Company Details
the-home-depot
125,004
1,033,148
43
homedepot.com
62
THE_3252455
Completed

The Home Depot Company CyberSecurity Posture
homedepot.comThe Home Depot, the world’s largest home improvement specialty retailer, values and rewards dedicated, knowledgeable, and experienced professionals. We operate more than 2,300 retail stores in all 50 states, the District of Columbia, Puerto Rico, the U.S. Virgin Islands, Guam, Canada, and Mexico. All of our associates have one thing in mind — helping our customers build and improve their homes. Join The Home Depot team today and see for yourself why we are consistently ranked as a top Fortune 500 company.
Company Details
the-home-depot
125,004
1,033,148
43
homedepot.com
62
THE_3252455
Completed
Between 800 and 849

HD Global Score (TPRM)XXXX

Description: **Home Depot Ignored Security Researcher’s Warning About Exposed Credential** Security researcher **Vinny Troia (operating under the alias "Zimmerman")** disclosed that **Home Depot failed to respond** to multiple alerts about a **publicly exposed credential**, despite his history of reporting similar vulnerabilities to other companies. Troia, who has previously notified organizations about security risks, stated that Home Depot was the only company to ignore his warnings. The exposed credential was **removed from public view** only after **TechCrunch reached out to Home Depot** last week. The incident highlights potential gaps in the company’s vulnerability disclosure process, though no details were provided on whether the credential was misused or the extent of its exposure. The case underscores the risks of unaddressed security alerts in enterprise environments.
Description: The California Office of the Attorney General reported a data breach incident involving The Home Depot, Inc. on February 10, 2014. The breach relates to unauthorized access by three HR associates to the personal information of current and former associates, potentially including names, contact information, social security numbers, and financial account numbers. However, the exact number of affected individuals and the breach date were not specified.
Description: In 2014, Home Depot experienced a major security breach that compromised over 50 million credit cards. Cybercriminals exploited a third-party vendor’s credentials to access the network and install malware on point-of-sale systems. As customers swiped their credit cards at physical stores, their data was clandestinely captured by the attackers, posing serious privacy and financial risks.
Description: The California Office of the Attorney General reported a data breach involving The Home Depot, Inc. on September 9, 2014. The breach potentially impacted customers using payment cards at Home Depot stores in the U.S. and Canada from April 2014 onward, involving payment card information including names, credit card numbers, and expiration dates. There is no evidence that debit PIN numbers were compromised.
Description: In one of the most significant cybersecurity breaches impacting the retail sector, Home Depot faced a formidable cyber attack between April and September 2014. Using a third-party vendor's login credentials, attackers infiltrated Home Depot’s network, then deployed sophisticated malware designed to infect the retailer’s POS system, aiming to harvest customer payment information. This breach had a massive scope, affecting 52 million customers. It caused considerable financial and reputational damage to the company. Home Depot subsequently agreed to pay $17.5 million to settle claims across the country, linked to this incident. However, this sum was only a part of the overall financial impact on Home Depot, which incurred pretax expenses of $198 million related to the breach, its aftermath, and subsequent litigation by customers, payment card issuers, and financial institutions before reaching the settlement. This event underscores the critical importance of stringent cybersecurity measures and the potential consequences of vulnerabilities within third-party vendor systems.
Description: Home Depot was listed among the 39 victims of the **Scattered Lapsus$ Hunters** cybercrime group, which breached corporate Salesforce instances via social engineering. The stolen data includes **personal and contact information of customers, employees, and partners**, with specific risks tied to a dedicated file containing **government employees' details**—names, email/postal addresses, and phone numbers. This exposure heightens risks of **targeted phishing, fraud, and even political violence** against individuals. The breach also involves sensitive data like **account IDs, dates of birth, passport/Social Security numbers, and purchase histories**, which could fuel identity theft or financial fraud. The group threatens to **publicly leak the data** unless a ransom is paid by **October 10, 2025**, leveraging pressure through a dark web leak site. Salesforce denies platform compromise but acknowledges extortion attempts linked to past incidents.


