Company Details
christian-dior-couture
13,418
1,904,503
4483
dior.com
0
CHR_4640751
In-progress

Christian Dior Couture Company CyberSecurity Posture
dior.comWelcome to Christian Dior Couture, House of Dreams, House of Talents. Christian Dior was the designer of dreams. In founding his House in 1947, marked by the revolution of the New Look, he metamorphosed his reveries into wonderful creations. His visionary spirit never ceased to make Clients all over the world feel more beautiful, an inspiration for his successors to this day. Christian Dior Couture, the House of Dreams, is recognized for its French heritage & vibrant culture sublimating its unique Savoir-faire and Creativity through empowering "metiers d’art”. Our Maison is a destination for sustainable growth & success where we shape the future of our Talents in a positive, authentic & generous environment. We bloom & deliver excellence with passion, determination, courage & optimism to offer meaningful & daring codes. Rich in exceptional heritage, with a community of more than 12000 talents, our House embodies Christian Dior’s “House of Talents” today more than ever.
Company Details
christian-dior-couture
13,418
1,904,503
4483
dior.com
0
CHR_4640751
In-progress
Between 700 and 749

CDC Global Score (TPRM)XXXX

Description: In September 2025, **Dior (Shanghai)** was publicly sanctioned in China for unlawfully transferring **personal information (PI) of Chinese users** to its headquarters in France without complying with regulatory requirements. The violations included: - **Failing to complete a cross-border data transfer security assessment**, enter a standard contract, or obtain PI protection certification. - **Not informing users adequately** about overseas processing methods or obtaining their **‘separate consent’** before sharing data. - **Lacking technical safeguards** (e.g., encryption, de-identification) for collected PI. The breach was exposed after users received warning messages, triggering an investigation by China’s public security authority. While the penalty details were undisclosed, the case marked China’s **first administrative penalty for illegal cross-border PI transfers**, signaling stricter enforcement of the **Personal Information Protection Law (PIPL)**. The incident underscored systemic compliance gaps in Dior’s data localization and security practices, risking reputational damage, regulatory scrutiny, and potential civil claims.
Description: Christian Dior Couture, a luxury fashion house owned by Louis Vuitton, experienced a significant cybersecurity incident that exposed sensitive personal information of its customers. The breach, discovered in May 2025, involved unauthorized access to customer databases containing personal data including names, addresses, dates of birth, and in some cases, Social Security numbers. The incident occurred on January 26, 2025, but was not detected until May 7, 2025. The affected database contained extensive personally identifiable information (PII) such as passport numbers, government-issued ID numbers, and Social Security numbers. No financial data was compromised, but the breach raised concerns about identity theft risks. Dior has implemented several remediation measures, including enhanced network security and complimentary credit monitoring services for affected customers.
Description: Dior’s Shanghai branch was penalized for violating China’s cybersecurity and data protection laws by transferring customer data to its French headquarters without complying with mandatory legal requirements. The breach involved the unauthorized cross-border transfer of personal information, lacking the necessary **security screening**, **customer disclosure**, and **encryption** as mandated by Chinese regulations. The incident highlights systemic failures in data governance, exposing customers to potential privacy risks while undermining compliance with China’s strict data localization and protection frameworks. The case underscores the heightened scrutiny under China’s evolving cybersecurity policies, particularly ahead of the enforcement of the **National Cybersecurity Incident Reporting Management Measures** (effective November 1, 2024). While the article does not specify the volume of data or direct harm (e.g., financial fraud or identity theft), the unauthorized transfer alone constitutes a **serious regulatory violation**, aligning with China’s classification of incidents threatening **social stability** or **national data security interests**. The fine serves as a warning to multinational corporations operating in China, emphasizing the legal and reputational consequences of non-compliance with data sovereignty laws.
Description: French luxury fashion brand Dior suffered a cyberattack on **May 7**, resulting in the exposure of customer data from its **Chinese and South Korean operations**. While account passwords and payment card details remained unaffected, the breach compromised **personal information** of customers, including: - **China**: Full names, gender, phone numbers, email addresses, postal addresses, and purchase histories. - **South Korea**: Contact details, purchase information, and shared preferences (e.g., product interests). The incident has triggered **phishing risks** for affected individuals, with Korean legislators criticizing Dior for **delayed reporting** to authorities. The attack’s scope is still under investigation, but the leaked data—though not financial—poses **reputational and privacy risks**, particularly given the high-profile nature of the brand and its customer base. Authorities and impacted users have been alerted, though the long-term consequences (e.g., fraud, regulatory penalties) remain unclear.


