Company Details
serco
31,499
469,991
5415
serco.com
0
SER_3397065
In-progress

Serco Company CyberSecurity Posture
serco.comWe bring together the right people, the right technology and the right partners to create innovative solutions that make positive impact and address some of the most urgent and complex challenges facing the modern world. With a focus on serving governments globally, Serco’s services span justice, migration, defence, space, customer services, health, and transport. Our core capabilities include service design and advisory, resourcing, complex programme management, systems integration, case management, engineering, and asset & facilities management.
Company Details
serco
31,499
469,991
5415
serco.com
0
SER_3397065
In-progress
Between 750 and 799

Serco Global Score (TPRM)XXXX

Description: The outsourcing company Serco accidentally shared the email addresses of almost 300 contact tracers recruited to assist in the UK government’s coronavirus “test, track, and trace” strategy. Serco is among the companies that are recruiting, coaching, and managing contact tracers who do not have clinical training. The email addresses were shared when Serco was contacting new recruits about training. The 296 email addresses were exposed when a member of staff at Serco wrote to trainees asking them not to contact the helpdesk if they had questions about training.
Description: The outsourcing firm Serco was targeted by the Babuk ransomware group. The attackers tried to terminate various security and recovery services as well as database, browser, and email programs and copied more than 1TB of your data. The attack had impacted the company's mainland European operations. The attackers threatened the company with "consequences" if it wouldn’t cooperate.


No incidents recorded for Serco in 2025.
No incidents recorded for Serco in 2025.
No incidents recorded for Serco in 2025.
Serco cyber incidents detection timeline including parent company and subsidiaries

We bring together the right people, the right technology and the right partners to create innovative solutions that make positive impact and address some of the most urgent and complex challenges facing the modern world. With a focus on serving governments globally, Serco’s services span justice, migration, defence, space, customer services, health, and transport. Our core capabilities include service design and advisory, resourcing, complex programme management, systems integration, case management, engineering, and asset & facilities management.


At Orange Business, our ambition is to become the leading European Network and Digital Integrator by leveraging our proven expertise in next-generation connectivity solutions, the cloud and cybersecurity. Our 30,000 women and men are present in 65 countries, where every voice counts. Together, we
FPT Software, a subsidiary of FPT Corporation, is a global technology and IT services provider headquartered in Vietnam, with USD 1.22 billion in revenue (2024) and over 33,000 employees in 30 countries. The company champions complex business opportunities and challenges with its world-class servic

At Hexaware, we're not just a global technology and business process services company; we're a community of 31,600+ Hexawarians dedicated to one singular purpose: creating smiles through the power of great people and technology. With a presence in 58 offices across 28 countries, we empower enterpris
A leading applied technology services company, we innovate to deliver service excellence and successful outcomes across sales, delivery and development. With our strategy to be agile, nimble and customer-centric, we anticipate the future of applied technology and predict tomorrow’s trends to keep ou

ITC Infotech is a global technology solution and services leader providing business-friendly solutions, that enable future-readiness for clients. We seamlessly bring together digital expertise, strong industry-specific alliances, and deep domain expertise from ITC Group businesses. Our solutions and

HCLTech is a global technology company, home to more than 220,000 people across 60 countries, delivering industry-leading capabilities centered around digital, engineering, cloud and AI, powered by a broad portfolio of technology services and products. We work with clients across all major verticals
Indra (www.indracompany.com) is one of the leading global defence, aerospace and technology companies, and a world leader in digital transformation and information technologies in Spain and Latin America through its subsidiary, Minsait. Its business model is based on a comprehensive range of proprie
Unlocking financial technology. Bringing the world’s money into harmony. At FIS, we advance the way the world pays, banks, and invests. With decades of expertise, we provide financial technology solutions to financial institutions, businesses, and developers. Headquartered in Jacksonville, Florida,

