ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Hi There! Thanks for dropping by to get to know us more. We are NOT a passionate team of coders, marketers, or designers - NADA. We are a passionate team of Problem-Solvers! Each member of our team is dedicated to solving problems in the WooCommerce space through innovation and design. We started this company back in 2011, as a web-consultancy, building custom solutions for our international clients. But as we progressed, we began to spot gaps in the market, and instead of sitting back, we decided to rise up and fill in those gaps. Our products are now serving more than 30,000 happy stores, across the globe today. As a team, we believe in an open-door policy and flexible timings. We host brainstorming & growth sessions, each month so that everyone can chime in and get equal opportunities. And while we have been able to develop a fun start-up culture at our space, we stand strong in terms of our ethics and values. Everyone's time and work are accounted for and every member's voice is heard. When you join our team, you will have a sturdy and strong ladder to climb. Wisetr, currently has two product lines - Funnelkit.com and XL Plugins. XL plugins creates conversion-boosting WooCommerce Plugins for time-strapped entrepreneurs and small business owners. And FunnelKit offers a new range of products focussed around bringing a Sales Funnel revolution in the WordPress/WooCommerce space. Both of these product lines are designed to get real-time ROI and massive conversions for store owners.

FunnelKit -We are Hiring ! A.I CyberSecurity Scoring

F-H

Company Details

Linkedin ID:

funnelkit-com

Employees number:

22

Number of followers:

3,571

NAICS:

5112

Industry Type:

Software Development

Homepage:

funnelkit.com

IP Addresses:

0

Company ID:

FUN_5796753

Scan Status:

In-progress

AI scoreF-H Risk Score (AI oriented)

Between 650 and 699

https://images.rankiteo.com/companyimages/funnelkit-com.jpeg
F-H Software Development
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreF-H Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/funnelkit-com.jpeg
F-H Software Development
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

F-H Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
WooCommerceBreach10044/2025
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: A cybercriminal under the pseudonym 'Satanic' claims to have breached WooCommerce through a third-party service on April 6, 2025, compromising over 4.4 million records. The breach reportedly includes detailed personal and business information such as contact details, company revenue, employee counts, and technology stacks. Major organizations like NVIDIA, Texas.gov, and NIST are believed to be affected. The breach poses a substantial risk of phishing, social engineering, and intelligence scraping, with the entire database put up for sale by the hacker.

WooCommerce
Breach
Severity: 100
Impact: 4
Seen: 4/2025
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: A cybercriminal under the pseudonym 'Satanic' claims to have breached WooCommerce through a third-party service on April 6, 2025, compromising over 4.4 million records. The breach reportedly includes detailed personal and business information such as contact details, company revenue, employee counts, and technology stacks. Major organizations like NVIDIA, Texas.gov, and NIST are believed to be affected. The breach poses a substantial risk of phishing, social engineering, and intelligence scraping, with the entire database put up for sale by the hacker.

Ailogo

F-H Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for F-H

Incidents vs Software Development Industry Average (This Year)

FunnelKit -We are Hiring ! has 132.56% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs All-Companies Average (This Year)

FunnelKit -We are Hiring ! has 56.25% more incidents than the average of all companies with at least one recorded incident.

Incident Types F-H vs Software Development Industry Avg (This Year)

FunnelKit -We are Hiring ! reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.

Incident History — F-H (X = Date, Y = Severity)

F-H cyber incidents detection timeline including parent company and subsidiaries

F-H Company Subsidiaries

SubsidiaryImage

Hi There! Thanks for dropping by to get to know us more. We are NOT a passionate team of coders, marketers, or designers - NADA. We are a passionate team of Problem-Solvers! Each member of our team is dedicated to solving problems in the WooCommerce space through innovation and design. We started this company back in 2011, as a web-consultancy, building custom solutions for our international clients. But as we progressed, we began to spot gaps in the market, and instead of sitting back, we decided to rise up and fill in those gaps. Our products are now serving more than 30,000 happy stores, across the globe today. As a team, we believe in an open-door policy and flexible timings. We host brainstorming & growth sessions, each month so that everyone can chime in and get equal opportunities. And while we have been able to develop a fun start-up culture at our space, we stand strong in terms of our ethics and values. Everyone's time and work are accounted for and every member's voice is heard. When you join our team, you will have a sturdy and strong ladder to climb. Wisetr, currently has two product lines - Funnelkit.com and XL Plugins. XL plugins creates conversion-boosting WooCommerce Plugins for time-strapped entrepreneurs and small business owners. And FunnelKit offers a new range of products focussed around bringing a Sales Funnel revolution in the WordPress/WooCommerce space. Both of these product lines are designed to get real-time ROI and massive conversions for store owners.