Christian Dior Couture has 275.0% more incidents than the average of same-industry companies with at least one recorded incident.
Christian Dior Couture has 289.61% more incidents than the average of all companies with at least one recorded incident.
Christian Dior Couture reported 3 incidents this year: 1 cyber attacks, 0 ransomware, 0 vulnerabilities, 2 data breaches, compared to industry peers with at least 1 incident.
CDC cyber incidents detection timeline including parent company and subsidiaries

Welcome to Christian Dior Couture, House of Dreams, House of Talents. Christian Dior was the designer of dreams. In founding his House in 1947, marked by the revolution of the New Look, he metamorphosed his reveries into wonderful creations. His visionary spirit never ceased to make Clients all over the world feel more beautiful, an inspiration for his successors to this day. Christian Dior Couture, the House of Dreams, is recognized for its French heritage & vibrant culture sublimating its unique Savoir-faire and Creativity through empowering "metiers d’art”. Our Maison is a destination for sustainable growth & success where we shape the future of our Talents in a positive, authentic & generous environment. We bloom & deliver excellence with passion, determination, courage & optimism to offer meaningful & daring codes. Rich in exceptional heritage, with a community of more than 12000 talents, our House embodies Christian Dior’s “House of Talents” today more than ever.


In 1837 Charles Lewis Tiffany founded his company in New York City where his store was soon acclaimed as the palace of jewels for its exceptional gemstones. Since then TIFFANY & CO. has become synonymous with elegance, innovative design, fine craftsmanship and creative excellence. During the 20th ce
Chanel is a private company and world leader in creating, manufacturing and distributing luxury products, including Ready-to-Wear, Accessories, Fragrances, Makeup, Skincare, Jewellery and Watches. Founded by Gabrielle Chanel in 1910, the House remains dedicated to exceptional craftsmanship and offer

The Prada Group is a global leader in the luxury industry and a pioneer in its unconventional dialogue with contemporary society across diverse cultural spheres. Home to prestigious brands as Prada, Miu Miu, Church’s, Car Shoe, Marchesi 1824 and Luna Rossa, the Group remains committed to enhancing
LVMH is the world leader in luxury. A family group founded in 1987 and headed by Chairman and CEO Bernard Arnault, LVMH is now home to 75 iconic Maisons, which embody a distinctive art de vivre blending heritage and modernity. With reported sales of 86.2 billion euros in 2023 and 6000 stores around
Kering is a global, family-led luxury group, home to people whose passion and expertise nurture creative Houses across ready-to-wear and couture, leather goods, jewelry, eyewear and beauty: Gucci, Saint Laurent, Bottega Veneta, Balenciaga, McQueen, Brioni, Boucheron, Pomellato, Dodo, Qeelin, Ginori

Founded in Florence, Italy in 1921, Gucci is one of the world’s leading luxury brands. Following the House’s centenary, Gucci forges ahead continuing to redefine fashion and luxury while celebrating creativity, Italian craftsmanship, and innovation. Gucci is part of the global luxury group Kering,

A creator, artisan and seller of high-quality objects since 1837, Hermès is an independent, family-owned French house that employs more than 16,600 people worldwide. Driven by its permanent entrepreneurial spirit and consistently high standards, Hermès cultivates the freedom and autonomy of each ind
Pandora is the world’s largest jewellery brand. The company designs, manufactures and markets hand-finished jewellery made from high-quality materials at affordable prices Pandora jewellery is sold in more than 100 countries through more than 6,500 points of sale, including more than 2,500 concept s

