Company Details
krispy-kreme
10,045
130,022
722
krispykreme.com
0
KRI_2894119
In-progress

Krispy Kreme Company CyberSecurity Posture
krispykreme.comHeadquartered in Charlotte, N.C., Krispy Kreme is one of the most beloved and well-known sweet treat brands in the world. Our iconic Original Glazed® doughnut is universally recognized for its hot-off-the-line, melt-in-your-mouth experience. Krispy Kreme operates in more than 40 countries through its unique network of fresh doughnut shops, partnerships with leading retailers, and a rapidly growing digital business. Our purpose of touching and enhancing lives through the joy that is Krispy Kreme guides how we operate every day and is reflected in the love we have for our people, our communities, and the planet.
Company Details
krispy-kreme
10,045
130,022
722
krispykreme.com
0
KRI_2894119
In-progress
Between 550 and 599

Krispy Kreme Global Score (TPRM)XXXX

Description: Krispy Kreme Doughnut Corporation experienced a significant data breach in late November 2024, affecting thousands of current and former employees, along with their family members. The breach exposed highly sensitive personal information, including Social Security numbers, financial account information, biometric data, and medical information. The company has since implemented additional security measures and is offering complimentary credit monitoring and identity protection services to those affected.
Description: On **Black Friday 2024**, Krispy Kreme detected unauthorized network activity, marking the start of a **cyber-attack** that crippled its **online ordering system until December 30, 2024**. The incident led to **significant financial and operational disruptions**, including lost digital sales revenue, cybersecurity advisory fees, and system restoration costs, all of which materially impacted the company’s financial condition. Months later, in **May 2025**, Krispy Kreme disclosed that **nearly 62,000 individuals** had their **highly sensitive data stolen**, including **Social Security numbers, financial account details, passport numbers, and biometric data**. The breach exploited potential holiday-season vulnerabilities, such as understaffed security teams and relaxed IT monitoring. The prolonged investigation and recovery underscored the attack’s severity, with long-term reputational and financial repercussions for the company.
Description: Krispy Kreme, the U.S. doughnut chain, confirmed a cyberattack in November 2024 that resulted in the theft of personal information of over 160,000 individuals. The breach affected 161,676 individuals, exposing their social security numbers, financial account information, and driver's license information. The Play ransomware gang claimed responsibility for the attack, releasing hundreds of GBs of stolen documents on their dark web leak site after failed negotiations.


No incidents recorded for Krispy Kreme in 2025.
No incidents recorded for Krispy Kreme in 2025.
No incidents recorded for Krispy Kreme in 2025.
Krispy Kreme cyber incidents detection timeline including parent company and subsidiaries

Headquartered in Charlotte, N.C., Krispy Kreme is one of the most beloved and well-known sweet treat brands in the world. Our iconic Original Glazed® doughnut is universally recognized for its hot-off-the-line, melt-in-your-mouth experience. Krispy Kreme operates in more than 40 countries through its unique network of fresh doughnut shops, partnerships with leading retailers, and a rapidly growing digital business. Our purpose of touching and enhancing lives through the joy that is Krispy Kreme guides how we operate every day and is reflected in the love we have for our people, our communities, and the planet.


We are a global food company dedicated to bringing local favorite foods to communities everywhere. Within 17 countries, we offer quality branded food at a range of price points and across diverse categories. We're a company dedicated to the production, distribution and sales of refrigerated and fr

Logramos un fuerte impacto en los lugares donde las personas trabajan, estudian y se recuperan. Nos concentramos en enriquecer la vida de millones de personas en todo el mundo, ofreciendo una amplia gama de servicios (en los rubros de servicios de alimentación y gestión de instalaciones) a un dive

Sysco is the global leader in selling, marketing and distributing food products to restaurants, healthcare and educational facilities, lodging establishments and other customers who prepare meals away from home. Its family of products also includes equipment and supplies for the foodservice and hosp

Founded in 1977, Almarai Company is the world’s largest vertically integrated dairy company and the largest food and beverage manufacturing and distribution company in MENA. Headquartered in the Kingdom of Saudi Arabia, Almarai Company is ranked as the number one FMCG Brand in the MENA region and th

As the world’s largest food and beverage company we are driven by a simple aim: unlocking the power of food to enhance quality of life for everyone, today and for generations to come. To deliver on this, we serve with passion, with a spirit of excellence, offering products and services for all stage

