Company Details
theinternationalmotors
10,628
169,523
3361
international.com
0
INT_4730611
In-progress

International Company CyberSecurity Posture
international.comWe build International trucks and engines and IC Bus® school and commercial buses that are as tough and as smart as the people who drive them. Our solutions deliver greater uptime and productivity to fleets across North America. We also develop Fleetrite® aftermarket parts. In everything we do, our vision is to accelerate the impact of sustainable mobility to create the cleaner, safer world we all deserve. We are part of the TRATON Group, one of the world's leading commercial vehicle manufacturers.
Company Details
theinternationalmotors
10,628
169,523
3361
international.com
0
INT_4730611
In-progress
Between 750 and 799

International Global Score (TPRM)XXXX

Description: US truck and military vehicle maker Navistar suffered from a data breach incident after an unknown attacker have stolen data from its network. The company disclosed the attack in an 8-K report filed with the Securities and Exchange Commission (SEC). Despite the security compromise, Navistar claims that there has been no impact on its business because all of its IT systems are up and running. Several other steps were taken by the business to lessen the effects of the security compromise that occurred.


No incidents recorded for International in 2025.
No incidents recorded for International in 2025.
No incidents recorded for International in 2025.
International cyber incidents detection timeline including parent company and subsidiaries

We build International trucks and engines and IC Bus® school and commercial buses that are as tough and as smart as the people who drive them. Our solutions deliver greater uptime and productivity to fleets across North America. We also develop Fleetrite® aftermarket parts. In everything we do, our vision is to accelerate the impact of sustainable mobility to create the cleaner, safer world we all deserve. We are part of the TRATON Group, one of the world's leading commercial vehicle manufacturers.


Every vehicle. Every innovation. Every bit of momentum in over 170 markets worldwide. None of it would be possible without the expertise, drive and continued ambition of our people. We’re proud of our heritage, but it’s our vision for the future that excites us most. Right across our business, ever

A gente sabe que o nome “Volkswagen” com certeza deve fazer parte da sua história. Porque a gente também sabe que não é à toa que estamos na vida, no coração e na garagem dos brasileiros. O segredo? Construímos os carros mais inovadores, tornamos as tecnologias acessíveis e dizemos sempre que estamo

TVS Motor Company is a reputed two and three-wheeler manufacturer globally, championing progress through Mobility with a focus on sustainability. Rooted in our 100-year legacy of Trust, Value, and Passion for Customers and Exactness, we take pride in making internationally aspirational products of t

Mercedes-Benz USA, LLC (MBUSA), a Daimler Company, is responsible for the Distribution and Marketing of Mercedes-Benz and smart products in the United States. MBUSA was founded in 1965 and prior to that Mercedes-Benz cars were sold in the United States by Mercedes-Benz Car Sales, Inc., a subsidiary

Company profile GRAMMER AG, which has its head office in Ursensollen, specializes in the development and production of complex components and systems for automotive interiors as well as suspension driver and passenger seats for onroad and offroad vehicles. In the Automotive product area, the Company

