Company Details
Flexbooker
2
44
5112
flexbooker.com
0
FLE_1219718
In-progress


FlexBooker Company CyberSecurity Posture
flexbooker.comFlexBooker is a company based out of United States.
Company Details
Flexbooker
2
44
5112
flexbooker.com
0
FLE_1219718
In-progress
Between 700 and 749

FlexBooker Global Score (TPRM)XXXX

Description: The Amazon Web Services (AWS) servers of the scheduling platform FlexBooker were hit in a cyberattack in December 2021. The attackers accessed a database containing sensitive customer data of 3.7 million accounts containing email addresses, names, passwords, phone numbers, and partial credit card numbers. FlexBooker notified and apologized to all the customers about the data leak and re-secured its servers.


No incidents recorded for FlexBooker in 2026.
No incidents recorded for FlexBooker in 2026.
No incidents recorded for FlexBooker in 2026.
FlexBooker cyber incidents detection timeline including parent company and subsidiaries

FlexBooker is a company based out of United States.


SS&C is a leading global provider of mission-critical, cloud-based software and solutions for the financial and healthcare industries. Named to the Fortune 1000 list as a top U.S. company based on revenue, SS&C (NASDAQ: SSNC) is a trusted provider to more than 22,000 financial services and healthcar
Olá, somos a TOTVS! A maior empresa de tecnologia do Brasil. 🤓 Líder absoluta em sistemas e plataformas para empresas, a TOTVS possui mais de 70 mil clientes. Indo muito além do ERP, oferece tecnologia completa para digitalização dos negócios por meio de 3 unidades de negócio: - Gestão: ERPs, sol

Zoho offers beautifully smart software to help you grow your business. With over 100 million users worldwide, Zoho's 55+ products aid your sales and marketing, support and collaboration, finance, and recruitment needs—letting you focus only on your business. Zoho respects user privacy and does not h
Pitney Bowes is a technology-driven company that provides digital shipping solutions, mailing innovation, and financial services to clients around the world – including more than 90 percent of the Fortune 500. Small businesses to large enterprises, and government entities rely on Pitney Bowes to red

Trimble is a global technology company that connects the physical and digital worlds, transforming the ways work gets done. With relentless innovation in precise positioning, modeling and data analytics, Trimble enables essential industries including construction, geospatial and transportation. Whet

Walmart has a long history of transforming retail and using technology to deliver innovations that improve how the world shops and empower our 2.1 million associates. It began with Sam Walton and continues today with Global Tech associates working together to power Walmart and lead the next retail d
Amazon is guided by four principles: customer obsession rather than competitor focus, passion for invention, commitment to operational excellence, and long-term thinking. We are driven by the excitement of building technologies, inventing products, and providing services that change lives. We embrac

Meta's mission is to build the future of human connection and the technology that makes it possible. Our technologies help people connect, find communities, and grow businesses. When Facebook launched in 2004, it changed the way people connect. Apps like Messenger, Instagram and WhatsApp further e