Red Bull Gives Wiiings to People and Ideas. This has driven us – and all we do – since 1987. Today, Red Bull operates in over 170 countries, selling more than 12 billion cans annually and growing! Above all, our people remain the essential ingredient in bringing the Red Bull brand to life. Check out
As China’s leading dairy manufacturer, Mengniu focuses on producing nutritional, healthy and tasty dairy products for customers worldwide. 20 years of experiences enabled Mengniu to develop a diversified product matrix, including liquid milk, ice-cream, infant formula, cheese and etc. The company ha

Compass Group is redefining the food and facility services landscape with innovation and passion through the lens of what’s next. Serving premier healthcare systems, respected educational institutions, world-renowned cultural centers, popular sporting and entertainment venues, and Fortune 500 organi
We bottle and sell the beverages of The Coca-Cola Company exclusively in our 29 markets and partner with other beverage businesses to also sell their brands. With over 100 brands covering eight categories – sparkling, water, juices, ready-to-drink tea, energy, plant-based, premium spirits and coffee
.png)
Kash Patel invested up to $50000 in Krispy Kreme as the FBI investigates a breach affecting 160000 customers.
Everyone has a Krispy Kreme story, CISO and Senior Director, Infrastructure, Jerry Fowler says, adding that those stories are more than doughnut reviews.
Krispy Kreme is warning tens of thousands of Americans that they are now at risk of identity theft and fraud following a major cybersecurity...
Krispy Kreme has confirmed that over 160000 individuals were affected by a ransomware attack in late 2024, in which hackers accessed and...
PITTSBURGH, June 24, 2025 (GLOBE NEWSWIRE) -- Krispy Kreme Doughnut Corporation (“Krispy Kreme”) recently announced a cybersecurity incident...
In November 2024, Krispy Kreme experienced a cyber incident. As of recently, the organization has revealed that 161,676 people were impacted...
Krispy Kreme suffered a ransomware attack exposing sensitive employee data, with 184GB leaked online and costs surpassing $11M.
Krispy Kreme began sending out breach notification documents to thousands of victims this week after a cyberattack in November exposed troves of data.
A cautionary tale from the crypto world, but equally applicable to regular businesses and organizations. Security firm Huntress reports on a...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Krispy Kreme is http://www.krispykreme.com.
According to Rankiteo, Krispy Kreme’s AI-generated cybersecurity score is 562, reflecting their Very Poor security posture.
According to Rankiteo, Krispy Kreme currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Krispy Kreme is not certified under SOC 2 Type 1.
According to Rankiteo, Krispy Kreme does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Krispy Kreme is not listed as GDPR compliant.
According to Rankiteo, Krispy Kreme does not currently maintain PCI DSS compliance.
According to Rankiteo, Krispy Kreme is not compliant with HIPAA regulations.
According to Rankiteo,Krispy Kreme is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Krispy Kreme operates primarily in the Food and Beverage Services industry.
Krispy Kreme employs approximately 10,045 people worldwide.
Krispy Kreme presently has no subsidiaries across any sectors.
Krispy Kreme’s official LinkedIn profile has approximately 130,022 followers.
Krispy Kreme is classified under the NAICS code 722, which corresponds to Food Services and Drinking Places.
No, Krispy Kreme does not have a profile on Crunchbase.
Yes, Krispy Kreme maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/krispy-kreme.
As of November 27, 2025, Rankiteo reports that Krispy Kreme has experienced 3 cybersecurity incidents.
Krispy Kreme has an estimated 8,400 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach, Cyber Attack and Ransomware.
Total Financial Loss: The total financial loss from these incidents is estimated to be $0.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with external cybersecurity experts, and containment measures with took measures to contain the breach, and communication strategy with breach notification letters, and incident response plan activated with yes, and third party assistance with yes, and remediation measures with complimentary credit monitoring and identity protection services, remediation measures with additional security measures to strengthen it infrastructure, and communication strategy with individual notice letters to affected individuals, communication strategy with dedicated support line, and incident response plan activated with yes (investigation initiated post-detection), and third party assistance with yes (cybersecurity experts and advisors engaged), and remediation measures with system restoration, ongoing investigation, and recovery measures with online ordering system restored by december 30, 2024, and communication strategy with sec filing (december 11, 2024), customer notification (may 2025)..
Title: Krispy Kreme Data Breach
Description: Krispy Kreme confirmed that attackers stole the personal information of over 160,000 individuals in a November 2024 cyberattack.
Date Detected: 2024-11-29
Date Publicly Disclosed: 2024-12-11
Type: Data Breach, Ransomware
Threat Actor: Play Ransomware
Motivation: Financial Gain, Data Theft
Title: Krispy Kreme Data Security Incident
Description: Krispy Kreme Doughnut Corporation has confirmed a significant data security incident affecting thousands of current and former employees, along with their family members, following unauthorized access to company systems discovered in late November 2024.
Date Detected: 2024-11-29
Date Publicly Disclosed: 2025-05-22
Type: Data Breach
Attack Vector: Unauthorized Access
Threat Actor: Cybercriminals
Title: Krispy Kreme Black Friday 2024 Cyberattack and Data Breach
Description: On Black Friday 2024, Krispy Kreme detected unauthorized activity on its network, leading to a cyberattack that disrupted its online ordering system until December 30, 2024. The incident resulted in the theft of sensitive personal data of nearly 62,000 individuals, including Social Security numbers, financial account information, passport numbers, and biometric data. The attack was disclosed in an SEC filing on December 11, 2024, with expected material financial and operational impacts. The company continued its investigation into 2025, confirming the data breach in May 2025.
Date Detected: 2024-11-29
Date Publicly Disclosed: 2024-12-11
Date Resolved: 2024-12-30
Type: cyberattack
Motivation: financial gaindata theft
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Social security numbers, Financial account information, Driver's license information, Client documents, Budget, Payroll, Accounting, Contracts, Taxes, Ids, Finance information
Systems Affected: IT Systems
Operational Impact: Disruptions to Online Ordering
Identity Theft Risk: High
Payment Information Risk: High

