ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Arrow Electronics (NYSE:ARW) guides innovation forward for thousands of leading technology manufacturers and service providers. With 2024 sales of $27.9 billion, Arrow develops technology solutions that help improve business and daily life. Our broad portfolio that spans the entire technology landscape, helps customers design, distribute and deploy forward-thinking products that make the benefits of technology accessible to as many people as possible. Learn more at arrow.com. Are you thinking Five Years Out? Join us at careers.arrow.com.

Arrow Electronics A.I CyberSecurity Scoring

Arrow Electronics

Company Details

Linkedin ID:

arrow-electronics

Employees number:

19,812

Number of followers:

361,004

NAICS:

513

Industry Type:

Technology, Information and Internet

Homepage:

https://www.arrow.com/company

IP Addresses:

0

Company ID:

ARR_9660639

Scan Status:

In-progress

AI scoreArrow Electronics Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/arrow-electronics.jpeg
Arrow Electronics Technology, Information and Internet
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreArrow Electronics Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/arrow-electronics.jpeg
Arrow Electronics Technology, Information and Internet
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Arrow Electronics Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Arrow ElectronicsBreach6032/2010
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: The New Hampshire Department of Justice reported on March 3, 2010, that Arrow Electronics, Inc. experienced a burglary on February 18, 2010, resulting in a stolen laptop containing personal information of approximately 4,044 current and former employees, including about 52 New Hampshire residents. The stolen data potentially involved names, addresses, and Social Security numbers, but there are no indications that the data was accessed or misused.

Arrow Electronics
Breach
Severity: 60
Impact: 3
Seen: 2/2010
Blog:
Rankiteo Explanation
Attack with significant impact with internal employee data leaks

Description: The New Hampshire Department of Justice reported on March 3, 2010, that Arrow Electronics, Inc. experienced a burglary on February 18, 2010, resulting in a stolen laptop containing personal information of approximately 4,044 current and former employees, including about 52 New Hampshire residents. The stolen data potentially involved names, addresses, and Social Security numbers, but there are no indications that the data was accessed or misused.

Ailogo

Arrow Electronics Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Arrow Electronics

Incidents vs Technology, Information and Internet Industry Average (This Year)

No incidents recorded for Arrow Electronics in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Arrow Electronics in 2025.

Incident Types Arrow Electronics vs Technology, Information and Internet Industry Avg (This Year)

No incidents recorded for Arrow Electronics in 2025.

Incident History — Arrow Electronics (X = Date, Y = Severity)

Arrow Electronics cyber incidents detection timeline including parent company and subsidiaries

Arrow Electronics Company Subsidiaries

SubsidiaryImage

Arrow Electronics (NYSE:ARW) guides innovation forward for thousands of leading technology manufacturers and service providers. With 2024 sales of $27.9 billion, Arrow develops technology solutions that help improve business and daily life. Our broad portfolio that spans the entire technology landscape, helps customers design, distribute and deploy forward-thinking products that make the benefits of technology accessible to as many people as possible. Learn more at arrow.com. Are you thinking Five Years Out? Join us at careers.arrow.com.

Loading...
similarCompanies

Arrow Electronics Similar Companies

OYO is a global platform that aims to empower entrepreneurs and small businesses with hotels and homes by providing full-stack technology products and services that aims to increase revenue and ease operations; bringing easy-to-book, affordable, and trusted accommodation to customers around the worl

Booking Holdings (NASDAQ: BKNG)

Booking Holdings is the world’s leading provider of online travel & related services, provided to consumers and local partners in more than 220 countries and territories through six primary consumer-facing brands: Booking.com, Priceline, Agoda, Rentalcars.com, KAYAK and OpenTable. Collectively, Book

Fanatics is a leading global digital sports platform. We ignite the passions of global sports fans and maximize the presence and reach for our hundreds of sports partners globally by offering products and services across Fanatics Commerce, Fanatics Collectibles, and Fanatics Betting & Gaming, allowi

Independiente / Freelance

La etimología de la palabra deriva del término medieval inglés usado para un mercenario (free-independiente o lance-lanza), es decir, un caballero que no servía a ningún señor en concreto y cuyos servicios podían ser alquilados por cualquiera. El término fue acuñado inicialmente por Sir Walter Scot

Zomato

Zomato’s mission statement is “better food for more people.” Since our inception in 2010, we have grown tremendously, both in scope and scale - and emerged as India’s most trusted brand during the pandemic, along with being one of the largest hyperlocal delivery networks in the country. Today, Zoma

Delivery Hero

As the world’s leading local delivery platform, our mission is to deliver an amazing experience, fast, easy, and to your door. We operate in over 70+ countries worldwide, powered by tech but driven by people. As one of Europe’s largest tech platforms, we enable ambitious talent to deliver solutions

