Company Details
manna-development-group-llc
181
814
7225
mannadevelopment.com
0
MAN_5098672
In-progress

Manna Development Group LLC, Franchisee of Panera Bread Company CyberSecurity Posture
mannadevelopment.comFounded in 2003, under the leadership of Paul Saber, President & CEO, and Patrick Rogers, Operating Partner, Manna Development Group has grown to become one of Panera Bread’s largest franchisees. Committed to operating great restaurants, a heart of service, and a desire for excellence are deeply rooted in everything Manna does. Manna currently holds the Area Development Agreement for 140 Panera Bread and Bakery Cafés across 7 states in San Diego, North and South Los Angeles, and Orange County, CA, and for Panera Cafés in Michigan, Oregon, Northern Indiana, Southwest Washington, and Colorado. Paul and Patrick have built an amazing culture and tremendous operational discipline throughout their organization by putting others above self and providing exceptional quality, service, and cleanliness. Both Paul, Patrick, and Manna Development have a long history of philanthropy. Share the Dough is a non-profit organization that was created by this group to provide resources, financial assistance, and educational opportunities to community organizations and Manna employees. Share the Dough feels called to protect the most vulnerable individuals and, therefore, focuses their efforts on children and families in need, and their communities. Share the Dough supports organizations that provide many services including, but not limited to: support for victims of abuse and violence, necessities for children affected by war, natural disaster, famine, poverty and disease, nutritious meals, backpacks filled with school supplies and help in times of emergency situations. Share the Dough is supported by Manna employees and by guests who enter Panera cafes and “round up” their checks to support these efforts.
Company Details
manna-development-group-llc
181
814
7225
mannadevelopment.com
0
MAN_5098672
In-progress
Between 650 and 699

MDGLFPB Global Score (TPRM)XXXX

Description: In 2024, bakery and café chain **Panera** faced a significant data breach exposing sensitive customer information, including **Social Security numbers**. The breach led to a **$2.5 million class-action settlement** (Case: 4:24-cv-00847-HEA) after plaintiffs alleged the company failed to implement adequate cybersecurity measures. Affected individuals—those notified on **March 23, 2024**—could claim up to **$500** for ordinary expenses or **$6,500** for extraordinary losses, with California residents eligible for an additional **$100 statutory payment**. The breach underscored vulnerabilities in Panera’s data protection, resulting in potential **identity theft, financial fraud, and legal repercussions** for victims. While Panera denied wrongdoing, the settlement required **documented proof of losses** (e.g., bank statements) and offered a **November 11, 2025, deadline** for claims. The incident highlights the growing risk of **large-scale customer data exposure** due to inadequate cybersecurity in digitalized business operations.


No incidents recorded for Manna Development Group LLC, Franchisee of Panera Bread in 2025.
No incidents recorded for Manna Development Group LLC, Franchisee of Panera Bread in 2025.
No incidents recorded for Manna Development Group LLC, Franchisee of Panera Bread in 2025.
MDGLFPB cyber incidents detection timeline including parent company and subsidiaries

Founded in 2003, under the leadership of Paul Saber, President & CEO, and Patrick Rogers, Operating Partner, Manna Development Group has grown to become one of Panera Bread’s largest franchisees. Committed to operating great restaurants, a heart of service, and a desire for excellence are deeply rooted in everything Manna does. Manna currently holds the Area Development Agreement for 140 Panera Bread and Bakery Cafés across 7 states in San Diego, North and South Los Angeles, and Orange County, CA, and for Panera Cafés in Michigan, Oregon, Northern Indiana, Southwest Washington, and Colorado. Paul and Patrick have built an amazing culture and tremendous operational discipline throughout their organization by putting others above self and providing exceptional quality, service, and cleanliness. Both Paul, Patrick, and Manna Development have a long history of philanthropy. Share the Dough is a non-profit organization that was created by this group to provide resources, financial assistance, and educational opportunities to community organizations and Manna employees. Share the Dough feels called to protect the most vulnerable individuals and, therefore, focuses their efforts on children and families in need, and their communities. Share the Dough supports organizations that provide many services including, but not limited to: support for victims of abuse and violence, necessities for children affected by war, natural disaster, famine, poverty and disease, nutritious meals, backpacks filled with school supplies and help in times of emergency situations. Share the Dough is supported by Manna employees and by guests who enter Panera cafes and “round up” their checks to support these efforts.

