Company Details
acosta
12,991
113,096
43
acosta.com
0
ACO_7586155
In-progress

Acosta Company CyberSecurity Posture
acosta.comAcosta brings simplicity to retail sales. We act as a catalyst to boldly connect brands, retailers and consumers, fueling growth and building long-term value throughout North America and Europe. We are deeply embedded in every corner of the retail industry, strengthening the local, regional and national relationships between brands and retailers. Our team of experts uses deep industry insight, cutting-edge analytics and integrated partnerships to help our clients move ahead with confidence.
Company Details
acosta
12,991
113,096
43
acosta.com
0
ACO_7586155
In-progress
Between 750 and 799

Acosta Global Score (TPRM)XXXX

Description: The Maine Office of the Attorney General reported a data breach involving Crossmark, Inc. on April 15, 2024. The breach occurred on March 15, 2024, due to an inadvertent disclosure of personal information, specifically a spreadsheet containing names and Social Security numbers, affecting a total of 1,295 individuals.


No incidents recorded for Acosta in 2025.
No incidents recorded for Acosta in 2025.
No incidents recorded for Acosta in 2025.
Acosta cyber incidents detection timeline including parent company and subsidiaries

Acosta brings simplicity to retail sales. We act as a catalyst to boldly connect brands, retailers and consumers, fueling growth and building long-term value throughout North America and Europe. We are deeply embedded in every corner of the retail industry, strengthening the local, regional and national relationships between brands and retailers. Our team of experts uses deep industry insight, cutting-edge analytics and integrated partnerships to help our clients move ahead with confidence.

Victoria’s Secret & Co. (NYSE: VSCO) is a specialty retailer of modern, fashion-inspired collections including signature bras, panties, lingerie, casual sleepwear, athleisure and swim, as well as award-winning prestige fragrances and body care. VS&Co is comprised of market leading brands, Victoria’s

Alfamart was initiated in 1989 by Djoko Susanto and started its business in trading and distribution. In 1999, the company expanded to minimarket sector and now has become one of the largest retail chains in Indonesia. Having over 20.000 stores, 36 office branch, and more than 165.000 employees, Alf

There are over 128,000 of us across Australia. We’re in the biggest cities and the tiniest towns. We’re meal creators and digital developers. Number crunchers and fresh food deliverers. Yes, we all have many skills and wear many hats. But we’re all the same team, because we’re all Fresh Food People.

At Costa Coffee, we’ve been crafting with heart and changing the coffee game since 1971. Now part of The Coca-Cola Company, we proudly operate in over 50 countries, and we’re still growing! And we’re much more than our beloved stores. Consumers all over the world can now enjoy Costa Coffee in our Re

Fundada em Junho de 2015, a Rumah é uma loja online especializada em artigos de decoração e itens para a casa, entregando seus produtos para o Brasil inteiro. Com um portfólio grande e variado, a Rumah proporciona diversas opções para seus clientes em várias categorias. Das influências clássicas, m

Reliance Retail is the retail initiative of RIL and an epicentre of our consumer-facing businesses. It has been ranked as the fastest-growing retailer in the world. It is ranked 53rd in the list of Top Global Retailers and is the only Indian Retailer to feature in the Top 100. It is the largest & th

About UNIQLO LifeWear Apparel that comes from the Japanese values of simplicity, quality, and longevity. Designed to be of the time and for the time, LifeWear is made with such modern elegance that it becomes the building blocks of each individual’s style. A perfect shirt that is always being made m

Sears is a leading integrated retailer and provider focused on seamlessly connecting the digital and physical shopping experiences to serve our members - wherever, whenever and however they want to shop. We are part of the Transformco family of brands which operates through its subsidiaries, inclu

The FlexKom franchise formula puts an end to business competition and gives birth to business collaboration on a global scale. Flexkom-at-home-franchise offers you the most innovative worldwide loyalty and credit card system in the world. The company is using a unique E.N.D.F. system, which is ba
.png)
The U.S. Environmental Protection Agency (EPA) announced this week the release of new and updated planning tools designed to significantly...
Credo AI, the global leader in enterprise AI governance, today announced that it has been recognized as a Gartner Cool Vendor in AI...
Port San Antonio is a trade and education hub, providing 83766 jobs in cybersecurity, aircraft manufacturing and engineering.
Conifers.ai, the agentic AI SOC platform transforming modern Security Operations Centers (SOCs), announced today that it has been named as a...
A cyberattack Tuesday disabled the systems of the University of St. Thomas in Houston, Texas. The private Catholic institution shared...
Middlebury has announced Parker Acosta as the assistant alpine skiing coach. Acosta joins the Panthers after serving in a similar role at...
The power of AI is growing, and it's starting right here in the 305. Miami Dade College students showed off their skills at the Wolfson...
Bárbara Hidalgo's (played by Juana Acosta) life is forever altered when she exposes her brother Camilo's paedophilic actions, sending him to prison.
During his years on CNN, reporter Jim Acosta wasn't shy about asking Democrats tough questions. But it is the tough questions Acosta asked...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Acosta is https://www.acosta.com.
According to Rankiteo, Acosta’s AI-generated cybersecurity score is 791, reflecting their Fair security posture.
According to Rankiteo, Acosta currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Acosta is not certified under SOC 2 Type 1.
According to Rankiteo, Acosta does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Acosta is not listed as GDPR compliant.
According to Rankiteo, Acosta does not currently maintain PCI DSS compliance.
According to Rankiteo, Acosta is not compliant with HIPAA regulations.
According to Rankiteo,Acosta is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Acosta operates primarily in the Retail industry.
Acosta employs approximately 12,991 people worldwide.
Acosta presently has no subsidiaries across any sectors.
Acosta’s official LinkedIn profile has approximately 113,096 followers.
Acosta is classified under the NAICS code 43, which corresponds to Retail Trade.
No, Acosta does not have a profile on Crunchbase.
Yes, Acosta maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/acosta.
As of December 11, 2025, Rankiteo reports that Acosta has experienced 1 cybersecurity incidents.
Acosta has an estimated 15,469 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Title: Data Breach at Crossmark, Inc.
Description: The Maine Office of the Attorney General reported a data breach involving Crossmark, Inc. on April 15, 2024. The breach occurred on March 15, 2024, due to an inadvertent disclosure of personal information, specifically a spreadsheet containing names and Social Security numbers, affecting a total of 1,295 individuals.
Date Detected: 2024-03-15
Date Publicly Disclosed: 2024-04-15
Type: Data Breach
Attack Vector: Inadvertent Disclosure
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Names, Social security numbers
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Social Security Numbers and .

Entity Name: Crossmark, Inc.
Entity Type: Company
Customers Affected: 1295

Type of Data Compromised: Names, Social security numbers
Number of Records Exposed: 1295
Sensitivity of Data: High
File Types Exposed: Spreadsheet

Source: Maine Office of the Attorney General
Date Accessed: 2024-04-15
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Maine Office of the Attorney GeneralDate Accessed: 2024-04-15.
Most Recent Incident Detected: The most recent incident detected was on 2024-03-15.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2024-04-15.
Most Significant Data Compromised: The most significant data compromised in an incident were Names, Social Security numbers and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Social Security numbers and Names.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 134.0.
Most Recent Source: The most recent source of information about an incident is Maine Office of the Attorney General.
.png)
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions prior to 16.0.96 and 17.0.1 through 17.0.9 have a weak default password. By default, this is a 6 digit numeric value which can be brute forced. (This is the app_password parameter). Depending on local configuration, this password could be the extension, voicemail, user manager, DPMA or EPM phone admin password. This issue is fixed in versions 16.0.96 and 17.0.10.
Neuron is a PHP framework for creating and orchestrating AI Agents. In versions 2.8.11 and below, the MySQLWriteTool executes arbitrary SQL provided by the caller using PDO::prepare() + execute() without semantic restrictions. This is consistent with the name (“write tool”), but in an LLM/agent context it becomes a high-risk capability: prompt injection or indirect prompt manipulation can cause execution of destructive queries such as DROP TABLE, TRUNCATE, DELETE, ALTER, or privilege-related statements (subject to DB permissions). Deployments that expose an agent with MySQLWriteTool enabled to untrusted input and/or run the tool with a DB user that has broad privileges are impacted. This issue is fixed in version 2.8.12.
Neuron is a PHP framework for creating and orchestrating AI Agents. Versions 2.8.11 and below use MySQLSelectTool, which is vulnerable to Read-Only Bypass. MySQLSelectTool is intended to be a read-only SQL tool (e.g., for LLM agent querying, however, validation based on the first keyword (e.g., SELECT) and a forbidden-keyword list does not block file-writing constructs such as INTO OUTFILE / INTO DUMPFILE. As a result, an attacker who can influence the tool input (e.g., via prompt injection through a public agent endpoint) may write arbitrary files to the DB server if the MySQL/MariaDB account has the FILE privilege and server configuration permits writes to a useful location (e.g., a web-accessible directory). This issue is fixed in version 2.8.12.
Okta Java Management SDK facilitates interactions with the Okta management API. In versions 11.0.0 through 20.0.0, race conditions may arise from concurrent requests using the ApiClient class. This could cause a status code or response header from one request’s response to influence another request’s response. This issue is fixed in version 20.0.1.
The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. When using versions 4.11.0 through 4.11.2 and 4.12.0, simultaneous requests on the same client may result in improper lookups in the TokenRequestCache for the request results. This issue is fixed in versions 4.11.2 and 4.12.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.