Company Details
telekomunikasi-indonesia
21,112
704,866
517
telkom.co.id
0
TEL_1128000
In-progress

Telkom Indonesia Company CyberSecurity Posture
telkom.co.idPT Telkom Indonesia (Persero) Tbk (Telkom) is a state-owned information and communications technology enterprise and telecommunications network in Indonesia. The Government of Indonesia is the majority shareholder with 52.09 percent shares while the remaining 47.91 percent shares belong to public shareholders. Telkom’s shares are traded on the Indonesian Stock Exchange (IDX) where it is listed as “TLKM” and on the New York Stock Exchange (NYSE), which lists it as “TLK”. As it transforms to become a digital telecommunication company, TelkomGroup implements a customer-oriented business and company operational strategy. The transformation aims to trim down TelkomGroup’s organization to be leaner and more agile in adapting the fast-changing nature of telecommunications industry. The new organization is expected to be able to improve efficiency and be more effective in producing a quality customer experience. TelkomGroup’s activities grow and change in accordance to the development of new technology, information and digitalization, but still within the corridor of telecommunications and information technology. This is evident in the newly developed business lines, which complements the company’s existing legacy business.
Company Details
telekomunikasi-indonesia
21,112
704,866
517
telkom.co.id
0
TEL_1128000
In-progress
Between 750 and 799

Telkom Indonesia Global Score (TPRM)XXXX



No incidents recorded for Telkom Indonesia in 2025.
No incidents recorded for Telkom Indonesia in 2025.
No incidents recorded for Telkom Indonesia in 2025.
Telkom Indonesia cyber incidents detection timeline including parent company and subsidiaries

PT Telkom Indonesia (Persero) Tbk (Telkom) is a state-owned information and communications technology enterprise and telecommunications network in Indonesia. The Government of Indonesia is the majority shareholder with 52.09 percent shares while the remaining 47.91 percent shares belong to public shareholders. Telkom’s shares are traded on the Indonesian Stock Exchange (IDX) where it is listed as “TLKM” and on the New York Stock Exchange (NYSE), which lists it as “TLK”. As it transforms to become a digital telecommunication company, TelkomGroup implements a customer-oriented business and company operational strategy. The transformation aims to trim down TelkomGroup’s organization to be leaner and more agile in adapting the fast-changing nature of telecommunications industry. The new organization is expected to be able to improve efficiency and be more effective in producing a quality customer experience. TelkomGroup’s activities grow and change in accordance to the development of new technology, information and digitalization, but still within the corridor of telecommunications and information technology. This is evident in the newly developed business lines, which complements the company’s existing legacy business.


Fundada em 1975, a Telemont Engenharia de Telecomunicações S/A é líder na prestação de serviços de implantação, manutenção e operação de redes de telecomunicações. São 7,7 milhões de acessos de voz, 3 milhões de ADSL e dados e 63 mil km de fibra óptica operados pela empresa. Através da Telemont I

Reliance Communications Limited, founded by the late Shri Dhirubhai H Ambani (1932-2002), has Corporate clientele that includes 40,000 Indian and multinational corporations, including small and medium enterprises. Reliance Communications has established a pan-India, Next-Generation, digital network

Connecting Nation. Accelerating Indonesia's Future. As Indonesia's leading digital telecommunications company, Telkomsel is committed to building a connected, competitive, and future-ready society. For over 29 years, we've empowered individuals, homes, and businesses with innovative connectivity an

About Motorola Solutions | Solving for safer Safety and security are at the heart of everything we do at Motorola Solutions. We build and connect technologies to help protect people, property and places. Our solutions foster the collaboration that’s critical for safer communities, safer schools, sa

We are an award-winning international communications company operating across the Middle East, North Africa and Southeast Asia. Serving consumers and businesses in 10 countries, we deliver a leading data experience through a broad range of content and services via our advanced, data-centric mob
EchoStar Corporation (Nasdaq: SATS) is a premier provider of technology, networking services, television entertainment and connectivity, offering consumer, enterprise, operator and government solutions worldwide under its EchoStar®, Boost Mobile®, Sling TV, DISH TV, Hughes®, HughesNet®, HughesON™ an
Our 15 000 talented colleagues serve millions of customers every day in one of the world’s most connected regions. With a strong connectivity base, we’re the hub in the digital ecosystem, empowering people, companies and societies to stay in touch with everything that matters 24/7/365 - on their ter

WE ARE EMPOWERING DIGITAL LIFE We don't know how the world will look like in 2050, but we know that A1 Telekom Austria Group is geared up for current and future demands. We are a leading provider of digital services and communications solutions in Central and Eastern Europe, offering a state-of-th

