Company Details
go-north-group
43
2,898
4541
gonorth.co
0
GO _5771914
In-progress

Go North Group Company CyberSecurity Posture
gonorth.coBased in Gothenburg, Sweden, Go North was founded as an Amazon Aggregator. We acquired a portfolio of brands who primarily sold their products on Amazon in the USA. Today, we focus on delivering Products with Purpose to consumers in multiple regions of the world, developing better, new products and expanding our sales channels. At Go North, we have a simple purpose of solving people’s problems everyday.
Company Details
go-north-group
43
2,898
4541
gonorth.co
0
GO _5771914
In-progress
Between 750 and 799

GNG Global Score (TPRM)XXXX



No incidents recorded for Go North Group in 2025.
No incidents recorded for Go North Group in 2025.
No incidents recorded for Go North Group in 2025.
GNG cyber incidents detection timeline including parent company and subsidiaries

Based in Gothenburg, Sweden, Go North was founded as an Amazon Aggregator. We acquired a portfolio of brands who primarily sold their products on Amazon in the USA. Today, we focus on delivering Products with Purpose to consumers in multiple regions of the world, developing better, new products and expanding our sales channels. At Go North, we have a simple purpose of solving people’s problems everyday.

FinditParts is the nation’s largest eCommerce provider of heavy-duty truck and trailer parts. From hard-to-find parts to everyday preventative maintenance items, we offer more than 4 million heavy-duty OEM, branded, and aftermarket parts ready to ship. Each month thousands of repair shops, fleets, a

Specialising in the fast-paced, ever popular world of washers and winches, we supply a demanding clientele with the very best in commercial and domestic appliance solutions. We are a small, dedicated team with specialist knowledge, on hand to provide expert advice and pass on the years of experi

Therapro: The therapy resource for families and professionals! We provide therapists, teachers, parents and other caregivers with the highest quality and most economical therapeutic and educational resources for all ages and abilities, from kids to adults. Our goal is to provide unique speech

In June of 1940 Smokers' Haven was opened by its founder Joseph Zieve, his wife Ina, and his brother in-law Sid Ritter. Joe and Sid were pioneers in the Retail market of pipes and tobaccos, and established a real Specialty Tobacco shop. From 1940 until the late 1970's, Smokers' Haven was one of th

Established in 1992, Hallmark Consumer Services is an award-winning family-owned business specialising in fulfilment services and innovative direct mail, based in Melton Mowbray, Leicestershire. Our key aim is to deliver a level of commitment that’s second-to-none through our core principles of Fle

We support your professional hair removal services with waxes that deliver reliable and consistent results for both you and your clients. We strive to provide our customers essential waxing supplies at a great value. Combined with dependable service and a fast turnaround, we're the premier source fo
.png)
For the second year in a row, North Korea's vast cryptocurrency hacking operation has broken its own record, stealing $2.02 billion in 2025,...
The past year has seen an unprecedented number of cyber-attacks targeting large enterprises and globally recognized brands.
This AI survey shows how AI investments are turning into business productivity gains and significant financial performance.
The global cybersecurity market size is projected to grow from $218.98 billion in 2025 to $562.77 billion by 2032, at a CAGR of 14.4% during...
Google Threat Intelligence Group's findings on adversarial misuse of AI, including Gemini and other non-Google tools.
Europe faces rising cyber threats from criminals and nation-states. Ransomware attacks now take just 24 hours, with 22% of global victims...
North Korean Lazarus Group targets European defense firms with ScoringMathTea malware in new espionage wave.
The six part BBC World Service series tells Evil Corp's origin story and takes listeners inside the long-running international investigation...
A Vietnamese threat actor named BatShadow has been attributed to a new campaign that leverages social engineering tactics to deceive job...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Go North Group is https://gonorth.co.
According to Rankiteo, Go North Group’s AI-generated cybersecurity score is 753, reflecting their Fair security posture.
According to Rankiteo, Go North Group currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Go North Group is not certified under SOC 2 Type 1.
According to Rankiteo, Go North Group does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Go North Group is not listed as GDPR compliant.
According to Rankiteo, Go North Group does not currently maintain PCI DSS compliance.
According to Rankiteo, Go North Group is not compliant with HIPAA regulations.
According to Rankiteo,Go North Group is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Go North Group operates primarily in the Online and Mail Order Retail industry.
Go North Group employs approximately 43 people worldwide.
Go North Group presently has no subsidiaries across any sectors.
Go North Group’s official LinkedIn profile has approximately 2,898 followers.
Go North Group is classified under the NAICS code 4541, which corresponds to Electronic Shopping and Mail-Order Houses.
Yes, Go North Group has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/go-north.
Yes, Go North Group maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/go-north-group.
As of December 30, 2025, Rankiteo reports that Go North Group has not experienced any cybersecurity incidents.
Go North Group has an estimated 86 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Go North Group has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
A vulnerability was found in Tenda WH450 1.0.0.18. Affected is an unknown function of the file /goform/PPTPUserSetting. Performing manipulation of the argument delno results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used.
A vulnerability has been found in Tenda WH450 1.0.0.18. This impacts an unknown function of the file /goform/PPTPServer. Such manipulation of the argument ip1 leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
A flaw has been found in omec-project UPF up to 2.1.3-dev. This affects the function handleSessionEstablishmentRequest of the file /pfcpiface/pfcpiface/messages_session.go of the component PFCP Session Establishment Request Handler. This manipulation causes null pointer dereference. The attack may be initiated remotely. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability was detected in floooh sokol up to 16cbcc864012898793cd2bc57f802499a264ea40. The impacted element is the function _sg_pipeline_desc_defaults in the library sokol_gfx.h. The manipulation results in stack-based buffer overflow. The attack requires a local approach. The exploit is now public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is identified as 5d11344150973f15e16d3ec4ee7550a73fb995e0. It is advisable to implement a patch to correct this issue.
A security vulnerability has been detected in PbootCMS up to 3.2.12. The affected element is the function get_user_ip of the file core/function/handle.php of the component Header Handler. The manipulation of the argument X-Forwarded-For leads to use of less trusted source. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.