Swatch Group is the world's number one manufacturer of finished watches. With its 16 watch brands, the Group is present in all price segments, and is also active in the manufacture and sale of jewelry, watch movements and components. Swatch Group unites, among other companies, the following watch b
.png)
Strauss Borrelli PLLC, a leading data breach law firm, is investigating Christian Dior Couture (“Dior”) regarding its recent data breach.
Luxury fashion house Christian Dior Couture has disclosed a data breach impacting U.S.-based customers, involving sensitive personal...
Hong Kong's privacy watchdog is investigating a data leak affecting about 419000 customers of Louis Vuitton, as the luxury giant suffers...
Christian Dior Couture SAS experienced a data breach affecting a database containing personal information of Dior clients.
Luxury fashion brand Louis Vuitton is grappling with the fallout from its third cyberattack in as many months, with recent breaches...
AI is evolving at a rapid pace, and the uptake of Generative AI (GenAI) is revolutionising the way humans interact and leverage this technology. GenAI is.
The British outpost of luxury brand giant LVMH has become the latest UK retailer to suffer a serious security breach, after it began...
Luxury fashion house Louis Vuitton is investigating a data breach that exposed customer information tied to its UK operations.
Hackers have stolen “some” customer data after successfully breaching Louis Vuitton UK. It is the third attack against the luxury retailer...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Christian Dior Couture is https://www.dior.com/carrieres/index.html.
According to Rankiteo, Christian Dior Couture’s AI-generated cybersecurity score is 736, reflecting their Moderate security posture.
According to Rankiteo, Christian Dior Couture currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Christian Dior Couture is not certified under SOC 2 Type 1.
According to Rankiteo, Christian Dior Couture does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Christian Dior Couture is not listed as GDPR compliant.
According to Rankiteo, Christian Dior Couture does not currently maintain PCI DSS compliance.
According to Rankiteo, Christian Dior Couture is not compliant with HIPAA regulations.
According to Rankiteo,Christian Dior Couture is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Christian Dior Couture operates primarily in the Retail Luxury Goods and Jewelry industry.
Christian Dior Couture employs approximately 13,418 people worldwide.
Christian Dior Couture presently has no subsidiaries across any sectors.
Christian Dior Couture’s official LinkedIn profile has approximately 1,904,503 followers.
Christian Dior Couture is classified under the NAICS code 4483, which corresponds to Jewelry, Luggage, and Leather Goods Stores.
No, Christian Dior Couture does not have a profile on Crunchbase.
Yes, Christian Dior Couture maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/christian-dior-couture.
As of December 11, 2025, Rankiteo reports that Christian Dior Couture has experienced 4 cybersecurity incidents.
Christian Dior Couture has an estimated 1,377 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack and Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with comprehensive investigation and containment measures, and remediation measures with enhanced network security measures, and communication strategy with customer notifications and dedicated breach response line, and incident response plan activated with mandatory under new rules (initial report within 30–60 minutes, postmortem within 30 days)., and law enforcement notified with required for 'major' or 'particularly major' incidents (reported to **national cyber info department** and **public security department**)., and communication strategy with multi-channel reporting (hotline **12387**, website, wechat, email)., and enhanced monitoring with expected to be adopted by organizations to meet real-time reporting requirements., and and communication strategy with official warning messages to users, and incident response plan activated with yes (ongoing investigation), and communication strategy with customers urged to be mindful of phishing attacks..
Title: Dior Customer Database Breach
Description: Christian Dior Couture, the luxury fashion house owned by Louis Vuitton, has begun notifying customers of a major cybersecurity incident that exposed sensitive personal information of clients.
Date Detected: 2025-05-07
Type: Data Breach
Attack Vector: Unauthorized Access
Threat Actor: Unspecified third party
Title: China Enforces New Cybersecurity Incident Reporting Rules with Strict Deadlines
Description: From November 1, 2024, the Cyberspace Administration of China (CAC) will enforce its **National Cybersecurity Incident Reporting Management Measures**, requiring Chinese network operators to report serious cyber incidents within **60 minutes** (or **30 minutes** for 'particularly major' events). The rules apply broadly to 'network operators'—any entity owning, managing, or providing network services—and mandate rapid disclosure of incidents threatening national security, social stability, or involving large-scale data breaches (e.g., >100 million personal records) or prolonged outages (e.g., government/news websites offline for >24 hours). Operators must submit initial reports with detailed incident specifics (systems affected, attack timeline, vulnerabilities, ransom demands, etc.) and a **30-day postmortem** analyzing root causes and lessons learned. Non-compliance risks severe penalties, including fines for late, false, or concealed reporting. The CAC has established multiple reporting channels (hotline, website, WeChat, email) to ensure compliance. This follows a recent fine against **Dior Shanghai** for unlawful cross-border data transfers without encryption or proper disclosure.
Date Publicly Disclosed: 2024-10-01
Type: Regulatory Policy Change
Motivation: Regulatory ComplianceNational SecurityData Protection
Title: Dior Shanghai Administrative Penalty for Unlawful Cross-Border Transfer of Personal Information
Description: On September 9, 2025, Dior (Shanghai) Co., Ltd. was publicly sanctioned in China for unlawfully transferring personal information (PI) overseas without completing required security assessments, obtaining separate user consent, or implementing necessary technical safeguards like encryption. This marks the first administrative penalty in China for unlawful cross-border PI transfers, signaling a shift from rulemaking to active enforcement under the Personal Information Protection Law (PIPL). The case underscores the need for multinational companies (MNCs) to reassess and localize their data compliance frameworks in China to meet increasingly stringent regulatory requirements. The investigation was triggered by a data breach reported in May 2025, where users in China received official warning messages from Dior. The penalty details were not disclosed, but the case highlights critical compliance gaps in cross-border data transfer mechanisms, user consent practices, and technical safeguards.
Date Detected: 2025-05
Date Publicly Disclosed: 2025-09-09
Type: Data Breach
Vulnerability Exploited: Lack of Cross-Border Data Transfer ComplianceInadequate User Consent MechanismsAbsence of Technical Safeguards (Encryption/De-identification)
Title: Dior Cyberattack Exposes Customer Data in China and South Korea
Description: French multinational luxury fashion brand Dior was impacted by a cyberattack on May 7, resulting in the exposure of customer data from its Chinese and South Korean operations. The compromised data includes full names, gender, phone numbers, email addresses, postal addresses, purchase histories, contact details, and shared preferences. Dior has warned affected customers about potential phishing attacks. Korean legislators have criticized Dior for failing to promptly inform authorities.
Date Detected: 2024-05-07
Type: Data Breach
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Customer database systems.

