Company Details
-tesco
78,016
874,087
43
http://www.tescoplc.com
104
TES_2845210
Completed

Tesco Company CyberSecurity Posture
http://www.tescoplc.comOne of the world’s largest retailers of consumer goods from food to fashion. Serving our customers, communities and planet a little better every day in our stores and online is at the heart of everything we do. Founded in 1919 by Jack Cohen using the £30 he received on leaving the Royal Flying Corp, we’ve come a long way from his small market stall in East London. Today over 400,000 colleagues work across our stores, office, distribution and customer engagement centres in the UK, Europe and Asia. Share our passion for the people, products and places that make us great, and we can offer the right support to develop your skills. If you’re looking for the perfect work-life balance, a collaborative culture and flexible ways of working, find your opportunity to get on at www.tesco-careers.com
Company Details
-tesco
78,016
874,087
43
http://www.tescoplc.com
104
TES_2845210
Completed
Between 700 and 749

Tesco Global Score (TPRM)XXXX

Description: Tesco experienced a security issue. A database of stolen usernames and passwords from other platforms had been tried out on its websites. It issued new cards to 600,000 Clubcard account holders.
Description: Tesco is suing Broadcom and VMware reseller Computacenter for £100 million in damages after Broadcom terminated perpetual license support for VMware’s vSphere Foundation and Cloud Foundation, which Tesco had purchased in 2021 with a five-year support agreement (until 2026) and an optional four-year extension. The abrupt shift to subscription-based pricing forced Tesco to face 'excessive and inflated prices' for virtualization software it had already paid for. The lawsuit highlights severe operational risks, as VMware’s software underpins ~40,000 server workloads—including critical systems like store tills and supply chain operations. Failure to resolve the dispute could disrupt Tesco’s grocery supply chains across the UK and Ireland, potentially leading to widespread operational outages, financial losses, and reputational damage. Replacing VMware entirely would also be costly and high-risk, compounding the threat to Tesco’s business continuity. The case reflects broader industry backlash against Broadcom’s pricing model, with other major firms like AT&T and Siemens filing similar lawsuits.
Description: Tesco’s website and app was targeted by cyber attack in October 2021. Their online grocery store website and app were interrupted. There have been issues with the site's search feature as a result of an attempt to meddle with their systems. They apologise for the inconvenience and worked very hard to fully restore all services.
Description: Tesco had to deactivate some customers' net accounts after their login names and passwords were shared online. The list of more than 2,000 Tesco.com accounts was posted to a popular text-sharing site. After knowing about the incident, Tesco immediately investigated the incident and notified all customers who were affected.
Description: Tesco experienced a data security incident on March 2020. A database of stolen usernames and passwords from other platforms had been tried out on its websites. No financial data was accessed and its systems have not been hacked. Tesco issued new cards to 600,000 Clubcard account holders after unearthing a security issue.
Description: Tesco service is run by currency giant Travelex for orders made over the telephone and online. It confirmed that 17,000 Tesco Travel Money customers have had personal information stolen, including full names and addresses. The compromise also includes e-mails sent from staff to customers, and internally. Those who have purchased their currency online or over the telephone at Tesco to collect in the branch or delivered at home could have been hit. No financial information has been disclosed. It is investigating how the data breach happened.


No incidents recorded for Tesco in 2025.
No incidents recorded for Tesco in 2025.
No incidents recorded for Tesco in 2025.
Tesco cyber incidents detection timeline including parent company and subsidiaries

One of the world’s largest retailers of consumer goods from food to fashion. Serving our customers, communities and planet a little better every day in our stores and online is at the heart of everything we do. Founded in 1919 by Jack Cohen using the £30 he received on leaving the Royal Flying Corp, we’ve come a long way from his small market stall in East London. Today over 400,000 colleagues work across our stores, office, distribution and customer engagement centres in the UK, Europe and Asia. Share our passion for the people, products and places that make us great, and we can offer the right support to develop your skills. If you’re looking for the perfect work-life balance, a collaborative culture and flexible ways of working, find your opportunity to get on at www.tesco-careers.com


Established in 2015, Pepco Group (WSE: PCO) is a Warsaw Stock Exchange listed operator of the market-leading retail businesses: Pepco, Poundland and Dealz Poland. These businesses provide great product range, value and convenience to over 60 million customers each month in Europe, trading from nearl
Petco is a category-defining health and wellness company focused on improving the lives of pets, pet parents and our own Petco partners. Since our founding in 1965, we’ve been trailblazing new standards in pet care, delivering comprehensive wellness solutions through our products and services, and c

Proudly serving our customers in the Chicagoland area since 1899, Jewel-Osco provides friendly service, quality products and great value. Jewel-Osco operates 188 stores throughout the Chicagoland area, Indiana and Iowa, which is part of a 2,200+ store operation that employs approximately 290,000 peo

Working in Partnership for a happier world. Our Partnership is an ongoing experiment to find happier, more trusted ways of doing business, for the benefit of us all. We work together to create a successful business and a fairer, more sustainable future for Partners, customers, suppliers and communi

7-Eleven introduced the world to convenience. And in return, the world made us the #1 convenience retailer. It started with a simple idea – give customers what they want, when and where they want it. That was 1927. And what started on a single ice dock in Dallas, Texas, has since grown to more than

Reconnue pour son combat contre la vie chère, Intermarché s'appuie sur un réseau de 2 328 points de vente en Europe (France, Belgique, Pologne, Portugal). Spécialiste des produits frais, l’enseigne propose différents formats de points de vente pour répondre aux attentes de ses clients : - Interma

Fozzy Group is one of the largest trade industrial groups in Ukraine and one of the leading Ukrainian retailers, with over 700 outlets all around the country. Besides retail, the group's businesses include food production, and restaurants. Fozzy Group is introducing modern solutions in all areas

We are the leading retailer of home improvement and outdoor living products in Australia & New Zealand and a major supplier to project builders, commercial tradespeople and the housing industry. Our ambition is to provide our customers with the widest range of home improvement products in accordanc

Shoppers Stop is one of the pioneers of modern retailing in India. Launched in 1991, Shoppers Stop was the first department store in the country that revolutionized the way modern India shopped. Today, with 81 stores across 37 cities and a growing online presence at www.shoppersstop.com, Shoppers St
.png)
According to the UK government, more than four in ten businesses and three in ten charities have reported having cyber security breaches in the last 12 months.
Tesco customers were unable to complete online payments when shopping earlier this morning as the supermarket giant's website appeared to...
Jewellery specialist Pandora has become the latest retailer to face a cyber-attack, with the brand confirming yesterday (5 August) that some...
Pandora has informed its customers today (August 5) of a cybersecurity attack that it recently experienced. In an email to customers,...
As cyber attacks surge in the UK, can a Silicon Valley-esque 'Innovation Centre' bolster our digital defences?
Devastating attacks at M&S, the Co-op and Harrods highlight risks as lenders say cybersecurity is biggest expense.
Britain's largest supermarket, led by chief exec Ken Murphy (pictured) said sales in the UK rose 5.1% to £12.3bn in the 13 weeks to May 24.
Tesco's chief executive said cyber security was a top priority, after a high-profile attack at competitor Marks & Spencer LSE:MKS,...
We explore why it's time for retailers to rethink not just their cyber defences, but who in the business is responsible for them.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Tesco is http://www.tescoplc.com.
According to Rankiteo, Tesco’s AI-generated cybersecurity score is 748, reflecting their Moderate security posture.
According to Rankiteo, Tesco currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Tesco is not certified under SOC 2 Type 1.
According to Rankiteo, Tesco does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Tesco is not listed as GDPR compliant.
According to Rankiteo, Tesco does not currently maintain PCI DSS compliance.
According to Rankiteo, Tesco is not compliant with HIPAA regulations.
According to Rankiteo,Tesco is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Tesco operates primarily in the Retail industry.
Tesco employs approximately 78,016 people worldwide.
Tesco presently has no subsidiaries across any sectors.
Tesco’s official LinkedIn profile has approximately 874,087 followers.
Tesco is classified under the NAICS code 43, which corresponds to Retail Trade.
No, Tesco does not have a profile on Crunchbase.
Yes, Tesco maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/-tesco.
As of November 27, 2025, Rankiteo reports that Tesco has experienced 6 cybersecurity incidents.
Tesco has an estimated 15,251 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Data Leak, Breach and Cyber Attack.
Total Financial Loss: The total financial loss from these incidents is estimated to be $100 million.
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with worked very hard to fully restore all services, and communication strategy with apologised for the inconvenience, and containment measures with account deactivation, and communication strategy with customer notification, and remediation measures with issued new cards to 600,000 clubcard account holders, and remediation measures with issued new cards to affected account holders, and third party assistance with legal counsel (lawsuit filing), and remediation measures with legal action to enforce contractual obligations, remediation measures with potential vmware replacement (high-risk, costly), and communication strategy with public disclosure via media (the register, techradar pro)..
Title: Tesco Travel Money Data Breach
Description: A data breach at Tesco Travel Money, run by Travelex, has resulted in the theft of personal information of 17,000 customers, including full names and addresses. Emails sent from staff to customers and internally were also compromised. No financial information was disclosed. The incident is under investigation.
Type: Data Breach
Title: Tesco Website and App Cyber Attack
Description: Tesco’s website and app were targeted by a cyber attack in October 2021, causing interruptions to their online grocery store website and app, particularly issues with the site's search feature.
Date Detected: October 2021
Type: Cyber Attack
Title: Tesco Account Breach
Description: Tesco had to deactivate some customers' net accounts after their login names and passwords were shared online. The list of more than 2,000 Tesco.com accounts was posted to a popular text-sharing site. After knowing about the incident, Tesco immediately investigated the incident and notified all customers who were affected.
Type: Data Breach
Attack Vector: Credential Sharing
Title: Tesco Security Issue
Description: A database of stolen usernames and passwords from other platforms had been tried out on its websites. Tesco issued new cards to 600,000 Clubcard account holders.
Type: Credential Stuffing
Attack Vector: Stolen Credentials
Vulnerability Exploited: Reuse of Usernames and Passwords
Motivation: Unauthorized Access
Title: Tesco Data Security Incident
Description: Tesco experienced a data security incident where a database of stolen usernames and passwords from other platforms had been tried out on its websites. No financial data was accessed and its systems have not been hacked. Tesco issued new cards to 600,000 Clubcard account holders after unearthing a security issue.
Date Detected: March 2020
Type: Credential Stuffing
Attack Vector: Stolen usernames and passwords from other platforms
Title: Tesco Sues Broadcom and VMware Reseller for £100 Million Over Breach of Licensing Contracts
Description: Tesco has filed a £100 million lawsuit against Broadcom and VMware reseller Computacenter for breaching VMware perpetual licensing contracts, which included five years of support and upgrades (2021–2026) with an optional four-year extension. Broadcom's decision to discontinue perpetual license support and push subscription-based models led to 'excessive and inflated prices' for virtualization software Tesco had already paid for. The dispute risks disrupting Tesco's grocery supply chains across the UK and Ireland, as VMware software underpins ~40,000 server workloads, including store tills and operations. Replacing VMware could introduce further costs and operational risks. Similar lawsuits have been filed by AT&T and Siemens over Broadcom's pricing strategies.
Type: Contractual Breach
Motivation: Financial Gain (Broadcom's subscription model push)Contractual Enforcement (Tesco's lawsuit)
Common Attack Types: The most common types of attacks the company has faced is Data Leak.

Data Compromised: Full names, Addresses, Emails

Systems Affected: Online grocery store websiteApp
Operational Impact: Interruptions to online services

Data Compromised: Login names, Passwords

Data Compromised: Usernames, Passwords

Financial Loss: £100 million (claimed damages, potential to rise if case prolonged)
Systems Affected: 40,000 server workloads (including store tills and operations)
Operational Impact: Potential disruption to UK & Ireland grocery supply chainsRisk of operational instability if VMware replacement is required
Brand Reputation Impact: Negative publicity due to lawsuitPotential customer trust erosion if supply chain disruptions occur
Legal Liabilities: Lawsuit against Broadcom, VMware, and Computacenter for breach of contract
Average Financial Loss: The average financial loss per incident is $16.67 million.
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information, Emails, , Login Names, Passwords, , Usernames, Passwords and .

Entity Name: Tesco Travel Money
Entity Type: Retail
Industry: Retail
Customers Affected: 17000

Entity Name: Tesco
Entity Type: Retailer
Industry: Retail
Customers Affected: More than 2,000

Entity Name: Tesco
Entity Type: Retail
Industry: Supermarket
Location: United Kingdom
Customers Affected: 600000

Entity Name: Tesco
Entity Type: Retail
Industry: Retail
Customers Affected: 600,000 Clubcard account holders

Entity Name: Tesco
Entity Type: Retailer
Industry: Grocery/Retail
Location: United KingdomIreland
Size: Large (Multinational)

Entity Name: Broadcom
Entity Type: Technology Vendor
Industry: Software/Semiconductors
Location: Global (HQ: USA)
Size: Large

Entity Name: VMware (acquired by Broadcom)
Entity Type: Software Provider
Industry: Virtualization/Cloud
Location: Global
Size: Large

Entity Name: Computacenter
Entity Type: Reseller
Industry: IT Services
Location: Global (HQ: UK)
Size: Large

Remediation Measures: Worked very hard to fully restore all services
Communication Strategy: Apologised for the inconvenience

Containment Measures: Account Deactivation
Communication Strategy: Customer Notification

Remediation Measures: Issued new cards to 600,000 Clubcard account holders

Remediation Measures: Issued new cards to affected account holders

Third Party Assistance: Legal Counsel (Lawsuit Filing).
Remediation Measures: Legal action to enforce contractual obligationsPotential VMware replacement (high-risk, costly)
Communication Strategy: Public disclosure via media (The Register, TechRadar Pro)
Third-Party Assistance: The company involves third-party assistance in incident response through Legal counsel (lawsuit filing), .

Type of Data Compromised: Personal information, Emails
Number of Records Exposed: 17000
Personally Identifiable Information: Full namesAddresses

Type of Data Compromised: Login names, Passwords
Number of Records Exposed: More than 2,000

Type of Data Compromised: Usernames, Passwords
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Worked very hard to fully restore all services, , Issued new cards to 600,000 Clubcard account holders, , Issued new cards to affected account holders, , Legal action to enforce contractual obligations, Potential VMware replacement (high-risk, costly), .
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by account deactivation and .

Legal Actions: Tesco's £100M lawsuit against Broadcom, VMware, and Computacenter,
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Tesco's £100M lawsuit against Broadcom, VMware, and Computacenter, .

Recommendations: Review vendor lock-in risks in perpetual licensing agreements, Assess long-term costs of subscription models vs. perpetual licenses, Diversify critical infrastructure dependencies to mitigate supply chain disruptions, Proactively renegotiate contracts during corporate acquisitions (e.g., Broadcom-VMware)Review vendor lock-in risks in perpetual licensing agreements, Assess long-term costs of subscription models vs. perpetual licenses, Diversify critical infrastructure dependencies to mitigate supply chain disruptions, Proactively renegotiate contracts during corporate acquisitions (e.g., Broadcom-VMware)Review vendor lock-in risks in perpetual licensing agreements, Assess long-term costs of subscription models vs. perpetual licenses, Diversify critical infrastructure dependencies to mitigate supply chain disruptions, Proactively renegotiate contracts during corporate acquisitions (e.g., Broadcom-VMware)Review vendor lock-in risks in perpetual licensing agreements, Assess long-term costs of subscription models vs. perpetual licenses, Diversify critical infrastructure dependencies to mitigate supply chain disruptions, Proactively renegotiate contracts during corporate acquisitions (e.g., Broadcom-VMware)

Source: The Register

Source: TechRadar Pro
URL: https://www.techradar.com/pro/tesco-sues-broadcom-for-100-million-over-vmware-licensing-dispute
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: The Register, and Source: TechRadar ProUrl: https://www.techradar.com/pro/tesco-sues-broadcom-for-100-million-over-vmware-licensing-dispute.

Investigation Status: Under Investigation

Investigation Status: Investigated

Investigation Status: Ongoing (lawsuit filed, no resolution yet)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Apologised For The Inconvenience, Customer Notification, Public Disclosure Via Media (The Register and Techradar Pro).

Customer Advisories: Notified
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Notified.

Root Causes: Broadcom'S Termination Of Perpetual License Support Post-Vmware Acquisition, Misalignment Between Purchased Licensing Terms And Post-Acquisition Vendor Policies, High Dependency On Vmware For Critical Infrastructure (40,000 Workloads),
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Legal Counsel (Lawsuit Filing), .
Most Recent Incident Detected: The most recent incident detected was on October 2021.
Highest Financial Loss: The highest financial loss from an incident was £100 million (claimed damages, potential to rise if case prolonged).
Most Significant Data Compromised: The most significant data compromised in an incident were Full names, Addresses, Emails, , Login Names, Passwords, , Usernames, Passwords and .
Most Significant System Affected: The most significant system affected in an incident were Online grocery store websiteApp and 40,000 server workloads (including store tills and operations).
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was legal counsel (lawsuit filing), .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Account Deactivation.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Addresses, Usernames, Full names, Emails, Passwords and Login Names.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 2.2K.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Tesco's £100M lawsuit against Broadcom, VMware, and Computacenter, .
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Proactively renegotiate contracts during corporate acquisitions (e.g., Broadcom-VMware), Diversify critical infrastructure dependencies to mitigate supply chain disruptions, Review vendor lock-in risks in perpetual licensing agreements and Assess long-term costs of subscription models vs. perpetual licenses.
Most Recent Source: The most recent source of information about an incident are The Register and TechRadar Pro.
Most Recent URL for Additional Resources: The most recent URL for additional resources on cybersecurity best practices is https://www.techradar.com/pro/tesco-sues-broadcom-for-100-million-over-vmware-licensing-dispute .
Current Status of Most Recent Investigation: The current status of the most recent investigation is Under Investigation.
Most Recent Customer Advisory: The most recent customer advisory issued was an Notified.
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.