Loading...
similarCompanies

F-H Similar Companies

Booking.com

A career at Booking.com is all about the journey, helping you explore new challenges in a place where you can be your best self. With plenty of exciting twists, turns and opportunities along the way. We’ve always been pioneers, on a mission to shape the future of travel through cutting edge techno

At Agoda, we bridge the world through travel. We aim to make it easy and rewarding for more travelers to explore and experience the amazing world we live in. We do so by enabling more people to see the world for less – with our best-value deals across our 4,700,000+ hotels and holiday properties, 13

Bosch Global Software Technologies

With our unique ability to offer end-to-end solutions that connect the three pillars of IoT - Sensors, Software, and Services, we enable businesses to move from the traditional to the digital, or improve businesses by introducing a digital element in their products and processes. Now more than ever

Upwork

Upwork is the world’s work marketplace that connects businesses with independent talent from across the globe. We serve everyone from one-person startups to large, Fortune 100 enterprises with a powerful, trust-driven platform that enables companies and talent to work together in new ways that unloc

Rakuten

Rakuten Group, Inc. (TSE: 4755) is a global technology leader in services that empower individuals, communities, businesses and society. Founded in Tokyo in 1997 as an online marketplace, Rakuten has expanded to offer services in e-commerce, fintech, digital content and communications to 2 billion m

Facebook

The Facebook company is now Meta. Meta builds technologies that help people connect, find communities, and grow businesses. When Facebook launched in 2004, it changed the way people connect. Apps like Messenger, Instagram and WhatsApp further empowered billions around the world. Now, Meta is moving

Instacart

Instacart, the leading grocery technology company in North America, works with grocers and retailers to transform how people shop. The company partners with more than 1,500 national, regional, and local retail banners to facilitate online shopping, delivery and pickup services from more than 85,000

PayPal

We're championing possibilities for all by making money fast, easy, and more enjoyable. Our hope is unlock opportunities for people in their everyday lives and empower the millions of people and businesses around the world who trust, rely, and use PayPal every day. For support, visit the PayPal He

Dassault Systèmes

Dassault Systèmes is a catalyst for human progress. Since 1981, the company has pioneered virtual worlds to improve real life for consumers, patients and citizens. With Dassault Systèmes’ 3DEXPERIENCE platform, 370,000 customers of all sizes, in all industries, can collaborate, imagine and create

newsone

F-H CyberSecurity News

December 04, 2025 10:33 PM
DHS, cyber industry mobilize to get CISA director nominee confirmed

A new obstacle in the confirmation process for a key Trump cybersecurity nominee has prompted government and industry officials to mount a...

December 04, 2025 10:19 PM
Cybersecurity Operations recent news | page 148 of 148

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly...

December 04, 2025 10:09 PM
Chinese-linked hackers use back door for potential 'sabotage,' US and Canada say

Chinese-linked hackers used sophisticated malware to penetrate and maintain long-term access to unnamed government and information...

December 04, 2025 10:08 PM
Agencies, IT companies impacted by latest malware from China

Hackers sponsored by China are targeting federal agencies, technology companies and critical infrastructure sector organizations with a new...

December 04, 2025 10:06 PM
Strong fiscal year performance, potential cybersecurity concerns in Board of Trustees meeting Wednesday

The Ohio State Board of Trustees discussed a strong 2025 fiscal year performance and potential cybersecurity concerns during its meeting...

December 04, 2025 10:05 PM
Automated fraud and automated attacks: How AI agents are changing cybersecurity

AI agents are transforming cybersecurity. Learn how they enable automated fraud and automated attacks, and how organizations can use them to...

December 04, 2025 09:35 PM
Faculty Council discusses cybersecurity policy

The Ithaca College Faculty Council met Dec. 2 to discuss updates to cybersecurity policy, changes to the library subscription catalogue and...

December 04, 2025 09:20 PM
CISA Publishes Security Guidance for Using AI in OT

Global cybersecurity agencies published guidance regarding AI deployments in operational technology, a backbone of critical infrastructure.

December 04, 2025 08:32 PM
Cybersecurity in focus: DOJ aggressively investigating contractors’ cybersecurity practices

The Justice Department recently resolved several investigations into federal contractors' cybersecurity requirements as part of the federal...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

F-H CyberSecurity History Information

Official Website of FunnelKit -We are Hiring !

The official website of FunnelKit -We are Hiring ! is https://funnelkit.com.

FunnelKit -We are Hiring !’s AI-Generated Cybersecurity Score

According to Rankiteo, FunnelKit -We are Hiring !’s AI-generated cybersecurity score is 652, reflecting their Weak security posture.

How many security badges does FunnelKit -We are Hiring !’ have ?

According to Rankiteo, FunnelKit -We are Hiring ! currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does FunnelKit -We are Hiring ! have SOC 2 Type 1 certification ?

According to Rankiteo, FunnelKit -We are Hiring ! is not certified under SOC 2 Type 1.

Does FunnelKit -We are Hiring ! have SOC 2 Type 2 certification ?

According to Rankiteo, FunnelKit -We are Hiring ! does not hold a SOC 2 Type 2 certification.

Does FunnelKit -We are Hiring ! comply with GDPR ?