Data Compromised: Names, Addresses, Dates of birth, Passport numbers, Government-issued id numbers, Social security numbers
Systems Affected: Customer database systems
Identity Theft Risk: High
Payment Information Risk: None

Operational Impact: Organizations must invest in **real-time monitoring** and **compliance teams** to meet strict reporting deadlines (30–60 minutes vs. EU's 72-hour rule).
Brand Reputation Impact: Potential reputational damage for non-compliant entities (e.g., Dior Shanghai fined for data transfer violations).
Legal Liabilities: Severe penalties for late, false, or concealed reporting, including fines and legal action against responsible personnel.

Data Compromised: Personal information (pi) of users in china
Operational Impact: Regulatory InvestigationAdministrative Penalty Under PIPLReputation Damage
Customer Complaints: ['Users Received Official Warning Messages']
Brand Reputation Impact: Widespread International AttentionErosion of Consumer TrustPotential Customer Attrition
Legal Liabilities: Administrative Penalty Under PIPL (Details Undisclosed)Potential Civil Claims
Identity Theft Risk: ['Exposure to Harassment Calls', 'Spam Emails', 'Fraud']

Data Compromised: Full names, Gender, Phone numbers, Email addresses, Postal addresses, Purchase histories, Contact details, Shared preferences
Customer Complaints: Criticism from Korean legislators for delayed notification
Brand Reputation Impact: Potential damage due to data exposure and delayed notification
Identity Theft Risk: High (due to exposed PII)
Payment Information Risk: None (payment card information confirmed not affected)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Pii, Passport Numbers, Government-Issued Id Numbers, Social Security Numbers, , Personal Information (Pi), , Personally Identifiable Information (Pii), Purchase Histories, Contact Details, Shared Preferences and .

Entity Name: Christian Dior Couture
Entity Type: Company
Industry: Fashion

Entity Name: Cyberspace Administration of China (CAC)
Entity Type: Government Regulatory Body
Industry: Cybersecurity Governance
Location: China

Entity Name: Dior Shanghai
Entity Type: Subsidiary (Luxury Retail)
Industry: Fashion/Retail
Location: Shanghai, China

Entity Name: Chinese Network Operators (Broad Category)
Entity Type: ISPs, Cloud Providers, Government Agencies, Private Enterprises
Industry: Multiple (IT, Telecom, Government, etc.)
Location: China

Entity Name: Dior (Shanghai) Co., Ltd.
Entity Type: Subsidiary
Industry: Luxury Retail
Location: Shanghai, China
Customers Affected: Users in China (Exact Number Undisclosed)

Entity Name: Dior (Chinese operations)
Entity Type: Subsidiary/Regional Office
Industry: Luxury Fashion
Location: China

Entity Name: Dior (South Korean operations)
Entity Type: Subsidiary/Regional Office
Industry: Luxury Fashion
Location: South Korea

Incident Response Plan Activated: True
Containment Measures: Comprehensive investigation and containment measures
Remediation Measures: Enhanced network security measures
Communication Strategy: Customer notifications and dedicated breach response line

Incident Response Plan Activated: Mandatory under new rules (initial report within 30–60 minutes, postmortem within 30 days).
Law Enforcement Notified: Required for 'major' or 'particularly major' incidents (reported to **national cyber info department** and **public security department**).
Communication Strategy: Multi-channel reporting (hotline **12387**, website, WeChat, email).
Enhanced Monitoring: Expected to be adopted by organizations to meet real-time reporting requirements.

Communication Strategy: Official Warning Messages to Users

Incident Response Plan Activated: Yes (ongoing investigation)
Communication Strategy: Customers urged to be mindful of phishing attacks
Incident Response Plan: The company's incident response plan is described as Mandatory under new rules (initial report within 30–60 minutes, postmortem within 30 days)., Yes (ongoing investigation).

Type of Data Compromised: Pii, Passport numbers, Government-issued id numbers, Social security numbers
Sensitivity of Data: High

Data Encryption: Dior Shanghai fined for **lack of encryption** in cross-border data transfers.
Personally Identifiable Information: Threshold for 'particularly major' incidents: **>100 million personal records** leaked.

Type of Data Compromised: Personal information (pi)
Sensitivity of Data: High (Potential for Harassment, Fraud, Identity Theft)
Data Exfiltration: Transferred to Dior Headquarters in France

Type of Data Compromised: Personally identifiable information (pii), Purchase histories, Contact details, Shared preferences
Sensitivity of Data: High (includes PII and purchase histories)
Data Exfiltration: Yes
Personally Identifiable Information: Yes (full names, gender, phone numbers, email addresses, postal addresses)
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Enhanced network security measures.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by comprehensive investigation and containment measures.

Data Exfiltration: True

Regulations Violated: National Cybersecurity Incident Reporting Management Measures (effective Nov 1, 2024), Cross-border data transfer laws (Dior Shanghai case),
Fines Imposed: Dior Shanghai fined for **unauthorized data transfer** without security screening or encryption.
Legal Actions: Penalties for non-compliant operators (late/false reporting) under CAC rules.
Regulatory Notifications: Mandatory reporting to **CAC**, **public security department**, and potentially other agencies.

Regulations Violated: Personal Information Protection Law (PIPL),
Fines Imposed: ['Administrative Penalty (Details Undisclosed)']
Legal Actions: Regulatory Investigation by China’s Public Security Authority,
Regulatory Notifications: First Administrative Penalty for Unlawful Cross-Border PI Transfer in China

Legal Actions: Criticism from Korean legislators for delayed notification to authorities
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Penalties for non-compliant operators (late/false reporting) under CAC rules., Regulatory Investigation by China’s Public Security Authority, , Criticism from Korean legislators for delayed notification to authorities.

Lessons Learned: Strict deadlines (**30–60 minutes**) require **automated detection** and **prepared response teams**., Cross-border data transfers must comply with **encryption** and **disclosure** requirements., Proactive **government coordination** is critical for 'particularly major' incidents.

Lessons Learned: China’s cross-border data regime has shifted from rulemaking to active enforcement, making compliance an urgent priority for MNCs., MNCs must reassess and localize their data compliance frameworks in China to align with PIPL requirements, which differ substantively from GDPR., Superficial adjustments to global privacy policies (e.g., GDPR-based) are insufficient; clause-by-clause localization is required., Separate user consent for cross-border PI transfers is a unique PIPL requirement and must be explicitly obtained., Luxury brands must elevate data security investments to protect high-value client PI and mitigate reputational/regulatory risks., Technical safeguards (e.g., encryption, de-identification) and PI Protection Impact Assessments (PIPIA) are mandatory for cross-border transfers., Thresholds for regulatory mechanisms (e.g., Security Assessment, SCC Filing) must be evaluated per entity, not at the group level.