Chipotle Mexican Grill, Inc. (NYSE: CMG) is cultivating a better world by serving responsibly sourced, classically-cooked, real food with wholesome ingredients without artificial colors, flavors or preservatives. Chipotle has over 3,250 restaurants in the United States, Canada, the United Kingdom, F
Waffle House has been serving Good Food Fast® since 1955. We started in one restaurant serving Avondale Estates, GA, and then grew into a national brand with more than 1,900 restaurants in 25 states providing career paths to 40,000 + employees. The love and devotion of our customer base helped bui
Panera began in 1987 as St. Louis Bread Company, a humble community bakery founded with a sourdough starter from San Francisco and a dream of putting a loaf of bread in every arm. While our business has expanded well beyond St. Louis since then, that same sourdough starter is still used in our iconi

Founded by Todd Graves in 1996 in Baton Rouge, La., RAISING CANE'S CHICKEN FINGERS has over 800 restaurants in 41 states, with many new restaurants under construction. The company has ONE LOVE®—craveable chicken finger meals—and is continually recognized for its unique business model and customer sa

Panda Restaurant Group, the world leader in Asian dining experiences and parent company of Panda Express, Panda Inn, and Hibachi-San, is dedicated to becoming a world leader in people development. We are family-owned and operated with over 2,500 locations worldwide and more than 48,000 associates.

Since the first Outback Steakhouse opened, our family of brands has expanded to include Carrabba's Italian Grill, Bonefish Grill, and Fleming's Prime Steakhouse & Wine Bar. Together, these unique, Founder-inspired restaurants make up Bloomin' Brands, Inc. Today, we are one of the world's largest cas

In 1965, TGI Fridays opened its first location in New York City. Today, there are 890 restaurants in 60 countries offering high quality, authentic American food and legendary drinks, bringing together all people from all places. The freeing and liberating spirit of "Friday" combined with our belief

At its Atlanta headquarters, known as the Corporate Support Center, Chick-fil-A, Inc. offers full-time careers in various fields such as Digital Transformation & Technology, Financial Services & Accounting, Enterprise Analytics, Restaurant Development, Early Talent Programs and more. Our team of mor

