Company Details
Flexbooker
2
44
5112
flexbooker.com
0
FLE_1219718
In-progress

FlexBooker Company CyberSecurity Posture
flexbooker.comFlexBooker is a company based out of United States.
Company Details
Flexbooker
2
44
5112
flexbooker.com
0
FLE_1219718
In-progress
Between 700 and 749

FlexBooker Global Score (TPRM)XXXX

Description: The Amazon Web Services (AWS) servers of the scheduling platform FlexBooker were hit in a cyberattack in December 2021. The attackers accessed a database containing sensitive customer data of 3.7 million accounts containing email addresses, names, passwords, phone numbers, and partial credit card numbers. FlexBooker notified and apologized to all the customers about the data leak and re-secured its servers.


No incidents recorded for FlexBooker in 2025.
No incidents recorded for FlexBooker in 2025.
No incidents recorded for FlexBooker in 2025.
FlexBooker cyber incidents detection timeline including parent company and subsidiaries

FlexBooker is a company based out of United States.


Cisco is the worldwide technology leader that is revolutionizing the way organizations connect and protect in the AI era. For more than 40 years, Cisco has securely connected the world. With its industry leading AI-powered solutions and services, Cisco enables its customers, partners and communities

Juniper Networks is leading the revolution in networking, making it one of the most exciting technology companies in Silicon Valley today. Since being founded by Pradeep Sindhu, Dennis Ferguson, and Bjorn Liencres nearly 20 years ago, Juniper’s sole mission has been to create innovative products and

At Agoda, we bridge the world through travel. We aim to make it easy and rewarding for more travelers to explore and experience the amazing world we live in. We do so by enabling more people to see the world for less – with our best-value deals across our 4,700,000+ hotels and holiday properties, 13
Amazon is guided by four principles: customer obsession rather than competitor focus, passion for invention, commitment to operational excellence, and long-term thinking. We are driven by the excitement of building technologies, inventing products, and providing services that change lives. We embrac

Join us in our mission to help the world get well, help the world stay well, and help future generations be healthier. We hire smart and motivated people from all academic majors to code, test, and implement healthcare software that hundreds of millions of patients and doctors rely on to improve ca
Autodesk is changing how the world is designed and made. Our technology spans architecture, engineering, construction, product design, manufacturing, and media and entertainment. We empower innovators everywhere to solve challenges, big and small. From greener buildings to smarter products and mo

At DoorDash, our mission to empower local economies shapes how our team members move quickly and always learn and reiterate to support merchants, Dashers and the communities we serve. We are a technology and logistics company that started with door-to-door delivery, and we are looking for team membe

OpenText is a leading Cloud and AI company that provides organizations around the world with a comprehensive suite of Business AI, Business Clouds, and Business Technology. We help organizations grow, innovate, become more efficient and effective, and do so in a trusted and secure way—through Inform

Shopee is the leading e-commerce platform in Southeast Asia and Taiwan. It is a platform tailored for the region, providing customers with an easy, secure and fast online shopping experience through strong payment and logistical support. Shopee aims to continually enhance its platform and become th
.png)
In December of 2021, the software firm suffered a cyber-security breach that led to the information of 3.7m clients being exposed.
The details of thousands of Bunnings Drive and Collect customers may have been compromised in the FlexBooker Christmas time data breach.
Bunnings Warehouse shoppers may have had their personal data compromised in a massive cyber security breach.
Bunnings' Drive & Collect customers have been the victim of a security breach after a third-party platform was compromised late last year.
Bunnings has alerted its New Zealand and Australian customers about a security breach to the system it uses to organise click-and-collect bookings. But the.
FlexBooker, a commonly used appointment scheduling and calendar service, is apologizing to its customers after 3.7 million records appeared on a dark web...
Bunnings customers who have used its 'click and collect services are among 3.7 million people globally whose personal data have been...
Bunnings customers are encouraged to "be cautious of any unusual activity in their email accounts" after a major...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of FlexBooker is http://www.flexbooker.com.
According to Rankiteo, FlexBooker’s AI-generated cybersecurity score is 746, reflecting their Moderate security posture.
According to Rankiteo, FlexBooker currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, FlexBooker is not certified under SOC 2 Type 1.
According to Rankiteo, FlexBooker does not hold a SOC 2 Type 2 certification.
According to Rankiteo, FlexBooker is not listed as GDPR compliant.
According to Rankiteo, FlexBooker does not currently maintain PCI DSS compliance.
According to Rankiteo, FlexBooker is not compliant with HIPAA regulations.
According to Rankiteo,FlexBooker is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
FlexBooker operates primarily in the Software Development industry.
FlexBooker employs approximately 2 people worldwide.
FlexBooker presently has no subsidiaries across any sectors.
FlexBooker’s official LinkedIn profile has approximately 44 followers.
FlexBooker is classified under the NAICS code 5112, which corresponds to Software Publishers.
No, FlexBooker does not have a profile on Crunchbase.
Yes, FlexBooker maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/Flexbooker.
As of December 07, 2025, Rankiteo reports that FlexBooker has experienced 1 cybersecurity incidents.
FlexBooker has an estimated 27,337 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with re-secured its servers, and communication strategy with notified and apologized to all the customers..
Title: FlexBooker Data Breach
Description: The Amazon Web Services (AWS) servers of the scheduling platform FlexBooker were hit in a cyberattack in December 2021. The attackers accessed a database containing sensitive customer data of 3.7 million accounts containing email addresses, names, passwords, phone numbers, and partial credit card numbers. FlexBooker notified and apologized to all the customers about the data leak and re-secured its servers.
Date Detected: December 2021
Type: Data Breach
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Data Compromised: Email addresses, Names, Passwords, Phone numbers, Partial credit card numbers
Systems Affected: AWS servers
Payment Information Risk: partial credit card numbers
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Email Addresses, Names, Passwords, Phone Numbers, Partial Credit Card Numbers and .