TELMEX, la empresa líder de telecomunicaciones y servicios TI en México, ha realizado importantes inversiones para desarrollar la plataforma tecnológica más robusta y vanguardista del país, que le permite ofrecer la más amplia gama de soluciones, con los mayores estándares de calidad, seguridad, con
.png)
Telkom Indonesia (Persero) has formed a strategic partnership with Fortinet to improve its digital infrastructure and cybersecurity...
Kaspersky signed a Memorandum of Understanding (MoU) with Telkom University, in implementing educational and scientific initiatives aimed at...
Singapore-based regional insurtech Igloo has partnered with Telkomsel, Indonesia's biggest telecommunications service provider, to introduce...
Telkom Indonesia revealed over the weekend that it has launched an AI Centre of Excellence (CoE) supported by its digital services arm...
Indonesia's telecommunications sector is at a historic crossroads. After a decade of consolidation, three groups — TelkomGroup (with...
State-owned Telkom Indonesia said on Monday it is set to carry out repairs on a damaged subsea cable that has disrupted internet...
Telkom Indonesia announced on Wednesday it is working with IBM Indonesia to develop a sovereign AI solution that it says will allow local enterprises to create...
Telkom Indonesia announced on Monday it has signed a Memorandum of Understanding (MoU) with Zoom Communications to cooperate on selling AI-based solutions for...
Telkom Indonesia announced on Friday it is collaborating with Gadjah Mada University (UGM) to develop an earthquake detection system.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Telkom Indonesia is http://www.telkom.co.id.
According to Rankiteo, Telkom Indonesia’s AI-generated cybersecurity score is 796, reflecting their Fair security posture.
According to Rankiteo, Telkom Indonesia currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Telkom Indonesia is not certified under SOC 2 Type 1.
According to Rankiteo, Telkom Indonesia does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Telkom Indonesia is not listed as GDPR compliant.
According to Rankiteo, Telkom Indonesia does not currently maintain PCI DSS compliance.
According to Rankiteo, Telkom Indonesia is not compliant with HIPAA regulations.
According to Rankiteo,Telkom Indonesia is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Telkom Indonesia operates primarily in the Telecommunications industry.
Telkom Indonesia employs approximately 21,112 people worldwide.
Telkom Indonesia presently has no subsidiaries across any sectors.
Telkom Indonesia’s official LinkedIn profile has approximately 704,866 followers.
Telkom Indonesia is classified under the NAICS code 517, which corresponds to Telecommunications.
No, Telkom Indonesia does not have a profile on Crunchbase.
Yes, Telkom Indonesia maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/telekomunikasi-indonesia.
As of December 11, 2025, Rankiteo reports that Telkom Indonesia has not experienced any cybersecurity incidents.
Telkom Indonesia has an estimated 9,686 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Telkom Indonesia has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions prior to 16.0.96 and 17.0.1 through 17.0.9 have a weak default password. By default, this is a 6 digit numeric value which can be brute forced. (This is the app_password parameter). Depending on local configuration, this password could be the extension, voicemail, user manager, DPMA or EPM phone admin password. This issue is fixed in versions 16.0.96 and 17.0.10.
Neuron is a PHP framework for creating and orchestrating AI Agents. In versions 2.8.11 and below, the MySQLWriteTool executes arbitrary SQL provided by the caller using PDO::prepare() + execute() without semantic restrictions. This is consistent with the name (“write tool”), but in an LLM/agent context it becomes a high-risk capability: prompt injection or indirect prompt manipulation can cause execution of destructive queries such as DROP TABLE, TRUNCATE, DELETE, ALTER, or privilege-related statements (subject to DB permissions). Deployments that expose an agent with MySQLWriteTool enabled to untrusted input and/or run the tool with a DB user that has broad privileges are impacted. This issue is fixed in version 2.8.12.
Neuron is a PHP framework for creating and orchestrating AI Agents. Versions 2.8.11 and below use MySQLSelectTool, which is vulnerable to Read-Only Bypass. MySQLSelectTool is intended to be a read-only SQL tool (e.g., for LLM agent querying, however, validation based on the first keyword (e.g., SELECT) and a forbidden-keyword list does not block file-writing constructs such as INTO OUTFILE / INTO DUMPFILE. As a result, an attacker who can influence the tool input (e.g., via prompt injection through a public agent endpoint) may write arbitrary files to the DB server if the MySQL/MariaDB account has the FILE privilege and server configuration permits writes to a useful location (e.g., a web-accessible directory). This issue is fixed in version 2.8.12.
Okta Java Management SDK facilitates interactions with the Okta management API. In versions 11.0.0 through 20.0.0, race conditions may arise from concurrent requests using the ApiClient class. This could cause a status code or response header from one request’s response to influence another request’s response. This issue is fixed in version 20.0.1.
The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. When using versions 4.11.0 through 4.11.2 and 4.12.0, simultaneous requests on the same client may result in improper lookups in the TokenRequestCache for the request results. This issue is fixed in versions 4.11.2 and 4.12.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.