Times Internet

At Times Internet, we create premium digital products that simplify and enhance the lives of millions. As India’s largest digital products company, we have a significant presence across a wide range of categories, including News, Sports, Fintech, and Enterprise solutions. Our portfolio features mar

Sohu.com

Sohu.com Inc. (NASDAQ: SOHU) is China's premier online brand and indispensable to the daily life of millions of Chinese, providing a network of web properties and community based/web 2.0 products which offer the vast Sohu user community a broad array of choices regarding information, entertainment a

YouTube

YouTube is a team-oriented, creative workplace where every single employee has a voice in the choices we make and the features we implement. We work together in small teams to design, develop, and roll out key features and products in very short time frames. Which means something you write today cou

newsone

Arrow Electronics CyberSecurity News

November 20, 2025 10:07 AM
Arrow Electronics Announces Distribution Agreement with Supermicro in EMEA

Global technology provider Arrow Electronics today announced a new distribution agreement with Supermicro in EMEA. The agreement will offer...

November 19, 2025 06:06 PM
CORRECTING and REPLACING The Redesign Group Named a 2025 Arrow Enterprise Computing Solutions Partner of the Year with Market Expansion Award

Please replace the release with the following corrected version due to multiple revisions. The updated release reads: THE REDESIGN GROUP...

November 19, 2025 06:06 PM
CORRECTING and REPLACING The Redesign Group Named a 2025 Arrow Enterprise Computing Solutions Partner of the Year with Market Expansion Award

CORRECTING and REPLACING The Redesign Group Named a 2025 Arrow Enterprise Computing Solutions Partner of the Year with Market Expansion...

November 17, 2025 06:38 AM
How Arrow’s Expanded European Cybersecurity Partnership With Clavister May Shape ARW’s Growth Prospects

Earlier this month, Clavister announced that Arrow Electronics expanded its distribution of Clavister's full cybersecurity portfolio beyond...

November 16, 2025 02:29 AM
Arrow Electronics (ARW): Evaluating Valuation After Expanding Clavister Cybersecurity Distribution Across Europe

Arrow Electronics (NYSE:ARW) is expanding its role in the European cybersecurity market by distributing Clavister's full portfolio beyond...

November 13, 2025 11:14 AM
Arrow Electronics Recognised as 2025 Microsoft Distribution Partner of the Year

Company recognised for exceptional work in delivering Cloud and AI solutions built on Microsoft platforms that positively impact mutual...

November 13, 2025 08:00 AM
What Arrow Electronics (ARW)'s Expanded European Cybersecurity Distribution Means for Shareholders

Clavister announced that Arrow Electronics has expanded distribution of its complete cybersecurity portfolio from Sweden into 11 additional...

November 10, 2025 08:00 AM
Modernize. Defend. Comply.

EU cyber threats are escalating. With ransomware attacks, phishing, and nation-state activity on the rise, intensifying pressure is being...

November 08, 2025 02:35 PM
Arrow Electronics (ARW): Assessing Valuation After Strong Q3 Earnings and Updated Guidance

Arrow Electronics released its third quarter results, revealing higher sales and net income compared to last year, along with updated...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Arrow Electronics CyberSecurity History Information

Official Website of Arrow Electronics

The official website of Arrow Electronics is https://www.arrow.com/company.

Arrow Electronics’s AI-Generated Cybersecurity Score

According to Rankiteo, Arrow Electronics’s AI-generated cybersecurity score is 784, reflecting their Fair security posture.

How many security badges does Arrow Electronics’ have ?

According to Rankiteo, Arrow Electronics currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Arrow Electronics have SOC 2 Type 1 certification ?

According to Rankiteo, Arrow Electronics is not certified under SOC 2 Type 1.

Does Arrow Electronics have SOC 2 Type 2 certification ?

According to Rankiteo, Arrow Electronics does not hold a SOC 2 Type 2 certification.

Does Arrow Electronics comply with GDPR ?

According to Rankiteo, Arrow Electronics is not listed as GDPR compliant.

Does Arrow Electronics have PCI DSS certification ?

According to Rankiteo, Arrow Electronics does not currently maintain PCI DSS compliance.

Does Arrow Electronics comply with HIPAA ?

According to Rankiteo, Arrow Electronics is not compliant with HIPAA regulations.

Does Arrow Electronics have ISO 27001 certification ?

According to Rankiteo,Arrow Electronics is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Arrow Electronics

Arrow Electronics operates primarily in the Technology, Information and Internet industry.

Number of Employees at Arrow Electronics

Arrow Electronics employs approximately 19,812 people worldwide.

Subsidiaries Owned by Arrow Electronics

Arrow Electronics presently has no subsidiaries across any sectors.

Arrow Electronics’s LinkedIn Followers

Arrow Electronics’s official LinkedIn profile has approximately 361,004 followers.