The Home Depot has 207.69% more incidents than the average of same-industry companies with at least one recorded incident.
The Home Depot has 156.41% more incidents than the average of all companies with at least one recorded incident.
The Home Depot reported 2 incidents this year: 1 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.
HD cyber incidents detection timeline including parent company and subsidiaries

The Home Depot, the world’s largest home improvement specialty retailer, values and rewards dedicated, knowledgeable, and experienced professionals. We operate more than 2,300 retail stores in all 50 states, the District of Columbia, Puerto Rico, the U.S. Virgin Islands, Guam, Canada, and Mexico. All of our associates have one thing in mind — helping our customers build and improve their homes. Join The Home Depot team today and see for yourself why we are consistently ranked as a top Fortune 500 company.


For 90 years, Chow Sang Sang has captured the hearts of millions with its exquisite jewellery collections. Inspired by its philosophy of “Sustained Vitality, Ever Rejuvenated” and driven by a relentless pursuit of perfection, the brand has become an icon of design, craftsmanship, quality and profess

Founded in 1956, Williams-Sonoma, Inc. is the premier specialty retailer of high-quality products for the home. Our family of brands includes Williams Sonoma, Pottery Barn, Pottery Barn Kids, PBteen, West Elm, Williams-Sonoma Home, Rejuvenation, and Mark and Graham. These brands are among the best
Our Purpose – Live Life Well Loblaw Companies Limited is Canada’s food and pharmacy leader, the nation’s largest retailer, and the majority unit holder of Choice Properties Real Estate Investment Trust. Loblaw – and its portfolio of grocery, health and beauty, financial services and apparel busines

The cooperatively organized REWE Group is one of the leading trade and tourism groups in Germany and Europe. In 2023, the company generated a total external turnover of more than 92 billion euros. Founded in 1927, REWE Group operates with around 390,000 employees in 21 European countries. The sa

What is Inditex? Inditex comprises seven brands: Zara, Pull&Bear, Massimo Dutti, Bershka, Stradivarius, Oysho and Zara Home. We sell in 213 markets through our online platforms and our over 5.800 stores. But… What is Inditex? We are the clothes you choose to wear, the products with which you deco

We exist so music can persist. Our family of brands has put more instruments into the hands of more people than anyone on the planet. Meet the family or, as we call them, The Guitar Center Company. Guitar Center. But there's more to us than guitars and basses. We carry all kinds of musical instrume

Founded in 1946, Tupperware's signature container created the modern food storage category that revolutionized the way the world stores, serves and prepares food. Today, we continue to innovate for the benefit of people and our planet by designing innovative, functional and environmentally responsib

Fozzy Group is one of the largest trade industrial groups in Ukraine and one of the leading Ukrainian retailers, with over 700 outlets all around the country. Besides retail, the group's businesses include food production, and restaurants. Fozzy Group is introducing modern solutions in all areas
Life is ridiculously awesome. That’s a bold statement. But hey, bold statements are our thing. So here’s another one: Kmart is ridiculously awesome, too. Know why? Because we work at it. We don’t do anything halfway. We go out and crush it. We’re about more than the products we sell. And more than
.png)
Home Depot Black Friday Ad. Browse the best deals from Home Depot's Black Friday sale in 2025.
Deceptive email: A new phishing campaign is impersonating Home Depot with a Halloween-themed giveaway. Advanced evasion tactics: The attack...
The cybersecurity landscape has been shaken by the emergence of Trinity of Chaos, a sophisticated ransomware collective that has launched a...
Shares of SentinelOne rose on Friday after the company became the latest cybersecurity firm whose results topped estimates as AI threats...
The latest financial disclosures from retail giant Home Depot (NYSE: HD) and cybersecurity leader Palo Alto Networks (NASDAQ: PANW) offer a...
PRNewswire/ -- The Home Depot® announced today that it has withdrawn and refiled its Premerger Notification and Report Form under the...
Technical leader and applied engineer Arjun Chakraborty has spent more than a decade at the intersection of AI and cybersecurity,...
Forescout Technologies announced Tuesday the appointment of Robert J. Skinner, USAF, retired, and cybersecurity and risk advisors, Michael Cunningham and Chase...
Weil is advising The Home Depot in its definitive agreement for its specialty trade distribution subsidiary, SRS Distribution Inc., to acquire GMS Inc.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of The Home Depot is http://www.careers.homedepot.com.
According to Rankiteo, The Home Depot’s AI-generated cybersecurity score is 801, reflecting their Good security posture.
According to Rankiteo, The Home Depot currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, The Home Depot is not certified under SOC 2 Type 1.
According to Rankiteo, The Home Depot does not hold a SOC 2 Type 2 certification.
According to Rankiteo, The Home Depot is not listed as GDPR compliant.
According to Rankiteo, The Home Depot does not currently maintain PCI DSS compliance.
According to Rankiteo, The Home Depot is not compliant with HIPAA regulations.
According to Rankiteo,The Home Depot is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
The Home Depot operates primarily in the Retail industry.
The Home Depot employs approximately 125,004 people worldwide.
The Home Depot presently has no subsidiaries across any sectors.
The Home Depot’s official LinkedIn profile has approximately 1,033,148 followers.
The Home Depot is classified under the NAICS code 43, which corresponds to Retail Trade.
No, The Home Depot does not have a profile on Crunchbase.
Yes, The Home Depot maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/the-home-depot.
As of December 13, 2025, Rankiteo reports that The Home Depot has experienced 6 cybersecurity incidents.
The Home Depot has an estimated 15,513 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack and Breach.
Total Financial Loss: The total financial loss from these incidents is estimated to be $198 million.
Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with yes (salesforce), and third party assistance with external experts, third party assistance with authorities, and law enforcement notified with yes (salesforce), and containment measures with security advisory issued, containment measures with customer vigilance advisories, and communication strategy with public advisory, communication strategy with help portal support, and containment measures with credential removed from public view..
Title: Home Depot Data Breach
Description: In one of the most significant cybersecurity breaches impacting the retail sector, Home Depot faced a formidable cyber attack between April and September 2014. Using a third-party vendor's login credentials, attackers infiltrated Home Depot’s network, then deployed sophisticated malware designed to infect the retailer’s POS system, aiming to harvest customer payment information. This breach had a massive scope, affecting 52 million customers. It caused considerable financial and reputational damage to the company. Home Depot subsequently agreed to pay $17.5 million to settle claims across the country, linked to this incident. However, this sum was only a part of the overall financial impact on Home Depot, which incurred pretax expenses of $198 million related to the breach, its aftermath, and subsequent litigation by customers, payment card issuers, and financial institutions before reaching the settlement. This event underscores the critical importance of stringent cybersecurity measures and the potential consequences of vulnerabilities within third-party vendor systems.
Date Detected: 2014-09
Type: Data Breach
Attack Vector: Third-party vendor's login credentials
Vulnerability Exploited: Weak vendor credentials
Motivation: Financial gain
Title: Home Depot Data Breach
Description: In 2014, Home Depot experienced a major security breach that compromised over 50 million credit cards. Cybercriminals exploited a third-party vendor’s credentials to access the network and install malware on point-of-sale systems. As customers swiped their credit cards at physical stores, their data was clandestinely captured by the attackers, posing serious privacy and financial risks.
Type: Data Breach
Attack Vector: Third-party vendor credentials exploitation
Vulnerability Exploited: Credentials exploitation
Motivation: Financial gain
Title: Data Breach at The Home Depot, Inc.
Description: Unauthorized access by three HR associates to the personal information of current and former associates, potentially including names, contact information, social security numbers, and financial account numbers.
Date Detected: 2014-02-10
Date Publicly Disclosed: 2014-02-10
Type: Data Breach
Attack Vector: Unauthorized Access
Vulnerability Exploited: Internal Access Controls
Threat Actor: Internal Employees
Title: Home Depot Data Breach
Description: The California Office of the Attorney General reported a data breach involving The Home Depot, Inc. on September 9, 2014. The breach potentially impacted customers using payment cards at Home Depot stores in the U.S. and Canada from April 2014 onward, involving payment card information including names, credit card numbers, and expiration dates. There is no evidence that debit PIN numbers were compromised.
Date Detected: 2014-09-09
Date Publicly Disclosed: 2014-09-09
Type: Data Breach
Title: Scattered Lapsus$ Hunters Data Leak Extortion Campaign Targeting Salesforce Customers
Description: Scattered Lapsus$ Hunters, a hacker collective combining members of Scattered Spider, Lapsus$, and ShinyHunters, launched a data leak site to extort 39+ organizations whose Salesforce databases were compromised via social engineering. The group demands ransom payments by October 10, 2025, threatening to release stolen customer/employee data (including PII like SSNs, passport numbers, and purchase histories) if unpaid. Salesforce denies platform compromise but acknowledges extortion attempts tied to 'past or unsubstantiated incidents.'
Date Publicly Disclosed: 2025-09-27
Type: Data Breach
Attack Vector: Social EngineeringCompromised Salesforce InstancesOAuth Credential Theft (Salesloft/Drift)
Vulnerability Exploited: Human Error (Social Engineering)Potential Salesforce Misconfigurations
Threat Actor: Scattered Lapsus$ HuntersCrimson Collective (Red Hat breach)
Motivation: Financial Gain (Extortion)Reputation DamageLegal Pressure on Salesforce
Title: Home Depot Credential Leak
Description: A leaked credential belonging to Home Depot was publicly exposed and later removed after TechCrunch contacted the company. The researcher, Zimmerman, disclosed similar exposures to other companies but received no response from Home Depot.
Type: Data Exposure
Attack Vector: Publicly Exposed Credential
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Third-party vendor's login credentials, Third-party vendor credentials and Social Engineering (Salesforce)OAuth Credential Theft (Salesloft/Drift).

Financial Loss: 198 million USD
Data Compromised: Payment information
Systems Affected: POS systems
Brand Reputation Impact: Significant
Legal Liabilities: 17.5 million USD settlement
Payment Information Risk: High

Data Compromised: Credit card information
Systems Affected: Point-of-sale systems
Payment Information Risk: High

Data Compromised: Names, Contact information, Social security numbers, Financial account numbers

Data Compromised: Names, Credit card numbers, Expiration dates
Payment Information Risk: True

Data Compromised: Personal/contact information (customers/employees/partners), Account ids, Dates of birth, Passport numbers, Social security numbers, Purchase histories, Live chat transcripts, Government employee records (e.g., home depot)
Systems Affected: Salesforce InstancesOAuth Credentials (Salesloft/Drift)
Operational Impact: Potential Phishing/Social Engineering RisksLegal LiabilitiesReputational Harm
Brand Reputation Impact: High (Public Data Leak Site)Threat of Litigation Against Salesforce
Legal Liabilities: Civil/Commercial Litigation Against SalesforcePotential GDPR/CCPA Violations
Identity Theft Risk: High

Data Compromised: Credential
Average Financial Loss: The average financial loss per incident is $33.00 million.
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Payment information, Credit card information, Personal Information, Financial Information, , Payment Card Information, , Personal Information, Contact Information, Account Ids, Dates Of Birth, Passport Numbers, Social Security Numbers, Purchase Histories, Live Chat Transcripts, Government Employee Records, and Credential.

Entity Name: Home Depot
Entity Type: Retailer
Industry: Retail
Location: United States
Size: Large
Customers Affected: 52 million

Entity Name: Home Depot
Entity Type: Retail
Industry: Home Improvement
Location: United States
Size: Large
Customers Affected: Over 50 million

Entity Name: The Home Depot, Inc.
Entity Type: Retail
Industry: Home Improvement
Location: California

Entity Name: The Home Depot, Inc.
Entity Type: Retail
Industry: Home Improvement
Location: United StatesCanada

Entity Name: Toyota
Entity Type: Corporation
Industry: Automotive
Location: Global
Size: Large

Entity Name: FedEx
Entity Type: Corporation
Industry: Logistics
Location: Global
Size: Large

Entity Name: Disney/Hulu
Entity Type: Corporation
Industry: Entertainment
Location: Global
Size: Large

Entity Name: Republic Services
Entity Type: Corporation
Industry: Waste Management
Location: USA
Size: Large

Entity Name: UPS
Entity Type: Corporation
Industry: Logistics
Location: Global
Size: Large

Entity Name: AeroMexico
Entity Type: Corporation
Industry: Aviation
Location: Mexico
Size: Large

Entity Name: Home Depot
Entity Type: Corporation
Industry: Retail
Location: USA
Size: Large

Entity Name: Marriott
Entity Type: Corporation
Industry: Hospitality
Location: Global
Size: Large

Entity Name: Vietnam Airlines
Entity Type: Corporation
Industry: Aviation
Location: Vietnam
Size: Large

Entity Name: Walgreens
Entity Type: Corporation
Industry: Pharmacy/Retail
Location: USA
Size: Large

Entity Name: Stellantis
Entity Type: Corporation
Industry: Automotive
Location: Global
Size: Large

Entity Name: McDonald’s
Entity Type: Corporation
Industry: Food Service
Location: Global
Size: Large

Entity Name: KFC
Entity Type: Corporation
Industry: Food Service
Location: Global
Size: Large

Entity Name: ASICS
Entity Type: Corporation
Industry: Apparel
Location: Global
Size: Large

Entity Name: GAP
Entity Type: Corporation
Industry: Apparel
Location: Global
Size: Large

Entity Name: Fujifilm
Entity Type: Corporation
Industry: Technology/Imaging
Location: Global
Size: Large

Entity Name: Instructure.com – Canvas
Entity Type: Corporation
Industry: Education Technology
Location: USA
Size: Medium

Entity Name: Albertsons
Entity Type: Corporation
Industry: Retail/Grocery
Location: USA
Size: Large

Entity Name: Engie Resources
Entity Type: Corporation
Industry: Energy
Location: Global
Size: Large

Entity Name: Kering (Gucci, Balenciaga, Brioni, Alexander McQueen)
Entity Type: Corporation
Industry: Luxury Apparel
Location: Global
Size: Large

Entity Name: HBO Max
Entity Type: Corporation
Industry: Entertainment
Location: USA
Size: Large

Entity Name: Instacart
Entity Type: Corporation
Industry: Grocery Delivery
Location: USA
Size: Large

Entity Name: Petco
Entity Type: Corporation
Industry: Pet Retail
Location: USA
Size: Large

Entity Name: Puma
Entity Type: Corporation
Industry: Apparel
Location: Global
Size: Large

Entity Name: Cartier
Entity Type: Corporation
Industry: Luxury Goods
Location: Global
Size: Large

Entity Name: Adidas
Entity Type: Corporation
Industry: Apparel
Location: Global
Size: Large

Entity Name: Qantas Airways
Entity Type: Corporation
Industry: Aviation
Location: Australia
Size: Large

Entity Name: CarMax
Entity Type: Corporation
Industry: Automotive Retail
Location: USA
Size: Large

Entity Name: Saks Fifth Avenue
Entity Type: Corporation
Industry: Luxury Retail
Location: USA
Size: Large

Entity Name: 1-800Accountant
Entity Type: Corporation
Industry: Financial Services
Location: USA
Size: Small/Medium

Entity Name: Air France & KLM
Entity Type: Corporation
Industry: Aviation
Location: Europe
Size: Large

Entity Name: Google AdSense
Entity Type: Corporation
Industry: Technology/Advertising
Location: Global
Size: Large

Entity Name: Cisco
Entity Type: Corporation
Industry: Technology
Location: Global
Size: Large

Entity Name: Pandora
Entity Type: Corporation
Industry: Jewelry
Location: Global
Size: Large

Entity Name: TransUnion
Entity Type: Corporation
Industry: Credit Reporting
Location: Global
Size: Large

Entity Name: Chanel
Entity Type: Corporation
Industry: Luxury Apparel
Location: Global
Size: Large

Entity Name: IKEA
Entity Type: Corporation
Industry: Retail/Furniture
Location: Global
Size: Large

Entity Name: Credit Institute of Vietnam
Entity Type: Organization
Industry: Financial Services
Location: Vietnam

Entity Name: S&P Global
Entity Type: Corporation
Industry: Financial Data
Location: Global
Size: Large

Entity Name: Red Hat
Entity Type: Corporation
Industry: Technology
Location: Global
Size: Large

Entity Name: Salesforce
Entity Type: Corporation
Industry: Cloud Computing/CRM
Location: Global
Size: Large

Entity Name: Home Depot
Entity Type: Retail
Industry: Home Improvement

Incident Response Plan Activated: Yes (Salesforce)
Third Party Assistance: External Experts, Authorities.
Law Enforcement Notified: Yes (Salesforce)
Containment Measures: Security Advisory IssuedCustomer Vigilance Advisories
Communication Strategy: Public AdvisoryHelp Portal Support

Containment Measures: Credential removed from public view
Incident Response Plan: The company's incident response plan is described as Yes (Salesforce).
Third-Party Assistance: The company involves third-party assistance in incident response through External Experts, Authorities, .