Grab is Southeast Asia’s leading superapp, offering a suite of services consisting of deliveries, mobility, financial services, enterprise and others. Grabbers come from all over the world, and we are united by a common mission: to drive Southeast Asia forward by creating economic empowerment for ev
.png)
In December of 2021, the software firm suffered a cyber-security breach that led to the information of 3.7m clients being exposed.
The details of thousands of Bunnings Drive and Collect customers may have been compromised in the FlexBooker Christmas time data breach.
Bunnings Warehouse shoppers who have used the contactless pick-up service may have had some of their person...
FlexBooker, a commonly used appointment scheduling and calendar service, is apologizing to its customers after 3.7 million records appeared on a dark web...
Bunnings customers who have used its 'click and collect services are among 3.7 million people globally whose personal data have been...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of FlexBooker is http://www.flexbooker.com.
According to Rankiteo, FlexBooker’s AI-generated cybersecurity score is 746, reflecting their Moderate security posture.
According to Rankiteo, FlexBooker currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, FlexBooker has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, FlexBooker is not certified under SOC 2 Type 1.
According to Rankiteo, FlexBooker does not hold a SOC 2 Type 2 certification.
According to Rankiteo, FlexBooker is not listed as GDPR compliant.
According to Rankiteo, FlexBooker does not currently maintain PCI DSS compliance.
According to Rankiteo, FlexBooker is not compliant with HIPAA regulations.
According to Rankiteo,FlexBooker is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
FlexBooker operates primarily in the Software Development industry.
FlexBooker employs approximately 2 people worldwide.
FlexBooker presently has no subsidiaries across any sectors.
FlexBooker’s official LinkedIn profile has approximately 44 followers.
FlexBooker is classified under the NAICS code 5112, which corresponds to Software Publishers.
No, FlexBooker does not have a profile on Crunchbase.
Yes, FlexBooker maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/Flexbooker.
As of January 24, 2026, Rankiteo reports that FlexBooker has experienced 1 cybersecurity incidents.
FlexBooker has an estimated 28,180 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.
Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with re-secured its servers, and communication strategy with notified and apologized to all the customers..
Title: FlexBooker Data Breach
Description: The Amazon Web Services (AWS) servers of the scheduling platform FlexBooker were hit in a cyberattack in December 2021. The attackers accessed a database containing sensitive customer data of 3.7 million accounts containing email addresses, names, passwords, phone numbers, and partial credit card numbers. FlexBooker notified and apologized to all the customers about the data leak and re-secured its servers.
Date Detected: December 2021
Type: Data Breach
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Data Compromised: Email addresses, Names, Passwords, Phone numbers, Partial credit card numbers
Systems Affected: AWS servers
Payment Information Risk: partial credit card numbers
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Email Addresses, Names, Passwords, Phone Numbers, Partial Credit Card Numbers and .

Entity Name: FlexBooker
Entity Type: Company
Industry: Scheduling Platform
Customers Affected: 3700000

Remediation Measures: re-secured its servers
Communication Strategy: notified and apologized to all the customers

Type of Data Compromised: Email addresses, Names, Passwords, Phone numbers, Partial credit card numbers
Number of Records Exposed: 3700000
Sensitivity of Data: high
Personally Identifiable Information: email addressesnamesphone numbers
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: re-secured its servers, .
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notified And Apologized To All The Customers.
Most Recent Incident Detected: The most recent incident detected was on December 2021.
Most Significant Data Compromised: The most significant data compromised in an incident were email addresses, names, passwords, phone numbers, partial credit card numbers and .
Most Significant System Affected: The most significant system affected in an incident was AWS servers.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were email addresses, phone numbers, partial credit card numbers, passwords and names.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 370.0.
.png)
Improper validation of specified type of input in M365 Copilot allows an unauthorized attacker to disclose information over a network.
Improper access control in Azure Front Door (AFD) allows an unauthorized attacker to elevate privileges over a network.
Azure Entra ID Elevation of Privilege Vulnerability
Moonraker is a Python web server providing API access to Klipper 3D printing firmware. In versions 0.9.3 and below, instances configured with the "ldap" component enabled are vulnerable to LDAP search filter injection techniques via the login endpoint. The 401 error response message can be used to determine whether or not a search was successful, allowing for brute force methods to discover LDAP entries on the server such as user IDs and user attributes. This issue has been fixed in version 0.10.0.
Runtipi is a Docker-based, personal homeserver orchestrator that facilitates multiple services on a single server. Versions 3.7.0 and above allow an authenticated user to execute arbitrary system commands on the host server by injecting shell metacharacters into backup filenames. The BackupManager fails to sanitize the filenames of uploaded backups. The system persists user-uploaded files directly to the host filesystem using the raw originalname provided in the request. This allows an attacker to stage a file containing shell metacharacters (e.g., $(id).tar.gz) at a predictable path, which is later referenced during the restore process. The successful storage of the file is what allows the subsequent restore command to reference and execute it. This issue has been fixed in version 4.7.0.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.