Comparison Overview

HelloFresh

VS

Haleon

HelloFresh

Prinzenstraße 89, Berlin, 10969, DE
Last Update: 2025-12-09

HelloFresh is on a mission to change the way people eat, forever! From our 2011 founding in Europe’s vibrant tech hub Berlin, we’re evolving from the world’s leading meal kit company to the world's leading food solutions group. We delivered 243.3 million meals and reached 7.5 million active customers around the world in Q3 2022. HelloFresh Group consists of six brands that provide customers with high quality food and recipes for different meal occasions. Every ingredient needed for our meals are carefully planned, responsibly sourced and delivered to your door when it’s most convenient for you. Only HelloFresh gives you the tools to achieve something delicious every day. Making a meal a delicious achievement - not just fuel for your day - takes a lot of work and smart people. From Designers and Copywriters to Data Scientists and DevOps Engineers, to potato farmers, pasta makers and the people who ensure every box is perfectly packed for every customer, we’re collectively disrupting the food supply chain and the multi-trillion-dollar food tech industry. Our more than 21,000 high-performing and ambitious employees across the globe from New York to Berlin, London to Sydney and Toronto to Milan enjoy a number of benefits including flexible working arrangements, discounts on our boxes, health and well-being and learning and development programs. We’re always looking for quality ingredients to perfect our recipe, so join us now! https://www.hellofresh.com/careers/locations

NAICS: 81
NAICS Definition: Other Services (except Public Administration)
Employees: 16,786
Subsidiaries: 2
12-month incidents
0
Known data breaches
0
Attack type number
0

Haleon

Weybridge, GB
Last Update: 2025-12-09
Between 800 and 849

You have loved and trusted our brands for over 170 years. We have a clear purpose, to deliver better everyday health with humanity. 💚 Our category-leading brands include Sensodyne, Panadol, Centrum, TUMS, Advil, Otrivin and Voltaren. We combine deep human understanding and trusted science to make everyday health more inclusive, more achievable and more sustainable. Want to learn more about us? Follow to stay up to date!

NAICS: 81
NAICS Definition: Other Services (except Public Administration)
Employees: 10,001
Subsidiaries: 1
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/hellofresh.jpeg
HelloFresh
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/haleon.jpeg
Haleon
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
HelloFresh
100%
Compliance Rate
0/4 Standards Verified
Haleon
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Consumer Services Industry Average (This Year)

No incidents recorded for HelloFresh in 2025.

Incidents vs Consumer Services Industry Average (This Year)

No incidents recorded for Haleon in 2025.

Incident History — HelloFresh (X = Date, Y = Severity)

HelloFresh cyber incidents detection timeline including parent company and subsidiaries

Incident History — Haleon (X = Date, Y = Severity)

Haleon cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/hellofresh.jpeg
HelloFresh
Incidents

No Incident

https://images.rankiteo.com/companyimages/haleon.jpeg
Haleon
Incidents

No Incident

FAQ

Haleon company demonstrates a stronger AI Cybersecurity Score compared to HelloFresh company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Haleon company has disclosed a higher number of cyber incidents compared to HelloFresh company.

In the current year, Haleon company and HelloFresh company have not reported any cyber incidents.

Neither Haleon company nor HelloFresh company has reported experiencing a ransomware attack publicly.

Neither Haleon company nor HelloFresh company has reported experiencing a data breach publicly.

Neither Haleon company nor HelloFresh company has reported experiencing targeted cyberattacks publicly.

Neither HelloFresh company nor Haleon company has reported experiencing or disclosing vulnerabilities publicly.

Neither HelloFresh nor Haleon holds any compliance certifications.

Neither company holds any compliance certifications.

HelloFresh company has more subsidiaries worldwide compared to Haleon company.

HelloFresh company employs more people globally than Haleon company, reflecting its scale as a Consumer Services.

Neither HelloFresh nor Haleon holds SOC 2 Type 1 certification.

Neither HelloFresh nor Haleon holds SOC 2 Type 2 certification.

Neither HelloFresh nor Haleon holds ISO 27001 certification.

Neither HelloFresh nor Haleon holds PCI DSS certification.

Neither HelloFresh nor Haleon holds HIPAA certification.

Neither HelloFresh nor Haleon holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Hitachi Vantara Pentaho Data Integration and Analytics Community Dashboard Framework prior to versions 10.2.0.4, including 9.3.0.x and 8.3.x display the full server stack trace when encountering an error within the GetCdfResource servlet.

Risk Information
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Description

Pentaho Data Integration and Analytics Community Dashboard Editor plugin versions before 10.2.0.4, including 9.3.0.x and 8.3.x, deserialize untrusted JSON data without constraining the parser to approved classes and methods.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Description

A security flaw has been discovered in CTCMS Content Management System up to 2.1.2. The impacted element is an unknown function in the library /ctcms/libs/Ct_Config.php of the component Backend System Configuration Module. The manipulation of the argument Cj_Add/Cj_Edit results in code injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 5.8
Severity: LOW
AV:N/AC:L/Au:M/C:P/I:P/A:P
cvss3
Base: 4.7
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in CTCMS Content Management System up to 2.1.2. The affected element is the function Save of the file /ctcms/libs/Ct_App.php of the component Backend App Configuration Module. The manipulation of the argument CT_App_Paytype leads to code injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 5.8
Severity: LOW
AV:N/AC:L/Au:M/C:P/I:P/A:P
cvss3
Base: 4.7
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Weblate is a web based localization tool. In versions prior to 5.15, it was possible to accept an invitation opened by a different user. Version 5.15. contains a patch. As a workaround, avoid leaving one's Weblate sessions with an invitation opened unattended.

Risk Information
cvss4
Base: 1.0
Severity: HIGH
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X