Data Compromised: Social security numbers, Dates of birth, Driver’s license numbers, Financial account information, Credit and debit card details with security codes, Passport numbers, Usernames and passwords for financial accounts, Biometric data, Medical and health insurance information, U.s. military id numbers, Immigration-related documentation, Digital signatures, Email credentials
Identity Theft Risk: High
Payment Information Risk: High

Financial Loss: material impact (revenue loss from digital sales, cybersecurity expert fees, system restoration costs)
Data Compromised: Social security numbers, Financial account information, Passport numbers, Biometric data, Personally identifiable information
Systems Affected: online ordering system
Downtime: 31 days (November 29, 2024 – December 30, 2024)
Operational Impact: online ordering system offline, extended investigation period
Revenue Loss: loss of digital sales during peak holiday season
Brand Reputation Impact: high (public disclosure of sensitive data breach)
Identity Theft Risk: high (SSNs, financial data, biometric data exposed)
Payment Information Risk: high (financial account information compromised)
Average Financial Loss: The average financial loss per incident is $0.00.
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Social Security Numbers, Financial Account Information, Driver'S License Information, Client Documents, Budget, Payroll, Accounting, Contracts, Taxes, Ids, Finance Information, , Social Security Numbers, Dates Of Birth, Driver’S License Numbers, Financial Account Information, Credit And Debit Card Details With Security Codes, Passport Numbers, Usernames And Passwords For Financial Accounts, Biometric Data, Medical And Health Insurance Information, U.S. Military Id Numbers, Immigration-Related Documentation, Digital Signatures, Email Credentials, , Personally Identifiable Information (Pii), Financial Data, Biometric Data, Government-Issued Ids (Ssns, Passports) and .

Entity Name: Krispy Kreme
Entity Type: Multinational Coffeehouse Chain
Industry: Food and Beverage
Location: Global
Size: 22,800 Employees
Customers Affected: 161676

Entity Name: Krispy Kreme Doughnut Corporation
Entity Type: Corporation
Industry: Food and Beverage
Customers Affected: Thousands of current and former employees, along with their family members

Entity Name: Krispy Kreme
Entity Type: public company
Industry: food and beverage (donut retail)
Location: United States (global operations)
Customers Affected: 62,000 individuals

Third Party Assistance: External Cybersecurity Experts
Containment Measures: Took Measures to Contain the Breach
Communication Strategy: Breach Notification Letters

