ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

The large sized retailing company group including the biggest department store in Japan. Main stores Isetan: Six stores (Shinjuku Main store, Tachikawa store, Matsudo store, Urawa store, Sagamihara store, Fuchu store) Mitsukoshi: Five stores (Nihombashi Main store, Ginza store, Chiba store, Ebisu Garden Place Store, Tama Center Store) www.isetan.co.jp www.mitsukoshi.co.jp

Isetan Mitsukoshi Holdings A.I CyberSecurity Scoring

IMH

Company Details

Linkedin ID:

isten-mitsukoshi-holdings

Employees number:

49

Number of followers:

1,012

NAICS:

43

Industry Type:

Retail

Homepage:

imhds.co.jp

IP Addresses:

0

Company ID:

ISE_1636328

Scan Status:

In-progress

AI scoreIMH Risk Score (AI oriented)

Between 700 and 749

https://images.rankiteo.com/companyimages/isten-mitsukoshi-holdings.jpeg
IMH Retail
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreIMH Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/isten-mitsukoshi-holdings.jpeg
IMH Retail
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

IMH Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Isetan Mitsukoshi HoldingsData Leak8548/2020
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Isetan Mitsukoshi Co., Ltd on 5 August 2020, suffered a data breach as a result of unauthorized access. It affected approximately 19,000 customers. Personal information such as name, address, phone number, email address, and date of birth of customers of the Mitsukoshi online store was accessed.

Isetan Mitsukoshi Holdings
Data Leak
Severity: 85
Impact: 4
Seen: 8/2020
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Isetan Mitsukoshi Co., Ltd on 5 August 2020, suffered a data breach as a result of unauthorized access. It affected approximately 19,000 customers. Personal information such as name, address, phone number, email address, and date of birth of customers of the Mitsukoshi online store was accessed.

Ailogo

IMH Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for IMH

Incidents vs Retail Industry Average (This Year)

No incidents recorded for Isetan Mitsukoshi Holdings in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Isetan Mitsukoshi Holdings in 2025.

Incident Types IMH vs Retail Industry Avg (This Year)

No incidents recorded for Isetan Mitsukoshi Holdings in 2025.

Incident History — IMH (X = Date, Y = Severity)

IMH cyber incidents detection timeline including parent company and subsidiaries

IMH Company Subsidiaries

SubsidiaryImage

The large sized retailing company group including the biggest department store in Japan. Main stores Isetan: Six stores (Shinjuku Main store, Tachikawa store, Matsudo store, Urawa store, Sagamihara store, Fuchu store) Mitsukoshi: Five stores (Nihombashi Main store, Ginza store, Chiba store, Ebisu Garden Place Store, Tama Center Store) www.isetan.co.jp www.mitsukoshi.co.jp

Loading...
similarCompanies

IMH Similar Companies

Kohl's

Kohl’s is a leading omnichannel retailer with more than 1,100 stores in 49 states. Kohl's business is built on a solid foundation of more than 60 million customers, an unmatched brand portfolio, industry-leading loyalty and Kohl's Card programs, a convenient and accessible nationwide store footprin

RD Saúde

Somos a RD Saúde, um ecossistema de saúde integral, com mais de 3 mil farmácias em todo o Brasil e negócios em saúde que dividem o mesmo propósito: contribuir para uma sociedade mais saudável. Nossa jornada começou em novembro de 2011, fruto da união entre Droga Raia e Drogasil, crescendo até se tor

Grupo Éxito

En Grupo Éxito evolucionamos junto a nuestros clientes, adaptándonos a las nuevas formas de consumo a través de la innovación, la transformación digital, las experiencias y la sostenibilidad. Como parte de la plataforma de retail más grande de Suramérica, estamos presentes en Colombia con las marcas

TJX Europe

TJX Europe is an exciting place to work with a rapid pace, different challenges every day, and a unique culture of teamwork and collaboration. We are the leading off-price retailer of fashion and homeware worldwide. Our brands in Europe are TK Maxx and Homesense, while elsewhere in the world we hav

Sam's Club

Sam’s Club (NYSE: WMT) a division of Walmart Inc., is the membership warehouse club solution for everyday living. Our President and CEO is Chris Nicholas and our headquarters is in Bentonville, AR. For the fiscal year ending January 31, 2023, Sam’s Club’s total revenue was $84.3 billion. There are

Founded in 1946, Tupperware's signature container created the modern food storage category that revolutionized the way the world stores, serves and prepares food. Today, we continue to innovate for the benefit of people and our planet by designing innovative, functional and environmentally responsib

Post Office Ltd

We’ve come a long way since it all started over 380 years ago. We’ve built up a network of 11,500 branches across the country. To give you a sense of how big that is, we’ve got more branches than the four biggest banks in the UK put together. Or put simply, we’re the largest retail network in the

Sunbelt Rentals, Inc.

At Sunbelt Rentals, we provide the tools, equipment, and support our customers need to build and maintain the world around us. With locations across the U.S. and Canada and a team of passionate experts, we're here to ensure our customers have what they need to get the job done right—safely, efficie

Hy-Vee, Inc.

Hy-Vee, Inc. is an employee-owned corporation operating more than 563 business units across nine Midwestern states with sales of more than $13 billion annually. The supermarket chain is synonymous with quality, variety, convenience, healthy lifestyles, culinary expertise and superior customer servic

newsone

IMH CyberSecurity News

November 10, 2025 08:00 AM
Cyberattack Leaves Asahi Struggling as Rival Brewers Gain Ground

As Japan gears up for its busiest beer-drinking season, the country's largest brewer is struggling to stay on tap — with its systems still...