Type of Data Compromised: Payment information
Number of Records Exposed: 52 million
Sensitivity of Data: High
Data Exfiltration: Yes

Type of Data Compromised: Credit card information
Number of Records Exposed: Over 50 million
Sensitivity of Data: High
Data Exfiltration: Yes

Type of Data Compromised: Personal information, Financial information
Sensitivity of Data: High

Type of Data Compromised: Payment card information
Sensitivity of Data: High

Type of Data Compromised: Personal information, Contact information, Account ids, Dates of birth, Passport numbers, Social security numbers, Purchase histories, Live chat transcripts, Government employee records
Sensitivity of Data: High (PII, Financial, Government)
Data Exfiltration: Yes
Personally Identifiable Information: Yes

Type of Data Compromised: Credential
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by security advisory issued, customer vigilance advisories, and credential removed from public view.

Ransom Demanded: Negotiable (Deadline: 2025-10-10)
Data Exfiltration: Yes

Regulations Violated: Potential GDPR, CCPA, Sector-Specific Data Protection Laws,
Legal Actions: Threatened Civil/Commercial Litigation Against Salesforce,
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Threatened Civil/Commercial Litigation Against Salesforce, .

Lessons Learned: The critical importance of stringent cybersecurity measures and the potential consequences of vulnerabilities within third-party vendor systems.

Recommendations: Enhance Social Engineering Training, Implement Multi-Factor Authentication (MFA) for Salesforce, Monitor Dark Web for Stolen Credentials, Review OAuth Integrations (e.g., Salesloft/Drift), Proactive Threat Hunting for Compromised AccountsEnhance Social Engineering Training, Implement Multi-Factor Authentication (MFA) for Salesforce, Monitor Dark Web for Stolen Credentials, Review OAuth Integrations (e.g., Salesloft/Drift), Proactive Threat Hunting for Compromised AccountsEnhance Social Engineering Training, Implement Multi-Factor Authentication (MFA) for Salesforce, Monitor Dark Web for Stolen Credentials, Review OAuth Integrations (e.g., Salesloft/Drift), Proactive Threat Hunting for Compromised AccountsEnhance Social Engineering Training, Implement Multi-Factor Authentication (MFA) for Salesforce, Monitor Dark Web for Stolen Credentials, Review OAuth Integrations (e.g., Salesloft/Drift), Proactive Threat Hunting for Compromised AccountsEnhance Social Engineering Training, Implement Multi-Factor Authentication (MFA) for Salesforce, Monitor Dark Web for Stolen Credentials, Review OAuth Integrations (e.g., Salesloft/Drift), Proactive Threat Hunting for Compromised Accounts
Key Lessons Learned: The key lessons learned from past incidents are The critical importance of stringent cybersecurity measures and the potential consequences of vulnerabilities within third-party vendor systems.

Source: California Office of the Attorney General
Date Accessed: 2014-02-10

Source: California Office of the Attorney General
Date Accessed: 2014-09-09

Source: DataBreaches.net (Dissent Doe)

Source: Salesforce Security Advisory
Date Accessed: 2025-09-27

Source: TechCrunch
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney GeneralDate Accessed: 2014-02-10, and Source: California Office of the Attorney GeneralDate Accessed: 2014-09-09, and Source: Help Net SecurityDate Accessed: 2025-09-27, and Source: DataBreaches.net (Dissent Doe), and Source: Salesforce Security AdvisoryDate Accessed: 2025-09-27, and Source: TechCrunch.

Investigation Status: Ongoing (Salesforce denies platform compromise; external experts involved)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public Advisory and Help Portal Support.

Stakeholder Advisories: Salesforce Help Portal Support, Vigilance Against Phishing.
Customer Advisories: Public Security Advisory Issued
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Salesforce Help Portal Support, Vigilance Against Phishing, Public Security Advisory Issued and .

Entry Point: Third-party vendor's login credentials

Entry Point: Third-party vendor credentials

Entry Point: Social Engineering (Salesforce), Oauth Credential Theft (Salesloft/Drift),
High Value Targets: Salesforce Customer Databases, Pii-Rich Records,
Data Sold on Dark Web: Salesforce Customer Databases, Pii-Rich Records,

Root Causes: Weak vendor credentials leading to malware deployment on POS systems