NAICS Classification of Arrow Electronics

Arrow Electronics is classified under the NAICS code 513, which corresponds to Others.

Arrow Electronics’s Presence on Crunchbase

No, Arrow Electronics does not have a profile on Crunchbase.

Arrow Electronics’s Presence on LinkedIn

Yes, Arrow Electronics maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/arrow-electronics.

Cybersecurity Incidents Involving Arrow Electronics

As of November 30, 2025, Rankiteo reports that Arrow Electronics has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Arrow Electronics has an estimated 12,720 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Arrow Electronics ?

Incident Types: The types of cybersecurity incidents that have occurred include Breach.

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Arrow Electronics Inc. Laptop Theft

Description: A laptop containing personal information of approximately 4,044 current and former employees, including about 52 New Hampshire residents, was stolen from Arrow Electronics, Inc.

Date Detected: 2010-02-18

Date Publicly Disclosed: 2010-03-03

Type: Data Breach

Attack Vector: Physical Theft

Vulnerability Exploited: Physical Security

Threat Actor: Unknown

Motivation: Unknown

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach ARR408070825

Data Compromised: Names, Addresses, Social security numbers

Systems Affected: Laptop

Identity Theft Risk: Medium

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information and .

Which entities were affected by each incident ?

Incident : Data Breach ARR408070825

Entity Name: Arrow Electronics, Inc.

Entity Type: Company

Industry: Electronics

Location: Unknown

Size: Large

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach ARR408070825

Type of Data Compromised: Personal information

Number of Records Exposed: 4044

Sensitivity of Data: High

Personally Identifiable Information: NamesAddressesSocial Security Numbers

References

Where can I find more information about each incident ?

Incident : Data Breach ARR408070825

Source: New Hampshire Department of Justice

Date Accessed: 2010-03-03

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: New Hampshire Department of JusticeDate Accessed: 2010-03-03.

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident was an Unknown.

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2010-02-18.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2010-03-03.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Names, Addresses, Social Security Numbers and .

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident was Laptop.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Social Security Numbers, Names and Addresses.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 408.0.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is New Hampshire Department of Justice.

cve

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability was determined in motogadget mo.lock Ignition Lock up to 20251125. Affected by this vulnerability is an unknown functionality of the component NFC Handler. Executing manipulation can lead to use of hard-coded cryptographic key . The physical device can be targeted for the attack. A high complexity level is associated with this attack. The exploitation appears to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 1.2
Severity: HIGH
AV:L/AC:H/Au:N/C:P/I:N/A:N
cvss3
Base: 2.0
Severity: HIGH
CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 1.0
Severity: HIGH
CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the interview attachment retrieval endpoint in the Recruitment module serves files based solely on an authenticated session and user-supplied identifiers, without verifying whether the requester has permission to access the associated interview record. Because the server does not perform any recruitment-level authorization checks, an ESS-level user with no access to recruitment workflows can directly request interview attachment URLs and receive the corresponding files. This exposes confidential interview documents—including candidate CVs, evaluations, and supporting files—to unauthorized users. The issue arises from relying on predictable object identifiers and session presence rather than validating the user’s association with the relevant recruitment process. This issue has been patched in version 5.8.

Risk Information
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application’s recruitment attachment retrieval endpoint does not enforce the required authorization checks before serving candidate files. Even users restricted to ESS-level access, who have no permission to view the Recruitment module, can directly access candidate attachment URLs. When an authenticated request is made to the attachment endpoint, the system validates the session but does not confirm that the requesting user has the necessary recruitment permissions. As a result, any authenticated user can download CVs and other uploaded documents for arbitrary candidates by issuing direct requests to the attachment endpoint, leading to unauthorized exposure of sensitive applicant data. This issue has been patched in version 5.8.

Risk Information
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application does not invalidate existing sessions when a user is disabled or when a password change occurs, allowing active session cookies to remain valid indefinitely. As a result, a disabled user, or an attacker using a compromised account, can continue to access protected pages and perform operations as long as a prior session remains active. Because the server performs no session revocation or session-store cleanup during these critical state changes, disabling an account or updating credentials has no effect on already-established sessions. This makes administrative disable actions ineffective and allows unauthorized users to retain full access even after an account is closed or a password is reset, exposing the system to prolonged unauthorized use and significantly increasing the impact of account takeover scenarios. This issue has been patched in version 5.8.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the password reset workflow does not enforce that the username submitted in the final reset request matches the account for which the reset process was originally initiated. After obtaining a valid reset link for any account they can receive email for, an attacker can alter the username parameter in the final reset request to target a different user. Because the system accepts the supplied username without verification, the attacker can set a new password for any chosen account, including privileged accounts, resulting in full account takeover. This issue has been patched in version 5.8.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=arrow-electronics' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge