Company Details
bunnings
15,633
150,768
43
bunnings.com.au
0
BUN_1222159
In-progress

Bunnings Company CyberSecurity Posture
bunnings.com.auWe are the leading retailer of home improvement and outdoor living products in Australia & New Zealand and a major supplier to project builders, commercial tradespeople and the housing industry. Our ambition is to provide our customers with the widest range of home improvement products in accordance with our lowest prices policy, backed with the best service. Our social media community standards can be found here: https://www.bunnings.com.au/policies/community-standards
Company Details
bunnings
15,633
150,768
43
bunnings.com.au
0
BUN_1222159
In-progress
Between 750 and 799

Bunnings Global Score (TPRM)XXXX



No incidents recorded for Bunnings in 2025.
No incidents recorded for Bunnings in 2025.
No incidents recorded for Bunnings in 2025.
Bunnings cyber incidents detection timeline including parent company and subsidiaries

We are the leading retailer of home improvement and outdoor living products in Australia & New Zealand and a major supplier to project builders, commercial tradespeople and the housing industry. Our ambition is to provide our customers with the widest range of home improvement products in accordance with our lowest prices policy, backed with the best service. Our social media community standards can be found here: https://www.bunnings.com.au/policies/community-standards


Coppel es una empresa mexicana con sede en la ciudad de Culiacán, que ha sido fundada en 1941. Es una cadena comercial de tiendas departamentales de ventas a través del otorgamiento de créditos con pocos requisitos, y repartos gratuitos. En la actualidad cuenta con mas de 1000 puntos de venta, distr

More Retail Limited ventured into food and grocery retail in 2007 through the acquisition of Trinethra Super Retail and subsequently expanded its presence nationally under the brand "more” across Supermarkets & Hypermarkets. There are currently 494 Supermarkets and 20 Hypermarkets which aims to offe

Kohl’s is a leading omnichannel retailer with more than 1,100 stores in 49 states. Kohl's business is built on a solid foundation of more than 60 million customers, an unmatched brand portfolio, industry-leading loyalty and Kohl's Card programs, a convenient and accessible nationwide store footprin
Life is ridiculously awesome. That’s a bold statement. But hey, bold statements are our thing. So here’s another one: Kmart is ridiculously awesome, too. Know why? Because we work at it. We don’t do anything halfway. We go out and crush it. We’re about more than the products we sell. And more than

Boots is the UK’s leading health and beauty retailer with over 52,000 team members and around 1,800 stores,* ranging from local community pharmacies to large destination health and beauty stores. We serve our customers and patients’ wellbeing for life as the leading provider of healthcare on the hi

Somos un espacio físico y digital que por más de 135 años ha inspirado y enriquecido la vida de nuestros clientes. Trabajamos con las mejores marcas del mundo para brindar una experiencia especialista omnicanal en vestuario, belleza, calzado, tecnología y hogar. Buscamos ser un espacio de encuentro

NIKE, Inc. is a purpose-driven organization energized by a shared commitment to move the world forward through the power of sport. We champion diversity and amplify individual passions to bring inspiration and innovation to every athlete* in the world. Here, every teammate has a role to play. We

