Company Details
lifetouch
4,946
28,956
54192
lifetouch.com
0
LIF_2599553
In-progress

Lifetouch Company CyberSecurity Posture
lifetouch.comAt Lifetouch, our purpose is to help families capture life's memories. For more than 80 years, Lifetouch has been the professional photography company of choice for schools and families. Headquartered in Eden Prairie, MN., the enterprise is organized around four primary business lines operating in local communities across North America. Built on the tradition of “Picture Day”, Lifetouch captures smiling faces from preschool through high school graduation, as well as sports, special events, seniors, and yearbooks. Additional photography services are offered through JCPenney Portraits by Lifetouch, helping families capture special milestones nationwide. Lifetouch is also proud to be a part of the Shutterfly family of brands.
Company Details
lifetouch
4,946
28,956
54192
lifetouch.com
0
LIF_2599553
In-progress
Between 750 and 799

Lifetouch Global Score (TPRM)XXXX

Description: The California Office of the Attorney General reported that Shutterfly, Inc. experienced a data breach involving potential unauthorized access to employee personal data on January 11, 2018, with the report submitted on March 28, 2018. The breach did not confirm the theft of personal data, but potentially exposed names, social security numbers, and other confidential information.
Description: On November 26, 2014, the California Office of the Attorney General reported a data breach involving Shutterfly, Inc. (Tiny Prints, Treat, and Wedding Paper Divas) due to a criminal cyber-attack. The incident potentially exposed email addresses and encrypted passwords of the customers, but there is no evidence that credit or debit card information was compromised.
Description: Online retail and photography manufacturing platform Shutterfly suffered a data breach after the Conti ransomware group stole data during a ransomware attack. The threat actors both locked up and encrypted 4,000 devices and 120 VMware ESXi servers and accessed some of the data on those systems including the personal information of certain people. The information included employees' personal information, including names, salary and compensation information, and FMLA leaves or workers’ compensation claims. Data posted on a private page also contained legal agreements, bank and merchant account info, login credentials for corporate services, spreadsheets, and some customer information, including the last four digits of credit cards.


No incidents recorded for Lifetouch in 2025.
No incidents recorded for Lifetouch in 2025.
No incidents recorded for Lifetouch in 2025.
Lifetouch cyber incidents detection timeline including parent company and subsidiaries

At Lifetouch, our purpose is to help families capture life's memories. For more than 80 years, Lifetouch has been the professional photography company of choice for schools and families. Headquartered in Eden Prairie, MN., the enterprise is organized around four primary business lines operating in local communities across North America. Built on the tradition of “Picture Day”, Lifetouch captures smiling faces from preschool through high school graduation, as well as sports, special events, seniors, and yearbooks. Additional photography services are offered through JCPenney Portraits by Lifetouch, helping families capture special milestones nationwide. Lifetouch is also proud to be a part of the Shutterfly family of brands.


A freelancer or freelance worker is a term commonly used for a person who is self-employed and is not necessarily committed to a particular employer long-term. Freelance workers are sometimes represented by a company or a temporary agency that resells freelance labor to clients; others work independ

Bertelsmann is a media, services and education company with more than 80,000 employees that operates in about 50 countries around the world. It includes the entertainment group RTL Group, the trade book publisher Penguin Random House, the music company BMG, the service provider Arvato Group, Bertels
.png)
Photography behemoth Shutterfly is suffering disruption to its business due to a ransomware attack that reportedly encrypted over 4000...
Shutterfly LLC, the operator of several popular e-commerce services focused on the photography market, has suffered a ransomware attack.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Lifetouch is http://lifetouch.com.
According to Rankiteo, Lifetouch’s AI-generated cybersecurity score is 763, reflecting their Fair security posture.
According to Rankiteo, Lifetouch currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Lifetouch is not certified under SOC 2 Type 1.
According to Rankiteo, Lifetouch does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Lifetouch is not listed as GDPR compliant.
According to Rankiteo, Lifetouch does not currently maintain PCI DSS compliance.
According to Rankiteo, Lifetouch is not compliant with HIPAA regulations.
According to Rankiteo,Lifetouch is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Lifetouch operates primarily in the Photography industry.
Lifetouch employs approximately 4,946 people worldwide.
Lifetouch presently has no subsidiaries across any sectors.
Lifetouch’s official LinkedIn profile has approximately 28,956 followers.
Lifetouch is classified under the NAICS code 54192, which corresponds to Photographic Services.
No, Lifetouch does not have a profile on Crunchbase.
Yes, Lifetouch maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/lifetouch.
As of December 17, 2025, Rankiteo reports that Lifetouch has experienced 3 cybersecurity incidents.
Lifetouch has an estimated 2,457 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack, Ransomware and Breach.
Title: Shutterfly Data Breach and Ransomware Attack
Description: Shutterfly suffered a data breach after the Conti ransomware group stole data during a ransomware attack.
Type: Ransomware and Data Breach
Attack Vector: Ransomware
Threat Actor: Conti ransomware group
Motivation: Data theft and ransom
Title: Shutterfly Data Breach
Description: A data breach involving Shutterfly, Inc. (Tiny Prints, Treat, and Wedding Paper Divas) due to a criminal cyber-attack potentially exposed email addresses and encrypted passwords of the customers.
Date Detected: 2014-11-26
Date Publicly Disclosed: 2014-11-26
Type: Data Breach
Title: Shutterfly Data Breach
Description: The California Office of the Attorney General reported that Shutterfly, Inc. experienced a data breach involving potential unauthorized access to employee personal data on January 11, 2018, with the report submitted on March 28, 2018. The breach did not confirm the theft of personal data, but potentially exposed names, social security numbers, and other confidential information.
Date Detected: 2018-01-11
Date Publicly Disclosed: 2018-03-28
Type: Data Breach
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Employee personal information, legal agreements, bank and merchant account info, login credentials for corporate services, spreadsheets, and some customer information
Systems Affected: 4,000 devices120 VMware ESXi servers

Data Compromised: Email addresses, Encrypted passwords

Data Compromised: Names, Social security numbers, Other confidential information
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Employee Personal Information, Legal Agreements, Bank And Merchant Account Info, Login Credentials For Corporate Services, Spreadsheets, Customer Information, , Email Addresses, Encrypted Passwords, , Names, Social Security Numbers, Other Confidential Information and .

Entity Name: Shutterfly
Entity Type: Online retail and photography manufacturing platform
Industry: Retail and Photography

Entity Name: Shutterfly, Inc.
Entity Type: Company
Industry: E-commerce

Entity Name: Shutterfly, Inc.
Entity Type: Company
Industry: Photography and Imaging Services
Location: California, USA

Type of Data Compromised: Employee personal information, Legal agreements, Bank and merchant account info, Login credentials for corporate services, Spreadsheets, Customer information
Personally Identifiable Information: NamesSalary and compensation informationFMLA leavesWorkers’ compensation claimsLast four digits of credit cards

Type of Data Compromised: Email addresses, Encrypted passwords

Type of Data Compromised: Names, Social security numbers, Other confidential information
Sensitivity of Data: High

Ransomware Strain: Conti
Data Encryption: True
Data Exfiltration: True

Source: California Office of the Attorney General
Date Accessed: 2014-11-26

Source: California Office of the Attorney General
Date Accessed: 2018-03-28
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney GeneralDate Accessed: 2014-11-26, and Source: California Office of the Attorney GeneralDate Accessed: 2018-03-28.
Last Attacking Group: The attacking group in the last incident was an Conti ransomware group.
Most Recent Incident Detected: The most recent incident detected was on 2014-11-26.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2018-03-28.
Most Significant Data Compromised: The most significant data compromised in an incident were Employee personal information, legal agreements, bank and merchant account info, login credentials for corporate services, spreadsheets, and some customer information, email addresses, encrypted passwords, , names, social security numbers, other confidential information and .
Most Significant System Affected: The most significant system affected in an incident were 4,000 devices120 VMware ESXi servers.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Employee personal information, legal agreements, bank and merchant account info, login credentials for corporate services, spreadsheets, and some customer information, social security numbers, encrypted passwords, names, other confidential information and email addresses.
Most Recent Source: The most recent source of information about an incident is California Office of the Attorney General.
.png)
Nagios XI versions prior to 2026R1.1 are vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A user‑accessible maintenance script may be executed as root via sudo and includes an application file that is writable by a lower‑privileged user. A local attacker with access to the application account can modify this file to introduce malicious code, which is then executed with elevated privileges when the script is run. Successful exploitation results in arbitrary code execution as the root user.
Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
SIPGO is a library for writing SIP services in the GO language. Starting in version 0.3.0 and prior to version 1.0.0-alpha-1, a nil pointer dereference vulnerability is in the SIPGO library's `NewResponseFromRequest` function that affects all normal SIP operations. The vulnerability allows remote attackers to crash any SIP application by sending a single malformed SIP request without a To header. The vulnerability occurs when SIP message parsing succeeds for a request missing the To header, but the response creation code assumes the To header exists without proper nil checks. This affects routine operations like call setup, authentication, and message handling - not just error cases. This vulnerability affects all SIP applications using the sipgo library, not just specific configurations or edge cases, as long as they make use of the `NewResponseFromRequest` function. Version 1.0.0-alpha-1 contains a patch for the issue.
GLPI is a free asset and IT management software package. Starting in version 9.1.0 and prior to version 10.0.21, an unauthorized user with an API access can read all knowledge base entries. Users should upgrade to 10.0.21 to receive a patch.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.