Company Details
arrow-electronics
19,812
361,004
513
https://www.arrow.com/company
0
ARR_9660639
In-progress

Arrow Electronics Company CyberSecurity Posture
https://www.arrow.com/companyArrow Electronics (NYSE:ARW) guides innovation forward for thousands of leading technology manufacturers and service providers. With 2024 sales of $27.9 billion, Arrow develops technology solutions that help improve business and daily life. Our broad portfolio that spans the entire technology landscape, helps customers design, distribute and deploy forward-thinking products that make the benefits of technology accessible to as many people as possible. Learn more at arrow.com. Are you thinking Five Years Out? Join us at careers.arrow.com.
Company Details
arrow-electronics
19,812
361,004
513
https://www.arrow.com/company
0
ARR_9660639
In-progress
Between 750 and 799

Arrow Electronics Global Score (TPRM)XXXX

Description: The New Hampshire Department of Justice reported on March 3, 2010, that Arrow Electronics, Inc. experienced a burglary on February 18, 2010, resulting in a stolen laptop containing personal information of approximately 4,044 current and former employees, including about 52 New Hampshire residents. The stolen data potentially involved names, addresses, and Social Security numbers, but there are no indications that the data was accessed or misused.


No incidents recorded for Arrow Electronics in 2025.
No incidents recorded for Arrow Electronics in 2025.
No incidents recorded for Arrow Electronics in 2025.
Arrow Electronics cyber incidents detection timeline including parent company and subsidiaries

Arrow Electronics (NYSE:ARW) guides innovation forward for thousands of leading technology manufacturers and service providers. With 2024 sales of $27.9 billion, Arrow develops technology solutions that help improve business and daily life. Our broad portfolio that spans the entire technology landscape, helps customers design, distribute and deploy forward-thinking products that make the benefits of technology accessible to as many people as possible. Learn more at arrow.com. Are you thinking Five Years Out? Join us at careers.arrow.com.

OYO is a global platform that aims to empower entrepreneurs and small businesses with hotels and homes by providing full-stack technology products and services that aims to increase revenue and ease operations; bringing easy-to-book, affordable, and trusted accommodation to customers around the worl
Booking Holdings is the world’s leading provider of online travel & related services, provided to consumers and local partners in more than 220 countries and territories through six primary consumer-facing brands: Booking.com, Priceline, Agoda, Rentalcars.com, KAYAK and OpenTable. Collectively, Book
Fanatics is a leading global digital sports platform. We ignite the passions of global sports fans and maximize the presence and reach for our hundreds of sports partners globally by offering products and services across Fanatics Commerce, Fanatics Collectibles, and Fanatics Betting & Gaming, allowi

La etimología de la palabra deriva del término medieval inglés usado para un mercenario (free-independiente o lance-lanza), es decir, un caballero que no servía a ningún señor en concreto y cuyos servicios podían ser alquilados por cualquiera. El término fue acuñado inicialmente por Sir Walter Scot
Zomato’s mission statement is “better food for more people.” Since our inception in 2010, we have grown tremendously, both in scope and scale - and emerged as India’s most trusted brand during the pandemic, along with being one of the largest hyperlocal delivery networks in the country. Today, Zoma
As the world’s leading local delivery platform, our mission is to deliver an amazing experience, fast, easy, and to your door. We operate in over 70+ countries worldwide, powered by tech but driven by people. As one of Europe’s largest tech platforms, we enable ambitious talent to deliver solutions

At Times Internet, we create premium digital products that simplify and enhance the lives of millions. As India’s largest digital products company, we have a significant presence across a wide range of categories, including News, Sports, Fintech, and Enterprise solutions. Our portfolio features mar
Sohu.com Inc. (NASDAQ: SOHU) is China's premier online brand and indispensable to the daily life of millions of Chinese, providing a network of web properties and community based/web 2.0 products which offer the vast Sohu user community a broad array of choices regarding information, entertainment a