Root Causes: Social Engineering Vulnerabilities, Potential Salesforce Misconfigurations, Oauth Security Gaps,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as External Experts, Authorities, .
Last Ransom Demanded: The amount of the last ransom demanded was Negotiable (Deadline: 2025-10-10).
Last Attacking Group: The attacking group in the last incident were an Internal Employees and Scattered Lapsus$ HuntersCrimson Collective (Red Hat breach).
Most Recent Incident Detected: The most recent incident detected was on 2014-09.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-09-27.
Highest Financial Loss: The highest financial loss from an incident was 198 million USD.
Most Significant Data Compromised: The most significant data compromised in an incident were Payment information, Credit card information, Names, Contact Information, Social Security Numbers, Financial Account Numbers, , names, credit card numbers, expiration dates, , Personal/Contact Information (Customers/Employees/Partners), Account IDs, Dates of Birth, Passport Numbers, Social Security Numbers, Purchase Histories, Live Chat Transcripts, Government Employee Records (e.g., Home Depot), and Credential.
Most Significant System Affected: The most significant system affected in an incident was Salesforce InstancesOAuth Credentials (Salesloft/Drift).
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was external experts, authorities, .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Security Advisory IssuedCustomer Vigilance Advisories and Credential removed from public view.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Contact Information, Passport Numbers, Government Employee Records (e.g., Home Depot), Personal/Contact Information (Customers/Employees/Partners), names, Names, Social Security Numbers, expiration dates, Credential, Live Chat Transcripts, credit card numbers, Purchase Histories, Dates of Birth, Financial Account Numbers, Account IDs, Credit card information and Payment information.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 102.0M.
Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was Negotiable (Deadline: 2025-10-10).
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Threatened Civil/Commercial Litigation Against Salesforce, .
Most Significant Lesson Learned: The most significant lesson learned from past incidents was The critical importance of stringent cybersecurity measures and the potential consequences of vulnerabilities within third-party vendor systems.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Proactive Threat Hunting for Compromised Accounts, Review OAuth Integrations (e.g., Salesloft/Drift), Monitor Dark Web for Stolen Credentials, Implement Multi-Factor Authentication (MFA) for Salesforce and Enhance Social Engineering Training.
Most Recent Source: The most recent source of information about an incident are TechCrunch, Help Net Security, California Office of the Attorney General, DataBreaches.net (Dissent Doe) and Salesforce Security Advisory.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (Salesforce denies platform compromise; external experts involved).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Salesforce Help Portal Support, Vigilance Against Phishing, .
Most Recent Customer Advisory: The most recent customer advisory issued was an Public Security Advisory Issued.
Most Recent Entry Point: The most recent entry point used by an initial access broker were an Third-party vendor credentials and Third-party vendor's login credentials.
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Weak vendor credentials leading to malware deployment on POS systems, Social Engineering VulnerabilitiesPotential Salesforce MisconfigurationsOAuth Security Gaps.
.png)
PCSX2 is a free and open-source PlayStation 2 (PS2) emulator. In versions 2.5.377 and below, an unchecked offset and size used in a memcpy operation inside PCSX2's CDVD SCMD 0x91 and SCMD 0x8F handlers allow a specially crafted disc image or ELF to cause an out-of-bounds read from emulator memory. Because the offset and size is controlled through MG header fields, a specially crafted ELF can read data beyond the bounds of mg_buffer and have it reflected back into emulated memory. This issue is fixed in version 2.5.378.
Aircompressor is a library with ports of the Snappy, LZO, LZ4, and Zstandard compression algorithms to Java. In versions 3.3 and below, incorrect handling of malformed data in Java-based decompressor implementations for Snappy and LZ4 allow remote attackers to read previous buffer contents via crafted compressed input. With certain crafted compressed inputs, elements from the output buffer can end up in the uncompressed output, potentially leaking sensitive data. This is relevant for applications that reuse the same output buffer to uncompress multiple inputs. This can be the case of a web server that allocates a fix-sized buffer for performance purposes. There is similar vulnerability in GHSA-cmp6-m4wj-q63q. This issue is fixed in version 3.4.
A vulnerability was found in itsourcecode COVID Tracking System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/?page=zone. The manipulation of the argument ID results in sql injection. The attack may be launched remotely. The exploit has been made public and could be used.
A vulnerability has been found in itsourcecode COVID Tracking System 1.0. Affected is an unknown function of the file /admin/login.php of the component Admin Login. The manipulation of the argument Username leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
A flaw has been found in campcodes Online Student Enrollment System 1.0. This impacts an unknown function of the file /admin/register.php. Executing manipulation of the argument photo can lead to unrestricted upload. The attack can be launched remotely. The exploit has been published and may be used.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.