According to Rankiteo, FunnelKit -We are Hiring ! is not listed as GDPR compliant.

Does FunnelKit -We are Hiring ! have PCI DSS certification ?

According to Rankiteo, FunnelKit -We are Hiring ! does not currently maintain PCI DSS compliance.

Does FunnelKit -We are Hiring ! comply with HIPAA ?

According to Rankiteo, FunnelKit -We are Hiring ! is not compliant with HIPAA regulations.

Does FunnelKit -We are Hiring ! have ISO 27001 certification ?

According to Rankiteo,FunnelKit -We are Hiring ! is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of FunnelKit -We are Hiring !

FunnelKit -We are Hiring ! operates primarily in the Software Development industry.

Number of Employees at FunnelKit -We are Hiring !

FunnelKit -We are Hiring ! employs approximately 22 people worldwide.

Subsidiaries Owned by FunnelKit -We are Hiring !

FunnelKit -We are Hiring ! presently has no subsidiaries across any sectors.

FunnelKit -We are Hiring !’s LinkedIn Followers

FunnelKit -We are Hiring !’s official LinkedIn profile has approximately 3,571 followers.

NAICS Classification of FunnelKit -We are Hiring !

FunnelKit -We are Hiring ! is classified under the NAICS code 5112, which corresponds to Software Publishers.

FunnelKit -We are Hiring !’s Presence on Crunchbase

No, FunnelKit -We are Hiring ! does not have a profile on Crunchbase.

FunnelKit -We are Hiring !’s Presence on LinkedIn

Yes, FunnelKit -We are Hiring ! maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/funnelkit-com.

Cybersecurity Incidents Involving FunnelKit -We are Hiring !

As of December 04, 2025, Rankiteo reports that FunnelKit -We are Hiring ! has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

FunnelKit -We are Hiring ! has an estimated 27,223 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at FunnelKit -We are Hiring ! ?

Incident Types: The types of cybersecurity incidents that have occurred include Breach.

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: WooCommerce Data Breach

Description: A cybercriminal under the pseudonym 'Satanic' claims to have breached WooCommerce through a third-party service on April 6, 2025, compromising over 4.4 million records. The breach reportedly includes detailed personal and business information such as contact details, company revenue, employee counts, and technology stacks. Major organizations like NVIDIA, Texas.gov, and NIST are believed to be affected. The breach poses a substantial risk of phishing, social engineering, and intelligence scraping, with the entire database put up for sale by the hacker.

Date Detected: 2025-04-06

Type: Data Breach

Attack Vector: Third-party service

Threat Actor: Satanic

Motivation: Financial gain

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Third-party service.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach FUN350040925

Data Compromised: Contact details, Company revenue, Employee counts, Technology stacks

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information, Business Information and .

Which entities were affected by each incident ?

Incident : Data Breach FUN350040925

Entity Name: NVIDIA

Entity Type: Organization

Industry: Technology

Incident : Data Breach FUN350040925

Entity Name: Texas.gov

Entity Type: Government

Industry: Public Sector

Incident : Data Breach FUN350040925

Entity Name: NIST

Entity Type: Government

Industry: Public Sector

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach FUN350040925

Type of Data Compromised: Personal information, Business information

Number of Records Exposed: 4.4 million

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Data Breach FUN350040925

Entry Point: Third-party service

High Value Targets: Nvidia, Texas.Gov, Nist,

Data Sold on Dark Web: Nvidia, Texas.Gov, Nist,

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident was an Satanic.

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2025-04-06.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Contact details, Company revenue, Employee counts, Technology stacks and .

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Technology stacks, Company revenue, Employee counts and Contact details.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 4.4M.

Initial Access Broker

What was the most recent entry point used by an initial access broker ?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an Third-party service.

cve

Latest Global CVEs (Not Company-Specific)

Description

MCP Server Kubernetes is an MCP Server that can connect to a Kubernetes cluster and manage it. Prior to 2.9.8, there is a security issue exists in the exec_in_pod tool of the mcp-server-kubernetes MCP Server. The tool accepts user-provided commands in both array and string formats. When a string format is provided, it is passed directly to shell interpretation (sh -c) without input validation, allowing shell metacharacters to be interpreted. This vulnerability can be exploited through direct command injection or indirect prompt injection attacks, where AI agents may execute commands without explicit user intent. This vulnerability is fixed in 2.9.8.

Risk Information
cvss3
Base: 6.4
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
Description

XML external entity (XXE) injection in eyoucms v1.7.1 allows remote attackers to cause a denial of service via crafted body of a POST request.

Description

An issue was discovered in Fanvil x210 V2 2.12.20 allowing unauthenticated attackers on the local network to access administrative functions of the device (e.g. file upload, firmware update, reboot...) via a crafted authentication bypass.

Description

Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.

Risk Information
cvss4
Base: 9.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.

Risk Information
cvss4
Base: 5.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=funnelkit-com' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge