Company Details
yokogawa-electric-corporation
238
1,880
335
yokogawa.com
0
YOK_1444741
In-progress

Yokogawa Electric Corporation Company CyberSecurity Posture
yokogawa.comYokogawa Electric Corporation is an electrical/electronic manufacturing company based out of Not Available, Not Available, Not Available, Italy.
Company Details
yokogawa-electric-corporation
238
1,880
335
yokogawa.com
0
YOK_1444741
In-progress
Between 750 and 799

YEC Global Score (TPRM)XXXX

Description: A high-severity vulnerability in a range of industrial recorders and data acquisition systems has been recognized in Yokogawa Electric Corporation. This flaw allows anyone with network access to manipulate the system settings and operational controls due to insecure default settings in their recorder products, where authentication is disabled by default. The attacker can manipulate measured values, alter system settings, and potentially compromise the integrity of critical operations. Possible impacts include incorrect measurements, data integrity compromise, downtime in production lines, and safety hazards in automated environments.


Yokogawa Electric Corporation has 17.65% more incidents than the average of same-industry companies with at least one recorded incident.
Yokogawa Electric Corporation has 28.21% more incidents than the average of all companies with at least one recorded incident.
Yokogawa Electric Corporation reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 1 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
YEC cyber incidents detection timeline including parent company and subsidiaries

Yokogawa Electric Corporation is an electrical/electronic manufacturing company based out of Not Available, Not Available, Not Available, Italy.


Delta is a global innovative provider of switching power supplies and DC brushless fans, as well as a major source for power management solutions, components, visual displays, industrial automation, networking products, and renewable energy solutions. Delta Group has sales offices worldwide and manu

Vertiv (NYSE: VRT) brings together hardware, software, analytics and ongoing services to enable its customers’ vital applications to run continuously, perform optimally and grow with their business needs. Vertiv solves the most important challenges facing today’s data centers, communication networks
We’re the manufacturing partner of choice that helps a diverse customer base design and build products that improve the world. We love to hear your thoughts, comments and ideas so feel free to like, share and comment away. Any question or opinion is good to go as long as it is respectful and falls

At Dyson we are focused on solving the problems that others have ignored; solving them first using our technology and ingenuity. In order to achieve this we need to pioneer technologies that are different and authentic. This is the core of what we do and who we are. We must strive to create the futu
Honeywell is a Fortune 500 company that invents and manufactures technologies to address tough challenges linked to global macrotrends such as safety, security, and energy. With approximately 110,000 employees worldwide, including more than 19,000 engineers and scientists, we have an unrelenting foc

Established in 1964, BHEL is one of India's largest engineering and manufacturing enterprises in the energy and infrastructure sectors, and a leading power equipment manufacturer globally. BHEL serves the core sectors of the economy and provides a comprehensive portfolio of products, systems and ser
Founded in 1918, and today a global leader in developing innovative technologies and solutions for wide-ranging applications in the consumer electronics, housing, automotive, industry, communications, and energy sectors worldwide, the Panasonic Group switched to an operating company system on April

Signify (Euronext: LIGHT) is the world leader in lighting for professionals, consumers, and the Internet of Things. Our Philips products, Interact systems and data-enabled services deliver business value and transform life in homes, buildings and public spaces. In 2023, we had sales of EUR 6.7 billi