Incident Response Plan Activated: Yes
Third Party Assistance: Yes
Remediation Measures: Complimentary credit monitoring and identity protection servicesAdditional security measures to strengthen IT infrastructure
Communication Strategy: Individual notice letters to affected individualsDedicated support line

Incident Response Plan Activated: yes (investigation initiated post-detection)
Third Party Assistance: yes (cybersecurity experts and advisors engaged)
Remediation Measures: system restoration, ongoing investigation
Recovery Measures: online ordering system restored by December 30, 2024
Communication Strategy: SEC filing (December 11, 2024), customer notification (May 2025)
Incident Response Plan: The company's incident response plan is described as Yes, .
Third-Party Assistance: The company involves third-party assistance in incident response through External Cybersecurity Experts, Yes, .

Type of Data Compromised: Social security numbers, Financial account information, Driver's license information, Client documents, Budget, Payroll, Accounting, Contracts, Taxes, Ids, Finance information
Number of Records Exposed: 161676
Sensitivity of Data: High

Type of Data Compromised: Social security numbers, Dates of birth, Driver’s license numbers, Financial account information, Credit and debit card details with security codes, Passport numbers, Usernames and passwords for financial accounts, Biometric data, Medical and health insurance information, U.s. military id numbers, Immigration-related documentation, Digital signatures, Email credentials
Number of Records Exposed: Thousands
Sensitivity of Data: High
Personally Identifiable Information: Yes

Type of Data Compromised: Personally identifiable information (pii), Financial data, Biometric data, Government-issued ids (ssns, passports)
Number of Records Exposed: 62,000
Sensitivity of Data: high
Data Exfiltration: yes
Personally Identifiable Information: yes
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Complimentary credit monitoring and identity protection services, Additional security measures to strengthen IT infrastructure, , system restoration, ongoing investigation.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by took measures to contain the breach.

Data Exfiltration: yes
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through online ordering system restored by December 30, 2024.

Regulatory Notifications: Maine's Office of the Attorney GeneralMassachusetts' Attorney GeneralSEC

Regulatory Notifications: SEC filing (December 11, 2024)

Lessons Learned: Hackers exploit holiday periods when security teams may be understaffed or monitoring relaxed. Proactive security measures, employee training, and incident response preparedness are critical during high-risk periods like Black Friday.

Recommendations: Stay vigilant by closely monitoring financial accounts, statements, and credit reports for suspicious activity or unauthorized charges, Regular review of personal financial information to detect potential identity theft earlyStay vigilant by closely monitoring financial accounts, statements, and credit reports for suspicious activity or unauthorized charges, Regular review of personal financial information to detect potential identity theft early

Recommendations: Verify payment details independently to prevent wire transfer fraud, especially during holidays., Ensure compliance with state privacy laws (e.g., Oregon Consumer Privacy Act) to avoid fines., Strengthen cybersecurity defenses ahead of high-risk periods (e.g., holidays)., Review and test incident response plans regularly., Monitor for unauthorized activity with heightened vigilance during peak seasons.Verify payment details independently to prevent wire transfer fraud, especially during holidays., Ensure compliance with state privacy laws (e.g., Oregon Consumer Privacy Act) to avoid fines., Strengthen cybersecurity defenses ahead of high-risk periods (e.g., holidays)., Review and test incident response plans regularly., Monitor for unauthorized activity with heightened vigilance during peak seasons.Verify payment details independently to prevent wire transfer fraud, especially during holidays., Ensure compliance with state privacy laws (e.g., Oregon Consumer Privacy Act) to avoid fines., Strengthen cybersecurity defenses ahead of high-risk periods (e.g., holidays)., Review and test incident response plans regularly., Monitor for unauthorized activity with heightened vigilance during peak seasons.Verify payment details independently to prevent wire transfer fraud, especially during holidays., Ensure compliance with state privacy laws (e.g., Oregon Consumer Privacy Act) to avoid fines., Strengthen cybersecurity defenses ahead of high-risk periods (e.g., holidays)., Review and test incident response plans regularly., Monitor for unauthorized activity with heightened vigilance during peak seasons.Verify payment details independently to prevent wire transfer fraud, especially during holidays., Ensure compliance with state privacy laws (e.g., Oregon Consumer Privacy Act) to avoid fines., Strengthen cybersecurity defenses ahead of high-risk periods (e.g., holidays)., Review and test incident response plans regularly., Monitor for unauthorized activity with heightened vigilance during peak seasons.
Key Lessons Learned: The key lessons learned from past incidents are Hackers exploit holiday periods when security teams may be understaffed or monitoring relaxed. Proactive security measures, employee training, and incident response preparedness are critical during high-risk periods like Black Friday.

Source: BleepingComputer

Source: Krispy Kreme Doughnut Corporation

Source: Krispy Kreme SEC Filing (December 11, 2024)

Source: Krispy Kreme Customer Notification (May 2025)
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: BleepingComputer, and Source: Krispy Kreme Doughnut Corporation, and Source: Krispy Kreme SEC Filing (December 11, 2024), and Source: Krispy Kreme Customer Notification (May 2025).

Investigation Status: Completed

Investigation Status: completed (as of May 2025 notification)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Breach Notification Letters, Individual Notice Letters To Affected Individuals, Dedicated Support Line, SEC filing (December 11, 2024) and customer notification (May 2025).

Customer Advisories: yes (notified 62,000 affected individuals in May 2025)
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were yes (notified 62 and000 affected individuals in May 2025).

High Value Targets: Customer Pii, Financial Data,
Data Sold on Dark Web: Customer Pii, Financial Data,

Corrective Actions: Implemented Additional Security Measures To Strengthen It Infrastructure,

Root Causes: Potential Understaffing During Holidays, Relaxed It Monitoring, Exploitation Of Peak Transaction Periods,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as External Cybersecurity Experts, , .
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Implemented Additional Security Measures To Strengthen It Infrastructure, .
Last Attacking Group: The attacking group in the last incident were an Play Ransomware and Cybercriminals.
Most Recent Incident Detected: The most recent incident detected was on 2024-11-29.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-12-11.
Most Recent Incident Resolved: The most recent incident resolved was on 2024-12-30.
Highest Financial Loss: The highest financial loss from an incident was material impact (revenue loss from digital sales, cybersecurity expert fees, system restoration costs).
Most Significant Data Compromised: The most significant data compromised in an incident were Social Security Numbers, Financial Account Information, Driver's License Information, Client Documents, Budget, Payroll, Accounting, Contracts, Taxes, IDs, Finance Information, , Social Security numbers, dates of birth, driver’s license numbers, financial account information, credit and debit card details with security codes, passport numbers, usernames and passwords for financial accounts, biometric data, medical and health insurance information, U.S. military ID numbers, immigration-related documentation, digital signatures, email credentials, , Social Security numbers, financial account information, passport numbers, biometric data, personally identifiable information and .
Most Significant System Affected: The most significant system affected in an incident was online ordering system.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was External Cybersecurity Experts, , .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Took Measures to Contain the Breach.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Accounting, usernames and passwords for financial accounts, financial account information, Financial Account Information, Payroll, Social Security numbers, Driver's License Information, email credentials, immigration-related documentation, Contracts, personally identifiable information, Social Security Numbers, dates of birth, digital signatures, IDs, medical and health insurance information, U.S. military ID numbers, Taxes, Finance Information, passport numbers, biometric data, driver’s license numbers, Client Documents, credit and debit card details with security codes and Budget.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 738.2K.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Hackers exploit holiday periods when security teams may be understaffed or monitoring relaxed. Proactive security measures, employee training, and incident response preparedness are critical during high-risk periods like Black Friday.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Ensure compliance with state privacy laws (e.g., Oregon Consumer Privacy Act) to avoid fines., Monitor for unauthorized activity with heightened vigilance during peak seasons., Verify payment details independently to prevent wire transfer fraud, especially during holidays., Stay vigilant by closely monitoring financial accounts, statements, and credit reports for suspicious activity or unauthorized charges, Review and test incident response plans regularly., Strengthen cybersecurity defenses ahead of high-risk periods (e.g., holidays). and Regular review of personal financial information to detect potential identity theft early.
Most Recent Source: The most recent source of information about an incident are Krispy Kreme SEC Filing (December 11, 2024), BleepingComputer, Krispy Kreme Doughnut Corporation and Krispy Kreme Customer Notification (May 2025).
Current Status of Most Recent Investigation: The current status of the most recent investigation is Completed.
Most Recent Customer Advisory: The most recent customer advisory issued were an yes (notified 62 and000 affected individuals in May 2025).
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.