Company Details
nike
85,136
6,052,402
43
nike.com/careers
0
NIK_8771416
In-progress

Nike Company CyberSecurity Posture
nike.com/careersNIKE, Inc. is a purpose-driven organization energized by a shared commitment to move the world forward through the power of sport. We champion diversity and amplify individual passions to bring inspiration and innovation to every athlete* in the world. Here, every teammate has a role to play. We work together, embracing our differences and pushing boundaries, to achieve collective success. For more information on how you can contribute to a world-class team, visit our career site at nike.com/careers and join our talent community at https://nikeats.avature.net/niketalentcommunity.
Company Details
nike
85,136
6,052,402
43
nike.com/careers
0
NIK_8771416
In-progress
Between 800 and 849

Nike Global Score (TPRM)XXXX



No incidents recorded for Nike in 2025.
No incidents recorded for Nike in 2025.
No incidents recorded for Nike in 2025.
Nike cyber incidents detection timeline including parent company and subsidiaries

NIKE, Inc. is a purpose-driven organization energized by a shared commitment to move the world forward through the power of sport. We champion diversity and amplify individual passions to bring inspiration and innovation to every athlete* in the world. Here, every teammate has a role to play. We work together, embracing our differences and pushing boundaries, to achieve collective success. For more information on how you can contribute to a world-class team, visit our career site at nike.com/careers and join our talent community at https://nikeats.avature.net/niketalentcommunity.

O’Reilly Auto Parts started as a single store and has grown into a leading retailer in the automotive aftermarket industry with more than 6,100 locations and counting. With more than 94,000 team members, O’Reilly has expanded into 48 states, Puerto Rico, Mexico, and Canada. O’Reilly, headquartered

ICA Gruppen´s core business is retail. The Group includes ICA Sweden which mainly conduct grocery retail, ICA Real Estate which owns and manages properties, ICA Bank which offers financial services and insurances, Apotek Hjärtat which conducts pharmacy operations. Guidelines: Comments in our chan

AZADEA Group is a premier lifestyle retail company that owns and operates more than 40+ leading international franchise concepts across the Middle East and Africa. With over 13,500 employees, dedicated offices in every market it operates, and world-class infrastructure, the company oversees over 700

Avolta AG, (SIX: AVOL) is leading a travel experience revolution. The result of the Dufry-Autogrill business combination, Avolta puts the traveler at our strategic core as we maximize every moment of the journey through our unique combination of travel retail and travel food & beverage, passion fo

Primark is an international fashion retailer employing more than 80,000 colleagues across 17 countries in Europe and the US. Founded in Ireland in 1969 under the Penneys brand, Primark aims to provide affordable choices for everyone, from great quality everyday essentials to stand-out style across w

Ace Hardware is the largest retailer-owned hardware cooperative in the world with over 5,500 locally owned and operated hardware stores in approximately 70 countries. Headquartered in Oak Brook, Ill., Ace and its subsidiaries operate an expansive network of distribution centers in the U.S. and have

Ahold Delhaize is one of the world’s largest food retail groups, we are a leader in supermarkets and e-commerce, and a company at the forefront of sustainable retailing. Our local brands employ around 393,000 associates in around 9,400 local grocery, small format, and specialty stores. Our family

Toys“R”Us is a beloved brand known all around the world—and we know how to have fun! For over 70 years we've been the toy authority and ambassadors of all things play. Our new vision looks beyond traditional retail for a re-imagined, immersive experience for kids of all ages. We've got a whole new w
Fnac Darty est un leader européen de la distribution de biens culturels, de loisirs, de produits techniques, d’électroménager et de services. Le groupe, qui compte plus de 25 000 collaborateurs, dispose à fin 2022 d’un réseau de 987 magasins et se positionne comme un acteur majeur du e-commerce en F
.png)
Ahead of this year's Digital Transformation Expo Europe, we spoke to Nike's Linda Cereda.
The cybersecurity landscape witnessed a sophisticated and ongoing attack campaign throughout 2025 that has successfully compromised major...
Vietnam remains Nike's largest manufacturing base globally for the third fiscal year running, according to the U.S. sportswear giant's...
Nike and JPMorgan are on a list of companies that are pushing back or changing the release timing of sustainability and diversity reports.
F5 Inc. acquires AI cybersecurity startup Fletch, boosting its intelligent security capabilities. 13 Fletch employees join F5 in the deal.
Silent Push researchers have identified that the notorious hacker collective Scattered Spider, also known as UNC3944 or Octo Tempest.
Cybersecurity experts now fear that cuts to certain federal programs threaten to make the job of protecting students' data tougher by ripping away training and...
The move comes as the cybersecurity company's former general counsel, Scot Rogers, is leaving after 20 years with F5.
A computer hacker who “took about an hour” to create a program which infiltrated the website of Nike Inc in a “credential stuffing” cyber attack avoided going...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Nike is nike.com/careers.
According to Rankiteo, Nike’s AI-generated cybersecurity score is 838, reflecting their Good security posture.
According to Rankiteo, Nike currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Nike is not certified under SOC 2 Type 1.
According to Rankiteo, Nike does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Nike is not listed as GDPR compliant.
According to Rankiteo, Nike does not currently maintain PCI DSS compliance.
According to Rankiteo, Nike is not compliant with HIPAA regulations.
According to Rankiteo,Nike is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Nike operates primarily in the Retail industry.
Nike employs approximately 85,136 people worldwide.
Nike presently has no subsidiaries across any sectors.
Nike’s official LinkedIn profile has approximately 6,052,402 followers.
Nike is classified under the NAICS code 43, which corresponds to Retail Trade.
No, Nike does not have a profile on Crunchbase.
Yes, Nike maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/nike.
As of November 27, 2025, Rankiteo reports that Nike has not experienced any cybersecurity incidents.
Nike has an estimated 15,247 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Nike has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.