’s population. With our digital operators, we transform lives through technology-driven services that empower millions and drive economic growth. Social media guidelines: We want everybody to have a positive and welcoming experience across the social media channels we use - and so we ask that everyone keeps their comments and discussions on VEON's page, or posts tagging the company, respectful to other members and our teams. Content which is abusive or harassing, obscene, deceptive or misleading, contains false or defamatory information, is discriminatory against any individual or group, or is considered spam may be removed - including reporting and blocking users responsible from our social media channels.
Company Details
veon
13,316
129,506
517
veon.com
0
VEO_5009294
In-progress
Between 750 and 799

VEON Global Score (TPRM)XXXX

Description: The primary telecom operator in Ukraine, Kyivstar, reports that it has been the victim of a "powerful hacker attack." Customers were left without internet or mobile service as a result of the attack, which also caused the air raid sirens in the northeastern city of Sumy to malfunction. Over 25 million people use Kyivstar's mobile service, while one million people use its home internet. The company used its social media channels to notify its clients about the outage due to the disruption to its website.


No incidents recorded for VEON in 2026.
No incidents recorded for VEON in 2026.
No incidents recorded for VEON in 2026.
VEON cyber incidents detection timeline including parent company and subsidiaries

VEON is a global digital operator headquartered in Dubai, providing connectivity and digital services across dynamic frontier markets that are home to more than 6% of the world’s population. With our digital operators, we transform lives through technology-driven services that empower millions and drive economic growth. Social media guidelines: We want everybody to have a positive and welcoming experience across the social media channels we use - and so we ask that everyone keeps their comments and discussions on VEON's page, or posts tagging the company, respectful to other members and our teams. Content which is abusive or harassing, obscene, deceptive or misleading, contains false or defamatory information, is discriminatory against any individual or group, or is considered spam may be removed - including reporting and blocking users responsible from our social media channels.

We understand that our customers want an easier, less complicated life. We’re using our network, labs, products, services, and people to create a world where everything works together seamlessly, and life is better as a result. How will we continue to drive for this excellence in innovation?

At Vodafone, we believe that connectivity is a force for good. If we use it for the things that really matter, it can improve people's lives and the world around us. Through our technology we empower people, connecting everyone regardless of who they are or where they live, we protect the planet a
Telefónica is today one of the largest telecommunications companies in the world in terms of market capitalisation and number of customers. We have the best infrastructure, as well as an innovative range of digital and data services; therefore, we are favorably positioned to meet the needs of our cu
Welcome to Deutsche Telekom. As one of the world's most valuable brands, we design innovative solutions and products in the areas of connectivity, networks, digitalization and security. #connectingyourworld At Deutsche Telekom, we believe that each and every one of us has the power to move society
Globe is a leading full-service telecommunications company in the Philippines and publicly listed in the PSE with the stock symbol GLO. The company serves the telecommunications and technology needs of consumers and businesses across an entire suite of products and services including mobile, fixed,

PT Telkom Indonesia (Persero) Tbk (Telkom) is a state-owned information and communications technology enterprise and telecommunications network in Indonesia. The Government of Indonesia is the majority shareholder with 52.09 percent shares while the remaining 47.91 percent shares belong to public sh
We are driving the digital transition of Italy and Brazil with innovative technologies and services because we want to contribute to accelerating the sustainable growth of the economy and society by bringing value and prosperity to people, companies and institutions. We offer diversified solutions

Nokia is a global leader in connectivity for the AI era. With expertise across fixed, mobile, and transport networks, powered by the innovation of Nokia Bell Labs, we’re advancing connectivity to secure a brighter world. Advanced connectivity is key to enable the opportunities of AI – opening new d

Founded in 2004, OPPO is one of the world's leading innovators of smart devices. With operations in over 60 countries and regions, OPPO's more than 290,000 points of sales and 1,900 official service centers share the beauty of technology with users all over the world. To forward our vision of a bett
.png)
Kyivstar reports over 3 million users for Starlink satellite services, enhancing connectivity for over 10% of its subscribers.
Dubai and Kyiv, January 15, 2026 – VEON Ltd. (Nasdaq: VEON), a global digital operator (“VEON”), today announced that Kyivstar (Nasdaq: KYIV...
Lviv, January 12, 2026 – VEON, a global digital operator (Nasdaq: VEON), today announces that Kyivstar (Nasdaq: KYIV), Ukraine's leading...
Veon-owned Banglalink has regained ISO 27001:2022 certification for its information security management systems, reaffirming its compliance...
Dubai and Kyiv, December 16, 2025: VEON Ltd. (Nasdaq: VEON), announces that Kyivstar (Nasdaq: KYIV; KYIVW), Ukraine's leading digital...
KYIV, Ukraine, Dec. 16, 2025 (GLOBE NEWSWIRE) -- Kyivstar Group Ltd. (“Kyivstar”, Nasdaq: KYIV), Ukraine's leading digital operator,...
Beeline Kazakhstan, VEON's digital operator in Kazakhstan, has completed the first Starlink Direct-to-Cell call in Central Asia.
London, December 10, 2025 – VEON Ltd. (Nasdaq: VEON), a global digital operator (“VEON” and together with its subsidiaries, the “Group”),...
VEON's JazzCash, Kyivstar and Jazz secure Gold and Silver honors at the World Communication Awards 2025, backed by JazzCash's 20.6M users...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of VEON is https://www.veon.com/.
According to Rankiteo, VEON’s AI-generated cybersecurity score is 767, reflecting their Fair security posture.
According to Rankiteo, VEON currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, VEON has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, VEON is not certified under SOC 2 Type 1.
According to Rankiteo, VEON does not hold a SOC 2 Type 2 certification.
According to Rankiteo, VEON is not listed as GDPR compliant.
According to Rankiteo, VEON does not currently maintain PCI DSS compliance.
According to Rankiteo, VEON is not compliant with HIPAA regulations.
According to Rankiteo,VEON is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
VEON operates primarily in the Telecommunications industry.
VEON employs approximately 13,316 people worldwide.
VEON presently has no subsidiaries across any sectors.
VEON’s official LinkedIn profile has approximately 129,506 followers.
VEON is classified under the NAICS code 517, which corresponds to Telecommunications.
Yes, VEON has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/veon.
Yes, VEON maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/veon.
As of January 21, 2026, Rankiteo reports that VEON has experienced 1 cybersecurity incidents.
VEON has an estimated 9,783 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.
Detection and Response: The company detects and responds to cybersecurity incidents through an communication strategy with social media notifications..
Title: Powerful Hacker Attack on Kyivstar
Description: Kyivstar, the primary telecom operator in Ukraine, experienced a hacker attack that disrupted mobile and internet services for millions of customers and caused malfunctions in air raid sirens in Sumy.
Type: Cyber Attack
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Systems Affected: Mobile ServiceInternet ServiceAir Raid Sirens
Operational Impact: Service OutageSiren Malfunction

Entity Name: Kyivstar
Entity Type: Telecom Operator
Industry: Telecommunications
Location: Ukraine
Size: Large
Customers Affected: 25 million mobile users, 1 million home internet users

Communication Strategy: Social Media Notifications
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Social Media Notifications.
Most Significant System Affected: The most significant system affected in an incident was Mobile ServiceInternet ServiceAir Raid Sirens.
.png)
SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g., execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.