Company Details
freestylesolutions
34
1,797
5112
freestylesolutions.com
0
FRE_1925857
In-progress

Freestyle Solutions Company CyberSecurity Posture
freestylesolutions.comFreestyle Solutions, formerly Dydacomp, provides enterprise-class order and inventory management solutions for high-growth retailers and brands, at a price that is affordable for the mid-market. With Freestyle, retailers can obtain a unified view of supply and demand across all sales channels to optimize inventory and fulfill customer orders more efficiently. Available in cloud and on-premise delivery models, Freestyle solutions are highly scalable and can be configured to the needs of individual users. Freestyle is a trusted and proven technology provider, with more than 2,000 customers and 25 years of expertise developing order management software.
Company Details
freestylesolutions
34
1,797
5112
freestylesolutions.com
0
FRE_1925857
In-progress
Between 700 and 749

Freestyle Solutions Global Score (TPRM)XXXX

Description: The complaint alleges that Freestyle’s contract language had assured PulseTV that it was PCI DSS-compliant when it wasn’t. Payment card information of over 236,000 of PulseTV’s customers was compromised in a data breach that continued for more than a year. The breach was first found as a result of alerts PulseTV got in March 2021 and again in October 2021 regarding them being a Common Point of Compromise. After several failed investigations to find the breach, they hired Kroll to conduct an investigation, which led to the confirmation of the breach in 2022. There are rumours that the dark web has data from the breach.


No incidents recorded for Freestyle Solutions in 2025.
No incidents recorded for Freestyle Solutions in 2025.
No incidents recorded for Freestyle Solutions in 2025.
Freestyle Solutions cyber incidents detection timeline including parent company and subsidiaries

Freestyle Solutions, formerly Dydacomp, provides enterprise-class order and inventory management solutions for high-growth retailers and brands, at a price that is affordable for the mid-market. With Freestyle, retailers can obtain a unified view of supply and demand across all sales channels to optimize inventory and fulfill customer orders more efficiently. Available in cloud and on-premise delivery models, Freestyle solutions are highly scalable and can be configured to the needs of individual users. Freestyle is a trusted and proven technology provider, with more than 2,000 customers and 25 years of expertise developing order management software.

At Bolt, we're building a future where people don’t need to own personal cars to move around safely and conveniently. A future where people have the freedom to use transport on demand, choosing whatever vehicle's best for each occasion — be it a car, scooter, or e-bike. We're helping over 200 mill

With our unique ability to offer end-to-end solutions that connect the three pillars of IoT - Sensors, Software, and Services, we enable businesses to move from the traditional to the digital, or improve businesses by introducing a digital element in their products and processes. Now more than ever
Databricks is the Data and AI company. More than 10,000 organizations worldwide — including Block, Comcast, Condé Nast, Rivian, Shell and over 60% of the Fortune 500 — rely on the Databricks Data Intelligence Platform to take control of their data and put it to work with AI. Databricks is headquarte

Adhering to the ‘Retail + Technology’ strategy, Meituan commits to its mission that 'We help people eat better, live better'. Since its establishment in March 2010, Meituan has advanced the digital upgrading of services and goods retail on both supply and demand sides. Together with our partners we

We’re the delivery market leader in Latin America. Our platform connects over 77.000 restaurants, supermarkets, pharmacies and stores with millions of users. Nowadays we operate in more than 500 cities in Latinamerica. And we are now over 3.400 employees. PedidosYa is available for iOS, Android and
Autodesk is changing how the world is designed and made. Our technology spans architecture, engineering, construction, product design, manufacturing, and media and entertainment. We empower innovators everywhere to solve challenges, big and small. From greener buildings to smarter products and mo