YouTube is a team-oriented, creative workplace where every single employee has a voice in the choices we make and the features we implement. We work together in small teams to design, develop, and roll out key features and products in very short time frames. Which means something you write today cou
.png)
Global technology provider Arrow Electronics today announced a new distribution agreement with Supermicro in EMEA. The agreement will offer...
Please replace the release with the following corrected version due to multiple revisions. The updated release reads: THE REDESIGN GROUP...
CORRECTING and REPLACING The Redesign Group Named a 2025 Arrow Enterprise Computing Solutions Partner of the Year with Market Expansion...
Earlier this month, Clavister announced that Arrow Electronics expanded its distribution of Clavister's full cybersecurity portfolio beyond...
Arrow Electronics (NYSE:ARW) is expanding its role in the European cybersecurity market by distributing Clavister's full portfolio beyond...
Company recognised for exceptional work in delivering Cloud and AI solutions built on Microsoft platforms that positively impact mutual...
Clavister announced that Arrow Electronics has expanded distribution of its complete cybersecurity portfolio from Sweden into 11 additional...
EU cyber threats are escalating. With ransomware attacks, phishing, and nation-state activity on the rise, intensifying pressure is being...
Arrow Electronics released its third quarter results, revealing higher sales and net income compared to last year, along with updated...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Arrow Electronics is https://www.arrow.com/company.
According to Rankiteo, Arrow Electronics’s AI-generated cybersecurity score is 784, reflecting their Fair security posture.
According to Rankiteo, Arrow Electronics currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Arrow Electronics is not certified under SOC 2 Type 1.
According to Rankiteo, Arrow Electronics does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Arrow Electronics is not listed as GDPR compliant.
According to Rankiteo, Arrow Electronics does not currently maintain PCI DSS compliance.
According to Rankiteo, Arrow Electronics is not compliant with HIPAA regulations.
According to Rankiteo,Arrow Electronics is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Arrow Electronics operates primarily in the Technology, Information and Internet industry.
Arrow Electronics employs approximately 19,812 people worldwide.
Arrow Electronics presently has no subsidiaries across any sectors.
Arrow Electronics’s official LinkedIn profile has approximately 361,004 followers.
Arrow Electronics is classified under the NAICS code 513, which corresponds to Others.
No, Arrow Electronics does not have a profile on Crunchbase.
Yes, Arrow Electronics maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/arrow-electronics.
As of November 30, 2025, Rankiteo reports that Arrow Electronics has experienced 1 cybersecurity incidents.
Arrow Electronics has an estimated 12,720 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Title: Arrow Electronics Inc. Laptop Theft
Description: A laptop containing personal information of approximately 4,044 current and former employees, including about 52 New Hampshire residents, was stolen from Arrow Electronics, Inc.
Date Detected: 2010-02-18
Date Publicly Disclosed: 2010-03-03
Type: Data Breach
Attack Vector: Physical Theft
Vulnerability Exploited: Physical Security
Threat Actor: Unknown
Motivation: Unknown
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Names, Addresses, Social security numbers
Systems Affected: Laptop
Identity Theft Risk: Medium
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information and .

Entity Name: Arrow Electronics, Inc.
Entity Type: Company
Industry: Electronics
Location: Unknown
Size: Large

Type of Data Compromised: Personal information
Number of Records Exposed: 4044
Sensitivity of Data: High
Personally Identifiable Information: NamesAddressesSocial Security Numbers

Source: New Hampshire Department of Justice
Date Accessed: 2010-03-03
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: New Hampshire Department of JusticeDate Accessed: 2010-03-03.
Last Attacking Group: The attacking group in the last incident was an Unknown.
Most Recent Incident Detected: The most recent incident detected was on 2010-02-18.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2010-03-03.
Most Significant Data Compromised: The most significant data compromised in an incident were Names, Addresses, Social Security Numbers and .
Most Significant System Affected: The most significant system affected in an incident was Laptop.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Social Security Numbers, Names and Addresses.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 408.0.
Most Recent Source: The most recent source of information about an incident is New Hampshire Department of Justice.
.png)
A vulnerability was determined in motogadget mo.lock Ignition Lock up to 20251125. Affected by this vulnerability is an unknown functionality of the component NFC Handler. Executing manipulation can lead to use of hard-coded cryptographic key . The physical device can be targeted for the attack. A high complexity level is associated with this attack. The exploitation appears to be difficult. The vendor was contacted early about this disclosure but did not respond in any way.
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the interview attachment retrieval endpoint in the Recruitment module serves files based solely on an authenticated session and user-supplied identifiers, without verifying whether the requester has permission to access the associated interview record. Because the server does not perform any recruitment-level authorization checks, an ESS-level user with no access to recruitment workflows can directly request interview attachment URLs and receive the corresponding files. This exposes confidential interview documents—including candidate CVs, evaluations, and supporting files—to unauthorized users. The issue arises from relying on predictable object identifiers and session presence rather than validating the user’s association with the relevant recruitment process. This issue has been patched in version 5.8.
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application’s recruitment attachment retrieval endpoint does not enforce the required authorization checks before serving candidate files. Even users restricted to ESS-level access, who have no permission to view the Recruitment module, can directly access candidate attachment URLs. When an authenticated request is made to the attachment endpoint, the system validates the session but does not confirm that the requesting user has the necessary recruitment permissions. As a result, any authenticated user can download CVs and other uploaded documents for arbitrary candidates by issuing direct requests to the attachment endpoint, leading to unauthorized exposure of sensitive applicant data. This issue has been patched in version 5.8.
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the application does not invalidate existing sessions when a user is disabled or when a password change occurs, allowing active session cookies to remain valid indefinitely. As a result, a disabled user, or an attacker using a compromised account, can continue to access protected pages and perform operations as long as a prior session remains active. Because the server performs no session revocation or session-store cleanup during these critical state changes, disabling an account or updating credentials has no effect on already-established sessions. This makes administrative disable actions ineffective and allows unauthorized users to retain full access even after an account is closed or a password is reset, exposing the system to prolonged unauthorized use and significantly increasing the impact of account takeover scenarios. This issue has been patched in version 5.8.
OrangeHRM is a comprehensive human resource management (HRM) system. From version 5.0 to 5.7, the password reset workflow does not enforce that the username submitted in the final reset request matches the account for which the reset process was originally initiated. After obtaining a valid reset link for any account they can receive email for, an attacker can alter the username parameter in the final reset request to target a different user. Because the system accepts the supplied username without verification, the attacker can set a new password for any chosen account, including privileged accounts, resulting in full account takeover. This issue has been patched in version 5.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.