Entity Name: FlexBooker
Entity Type: Company
Industry: Scheduling Platform
Customers Affected: 3700000

Remediation Measures: re-secured its servers
Communication Strategy: notified and apologized to all the customers

Type of Data Compromised: Email addresses, Names, Passwords, Phone numbers, Partial credit card numbers
Number of Records Exposed: 3700000
Sensitivity of Data: high
Personally Identifiable Information: email addressesnamesphone numbers
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: re-secured its servers, .
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notified And Apologized To All The Customers.
Most Recent Incident Detected: The most recent incident detected was on December 2021.
Most Significant Data Compromised: The most significant data compromised in an incident were email addresses, names, passwords, phone numbers, partial credit card numbers and .
Most Significant System Affected: The most significant system affected in an incident was AWS servers.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were passwords, names, partial credit card numbers, email addresses and phone numbers.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 370.0.
.png)
HedgeDoc is an open source, real-time, collaborative, markdown notes application. Prior to 1.10.4, some of HedgeDoc's OAuth2 endpoints for social login providers such as Google, GitHub, GitLab, Facebook or Dropbox lack CSRF protection, since they don't send a state parameter and verify the response using this parameter. This vulnerability is fixed in 1.10.4.
Langflow versions up to and including 1.6.9 contain a chained vulnerability that enables account takeover and remote code execution. An overly permissive CORS configuration (allow_origins='*' with allow_credentials=True) combined with a refresh token cookie configured as SameSite=None allows a malicious webpage to perform cross-origin requests that include credentials and successfully call the refresh endpoint. An attacker-controlled origin can therefore obtain fresh access_token / refresh_token pairs for a victim session. Obtained tokens permit access to authenticated endpoints — including built-in code-execution functionality — allowing the attacker to execute arbitrary code and achieve full system compromise.
A vulnerability was detected in xerrors Yuxi-Know up to 0.4.0. This vulnerability affects the function OtherEmbedding.aencode of the file /src/models/embed.py. Performing manipulation of the argument health_url results in server-side request forgery. The attack can be initiated remotely. The exploit is now public and may be used. The patch is named 0ff771dc1933d5a6b78f804115e78a7d8625c3f3. To fix this issue, it is recommended to deploy a patch. The vendor responded with a vulnerability confirmation and a list of security measures they have established already (e.g. disabled URL parsing, disabled URL upload mode, removed URL-to-markdown conversion).
A security vulnerability has been detected in Rarlab RAR App up to 7.11 Build 127 on Android. This affects an unknown part of the component com.rarlab.rar. Such manipulation leads to path traversal. It is possible to launch the attack remotely. Attacks of this nature are highly complex. It is indicated that the exploitability is difficult. The exploit has been disclosed publicly and may be used. Upgrading to version 7.20 build 128 is able to mitigate this issue. You should upgrade the affected component. The vendor responded very professional: "This is the real vulnerability affecting RAR for Android only. WinRAR and Unix RAR versions are not affected. We already fixed it in RAR for Android 7.20 build 128 and we publicly mentioned it in that version changelog. (...) To avoid confusion among users, it would be useful if such disclosure emphasizes that it is RAR for Android only issue and WinRAR isn't affected."
A weakness has been identified in ZSPACE Q2C NAS up to 1.1.0210050. Affected by this issue is the function zfilev2_api.OpenSafe of the file /v2/file/safe/open of the component HTTP POST Request Handler. This manipulation of the argument safe_dir causes command injection. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.