Founded in 1982 by a small group of entrepreneurs, Softtek started out in Mexico providing local IT services, and today is a global leader in next-generation digital solutions. The first company to introduce the Nearshore model, Softtek helps Global 2000 organizations build their digital capabilitie
.png)
Serco has gone live with a new mobile application aimed at securely connecting its dispersed contractor workforce across Australia.
The Q2 2025 M&A landscape remained dynamic amid continued geopolitical volatility, domestic policy shifts, and evolving defense priorities.
UK businesses have been warned by the government to redouble their cybersecurity efforts - as experts warn of increased Iran-adjacent attacks.
Here's everything you need to know about investing in UK defence stocks to determine whether they are the right investment for you.
Almost six out of 10 van and truck operators at last month's Microlise transport conference have been impacted by a cybersecurity incident...
CGI (TSX: GIB.A) (NYSE: GIB) was recently selected to deliver key system engineering and cyber security expertise for the European Space...
Herndon, Virginia-based government contractor Serco Inc. will hire hundreds of coaches and physical fitness experts after winning a US Army contract.
The new SafePay ransomware gang has claimed responsibility for the attack on UK telematics biz Microlise, giving the company less than 24 hours to pay its...
Microlise said a cyberattack three weeks ago exposed corporate data. The incident drew attention after customers such as British prison van...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Serco is http://www.serco.com/.
According to Rankiteo, Serco’s AI-generated cybersecurity score is 750, reflecting their Fair security posture.
According to Rankiteo, Serco currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Serco is not certified under SOC 2 Type 1.
According to Rankiteo, Serco does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Serco is not listed as GDPR compliant.
According to Rankiteo, Serco does not currently maintain PCI DSS compliance.
According to Rankiteo, Serco is not compliant with HIPAA regulations.
According to Rankiteo,Serco is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Serco operates primarily in the IT Services and IT Consulting industry.
Serco employs approximately 31,499 people worldwide.
Serco presently has no subsidiaries across any sectors.
Serco’s official LinkedIn profile has approximately 469,991 followers.
Serco is classified under the NAICS code 5415, which corresponds to Computer Systems Design and Related Services.
No, Serco does not have a profile on Crunchbase.
Yes, Serco maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/serco.
As of December 11, 2025, Rankiteo reports that Serco has experienced 2 cybersecurity incidents.
Serco has an estimated 37,490 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware and Data Leak.
Title: Serco Ransomware Attack by Babuk Group
Description: The outsourcing firm Serco was targeted by the Babuk ransomware group. The attackers tried to terminate various security and recovery services as well as database, browser, and email programs and copied more than 1TB of your data. The attack had impacted the company's mainland European operations. The attackers threatened the company with 'consequences' if it wouldn’t cooperate.
Type: Ransomware
Threat Actor: Babuk ransomware group
Motivation: Financial
Title: Serco Email Address Leak Incident
Description: The outsourcing company Serco accidentally shared the email addresses of almost 300 contact tracers recruited to assist in the UK government’s coronavirus 'test, track, and trace' strategy. Serco is among the companies that are recruiting, coaching, and managing contact tracers who do not have clinical training. The email addresses were shared when Serco was contacting new recruits about training. The 296 email addresses were exposed when a member of staff at Serco wrote to trainees asking them not to contact the helpdesk if they had questions about training.
Type: Data Leak
Attack Vector: Accidental Sharing
Common Attack Types: The most common types of attacks the company has faced is Data Leak.

Data Compromised: More than 1tb of data
Systems Affected: Security servicesRecovery servicesDatabase programsBrowser programsEmail programs
Operational Impact: Mainland European operations

Data Compromised: Email Addresses
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Email Addresses.

Entity Name: Serco
Entity Type: Outsourcing Firm
Industry: Outsourcing
Location: Mainland Europe

Entity Name: Serco
Entity Type: Outsourcing Company
Industry: Government Services
Location: UK
Customers Affected: 296

Data Exfiltration: More than 1TB of data

Type of Data Compromised: Email Addresses
Number of Records Exposed: 296
Last Attacking Group: The attacking group in the last incident was an Babuk ransomware group.
Most Significant Data Compromised: The most significant data compromised in an incident were More than 1TB of data, and Email Addresses.
Most Significant System Affected: The most significant system affected in an incident was Security servicesRecovery servicesDatabase programsBrowser programsEmail programs.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were More than 1TB of data and Email Addresses.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 296.0.
.png)
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions prior to 16.0.96 and 17.0.1 through 17.0.9 have a weak default password. By default, this is a 6 digit numeric value which can be brute forced. (This is the app_password parameter). Depending on local configuration, this password could be the extension, voicemail, user manager, DPMA or EPM phone admin password. This issue is fixed in versions 16.0.96 and 17.0.10.
Neuron is a PHP framework for creating and orchestrating AI Agents. In versions 2.8.11 and below, the MySQLWriteTool executes arbitrary SQL provided by the caller using PDO::prepare() + execute() without semantic restrictions. This is consistent with the name (“write tool”), but in an LLM/agent context it becomes a high-risk capability: prompt injection or indirect prompt manipulation can cause execution of destructive queries such as DROP TABLE, TRUNCATE, DELETE, ALTER, or privilege-related statements (subject to DB permissions). Deployments that expose an agent with MySQLWriteTool enabled to untrusted input and/or run the tool with a DB user that has broad privileges are impacted. This issue is fixed in version 2.8.12.
Neuron is a PHP framework for creating and orchestrating AI Agents. Versions 2.8.11 and below use MySQLSelectTool, which is vulnerable to Read-Only Bypass. MySQLSelectTool is intended to be a read-only SQL tool (e.g., for LLM agent querying, however, validation based on the first keyword (e.g., SELECT) and a forbidden-keyword list does not block file-writing constructs such as INTO OUTFILE / INTO DUMPFILE. As a result, an attacker who can influence the tool input (e.g., via prompt injection through a public agent endpoint) may write arbitrary files to the DB server if the MySQL/MariaDB account has the FILE privilege and server configuration permits writes to a useful location (e.g., a web-accessible directory). This issue is fixed in version 2.8.12.
Okta Java Management SDK facilitates interactions with the Okta management API. In versions 11.0.0 through 20.0.0, race conditions may arise from concurrent requests using the ApiClient class. This could cause a status code or response header from one request’s response to influence another request’s response. This issue is fixed in version 20.0.1.
The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. When using versions 4.11.0 through 4.11.2 and 4.12.0, simultaneous requests on the same client may result in improper lookups in the TokenRequestCache for the request results. This issue is fixed in versions 4.11.2 and 4.12.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.