Lidl s’est implanté en France en 1989. Nous avons connu une expansion très rapide qui nous a permis de devenir un acteur incontournable de la grande distribution. Lidl France, c’est aujourd’hui 45 000 collaborateurs, plus de 1 570 magasins, 25 Directions Régionales et un siège social sur 2 sites :
Here at Wawa, the sky's the limit. Voted as “America’s Favorite Convenience Store,” Wawa operates a chain of convenience retail stores located in Pennsylvania, New Jersey, Delaware, Maryland, Indiana, Ohio, Kentucky, Virginia, North Carolina, Georgia, Alabama, Florida, and Washington D.C. We're fa
.png)
Details about the facial recognition system retailer Bunnings deployed for theft prevention are emerging from an Administrative Review...
DUBAI, United Arab Emirates and LÉON, Spain and HOLMDEL, N.J. , Oct. 15, 2025 (GLOBE NEWSWIRE) -- BIO-key® International, Inc. (Nasdaq:...
Medianet's 2025 CEO media analysis finds female leaders more visible during crises, with greenwashing and cybersecurity driving media...
A hacker claimed to have stolen droves of important credentials from popular cloud company Oracle, despite the company staunchly denying any data has been...
Here is a list of 100 cybersecurity leaders in the ANZ region who have helped secure organizations in the face of growing cyber threats.
By Dr. Zakaria Amin | 1 Dec, 2024 | Business | 0 |. Bunnings job ready tour: A transformative step toward employment...
The efforts of retail giant Bunnings to address violence and aggression in its stores by using facial recognition technology (FRT) were described as “well-...
Bunnings has released a shocking CCTV montage of attacks against its employees after Australia's privacy watchdog slammed its use of facial recognition...
The home improvement supplies retailer Bunnings violated shoppers' privacy by using facial recognition technology without their consent,...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Bunnings is http://www.bunnings.com.au.
According to Rankiteo, Bunnings’s AI-generated cybersecurity score is 794, reflecting their Fair security posture.
According to Rankiteo, Bunnings currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Bunnings is not certified under SOC 2 Type 1.
According to Rankiteo, Bunnings does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Bunnings is not listed as GDPR compliant.
According to Rankiteo, Bunnings does not currently maintain PCI DSS compliance.
According to Rankiteo, Bunnings is not compliant with HIPAA regulations.
According to Rankiteo,Bunnings is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Bunnings operates primarily in the Retail industry.
Bunnings employs approximately 15,633 people worldwide.
Bunnings presently has no subsidiaries across any sectors.
Bunnings’s official LinkedIn profile has approximately 150,768 followers.
Bunnings is classified under the NAICS code 43, which corresponds to Retail Trade.
No, Bunnings does not have a profile on Crunchbase.
Yes, Bunnings maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/bunnings.
As of December 11, 2025, Rankiteo reports that Bunnings has not experienced any cybersecurity incidents.
Bunnings has an estimated 15,471 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Bunnings has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions prior to 16.0.96 and 17.0.1 through 17.0.9 have a weak default password. By default, this is a 6 digit numeric value which can be brute forced. (This is the app_password parameter). Depending on local configuration, this password could be the extension, voicemail, user manager, DPMA or EPM phone admin password. This issue is fixed in versions 16.0.96 and 17.0.10.
Neuron is a PHP framework for creating and orchestrating AI Agents. In versions 2.8.11 and below, the MySQLWriteTool executes arbitrary SQL provided by the caller using PDO::prepare() + execute() without semantic restrictions. This is consistent with the name (“write tool”), but in an LLM/agent context it becomes a high-risk capability: prompt injection or indirect prompt manipulation can cause execution of destructive queries such as DROP TABLE, TRUNCATE, DELETE, ALTER, or privilege-related statements (subject to DB permissions). Deployments that expose an agent with MySQLWriteTool enabled to untrusted input and/or run the tool with a DB user that has broad privileges are impacted. This issue is fixed in version 2.8.12.
Neuron is a PHP framework for creating and orchestrating AI Agents. Versions 2.8.11 and below use MySQLSelectTool, which is vulnerable to Read-Only Bypass. MySQLSelectTool is intended to be a read-only SQL tool (e.g., for LLM agent querying, however, validation based on the first keyword (e.g., SELECT) and a forbidden-keyword list does not block file-writing constructs such as INTO OUTFILE / INTO DUMPFILE. As a result, an attacker who can influence the tool input (e.g., via prompt injection through a public agent endpoint) may write arbitrary files to the DB server if the MySQL/MariaDB account has the FILE privilege and server configuration permits writes to a useful location (e.g., a web-accessible directory). This issue is fixed in version 2.8.12.
Okta Java Management SDK facilitates interactions with the Okta management API. In versions 11.0.0 through 20.0.0, race conditions may arise from concurrent requests using the ApiClient class. This could cause a status code or response header from one request’s response to influence another request’s response. This issue is fixed in version 20.0.1.
The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. When using versions 4.11.0 through 4.11.2 and 4.12.0, simultaneous requests on the same client may result in improper lookups in the TokenRequestCache for the request results. This issue is fixed in versions 4.11.2 and 4.12.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.