In a world of constant motion, life is about balance. At Dana, our balanced approach considers the people, products, and planet that sustain us all. For 120 years, we've been powering innovation to move our world. Today, over 40,000 Dana people, in more than 30 countries, advance drive and motion
We see a future where everyone can live and move without limitations. That’s why we are developing technologies, systems and concepts that make vehicles safer and cleaner, while serving our communities, the planet and, above all, people. Forward. For all. Our common shares trade on the Toronto Sto
At Cummins, we empower everyone to grow their careers through meaningful work, building inclusive and equitable teams, coaching, development and opportunities to make a difference. Across our entire organization, you'll find engineers, developers, and technicians who are innovating, designing, testi
FORVIA comprises the complementary technology and industrial strengths of Faurecia and HELLA. With over 300 industrial sites and 77 R&D centers, 150,000 people, including more than 35,000 engineers across 40+ countries, FORVIA provides a unique and comprehensive approach to the automotive challenge
.png)
An international two-day seminar titled Artificial Intelligence in Cybersecurity was held in Baku under the organization of Azerbaijan.
China, Russia, North Korea, and Iran are reshaping the cyber domain through collaboration and irregular tactics. This article explores how...
In Taiwan, Taoyuan International Airport is upgrading the communications infrastructure across Terminals 1 and 2.
Interpol General Assembly in Marrakech : Global police leaders tackle crime and cybersecurity. The 93rd session of the General Assembly of...
24 November 2025 - Wits University. The Bachelor of Science Honours (BScHons) and the Master of Science (MSc) in Cybersecurity will be...
The Federal Government is developing its 2023-2030 Australian Cyber Security Strategy – exploring a range of policy options.
Our commitment to audit quality. At EY US, we are bringing our bold vision for the future of audit to life with quality at the center,...
SIX Swiss Exchange Ad hoc announcement pursuant to Art. 53 LR — Logitech International (SIX: LOGN) (Nasdaq: LOGI) today shared the Company...
Team Europe warmly acclaimed today in Tokyo for an outstanding 1st place of the 4th edition of the International Cybersecurity Challenge,...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of International is http://www.international.com.
According to Rankiteo, International’s AI-generated cybersecurity score is 769, reflecting their Fair security posture.
According to Rankiteo, International currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, International is not certified under SOC 2 Type 1.
According to Rankiteo, International does not hold a SOC 2 Type 2 certification.
According to Rankiteo, International is not listed as GDPR compliant.
According to Rankiteo, International does not currently maintain PCI DSS compliance.
According to Rankiteo, International is not compliant with HIPAA regulations.
According to Rankiteo,International is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
International operates primarily in the Motor Vehicle Manufacturing industry.
International employs approximately 10,628 people worldwide.
International presently has no subsidiaries across any sectors.
International’s official LinkedIn profile has approximately 169,523 followers.
International is classified under the NAICS code 3361, which corresponds to Motor Vehicle Manufacturing.
No, International does not have a profile on Crunchbase.
Yes, International maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/theinternationalmotors.
As of December 11, 2025, Rankiteo reports that International has experienced 1 cybersecurity incidents.
International has an estimated 12,645 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an recovery measures with all it systems are up and running, recovery measures with several steps taken to lessen the effects, and communication strategy with disclosed the attack in an 8-k report filed with the sec..
Common Attack Types: The most common types of attacks the company has faced is Breach.

Operational Impact: No impact on business operations

Entity Name: Navistar
Entity Type: Corporation
Industry: Automotive, Defense
Location: United States

Recovery Measures: All IT systems are up and runningSeveral steps taken to lessen the effects
Communication Strategy: Disclosed the attack in an 8-K report filed with the SEC
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through All IT systems are up and running, Several steps taken to lessen the effects, .

Source: SEC 8-K Report
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: SEC 8-K Report.
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Disclosed The Attack In An 8-K Report Filed With The Sec.
Last Attacking Group: The attacking group in the last incident was an Unknown.
Most Recent Source: The most recent source of information about an incident is SEC 8-K Report.
.png)
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions prior to 16.0.96 and 17.0.1 through 17.0.9 have a weak default password. By default, this is a 6 digit numeric value which can be brute forced. (This is the app_password parameter). Depending on local configuration, this password could be the extension, voicemail, user manager, DPMA or EPM phone admin password. This issue is fixed in versions 16.0.96 and 17.0.10.
Neuron is a PHP framework for creating and orchestrating AI Agents. In versions 2.8.11 and below, the MySQLWriteTool executes arbitrary SQL provided by the caller using PDO::prepare() + execute() without semantic restrictions. This is consistent with the name (“write tool”), but in an LLM/agent context it becomes a high-risk capability: prompt injection or indirect prompt manipulation can cause execution of destructive queries such as DROP TABLE, TRUNCATE, DELETE, ALTER, or privilege-related statements (subject to DB permissions). Deployments that expose an agent with MySQLWriteTool enabled to untrusted input and/or run the tool with a DB user that has broad privileges are impacted. This issue is fixed in version 2.8.12.
Neuron is a PHP framework for creating and orchestrating AI Agents. Versions 2.8.11 and below use MySQLSelectTool, which is vulnerable to Read-Only Bypass. MySQLSelectTool is intended to be a read-only SQL tool (e.g., for LLM agent querying, however, validation based on the first keyword (e.g., SELECT) and a forbidden-keyword list does not block file-writing constructs such as INTO OUTFILE / INTO DUMPFILE. As a result, an attacker who can influence the tool input (e.g., via prompt injection through a public agent endpoint) may write arbitrary files to the DB server if the MySQL/MariaDB account has the FILE privilege and server configuration permits writes to a useful location (e.g., a web-accessible directory). This issue is fixed in version 2.8.12.
Okta Java Management SDK facilitates interactions with the Okta management API. In versions 11.0.0 through 20.0.0, race conditions may arise from concurrent requests using the ApiClient class. This could cause a status code or response header from one request’s response to influence another request’s response. This issue is fixed in version 20.0.1.
The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. When using versions 4.11.0 through 4.11.2 and 4.12.0, simultaneous requests on the same client may result in improper lookups in the TokenRequestCache for the request results. This issue is fixed in versions 4.11.2 and 4.12.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.