Darden’s family of restaurants features some of the most recognizable and successful brands in full-service dining — Olive Garden, LongHorn Steakhouse, Yard House, Ruth's Chris Steak House, Cheddar’s Scratch Kitchen, The Capital Grille, Chuy's, Seasons 52, Eddie V's and Bahama Breeze. We own and ope
.png)
The General Services Administration announced on Thursday that it reached an agreement with leading cybersecurity firm Palo Alto Networks to...
Led by Index Ventures, 7AI Raises $130 Million Series A Round as Enterprises Rapidly Adopt AI Cybersecurity Agents.
VigilAigent signs a two-year contract worth over $350000, moving a key partner to its OmniViz platform and Virtual Aigents,...
A report from one of the largest US insurance groups delves into what HNW citizens fret about, what they are insuring and how confident they...
As cyber threats escalate across industries, the cyber security as a service market has evolved into a critical foundation for protecting...
COGNNA, a Saudi AI-led cybersecurity company, is building an Agentic SOC designed to anticipate threats in real time — and it now has fresh...
Cybersecurity expert Eric O'Neill warns that scammers are using AI to personalize holiday attacks with cloned voices and fake delivery...
BOSTON, December 04, 2025--Brighton Marine today announced the promotion of Adam Hellman, its general counsel, to chief operating officer.
Orange Cyberdefense warned that cybercrime is converging with geopolitics, demanding a rethink of how to respond to digital threats.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Manna Development Group LLC, Franchisee of Panera Bread is http://www.mannadevelopment.com/.
According to Rankiteo, Manna Development Group LLC, Franchisee of Panera Bread’s AI-generated cybersecurity score is 684, reflecting their Weak security posture.
According to Rankiteo, Manna Development Group LLC, Franchisee of Panera Bread currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Manna Development Group LLC, Franchisee of Panera Bread is not certified under SOC 2 Type 1.
According to Rankiteo, Manna Development Group LLC, Franchisee of Panera Bread does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Manna Development Group LLC, Franchisee of Panera Bread is not listed as GDPR compliant.
According to Rankiteo, Manna Development Group LLC, Franchisee of Panera Bread does not currently maintain PCI DSS compliance.
According to Rankiteo, Manna Development Group LLC, Franchisee of Panera Bread is not compliant with HIPAA regulations.
According to Rankiteo,Manna Development Group LLC, Franchisee of Panera Bread is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Manna Development Group LLC, Franchisee of Panera Bread operates primarily in the Restaurants industry.
Manna Development Group LLC, Franchisee of Panera Bread employs approximately 181 people worldwide.
Manna Development Group LLC, Franchisee of Panera Bread presently has no subsidiaries across any sectors.
Manna Development Group LLC, Franchisee of Panera Bread’s official LinkedIn profile has approximately 814 followers.
Manna Development Group LLC, Franchisee of Panera Bread is classified under the NAICS code 7225, which corresponds to Restaurants and Other Eating Places.
No, Manna Development Group LLC, Franchisee of Panera Bread does not have a profile on Crunchbase.
Yes, Manna Development Group LLC, Franchisee of Panera Bread maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/manna-development-group-llc.
As of December 04, 2025, Rankiteo reports that Manna Development Group LLC, Franchisee of Panera Bread has experienced 1 cybersecurity incidents.
Manna Development Group LLC, Franchisee of Panera Bread has an estimated 4,826 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Total Financial Loss: The total financial loss from these incidents is estimated to be $2.50 million.
Detection and Response: The company detects and responds to cybersecurity incidents through an recovery measures with $2.5 million settlement for affected class members, and communication strategy with notification letters sent to affected customers (march 23, 2024); public settlement announcement..
Title: Panera Bread Data Breach (2024)
Description: A data breach at bakery and cafe chain Panera exposed sensitive client information, including Social Security numbers, leading to a $2.5 million class-action settlement. The breach prompted allegations that Panera failed to implement adequate cybersecurity measures to protect consumer data. Eligible class members (those notified on March 23, 2024) can claim compensation for ordinary ($500) or extraordinary ($6,500) losses, with California residents eligible for an additional $100 statutory payment. The final claim submission deadline is November 11, 2025, with a final approval hearing scheduled for January 29, 2026.
Date Publicly Disclosed: 2024-03-23
Type: Data Breach
Motivation: Financial GainData Theft
Common Attack Types: The most common types of attacks the company has faced is Breach.

Financial Loss: $2.5 million (settlement amount)
Data Compromised: Social security numbers, Potentially other sensitive client information
Customer Complaints: Class-action lawsuit filed (Case: 4:24-cv-00847-HEA)
Brand Reputation Impact: Negative (public disclosure, lawsuit, settlement)
Legal Liabilities: $2.5 million settlement; potential regulatory scrutiny
Identity Theft Risk: High (exposure of SSNs)
Average Financial Loss: The average financial loss per incident is $2.50 million.
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Social Security Numbers, Potentially Other Personally Identifiable Information (Pii) and .

Entity Name: Panera Bread
Entity Type: Bakery and Cafe Chain
Industry: Food & Beverage / Retail
Location: United States
Customers Affected: Class members notified on March 23, 2024 (exact number unspecified)

Recovery Measures: $2.5 million settlement for affected class members
Communication Strategy: Notification letters sent to affected customers (March 23, 2024); public settlement announcement

Type of Data Compromised: Social security numbers, Potentially other personally identifiable information (pii)
Sensitivity of Data: High (includes SSNs)
Data Exfiltration: Likely (data exposed to unauthorized third parties)
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through $2.5 million settlement for affected class members.