Sanmina Corporation (Nasdaq: SANM) is a leading integrated manufacturing solutions provider serving the fastest-growing segments of the global Electronics Manufacturing Services (EMS) market. Recognized as a technology leader, Sanmina Corporationprovides end-to-end manufacturing solutions, deliverin
.png)
The December 2025 issue of World Pipelines explores how the global pipeline sector is adapting to the energy transition, with a strong focus on CCS...
Yokogawa Electric has acquired Intellisync, a cybersecurity and digital transformation services provider, and WiSNAM, a developer of...
Yokogawa Electric Corporation has acquired Intellisync, a provider of cybersecurity and digital transformation solutions, and WiSNAM,...
Yokogawa Electric Corporation has acquired Intellisync, a provider of cybersecurity and digital transformation solutions, and WiSNAM,...
Creating a Digital Hub for Renewable Energy and Decarbonization. Yokogawa Electric Corporation (TOKYO: 6841) announces that it has acquired...
Global functional safety market growth is fueled by smart automation, cybersecurity convergence, and stricter safety standards shaping...
Distributed Control Systems Market Outlook. The distributed control systems market is valued at USD 22.71 billion in 2025 and is forecast to...
HANOVER, Md.–(BUSINESS WIRE)–Dragos Inc., the global leader in cybersecurity for operational technology (OT) environments, today announced...
Yokogawa Electric Corporation has introduced Release 7.01 of its CENTUM™ VP integrated production control system. This launch represents the...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Yokogawa Electric Corporation is https://www.yokogawa.com/in/industries/power/.
According to Rankiteo, Yokogawa Electric Corporation’s AI-generated cybersecurity score is 777, reflecting their Fair security posture.
According to Rankiteo, Yokogawa Electric Corporation currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Yokogawa Electric Corporation is not certified under SOC 2 Type 1.
According to Rankiteo, Yokogawa Electric Corporation does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Yokogawa Electric Corporation is not listed as GDPR compliant.
According to Rankiteo, Yokogawa Electric Corporation does not currently maintain PCI DSS compliance.
According to Rankiteo, Yokogawa Electric Corporation is not compliant with HIPAA regulations.
According to Rankiteo,Yokogawa Electric Corporation is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Yokogawa Electric Corporation operates primarily in the Appliances, Electrical, and Electronics Manufacturing industry.
Yokogawa Electric Corporation employs approximately 238 people worldwide.
Yokogawa Electric Corporation presently has no subsidiaries across any sectors.
Yokogawa Electric Corporation’s official LinkedIn profile has approximately 1,880 followers.
No, Yokogawa Electric Corporation does not have a profile on Crunchbase.
Yes, Yokogawa Electric Corporation maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/yokogawa-electric-corporation.
As of December 24, 2025, Rankiteo reports that Yokogawa Electric Corporation has experienced 1 cybersecurity incidents.
Yokogawa Electric Corporation has an estimated 9,376 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Vulnerability.
Title: High-Severity Vulnerability in Yokogawa Electric Corporation's Industrial Recorders
Description: A high-severity vulnerability in a range of industrial recorders and data acquisition systems has been recognized in Yokogawa Electric Corporation. This flaw allows anyone with network access to manipulate the system settings and operational controls due to insecure default settings in their recorder products, where authentication is disabled by default. The attacker can manipulate measured values, alter system settings, and potentially compromise the integrity of critical operations. Possible impacts include incorrect measurements, data integrity compromise, downtime in production lines, and safety hazards in automated environments.
Type: Vulnerability Exploitation
Attack Vector: Network Access
Vulnerability Exploited: Insecure Default Settings
Common Attack Types: The most common types of attacks the company has faced is Vulnerability.

Data Compromised: Measured values, system settings
Systems Affected: Industrial recorders and data acquisition systems
Downtime: Possible downtime in production lines
Operational Impact: Compromise of critical operations
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Measured values and system settings.

Entity Name: Yokogawa Electric Corporation
Entity Type: Corporation
Industry: Industrial Automation

Type of Data Compromised: Measured values, system settings
Most Significant Data Compromised: The most significant data compromised in an incident were Measured values and system settings.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Measured values and system settings.
.png)
httparty is an API tool. In versions 0.23.2 and prior, httparty is vulnerable to SSRF. This issue can pose a risk of leaking API keys, and it can also allow third parties to issue requests to internal servers. This issue has been patched via commit 0529bcd.
5ire is a cross-platform desktop artificial intelligence assistant and model context protocol client. In versions 0.15.2 and prior, an RCE vulnerability exists in useMarkdown.ts, where the markdown-it-mermaid plugin is initialized with securityLevel: 'loose'. This configuration explicitly permits the rendering of HTML tags within Mermaid diagram nodes. This issue has not been patched at time of publication.
continuwuity is a Matrix homeserver written in Rust. Prior to version 0.5.0, this vulnerability allows a remote, unauthenticated attacker to force the target server to cryptographically sign arbitrary membership events. The flaw exists because the server fails to validate the origin of a signing request, provided the event's state_key is a valid user ID belonging to the target server. This issue has been patched in version 0.5.0. A workaround for this issue involves blocking access to the PUT /_matrix/federation/v2/invite/{roomId}/{eventId} endpoint using the reverse proxy.
LangChain is a framework for building LLM-powered applications. Prior to @langchain/core versions 0.3.80 and 1.1.8, and prior to langchain versions 0.3.37 and 1.2.3, a serialization injection vulnerability exists in LangChain JS's toJSON() method (and subsequently when string-ifying objects using JSON.stringify(). The method did not escape objects with 'lc' keys when serializing free-form data in kwargs. The 'lc' key is used internally by LangChain to mark serialized objects. When user-controlled data contains this key structure, it is treated as a legitimate LangChain object during deserialization rather than plain user data. This issue has been patched in @langchain/core versions 0.3.80 and 1.1.8, and langchain versions 0.3.37 and 1.2.3
LangChain is a framework for building agents and LLM-powered applications. Prior to versions 0.3.81 and 1.2.5, a serialization injection vulnerability exists in LangChain's dumps() and dumpd() functions. The functions do not escape dictionaries with 'lc' keys when serializing free-form dictionaries. The 'lc' key is used internally by LangChain to mark serialized objects. When user-controlled data contains this key structure, it is treated as a legitimate LangChain object during deserialization rather than plain user data. This issue has been patched in versions 0.3.81 and 1.2.5.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.