Company Details
fozzy-group
10,001
0
43
fozzy.ua
0
FOZ_2284200
In-progress


Fozzy Group Company CyberSecurity Posture
fozzy.uaFozzy Group is one of the largest trade industrial groups in Ukraine and one of the leading Ukrainian retailers, with over 700 outlets all around the country. Besides retail, the group's businesses include food production, and restaurants. Fozzy Group is introducing modern solutions in all areas of its activity. By investing in improving its business processes, the group has achieved leading positions in the retail market. By performing retail chains logistics through its own distribution centers, Fozzy Group has been able to ensure the timely delivery of food to its stores all over Ukraine. In addition, the group operates its own quality control system, ensuring full compliance with its standards in goods storage, transportation and sale. Since its inception in 1997, Fozzy Group has focused on making innovative business improvements, creating new opportunities for the market and further developing the industry as a whole.
Company Details
fozzy-group
10,001
0
43
fozzy.ua
0
FOZ_2284200
In-progress
Between 750 and 799

Fozzy Group Global Score (TPRM)XXXX



No incidents recorded for Fozzy Group in 2026.
No incidents recorded for Fozzy Group in 2026.
No incidents recorded for Fozzy Group in 2026.
Fozzy Group cyber incidents detection timeline including parent company and subsidiaries

Fozzy Group is one of the largest trade industrial groups in Ukraine and one of the leading Ukrainian retailers, with over 700 outlets all around the country. Besides retail, the group's businesses include food production, and restaurants. Fozzy Group is introducing modern solutions in all areas of its activity. By investing in improving its business processes, the group has achieved leading positions in the retail market. By performing retail chains logistics through its own distribution centers, Fozzy Group has been able to ensure the timely delivery of food to its stores all over Ukraine. In addition, the group operates its own quality control system, ensuring full compliance with its standards in goods storage, transportation and sale. Since its inception in 1997, Fozzy Group has focused on making innovative business improvements, creating new opportunities for the market and further developing the industry as a whole.


Titan Company Ltd is the organization that brought about a paradigm shift in the Indian watch market when it introduced its futuristic quartz technology, complemented by international styling. With India's two most recognized and loved brands Titan and Tanishq to its credit, Titan Company Ltd is the
Sprouts is the place where goodness grows. True to its farm-stand heritage, Sprouts offers a unique grocery experience featuring an open layout with fresh produce at the heart of the store. Sprouts inspires wellness naturally with a carefully curated assortment of better-for-you products paired wit

Kingfisher plc is an international home improvement company with over 2,000 stores, and operations in eight countries across Europe. We operate under retail banners including B&Q, Castorama, Brico Dépôt, Screwfix, TradePoint and Koçtaş, supported by a team of over 78,000 colleagues. We offer home

Whole Foods was founded in 1980 on the belief that where food comes from, and how it’s grown, matters. It meant creating quality standards, working with suppliers who achieve them, and sharing that information with our customers. And it radically changed the way people understood and shopped for foo
Woolworths offers a unique blend of food, fashion, beauty and homeware. Since 1931, we’ve found ways to do better, think bigger, inspire more, care more. As we continue to innovate and evolve, our commitment to quality will never change. Woolies Exceptional Quality™ is the driving force of every d

Avolta AG, (SIX: AVOL) is leading a travel experience revolution. The result of the Dufry-Autogrill business combination, Avolta puts the traveler at our strategic core as we maximize every moment of the journey through our unique combination of travel retail and travel food & beverage, passion fo
PERSONE OLTRE LE COSE. Conad è una storia fatta di imprenditori, commercianti, clienti e comunità. Un lungo viaggio che inizia nella metà degli anni ’60: nel 1962 nasce a Bologna il Consorzio Nazionale Dettaglianti, una società cooperativa a responsabilità limitata costituita da 14 gruppi d’acquisto

Apparel Group is a multi-award-winning global fashion and lifestyle retail conglomerate based in Dubai, UAE, with operations across the GCC. Today, Apparel Group caters to millions of eager shoppers through its 2,300+ retail stores and 85+ brands on all platforms while employing over 24,000 multicul

تعتبر أسواق عبدالله العثيم امتداد لمؤسسة صالح العثيم التجارية، التي أسسها في عام 1376هـ ( 1956م ) الشيخ الراحل/ صالح العثيم " يرحمه الله "حيث افتتحت تلك المؤسسة موقعها الأول في قلب منطقة العمل التجاري آنذاك الرياض-حلة القصمان، وعملت في تجارة المواد الغذائية وفي عام 1401 هـ / 1980 م تم تأسيس شركة أسو
.png)
In just over two weeks' time, Paris will host the inaugural edition of NRF 2025: Retail's Big Show Europe, from September 16–18 at Paris...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Fozzy Group is http://www.fozzy.ua.
According to Rankiteo, Fozzy Group’s AI-generated cybersecurity score is 786, reflecting their Fair security posture.
According to Rankiteo, Fozzy Group currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Fozzy Group has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Fozzy Group is not certified under SOC 2 Type 1.
According to Rankiteo, Fozzy Group does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Fozzy Group is not listed as GDPR compliant.
According to Rankiteo, Fozzy Group does not currently maintain PCI DSS compliance.
According to Rankiteo, Fozzy Group is not compliant with HIPAA regulations.
According to Rankiteo,Fozzy Group is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Fozzy Group operates primarily in the Retail industry.
Fozzy Group employs approximately 10,001 people worldwide.
Fozzy Group presently has no subsidiaries across any sectors.
Fozzy Group’s official LinkedIn profile has approximately 0 followers.
Fozzy Group is classified under the NAICS code 43, which corresponds to Retail Trade.
No, Fozzy Group does not have a profile on Crunchbase.
Yes, Fozzy Group maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/fozzy-group.
As of January 24, 2026, Rankiteo reports that Fozzy Group has not experienced any cybersecurity incidents.
Fozzy Group has an estimated 15,596 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Fozzy Group has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Typemill is a flat-file, Markdown-based CMS designed for informational documentation websites. A reflected Cross-Site Scripting (XSS) exists in the login error view template `login.twig` of versions 2.19.1 and below. The `username` value can be echoed back without proper contextual encoding when authentication fails. An attacker can execute script in the login page context. This issue has been fixed in version 2.19.2.
A DOM-based Cross-Site Scripting (XSS) vulnerability exists in the DomainCheckerApp class within domain/script.js of Sourcecodester Domain Availability Checker v1.0. The vulnerability occurs because the application improperly handles user-supplied data in the createResultElement method by using the unsafe innerHTML property to render domain search results.
A Remote Code Execution (RCE) vulnerability exists in Sourcecodester Modern Image Gallery App v1.0 within the gallery/upload.php component. The application fails to properly validate uploaded file contents. Additionally, the application preserves the user-supplied file extension during the save process. This allows an unauthenticated attacker to upload arbitrary PHP code by spoofing the MIME type as an image, leading to full system compromise.
A UNIX symbolic link following issue in the jailer component in Firecracker version v1.13.1 and earlier and 1.14.0 on Linux may allow a local host user with write access to the pre-created jailer directories to overwrite arbitrary host files via a symlink attack during the initialization copy at jailer startup, if the jailer is executed with root privileges. To mitigate this issue, users should upgrade to version v1.13.2 or 1.14.1 or above.
An information disclosure vulnerability exists in the /srvs/membersrv/getCashiers endpoint of the Aptsys gemscms backend platform thru 2025-05-28. This unauthenticated endpoint returns a list of cashier accounts, including names, email addresses, usernames, and passwords hashed using MD5. As MD5 is a broken cryptographic function, the hashes can be easily reversed using public tools, exposing user credentials in plaintext. This allows remote attackers to perform unauthorized logins and potentially gain access to sensitive POS operations or backend functions.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.