Fines Imposed: $2.5 million (settlement, not a regulatory fine)
Legal Actions: Class-action lawsuit (Case: 4:24-cv-00847-HEA in the U.S. District Court)
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Class-action lawsuit (Case: 4:24-cv-00847-HEA in the U.S. District Court).

Lessons Learned: Companies must implement robust cybersecurity measures to protect sensitive customer data, particularly Social Security numbers and other PII. Failure to do so can result in costly class-action lawsuits, reputational damage, and financial settlements. Proactive communication with affected customers and regulatory bodies is critical in mitigating fallout from such incidents.

Recommendations: Enhance data encryption and access controls for sensitive customer information (e.g., SSNs)., Implement multi-factor authentication (MFA) and regular security audits., Develop and test an incident response plan to ensure swift action in the event of a breach., Provide credit monitoring or identity theft protection services to affected customers as part of remediation efforts., Ensure compliance with data protection regulations (e.g., GDPR, CCPA) to avoid legal repercussions.Enhance data encryption and access controls for sensitive customer information (e.g., SSNs)., Implement multi-factor authentication (MFA) and regular security audits., Develop and test an incident response plan to ensure swift action in the event of a breach., Provide credit monitoring or identity theft protection services to affected customers as part of remediation efforts., Ensure compliance with data protection regulations (e.g., GDPR, CCPA) to avoid legal repercussions.Enhance data encryption and access controls for sensitive customer information (e.g., SSNs)., Implement multi-factor authentication (MFA) and regular security audits., Develop and test an incident response plan to ensure swift action in the event of a breach., Provide credit monitoring or identity theft protection services to affected customers as part of remediation efforts., Ensure compliance with data protection regulations (e.g., GDPR, CCPA) to avoid legal repercussions.Enhance data encryption and access controls for sensitive customer information (e.g., SSNs)., Implement multi-factor authentication (MFA) and regular security audits., Develop and test an incident response plan to ensure swift action in the event of a breach., Provide credit monitoring or identity theft protection services to affected customers as part of remediation efforts., Ensure compliance with data protection regulations (e.g., GDPR, CCPA) to avoid legal repercussions.Enhance data encryption and access controls for sensitive customer information (e.g., SSNs)., Implement multi-factor authentication (MFA) and regular security audits., Develop and test an incident response plan to ensure swift action in the event of a breach., Provide credit monitoring or identity theft protection services to affected customers as part of remediation efforts., Ensure compliance with data protection regulations (e.g., GDPR, CCPA) to avoid legal repercussions.
Key Lessons Learned: The key lessons learned from past incidents are Companies must implement robust cybersecurity measures to protect sensitive customer data, particularly Social Security numbers and other PII. Failure to do so can result in costly class-action lawsuits, reputational damage, and financial settlements. Proactive communication with affected customers and regulatory bodies is critical in mitigating fallout from such incidents.

Source: U.S. District Court Case: 4:24-cv-00847-HEA

Source: Panera Bread Data Breach Settlement Notice (March 23, 2024)
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: U.S. District Court Case: 4:24-cv-00847-HEA, and Source: Panera Bread Data Breach Settlement Notice (March 23, 2024).

Investigation Status: Settled (class-action lawsuit resolved with $2.5 million payout; final approval hearing scheduled for January 29, 2026)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notification letters sent to affected customers (March 23 and 2024); public settlement announcement.

