Company Details
brown-forman
4,646
307,419
3121
brown-forman.com
0
BRO_2600719
In-progress

Brown-Forman Company CyberSecurity Posture
brown-forman.comBrown‑Forman Corporation has been building exceptional spirits brands for more than 150 years, responsibly upholding our founding promise of “Nothing Better in the Market.” Our portfolio of premium brands includes the Jack Daniel’s Family of Brands, Woodford Reserve, Herradura, el Jimador, Korbel, New Mix, Old Forester, The Glendronach, Glenglassaugh, Benriach, Diplomático Rum, Chambord, Gin Mare, Fords Gin, Slane, and Coopers’ Craft. With a team of approximately 5,000 employees worldwide, we proudly share our passion for premium beverages in more than 170 countries.
Company Details
brown-forman
4,646
307,419
3121
brown-forman.com
0
BRO_2600719
In-progress
Between 700 and 749

Brown-Forman Global Score (TPRM)XXXX

Description: The Maine Office of the Attorney General disclosed on **May 10, 2021**, that **Brown-Forman Corporation** suffered a **data breach** due to unauthorized access to its internal network, initially detected on **July 28, 2020**, and confirmed on **August 4, 2020**. The incident impacted **72 individuals**, with compromised data potentially including **Social Security numbers (SSNs)** and **credit card information linked to expired cards**. The breach exposed sensitive personal and financial details, raising concerns over identity theft, fraud, and reputational harm. While the compromised credit card data pertained to expired cards—reducing immediate financial risk—the exposure of **SSNs** poses long-term threats, as such information is permanent and highly valuable to cybercriminals. The company likely faced regulatory scrutiny, customer distrust, and potential legal liabilities due to the failure to safeguard personally identifiable information (PII). The attack underscores vulnerabilities in corporate network security, particularly in protecting high-value employee and customer data from unauthorized intrusions. Though the scale was limited to 72 individuals, the nature of the exposed data elevates the severity of the incident.
Description: The California Office of the Attorney General reported a data breach involving Brown-Forman Corporation on August 25, 2020. The breach occurred on July 28, 2020, and involved a cyber attack that compromised personal information about current and former employees, as well as certain beneficiaries. Approximately, the data included names, Social Security Numbers, email addresses, home addresses, job titles, and salary information, although the number of affected individuals was not specified.
Description: Jack Daniel’s parent Brown-Forman was targeted by the REvil ransomware breach. The group stole 1TB of confidential information and data including employees, company agreements, contracts, financial statements, and internal correspondence. The gang is demanding a huge ransom by threatening to leak the data stolen in the attack.


No incidents recorded for Brown-Forman in 2025.
No incidents recorded for Brown-Forman in 2025.
No incidents recorded for Brown-Forman in 2025.
Brown-Forman cyber incidents detection timeline including parent company and subsidiaries

Brown‑Forman Corporation has been building exceptional spirits brands for more than 150 years, responsibly upholding our founding promise of “Nothing Better in the Market.” Our portfolio of premium brands includes the Jack Daniel’s Family of Brands, Woodford Reserve, Herradura, el Jimador, Korbel, New Mix, Old Forester, The Glendronach, Glenglassaugh, Benriach, Diplomático Rum, Chambord, Gin Mare, Fords Gin, Slane, and Coopers’ Craft. With a team of approximately 5,000 employees worldwide, we proudly share our passion for premium beverages in more than 170 countries.