Thomson Reuters is the world’s leading provider of news and information-based tools to professionals. Our worldwide network of journalists and specialist editors keep customers up to speed on global developments, with a particular focus on legal, regulatory and tax changes. Our customers operat
Founded in 2003, LinkedIn connects the world's professionals to make them more productive and successful. With more than 1 billion members worldwide, including executives from every Fortune 500 company, LinkedIn is the world's largest professional network. The company has a diversified business mode
Upwork is the world’s work marketplace that connects businesses with independent talent from across the globe. We serve everyone from one-person startups to large, Fortune 100 enterprises with a powerful, trust-driven platform that enables companies and talent to work together in new ways that unloc
.png)
Explore Abbott's internships and other early career roles at Abbott, a global health tech leader and innovator. Start your journey to help shape the future...
Freestyle Software, which does business as Freestyle Solutions, and Sturm, Ruger & Co. agreed to a $1.5 million class action lawsuit...
One of his most significant accomplishments is Freestyle Orchestrator, a low-code platform streamlining workflows. Created by Billy Wilder
Cybersecurity startup Deduce Inc. today announced that it has raised $9 million in new funding to launch its generative AI identity fraud solution.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Freestyle Solutions is http://www.freestylesolutions.com.
According to Rankiteo, Freestyle Solutions’s AI-generated cybersecurity score is 722, reflecting their Moderate security posture.
According to Rankiteo, Freestyle Solutions currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Freestyle Solutions is not certified under SOC 2 Type 1.
According to Rankiteo, Freestyle Solutions does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Freestyle Solutions is not listed as GDPR compliant.
According to Rankiteo, Freestyle Solutions does not currently maintain PCI DSS compliance.
According to Rankiteo, Freestyle Solutions is not compliant with HIPAA regulations.
According to Rankiteo,Freestyle Solutions is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Freestyle Solutions operates primarily in the Software Development industry.
Freestyle Solutions employs approximately 34 people worldwide.
Freestyle Solutions presently has no subsidiaries across any sectors.
Freestyle Solutions’s official LinkedIn profile has approximately 1,797 followers.
Freestyle Solutions is classified under the NAICS code 5112, which corresponds to Software Publishers.
No, Freestyle Solutions does not have a profile on Crunchbase.
Yes, Freestyle Solutions maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/freestylesolutions.
As of December 23, 2025, Rankiteo reports that Freestyle Solutions has experienced 1 cybersecurity incidents.
Freestyle Solutions has an estimated 27,855 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with kroll..
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Payment card information
Payment Information Risk: True
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Payment card information.

Entity Name: PulseTV
Entity Type: Company
Customers Affected: 236,000

Third Party Assistance: Kroll
Third-Party Assistance: The company involves third-party assistance in incident response through Kroll.

Type of Data Compromised: Payment card information
Number of Records Exposed: 236,000

Regulations Violated: PCI DSS,

Source: Cyber Incident Description
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Cyber Incident Description.

Investigation Status: Confirmed
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Kroll.
Most Recent Incident Detected: The most recent incident detected was on October 2021.
Most Recent Incident Resolved: The most recent incident resolved was on 2022.
Most Significant Data Compromised: The most significant data compromised in an incident were Payment card information and .
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Kroll.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Payment card information.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 236.0K.
Most Recent Source: The most recent source of information about an incident is Cyber Incident Description.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Confirmed.
.png)
Marshmallow is a lightweight library for converting complex objects to and from simple Python datatypes. In versions from 3.0.0rc1 to before 3.26.2 and from 4.0.0 to before 4.1.2, Schema.load(data, many=True) is vulnerable to denial of service attacks. A moderately sized request can consume a disproportionate amount of CPU time. This issue has been patched in version 3.26.2 and 4.1.2.
KEDA is a Kubernetes-based Event Driven Autoscaling component. Prior to versions 2.17.3 and 2.18.3, an Arbitrary File Read vulnerability has been identified in KEDA, potentially affecting any KEDA resource that uses TriggerAuthentication to configure HashiCorp Vault authentication. The vulnerability stems from an incorrect or insufficient path validation when loading the Service Account Token specified in spec.hashiCorpVault.credential.serviceAccount. An attacker with permissions to create or modify a TriggerAuthentication resource can exfiltrate the content of any file from the node's filesystem (where the KEDA pod resides) by directing the file's content to a server under their control, as part of the Vault authentication request. The potential impact includes the exfiltration of sensitive system information, such as secrets, keys, or the content of files like /etc/passwd. This issue has been patched in versions 2.17.3 and 2.18.3.
Fedify is a TypeScript library for building federated server apps powered by ActivityPub. Prior to versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2, a Regular Expression Denial of Service (ReDoS) vulnerability exists in Fedify's document loader. The HTML parsing regex at packages/fedify/src/runtime/docloader.ts:259 contains nested quantifiers that cause catastrophic backtracking when processing maliciously crafted HTML responses. This issue has been patched in versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2.
Authenticated Remote Code Execution (RCE) in PluXml CMS 5.8.22 allows an attacker with administrator panel access to inject a malicious PHP webshell into a theme file (e.g., home.php).
An issue was discovered in Xiongmai XM530 IP cameras on firmware V5.00.R02.000807D8.10010.346624.S.ONVIF 21.06. The GetStreamUri exposes RTSP URIs containing hardcoded credentials enabling direct unauthorized video stream access.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.