Company Details
food-for-the-poor
681
34,100
8135
foodforthepoor.org
0
FOO_1757492
In-progress

Food For The Poor Company CyberSecurity Posture
foodforthepoor.orgFood For The Poor, one of the largest international relief and development organizations in the nation, does much more than feed millions of hungry children and families living in poverty throughout Latin America and the Caribbean. We provide emergency relief assistance, water, medicine, educational materials, homes, support for vulnerable children, care for the aged, skills training and micro-enterprise development assistance. For more information, please visit www.FoodForThePoor.org. Career opportunities: https://foodforthepoor.org/about-us/employment/
Company Details
food-for-the-poor
681
34,100
8135
foodforthepoor.org
0
FOO_1757492
In-progress
Between 700 and 749

FP Global Score (TPRM)XXXX

Description: In September 2024, **Food for the Poor Inc.**, a charitable organization, suffered a **cyberattack** that resulted in the **leak of confidential, sensitive, and private information** belonging to its **employees and donors**. The breach exposed personal data, prompting a proposed **class-action lawsuit** alleging negligence. However, a **federal court dismissed the case**, citing deficiencies in the plaintiffs' claims, including a lack of evidence supporting an **implied breach of contract** since the affected individuals did not directly provide their information to the organization for secure storage. Despite the legal dismissal, the incident highlights significant **data exposure risks** for nonprofits handling donor and employee records, with potential long-term **reputational and financial repercussions** due to the unauthorized disclosure of sensitive information.


No incidents recorded for Food For The Poor in 2025.
No incidents recorded for Food For The Poor in 2025.
No incidents recorded for Food For The Poor in 2025.
FP cyber incidents detection timeline including parent company and subsidiaries

Food For The Poor, one of the largest international relief and development organizations in the nation, does much more than feed millions of hungry children and families living in poverty throughout Latin America and the Caribbean. We provide emergency relief assistance, water, medicine, educational materials, homes, support for vulnerable children, care for the aged, skills training and micro-enterprise development assistance. For more information, please visit www.FoodForThePoor.org. Career opportunities: https://foodforthepoor.org/about-us/employment/


TED’s mission is to discover and champion the ideas that will shape tomorrow. Powerful ideas, powerfully presented, can move us to feel something, to think differently, to take action and create a brighter future. TED finds these powerful ideas across disciplines and around the globe, from people w

Colsubsidio es una organización privada sin ánimo de lucro, que pertenece al Sistema de Protección y Seguridad Social, su evolución ha estado marcada tanto por el reconocimiento de las personas como seres integrales con necesidades dinámicas, múltiples e interdependientes, como por las transformacio

AIESEC develops leadership among youth aged 18 to 30 and contributes to strengthening the global employability market by providing an end-to-end international talent recruitment solution for Enterprises, NGOs, and Start-ups. AIESEC is the world's largest youth-run organization developing the leader
The International Rescue Committee responds to the world’s worst humanitarian crises and help people to survive, recover, and gain control of their future. Founded in 1933 at the request of Albert Einstein, the IRC offers lifesaving care and life-changing assistance to refugees and displaced peopl
The American Red Cross prevents and alleviates human suffering in the face of emergencies by mobilizing the power of volunteers and the generosity of donors. Each day, thousands of people – people just like you – provide compassionate care to those in need. Our network of generous donors, voluntee

Every day, we help millions of people to make journeys across London: By Tube, bus, tram, car, bike – and more. People don’t associate us with journeys by river, on foot or via the air, but we help with that, too. Getting people to where they need to go has been our business for over 100 years, and
Goodwill Industries is all about people working. We are North America’s leading nonprofit provider of education, training, and career services for people with disadvantages, such as welfare dependency, homelessness, and lack of education or work experience, as well as those with physical, mental an

YMCA of the USA is the national resource office for the nation's YMCAs. Located in Chicago, IL, YMCA of the USA exists to serve YMCAs. To address the specific needs of communities, each YMCA is an independent organization, autonomous and separate from YMCA of the USA. They are required by the nation