Stakeholder Advisories: Class members notified via mail (March 23, 2024) with instructions for claiming compensation. Public advisories likely issued through Panera’s corporate communications channels.
Customer Advisories: Customers advised to submit claims by November 11, 2025, with documentation (e.g., bank/credit card statements) to receive compensation. California residents eligible for additional $100 statutory payment.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Class members notified via mail (March 23, 2024) with instructions for claiming compensation. Public advisories likely issued through Panera’s corporate communications channels., Customers advised to submit claims by November 11, 2025, with documentation (e.g. and bank/credit card statements) to receive compensation. California residents eligible for additional $100 statutory payment..

High Value Targets: Customer Pii (E.G., Social Security Numbers),
Data Sold on Dark Web: Customer Pii (E.G., Social Security Numbers),

Root Causes: Inadequate Cybersecurity Measures To Protect Sensitive Customer Data, Potential Failure To Implement Industry-Standard Safeguards (E.G., Encryption, Access Controls),
Corrective Actions: $2.5 Million Settlement To Compensate Affected Class Members., Likely Internal Reviews And Updates To Cybersecurity Policies (Details Unspecified)., Public Accountability Through Legal Proceedings And Settlement Terms.,
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: $2.5 Million Settlement To Compensate Affected Class Members., Likely Internal Reviews And Updates To Cybersecurity Policies (Details Unspecified)., Public Accountability Through Legal Proceedings And Settlement Terms., .
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-03-23.
Highest Financial Loss: The highest financial loss from an incident was $2.5 million (settlement amount).
Most Significant Data Compromised: The most significant data compromised in an incident were Social Security numbers, Potentially other sensitive client information and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Social Security numbers and Potentially other sensitive client information.
Highest Fine Imposed: The highest fine imposed for a regulatory violation was $2.5 million (settlement, not a regulatory fine).
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Class-action lawsuit (Case: 4:24-cv-00847-HEA in the U.S. District Court).
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Companies must implement robust cybersecurity measures to protect sensitive customer data, particularly Social Security numbers and other PII. Failure to do so can result in costly class-action lawsuits, reputational damage, and financial settlements. Proactive communication with affected customers and regulatory bodies is critical in mitigating fallout from such incidents.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Ensure compliance with data protection regulations (e.g., GDPR, CCPA) to avoid legal repercussions., Provide credit monitoring or identity theft protection services to affected customers as part of remediation efforts., Develop and test an incident response plan to ensure swift action in the event of a breach., Enhance data encryption and access controls for sensitive customer information (e.g., SSNs). and Implement multi-factor authentication (MFA) and regular security audits..
Most Recent Source: The most recent source of information about an incident are U.S. District Court Case: 4:24-cv-00847-HEA, Panera Bread Data Breach Settlement Notice (March 23 and 2024).
Current Status of Most Recent Investigation: The current status of the most recent investigation is Settled (class-action lawsuit resolved with $2.5 million payout; final approval hearing scheduled for January 29, 2026).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Class members notified via mail (March 23, 2024) with instructions for claiming compensation. Public advisories likely issued through Panera’s corporate communications channels., .
Most Recent Customer Advisory: The most recent customer advisory issued were an Customers advised to submit claims by November 11, 2025, with documentation (e.g. and bank/credit card statements) to receive compensation. California residents eligible for additional $100 statutory payment.
.png)
MCP Server Kubernetes is an MCP Server that can connect to a Kubernetes cluster and manage it. Prior to 2.9.8, there is a security issue exists in the exec_in_pod tool of the mcp-server-kubernetes MCP Server. The tool accepts user-provided commands in both array and string formats. When a string format is provided, it is passed directly to shell interpretation (sh -c) without input validation, allowing shell metacharacters to be interpreted. This vulnerability can be exploited through direct command injection or indirect prompt injection attacks, where AI agents may execute commands without explicit user intent. This vulnerability is fixed in 2.9.8.
XML external entity (XXE) injection in eyoucms v1.7.1 allows remote attackers to cause a denial of service via crafted body of a POST request.
An issue was discovered in Fanvil x210 V2 2.12.20 allowing unauthenticated attackers on the local network to access administrative functions of the device (e.g. file upload, firmware update, reboot...) via a crafted authentication bypass.
Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.
Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.