October 11, 2025 07:00 AM
Asahi reduced to faxing and phoning it in after hack attack

TOKYO -- After a cyberattack disabled information systems at Asahi Group Holdings, the Japanese beverage giant has struggled to fill orders...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

IMH CyberSecurity History Information

Official Website of Isetan Mitsukoshi Holdings

The official website of Isetan Mitsukoshi Holdings is http://www.imhds.co.jp/english/.

Isetan Mitsukoshi Holdings’s AI-Generated Cybersecurity Score

According to Rankiteo, Isetan Mitsukoshi Holdings’s AI-generated cybersecurity score is 746, reflecting their Moderate security posture.

How many security badges does Isetan Mitsukoshi Holdings’ have ?

According to Rankiteo, Isetan Mitsukoshi Holdings currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Isetan Mitsukoshi Holdings have SOC 2 Type 1 certification ?

According to Rankiteo, Isetan Mitsukoshi Holdings is not certified under SOC 2 Type 1.

Does Isetan Mitsukoshi Holdings have SOC 2 Type 2 certification ?

According to Rankiteo, Isetan Mitsukoshi Holdings does not hold a SOC 2 Type 2 certification.

Does Isetan Mitsukoshi Holdings comply with GDPR ?

According to Rankiteo, Isetan Mitsukoshi Holdings is not listed as GDPR compliant.

Does Isetan Mitsukoshi Holdings have PCI DSS certification ?

According to Rankiteo, Isetan Mitsukoshi Holdings does not currently maintain PCI DSS compliance.

Does Isetan Mitsukoshi Holdings comply with HIPAA ?

According to Rankiteo, Isetan Mitsukoshi Holdings is not compliant with HIPAA regulations.

Does Isetan Mitsukoshi Holdings have ISO 27001 certification ?

According to Rankiteo,Isetan Mitsukoshi Holdings is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Isetan Mitsukoshi Holdings

Isetan Mitsukoshi Holdings operates primarily in the Retail industry.

Number of Employees at Isetan Mitsukoshi Holdings

Isetan Mitsukoshi Holdings employs approximately 49 people worldwide.

Subsidiaries Owned by Isetan Mitsukoshi Holdings

Isetan Mitsukoshi Holdings presently has no subsidiaries across any sectors.

Isetan Mitsukoshi Holdings’s LinkedIn Followers

Isetan Mitsukoshi Holdings’s official LinkedIn profile has approximately 1,012 followers.

NAICS Classification of Isetan Mitsukoshi Holdings

Isetan Mitsukoshi Holdings is classified under the NAICS code 43, which corresponds to Retail Trade.

Isetan Mitsukoshi Holdings’s Presence on Crunchbase

No, Isetan Mitsukoshi Holdings does not have a profile on Crunchbase.

Isetan Mitsukoshi Holdings’s Presence on LinkedIn

Yes, Isetan Mitsukoshi Holdings maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/isten-mitsukoshi-holdings.

Cybersecurity Incidents Involving Isetan Mitsukoshi Holdings

As of December 04, 2025, Rankiteo reports that Isetan Mitsukoshi Holdings has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Isetan Mitsukoshi Holdings has an estimated 15,375 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Isetan Mitsukoshi Holdings ?

Incident Types: The types of cybersecurity incidents that have occurred include Data Leak.

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Isetan Mitsukoshi Data Breach

Description: Isetan Mitsukoshi Co., Ltd suffered a data breach as a result of unauthorized access, affecting approximately 19,000 customers. Personal information such as name, address, phone number, email address, and date of birth of customers of the Mitsukoshi online store was accessed.

Date Detected: 2020-08-05

Type: Data Breach

Attack Vector: Unauthorized Access

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Data Leak.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach ISE14323123

Data Compromised: Personal information (name, address, phone number, email address, date of birth)

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal information.

Which entities were affected by each incident ?

Incident : Data Breach ISE14323123

Entity Name: Isetan Mitsukoshi Co., Ltd

Entity Type: Retail

Industry: Retail

Customers Affected: 19000

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach ISE14323123

Type of Data Compromised: Personal information

Number of Records Exposed: 19000

Personally Identifiable Information: Name, Address, Phone Number, Email Address, Date of Birth

Additional Questions

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2020-08-05.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Personal information (name, address, phone number, email address and date of birth).

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Personal information (name, address, phone number, email address and date of birth).

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 190.0.

cve

Latest Global CVEs (Not Company-Specific)

Description

MCP Server Kubernetes is an MCP Server that can connect to a Kubernetes cluster and manage it. Prior to 2.9.8, there is a security issue exists in the exec_in_pod tool of the mcp-server-kubernetes MCP Server. The tool accepts user-provided commands in both array and string formats. When a string format is provided, it is passed directly to shell interpretation (sh -c) without input validation, allowing shell metacharacters to be interpreted. This vulnerability can be exploited through direct command injection or indirect prompt injection attacks, where AI agents may execute commands without explicit user intent. This vulnerability is fixed in 2.9.8.

Risk Information
cvss3
Base: 6.4
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
Description

XML external entity (XXE) injection in eyoucms v1.7.1 allows remote attackers to cause a denial of service via crafted body of a POST request.

Description

An issue was discovered in Fanvil x210 V2 2.12.20 allowing unauthenticated attackers on the local network to access administrative functions of the device (e.g. file upload, firmware update, reboot...) via a crafted authentication bypass.

Description

Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.

Risk Information
cvss4
Base: 9.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.

Risk Information
cvss4
Base: 5.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=isten-mitsukoshi-holdings' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge