ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

PUMA is one of the world’s leading sports brands, designing, developing, selling and marketing footwear, apparel and accessories. For more than 75 years, PUMA has relentlessly pushed sport and culture forward by creating fast products for the world’s fastest athletes. PUMA offers performance and sport-inspired lifestyle products in categories such as Football, Running and Training, Basketball, Golf, and Motorsports. It collaborates with renowned designers and brands to bring sport influences into street culture and fashion. The PUMA Group owns the brands PUMA, Cobra Golf and stichd. The company distributes its products in more than 120 countries, employs about 20,000 people worldwide, and is headquartered in Herzogenaurach/Germany.

PUMA Group A.I CyberSecurity Scoring

PUMA Group

Company Details

Linkedin ID:

puma

Employees number:

20,088

Number of followers:

1,551,894

NAICS:

43

Industry Type:

Retail

Homepage:

puma.com

IP Addresses:

184

Company ID:

PUM_2897049

Scan Status:

Completed

AI scorePUMA Group Risk Score (AI oriented)

Between 700 and 749

https://images.rankiteo.com/companyimages/puma.jpeg
PUMA Group Retail
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscorePUMA Group Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/puma.jpeg
PUMA Group Retail
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

PUMA Group Company CyberSecurity News & History

Past Incidents
2
Attack Types
2
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
PUMA GroupBreach75302/2022
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: The data of Puma Employees was breached in a ransomware attack that hit Ultimate Kronos Group, an HR management platform. The data includes names, Social Security numbers, and other personal information.

PUMA GroupData Leak85401/2023
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Private data allegedly belonging to more than 230,000 Puma customers in Chile has been found on a hacker forum. The threat actor listed an 84MB-strong dataset for sale that allegedly belonging to 237,013 users. The data included Customer Email, Telephone, Customer Name, Documento, Purchase Date, Bill-to Name, Ship-to Name, Grand Total (Base), Grand Total (Purchased), Billing Address, Shipping Address, Subtotal, Shipping and Handling, Medio de pago, Oms Number, Coupon Code, Cart Rule, Estado del Pago, Ciudad, Region.

PUMA Group
Breach
Severity: 75
Impact: 3
Seen: 02/2022
Blog:
Rankiteo Explanation
Attack with significant impact with internal employee data leaks

Description: The data of Puma Employees was breached in a ransomware attack that hit Ultimate Kronos Group, an HR management platform. The data includes names, Social Security numbers, and other personal information.

PUMA Group
Data Leak
Severity: 85
Impact: 4
Seen: 01/2023
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Private data allegedly belonging to more than 230,000 Puma customers in Chile has been found on a hacker forum. The threat actor listed an 84MB-strong dataset for sale that allegedly belonging to 237,013 users. The data included Customer Email, Telephone, Customer Name, Documento, Purchase Date, Bill-to Name, Ship-to Name, Grand Total (Base), Grand Total (Purchased), Billing Address, Shipping Address, Subtotal, Shipping and Handling, Medio de pago, Oms Number, Coupon Code, Cart Rule, Estado del Pago, Ciudad, Region.

Ailogo

PUMA Group Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for PUMA Group

Incidents vs Retail Industry Average (This Year)

No incidents recorded for PUMA Group in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for PUMA Group in 2025.

Incident Types PUMA Group vs Retail Industry Avg (This Year)

No incidents recorded for PUMA Group in 2025.

Incident History — PUMA Group (X = Date, Y = Severity)

PUMA Group cyber incidents detection timeline including parent company and subsidiaries

PUMA Group Company Subsidiaries

SubsidiaryImage

PUMA is one of the world’s leading sports brands, designing, developing, selling and marketing footwear, apparel and accessories. For more than 75 years, PUMA has relentlessly pushed sport and culture forward by creating fast products for the world’s fastest athletes. PUMA offers performance and sport-inspired lifestyle products in categories such as Football, Running and Training, Basketball, Golf, and Motorsports. It collaborates with renowned designers and brands to bring sport influences into street culture and fashion. The PUMA Group owns the brands PUMA, Cobra Golf and stichd. The company distributes its products in more than 120 countries, employs about 20,000 people worldwide, and is headquartered in Herzogenaurach/Germany.

Loading...
similarCompanies

PUMA Group Similar Companies

Albert Heijn

Bij Albert Heijn geloven we dat eten en drinken een essentiële rol speelt bij de grote uitdagingen in de maatschappij. Het levert een belangrijke bijdrage aan een gezonde levensstijl, het verbindt mensen en draagt bij aan een beter klimaat en daarmee een duurzame samenleving. Onze missie is dan ook:

Chow Sang Sang Holdings International Limited

For 90 years, Chow Sang Sang has captured the hearts of millions with its exquisite jewellery collections. Inspired by its philosophy of “Sustained Vitality, Ever Rejuvenated” and driven by a relentless pursuit of perfection, the brand has become an icon of design, craftsmanship, quality and profess

Big Lots

Big Lots, Inc. (NYSE: BIG) is one of America’s largest off-price retailers, offering bargains on everything for the home, including furniture, décor, pantry essentials, kitchenware, pet supplies, and more. The Company fulfills its mission to help customers "Live Big and Save Lots" by strategically s

Wesfarmers — a diversified corporation From its origins in 1914 as a Western Australian farmers' cooperative, Wesfarmers has grown into one of Australia's largest listed companies. With headquarters in Western Australia, its diverse business operations cover: home improvement and outdoor living; ap

AutoZone is the nation's leading retailer and a leading distributor of automotive replacement parts and accessories with more than 7,000 stores in the US, Mexico, Brazil and Puerto Rico. Each store carries an extensive line for cars, sport utility vehicles, vans and light trucks, including new and r

Founded in 1946, Tupperware's signature container created the modern food storage category that revolutionized the way the world stores, serves and prepares food. Today, we continue to innovate for the benefit of people and our planet by designing innovative, functional and environmentally responsib

It’s hard for anyone to imagine just how many different career possibilities there are at Asda. Ours is a big business, and beyond the roles you might be familiar with on the shop floor (or on your doorstep), there are hundreds of others you don’t get to see. In fact, because our business is chang

Jewel-Osco

Proudly serving our customers in the Chicagoland area since 1899, Jewel-Osco provides friendly service, quality products and great value. Jewel-Osco operates 188 stores throughout the Chicagoland area, Indiana and Iowa, which is part of a 2,200+ store operation that employs approximately 290,000 peo

JD Sports Fashion

Founded in 1981 with a single store in the Northwest of England, JD Group has grown into a leading global omni-channel retailer in Sports Fashion, Outdoors, and Gyms. Our diverse and dedicated teams operate across a portfolio of renowned retail brands in multiple international markets. Listed on th

newsone

PUMA Group CyberSecurity News

November 27, 2025 06:47 AM
Asahi admits cybersecurity ‘weakness’ after info of 2 million people stolen

Japanese drink giant Asahi Group Holdings said on Thursday an investigation has found that personal information linked to around 2 million...

October 08, 2025 07:00 AM
Qantas among nearly 40 companies facing ransom demand from hacker group

Hacker collective Scattered Lapsus$ Hunters reportedly threatening to leak stolen personal data from dozens of firms in major extortion...

September 22, 2025 07:00 AM
German companies face rising cybercrime

Sabotage, data theft and espionage are affecting more and more companies in Germany, costing them billions in damages every year and...

June 17, 2025 07:00 AM
Italy's Leonardo buys a European cybersecurity company

Italy's Leonardo will soon announce the acquisition of a European cybersecurity company, its chairman told Reuters on Tuesday,...

June 05, 2025 07:00 AM
Weekly Intelligence Report – 06 June 2025

CYFIRMA Research and Advisory Team has found Datarip Ransomware while monitoring various underground forums as part of our Threat Discovery Process.

May 28, 2025 07:00 AM
Adidas confirms data breach, customer contact information exposed

Become a FashionUnited insider to access premium industry news and data-driven reports. Subscribe today with your business email.

May 02, 2025 07:00 AM
PUMA enhances HR operations and talent development with Workday

Global sports company PUMA has deployed Workday Human Capital Management (HCM) to redefine its HR operations and talent development.

April 07, 2025 07:00 AM
ExpressVPN at Hackathons and CTF Competitions | ExpressVPN Blog

Discover how our Security Team dominates Capture the Flag competitions against global giants, helping us stay ahead of the cybersecurity...

January 31, 2025 08:00 AM
Coding and Cybersecurity: registration is now open for the Reply Hack The Code Challenge 2025

Reply is a network of highly specialized companies that support leading industrial groups in defining and developing business models enabled...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

PUMA Group CyberSecurity History Information

Official Website of PUMA Group

The official website of PUMA Group is http://about.puma.com/en/careers.

PUMA Group’s AI-Generated Cybersecurity Score

According to Rankiteo, PUMA Group’s AI-generated cybersecurity score is 704, reflecting their Moderate security posture.

How many security badges does PUMA Group’ have ?

According to Rankiteo, PUMA Group currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does PUMA Group have SOC 2 Type 1 certification ?

According to Rankiteo, PUMA Group is not certified under SOC 2 Type 1.

Does PUMA Group have SOC 2 Type 2 certification ?

According to Rankiteo, PUMA Group does not hold a SOC 2 Type 2 certification.

Does PUMA Group comply with GDPR ?

According to Rankiteo, PUMA Group is not listed as GDPR compliant.

Does PUMA Group have PCI DSS certification ?

According to Rankiteo, PUMA Group does not currently maintain PCI DSS compliance.

Does PUMA Group comply with HIPAA ?

According to Rankiteo, PUMA Group is not compliant with HIPAA regulations.

Does PUMA Group have ISO 27001 certification ?

According to Rankiteo,PUMA Group is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of PUMA Group

PUMA Group operates primarily in the Retail industry.

Number of Employees at PUMA Group

PUMA Group employs approximately 20,088 people worldwide.

Subsidiaries Owned by PUMA Group

PUMA Group presently has no subsidiaries across any sectors.

PUMA Group’s LinkedIn Followers

PUMA Group’s official LinkedIn profile has approximately 1,551,894 followers.

NAICS Classification of PUMA Group

PUMA Group is classified under the NAICS code 43, which corresponds to Retail Trade.

PUMA Group’s Presence on Crunchbase

No, PUMA Group does not have a profile on Crunchbase.

PUMA Group’s Presence on LinkedIn

Yes, PUMA Group maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/puma.

Cybersecurity Incidents Involving PUMA Group

As of November 27, 2025, Rankiteo reports that PUMA Group has experienced 2 cybersecurity incidents.

Number of Peer and Competitor Companies

PUMA Group has an estimated 15,251 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at PUMA Group ?

Incident Types: The types of cybersecurity incidents that have occurred include Data Leak and Breach.

Incident Details

Can you provide details on each incident ?

Incident : Data Breach, Ransomware

Title: Puma Employee Data Breach via Ultimate Kronos Group

Description: The data of Puma Employees was breached in a ransomware attack that hit Ultimate Kronos Group, an HR management platform. The data includes names, Social Security numbers, and other personal information.

Type: Data Breach, Ransomware

Incident : Data Breach

Title: Data Breach of Puma Customers in Chile

Description: Private data allegedly belonging to more than 230,000 Puma customers in Chile has been found on a hacker forum. The threat actor listed an 84MB-strong dataset for sale that allegedly belonging to 237,013 users. The data included Customer Email, Telephone, Customer Name, Documento, Purchase Date, Bill-to Name, Ship-to Name, Grand Total (Base), Grand Total (Purchased), Billing Address, Shipping Address, Subtotal, Shipping and Handling, Medio de pago, Oms Number, Coupon Code, Cart Rule, Estado del Pago, Ciudad, Region.

Type: Data Breach

Motivation: Financial Gain

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach, Ransomware PUM1910222

Data Compromised: Names, Social security numbers, Other personal information

Incident : Data Breach PUM231924123

Data Compromised: Customer email, Telephone, Customer name, Documento, Purchase date, Bill-to name, Ship-to name, Grand total (base), Grand total (purchased), Billing address, Shipping address, Subtotal, Shipping and handling, Medio de pago, Oms number, Coupon code, Cart rule, Estado del pago, Ciudad, Region

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Social Security Numbers, Other Personal Information, , Customer Email, Telephone, Customer Name, Documento, Purchase Date, Bill-To Name, Ship-To Name, Grand Total (Base), Grand Total (Purchased), Billing Address, Shipping Address, Subtotal, Shipping And Handling, Medio De Pago, Oms Number, Coupon Code, Cart Rule, Estado Del Pago, Ciudad, Region and .

Which entities were affected by each incident ?

Incident : Data Breach, Ransomware PUM1910222

Entity Name: Puma

Entity Type: Company

Industry: Retail

Incident : Data Breach, Ransomware PUM1910222

Entity Name: Ultimate Kronos Group

Entity Type: Company

Industry: HR Management

Incident : Data Breach PUM231924123

Entity Name: Puma

Entity Type: Retail

Industry: Sporting Goods

Location: Chile

Customers Affected: 237013

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach, Ransomware PUM1910222

Type of Data Compromised: Names, Social security numbers, Other personal information

Sensitivity of Data: High

Incident : Data Breach PUM231924123

Type of Data Compromised: Customer email, Telephone, Customer name, Documento, Purchase date, Bill-to name, Ship-to name, Grand total (base), Grand total (purchased), Billing address, Shipping address, Subtotal, Shipping and handling, Medio de pago, Oms number, Coupon code, Cart rule, Estado del pago, Ciudad, Region

Number of Records Exposed: 237013

Additional Questions

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were names, Social Security numbers, other personal information, , Customer Email, Telephone, Customer Name, Documento, Purchase Date, Bill-to Name, Ship-to Name, Grand Total (Base), Grand Total (Purchased), Billing Address, Shipping Address, Subtotal, Shipping and Handling, Medio de pago, Oms Number, Coupon Code, Cart Rule, Estado del Pago, Ciudad, Region and .

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were other personal information, Region, Grand Total (Purchased), Social Security numbers, Ciudad, Subtotal, Shipping and Handling, Medio de pago, Oms Number, Documento, Cart Rule, Telephone, Estado del Pago, Shipping Address, Billing Address, Bill-to Name, Grand Total (Base), Coupon Code, Ship-to Name, Customer Email, Purchase Date, Customer Name and names.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 250.0.

cve

Latest Global CVEs (Not Company-Specific)

Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=puma' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge