Company Details
fozzy-group
10,001
0
43
fozzy.ua
0
FOZ_2284200
In-progress


Fozzy Group Company CyberSecurity Posture
fozzy.uaFozzy Group is one of the largest trade industrial groups in Ukraine and one of the leading Ukrainian retailers, with over 700 outlets all around the country. Besides retail, the group's businesses include food production, and restaurants. Fozzy Group is introducing modern solutions in all areas of its activity. By investing in improving its business processes, the group has achieved leading positions in the retail market. By performing retail chains logistics through its own distribution centers, Fozzy Group has been able to ensure the timely delivery of food to its stores all over Ukraine. In addition, the group operates its own quality control system, ensuring full compliance with its standards in goods storage, transportation and sale. Since its inception in 1997, Fozzy Group has focused on making innovative business improvements, creating new opportunities for the market and further developing the industry as a whole.
Company Details
fozzy-group
10,001
0
43
fozzy.ua
0
FOZ_2284200
In-progress
Between 750 and 799

Fozzy Group Global Score (TPRM)XXXX



No incidents recorded for Fozzy Group in 2026.
No incidents recorded for Fozzy Group in 2026.
No incidents recorded for Fozzy Group in 2026.
Fozzy Group cyber incidents detection timeline including parent company and subsidiaries

Fozzy Group is one of the largest trade industrial groups in Ukraine and one of the leading Ukrainian retailers, with over 700 outlets all around the country. Besides retail, the group's businesses include food production, and restaurants. Fozzy Group is introducing modern solutions in all areas of its activity. By investing in improving its business processes, the group has achieved leading positions in the retail market. By performing retail chains logistics through its own distribution centers, Fozzy Group has been able to ensure the timely delivery of food to its stores all over Ukraine. In addition, the group operates its own quality control system, ensuring full compliance with its standards in goods storage, transportation and sale. Since its inception in 1997, Fozzy Group has focused on making innovative business improvements, creating new opportunities for the market and further developing the industry as a whole.


Lidl s’est implanté en France en 1989. Nous avons connu une expansion très rapide qui nous a permis de devenir un acteur incontournable de la grande distribution. Lidl France, c’est aujourd’hui 45 000 collaborateurs, plus de 1 570 magasins, 25 Directions Régionales et un siège social sur 2 sites :

At Endeavour Group we exist to bring people together in better, more enjoyable, and more meaningful ways. Because we believe that social communities are thriving communities, built through great experiences and positive, memorable moments. United behind a common purpose of ‘Creating a more sociabl

Founded in 1960 in North Carolina, Harris Teeter has been enriching the lives of our customers and our communities for decades. Today, Harris Teeter employs 36,000 valued associates and operates more than 250 stores and 70 fuel centers in seven states and the District of Columbia. In addition to our

Welcome to the ALDI Nord Group! The ALDI Nord Group is one of the leading international retail enterprises. With a tradition stretching back over 110 years, the ALDI brand is synonymous with the invention of discount retail. ALDI Nord focuses on the essentials and reliably offers its customers in

Avec près de 4000 points de vente en Europe et un chiffre d'affaires de 53,39 milliards d'euros en 2022, Le Groupement Les Mousquetaires est un acteur majeur de la grande distribution. Créé en France en 1969, le Groupement, fondé sur l'initiative privée, rassemble aujourd'hui plus de 3 000 chefs d

#SomosUnEquipo Te invitamos a conocer y a ser parte de nuestra Casa, un lugar donde la innovación, la sostenibilidad y la diversidad se viven día a día. Con más de 60 años de trayectoria y presencia en Chile, Perú, Colombia, Argentina, Brasil, Uruguay y México, nuestra compañía se enfoca en el mejor
Woolworths offers a unique blend of food, fashion, beauty and homeware. Since 1931, we’ve found ways to do better, think bigger, inspire more, care more. As we continue to innovate and evolve, our commitment to quality will never change. Woolies Exceptional Quality™ is the driving force of every d

Thank you for your interest in ALDI. We are aware of attempts to deceive applicants through fraudulent websites and email domains. Please know, ALDI recruiters will only contact you from an @aldi.us email address. As one of America’s favorite grocers, we believe in offering value and quality in

We’re the largest employee owned business in the UK and home of our cherished brands, John Lewis and Waitrose. We’re not just employees, we’re Partners, driven by our purpose to build a happier world. As we look to our future, there’s never been a more exciting time to join us. We’re ruthlessly fo
.png)
In just over two weeks' time, Paris will host the inaugural edition of NRF 2025: Retail's Big Show Europe, from September 16–18 at Paris...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Fozzy Group is http://www.fozzy.ua.
According to Rankiteo, Fozzy Group’s AI-generated cybersecurity score is 786, reflecting their Fair security posture.
According to Rankiteo, Fozzy Group currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Fozzy Group has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Fozzy Group is not certified under SOC 2 Type 1.
According to Rankiteo, Fozzy Group does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Fozzy Group is not listed as GDPR compliant.
According to Rankiteo, Fozzy Group does not currently maintain PCI DSS compliance.
According to Rankiteo, Fozzy Group is not compliant with HIPAA regulations.
According to Rankiteo,Fozzy Group is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Fozzy Group operates primarily in the Retail industry.
Fozzy Group employs approximately 10,001 people worldwide.
Fozzy Group presently has no subsidiaries across any sectors.
Fozzy Group’s official LinkedIn profile has approximately 0 followers.
Fozzy Group is classified under the NAICS code 43, which corresponds to Retail Trade.
No, Fozzy Group does not have a profile on Crunchbase.
Yes, Fozzy Group maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/fozzy-group.
As of January 24, 2026, Rankiteo reports that Fozzy Group has not experienced any cybersecurity incidents.
Fozzy Group has an estimated 15,596 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Fozzy Group has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Typemill is a flat-file, Markdown-based CMS designed for informational documentation websites. A reflected Cross-Site Scripting (XSS) exists in the login error view template `login.twig` of versions 2.19.1 and below. The `username` value can be echoed back without proper contextual encoding when authentication fails. An attacker can execute script in the login page context. This issue has been fixed in version 2.19.2.
A DOM-based Cross-Site Scripting (XSS) vulnerability exists in the DomainCheckerApp class within domain/script.js of Sourcecodester Domain Availability Checker v1.0. The vulnerability occurs because the application improperly handles user-supplied data in the createResultElement method by using the unsafe innerHTML property to render domain search results.
A Remote Code Execution (RCE) vulnerability exists in Sourcecodester Modern Image Gallery App v1.0 within the gallery/upload.php component. The application fails to properly validate uploaded file contents. Additionally, the application preserves the user-supplied file extension during the save process. This allows an unauthenticated attacker to upload arbitrary PHP code by spoofing the MIME type as an image, leading to full system compromise.
A UNIX symbolic link following issue in the jailer component in Firecracker version v1.13.1 and earlier and 1.14.0 on Linux may allow a local host user with write access to the pre-created jailer directories to overwrite arbitrary host files via a symlink attack during the initialization copy at jailer startup, if the jailer is executed with root privileges. To mitigate this issue, users should upgrade to version v1.13.2 or 1.14.1 or above.
An information disclosure vulnerability exists in the /srvs/membersrv/getCashiers endpoint of the Aptsys gemscms backend platform thru 2025-05-28. This unauthenticated endpoint returns a list of cashier accounts, including names, email addresses, usernames, and passwords hashed using MD5. As MD5 is a broken cryptographic function, the hashes can be easily reversed using public tools, exposing user credentials in plaintext. This allows remote attackers to perform unauthorized logins and potentially gain access to sensitive POS operations or backend functions.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.