Southern Glazer’s Wine & Spirits is the world’s pre-eminent distributor of beverage alcohol, and proud to be a multi-generational, family-owned company. We have operations in 47 states and Canada. We offer an array of careers focused on delivering a captivating and rewarding experience. We challeng
Pernod Ricard is a convivial, responsible and successful global wine and spirits group and the #1 premium spirits organisation in the world. The Group represents 240 premium brands available in more than 160 countries. We are 18,500 exceptionally talented people worldwide with our own salesforce in
Diageo's official LinkedIn account. We're a global leader in premium drinks, across spirits and beer, a business built on the principles and foundations laid by the giants of the industry. With over 200 brands sold in 180 countries, our portfolio has remarkable breadth. From centuries-old names to
.png)
Detailed price information for Rapid7 Inc (RPD-Q) from The Globe and Mail including charting and trades.
Louisville's tech industry is booming in 2025, growing 35% in five years with major players like GE Appliances, Humana, and Brown-Forman leading AI and digital...
Explore the top high-paying tech jobs in Louisville, Kentucky, with roles at Humana, Papa John's, and more. Discover roles, salaries...
Discover the top 10 tech internships in Louisville, Kentucky, and what each program offers to kickstart your career in technology.
Let's turn to some new research from Morningstar, starting with Okta OKTA and Zscaler ZS, two cybersecurity companies that reported earnings last week.
Plus, our updated forecasts for interest rates and inflation and our March stock market outlook.
This five-person team, which specializes in cybersecurity and data privacy, grows the law firm's Cleveland office to 22 attorneys.
The Tennessee whiskey, long snubbed by connoisseurs and collectors, is suddenly grabbing attention with a series of special releases.
Congratulations to these high-flying technology leaders who recently started new opportunities! Here are the latest moves by CIOs, CTOs,...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Brown-Forman is http://www.brown-forman.com.
According to Rankiteo, Brown-Forman’s AI-generated cybersecurity score is 741, reflecting their Moderate security posture.
According to Rankiteo, Brown-Forman currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Brown-Forman is not certified under SOC 2 Type 1.
According to Rankiteo, Brown-Forman does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Brown-Forman is not listed as GDPR compliant.
According to Rankiteo, Brown-Forman does not currently maintain PCI DSS compliance.
According to Rankiteo, Brown-Forman is not compliant with HIPAA regulations.
According to Rankiteo,Brown-Forman is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Brown-Forman operates primarily in the Beverage Manufacturing industry.
Brown-Forman employs approximately 4,646 people worldwide.
Brown-Forman presently has no subsidiaries across any sectors.
Brown-Forman’s official LinkedIn profile has approximately 307,419 followers.
Brown-Forman is classified under the NAICS code 3121, which corresponds to Beverage Manufacturing.
Yes, Brown-Forman has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/brown-forman-corp.
Yes, Brown-Forman maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/brown-forman.
As of November 27, 2025, Rankiteo reports that Brown-Forman has experienced 3 cybersecurity incidents.
Brown-Forman has an estimated 1,681 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach, Cyber Attack and Ransomware.
Title: Brown-Forman Ransomware Breach
Description: Jack Daniel’s parent Brown-Forman was targeted by the REvil ransomware breach. The group stole 1TB of confidential information and data including employees, company agreements, contracts, financial statements, and internal correspondence. The gang is demanding a huge ransom by threatening to leak the data stolen in the attack.
Type: Ransomware
Threat Actor: REvil
Motivation: Financial Gain
Title: Data Breach at Brown-Forman Corporation
Description: The California Office of the Attorney General reported a data breach involving Brown-Forman Corporation on August 25, 2020. The breach occurred on July 28, 2020, and involved a cyber attack that compromised personal information about current and former employees, as well as certain beneficiaries. Approximately, the data included names, Social Security Numbers, email addresses, home addresses, job titles, and salary information, although the number of affected individuals was not specified.
Date Detected: 2020-07-28
Date Publicly Disclosed: 2020-08-25
Type: Data Breach
Title: Brown-Forman Corporation Data Breach (2020)
Description: The Maine Office of the Attorney General reported that Brown-Forman Corporation experienced a data breach involving unauthorized access to their internal network. A total of 72 individuals were affected, with potentially compromised information including Social Security numbers and/or credit card information associated with expired cards.
Date Detected: 2020-07-28
Date Publicly Disclosed: 2021-05-10
Type: Data Breach
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Employees, Company agreements, Contracts, Financial statements, Internal correspondence

Data Compromised: Names, Social security numbers, Email addresses, Home addresses, Job titles, Salary information

Data Compromised: Social security numbers, Credit card information (expired cards)
Systems Affected: internal network
Identity Theft Risk: Potential (due to SSN exposure)
Payment Information Risk: Potential (expired credit card data)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Employees, Company Agreements, Contracts, Financial Statements, Internal Correspondence, , Names, Social Security Numbers, Email Addresses, Home Addresses, Job Titles, Salary Information, , Social Security Numbers, Credit Card Information (Expired) and .

Entity Name: Brown-Forman Corporation
Entity Type: Corporation
Industry: Beverage

Entity Name: Brown-Forman Corporation
Entity Type: Corporation
Industry: Beverage (Alcohol)
Location: Louisville, Kentucky, USA
Customers Affected: 72

Type of Data Compromised: Employees, Company agreements, Contracts, Financial statements, Internal correspondence
Sensitivity of Data: High
Data Exfiltration: Yes

Type of Data Compromised: Names, Social security numbers, Email addresses, Home addresses, Job titles, Salary information
Sensitivity of Data: High

Type of Data Compromised: Social security numbers, Credit card information (expired)
Number of Records Exposed: 72
Sensitivity of Data: High (SSNs, payment data)

Regulatory Notifications: Maine Office of the Attorney General

Source: California Office of the Attorney General
Date Accessed: 2020-08-25

Source: Maine Office of the Attorney General
Date Accessed: 2021-05-10
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney GeneralDate Accessed: 2020-08-25, and Source: Maine Office of the Attorney GeneralDate Accessed: 2021-05-10.

Investigation Status: Confirmed (as of 2020-08-04)
Last Ransom Demanded: The amount of the last ransom demanded was Yes.
Last Attacking Group: The attacking group in the last incident was an REvil.
Most Recent Incident Detected: The most recent incident detected was on 2020-07-28.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2021-05-10.
Most Significant Data Compromised: The most significant data compromised in an incident were employees, company agreements, contracts, financial statements, internal correspondence, , names, Social Security Numbers, email addresses, home addresses, job titles, salary information, , Social Security numbers, credit card information (expired cards) and .
Most Significant System Affected: The most significant system affected in an incident was internal network.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Social Security numbers, employees, contracts, email addresses, financial statements, job titles, home addresses, company agreements, salary information, internal correspondence, credit card information (expired cards), names and Social Security Numbers.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 72.0.
Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was Yes.
Most Recent Source: The most recent source of information about an incident are Maine Office of the Attorney General and California Office of the Attorney General.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Confirmed (as of 2020-08-04).
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.