World Vision is the largest child-focused private charity in the world. Our 33,000+ staff members working in nearly 100 countries have united with our incredible supporters to impact the lives of over 200 million vulnerable children by tackling the root causes of poverty. Through World Vision every
.png)
The company is investigating a discrimination complaint brought by a former employee claiming he was fired after reporting the executive's...
Campbell's executive Martin Bally allegedly made the offensive remarks during a meeting in November 2024.
The comments came to light after an audiotape was released, tied to a lawsuit filed by a former employee.
The Campbell's Company says that its soup is made from real meat -- not “3-D printed chicken," as an exec allegedly said in a shocking...
I don't want to eat a f**king piece of chicken that came from a 3D printer,” the executive allegedly said.
A Campbell Soup Company executive allegedly made offensive comments about Indian workers, according to a Michigan lawsuit.
A lawsuit accuses a Campbell's Soup executive of claiming their products were for "poor people" and making racist remarks about Indian...
Accusations are making their rounds after a Campbell Soup Company executive allegedly made disparaging comments regarding the company's...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Food For The Poor is https://foodforthepoor.org/.
According to Rankiteo, Food For The Poor’s AI-generated cybersecurity score is 747, reflecting their Moderate security posture.
According to Rankiteo, Food For The Poor currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Food For The Poor is not certified under SOC 2 Type 1.
According to Rankiteo, Food For The Poor does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Food For The Poor is not listed as GDPR compliant.
According to Rankiteo, Food For The Poor does not currently maintain PCI DSS compliance.
According to Rankiteo, Food For The Poor is not compliant with HIPAA regulations.
According to Rankiteo,Food For The Poor is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Food For The Poor operates primarily in the Non-profit Organizations industry.
Food For The Poor employs approximately 681 people worldwide.
Food For The Poor presently has no subsidiaries across any sectors.
Food For The Poor’s official LinkedIn profile has approximately 34,100 followers.
Food For The Poor is classified under the NAICS code 8135, which corresponds to Others.
No, Food For The Poor does not have a profile on Crunchbase.
Yes, Food For The Poor maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/food-for-the-poor.
As of December 04, 2025, Rankiteo reports that Food For The Poor has experienced 1 cybersecurity incidents.
Food For The Poor has an estimated 20,522 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.
Title: Food for the Poor Inc. Data Breach (September 2024)
Description: A September 2024 cyberattack on Food for the Poor Inc., an international charitable organization, resulted in the leak of confidential, sensitive, and private information belonging to employees and donors. A proposed data breach class action was dismissed by a federal court due to deficiencies in the plaintiffs' claims, including failure to establish an implied breach of contract for the handling of personal information.
Date Detected: 2024-09
Type: Data Breach
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Data Compromised: Confidential information, Sensitive information, Private information
Customer Complaints: Class action lawsuit filed (later dismissed)
Brand Reputation Impact: Potential reputational harm due to leaked sensitive data
Legal Liabilities: Proposed class action dismissed; no fines or legal actions confirmed
Identity Theft Risk: High (sensitive and private information exposed)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Confidential Information, Sensitive Information, Private Information and .

Entity Name: Food for the Poor Inc.
Entity Type: Non-profit/Charitable Organization
Industry: International Relief/Humanitarian Aid
Location: Southern District of Florida, USA (HQ in Coconut Creek, Florida)
Customers Affected: employees, donors

Type of Data Compromised: Confidential information, Sensitive information, Private information
Sensitivity of Data: High
Data Exfiltration: Yes
Personally Identifiable Information: Likely (based on context)

Fines Imposed: None (case dismissed)
Legal Actions: Proposed class action dismissed (deficiencies in claims)
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Proposed class action dismissed (deficiencies in claims).

Source: US District Court for the Southern District of Florida (Judge Ed Artau)
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: US District Court for the Southern District of Florida (Judge Ed Artau).

Investigation Status: Legal proceedings dismissed; no further details on technical investigation

High Value Targets: Employee Data, Donor Data,
Data Sold on Dark Web: Employee Data, Donor Data,
Most Recent Incident Detected: The most recent incident detected was on 2024-09.
Most Significant Data Compromised: The most significant data compromised in an incident were confidential information, sensitive information, private information and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were private information, sensitive information and confidential information.
Highest Fine Imposed: The highest fine imposed for a regulatory violation was None (case dismissed).
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Proposed class action dismissed (deficiencies in claims).
Most Recent Source: The most recent source of information about an incident is US District Court for the Southern District of Florida (Judge Ed Artau).
Current Status of Most Recent Investigation: The current status of the most recent investigation is Legal proceedings dismissed; no further details on technical investigation.
.png)
MCP Server Kubernetes is an MCP Server that can connect to a Kubernetes cluster and manage it. Prior to 2.9.8, there is a security issue exists in the exec_in_pod tool of the mcp-server-kubernetes MCP Server. The tool accepts user-provided commands in both array and string formats. When a string format is provided, it is passed directly to shell interpretation (sh -c) without input validation, allowing shell metacharacters to be interpreted. This vulnerability can be exploited through direct command injection or indirect prompt injection attacks, where AI agents may execute commands without explicit user intent. This vulnerability is fixed in 2.9.8.
XML external entity (XXE) injection in eyoucms v1.7.1 allows remote attackers to cause a denial of service via crafted body of a POST request.
An issue was discovered in Fanvil x210 V2 2.12.20 allowing unauthenticated attackers on the local network to access administrative functions of the device (e.g. file upload, firmware update, reboot...) via a crafted authentication bypass.
Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.
Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.