Recommendations: Implement **real-time monitoring** to detect incidents promptly., Establish **clear escalation protocols** for 30/60-minute reporting., Conduct **regular drills** to test incident response plans., Ensure **encryption** and **legal reviews** for cross-border data flows., Leverage **CAC-provided channels** (hotline, WeChat, etc.) for compliance.Implement **real-time monitoring** to detect incidents promptly., Establish **clear escalation protocols** for 30/60-minute reporting., Conduct **regular drills** to test incident response plans., Ensure **encryption** and **legal reviews** for cross-border data flows., Leverage **CAC-provided channels** (hotline, WeChat, etc.) for compliance.Implement **real-time monitoring** to detect incidents promptly., Establish **clear escalation protocols** for 30/60-minute reporting., Conduct **regular drills** to test incident response plans., Ensure **encryption** and **legal reviews** for cross-border data flows., Leverage **CAC-provided channels** (hotline, WeChat, etc.) for compliance.Implement **real-time monitoring** to detect incidents promptly., Establish **clear escalation protocols** for 30/60-minute reporting., Conduct **regular drills** to test incident response plans., Ensure **encryption** and **legal reviews** for cross-border data flows., Leverage **CAC-provided channels** (hotline, WeChat, etc.) for compliance.Implement **real-time monitoring** to detect incidents promptly., Establish **clear escalation protocols** for 30/60-minute reporting., Conduct **regular drills** to test incident response plans., Ensure **encryption** and **legal reviews** for cross-border data flows., Leverage **CAC-provided channels** (hotline, WeChat, etc.) for compliance.

Recommendations: Conduct a comprehensive data mapping exercise to identify cross-border PI transfers and assess regulatory triggers (Security Assessment, SCC Filing, or PI Protection Certification)., Implement localized privacy policies that fully comply with PIPL, including detailed disclosures for overseas recipients and separate consent mechanisms., Adopt technical safeguards such as encryption, de-identification, and access controls for PI handling., Perform a PI Protection Impact Assessment (PIPIA) for all cross-border transfers and retain reports for at least three years., Establish a local office or appoint a representative in China if collecting PI directly from individuals in China (as required by PIPL)., Train employees on PIPL compliance and data security best practices, with a focus on luxury sector risks., Develop and test contingency plans for PI security incidents, including breach notification and regulatory reporting procedures., Monitor regulatory updates (e.g., CAC guidelines) and adjust compliance frameworks proactively to avoid penalties (up to RMB 50 million or 5% of annual turnover)., For luxury brands, prioritize security investments to protect high-net-worth client data and mitigate targeted cyber threats.Conduct a comprehensive data mapping exercise to identify cross-border PI transfers and assess regulatory triggers (Security Assessment, SCC Filing, or PI Protection Certification)., Implement localized privacy policies that fully comply with PIPL, including detailed disclosures for overseas recipients and separate consent mechanisms., Adopt technical safeguards such as encryption, de-identification, and access controls for PI handling., Perform a PI Protection Impact Assessment (PIPIA) for all cross-border transfers and retain reports for at least three years., Establish a local office or appoint a representative in China if collecting PI directly from individuals in China (as required by PIPL)., Train employees on PIPL compliance and data security best practices, with a focus on luxury sector risks., Develop and test contingency plans for PI security incidents, including breach notification and regulatory reporting procedures., Monitor regulatory updates (e.g., CAC guidelines) and adjust compliance frameworks proactively to avoid penalties (up to RMB 50 million or 5% of annual turnover)., For luxury brands, prioritize security investments to protect high-net-worth client data and mitigate targeted cyber threats.Conduct a comprehensive data mapping exercise to identify cross-border PI transfers and assess regulatory triggers (Security Assessment, SCC Filing, or PI Protection Certification)., Implement localized privacy policies that fully comply with PIPL, including detailed disclosures for overseas recipients and separate consent mechanisms., Adopt technical safeguards such as encryption, de-identification, and access controls for PI handling., Perform a PI Protection Impact Assessment (PIPIA) for all cross-border transfers and retain reports for at least three years., Establish a local office or appoint a representative in China if collecting PI directly from individuals in China (as required by PIPL)., Train employees on PIPL compliance and data security best practices, with a focus on luxury sector risks., Develop and test contingency plans for PI security incidents, including breach notification and regulatory reporting procedures., Monitor regulatory updates (e.g., CAC guidelines) and adjust compliance frameworks proactively to avoid penalties (up to RMB 50 million or 5% of annual turnover)., For luxury brands, prioritize security investments to protect high-net-worth client data and mitigate targeted cyber threats.Conduct a comprehensive data mapping exercise to identify cross-border PI transfers and assess regulatory triggers (Security Assessment, SCC Filing, or PI Protection Certification)., Implement localized privacy policies that fully comply with PIPL, including detailed disclosures for overseas recipients and separate consent mechanisms., Adopt technical safeguards such as encryption, de-identification, and access controls for PI handling., Perform a PI Protection Impact Assessment (PIPIA) for all cross-border transfers and retain reports for at least three years., Establish a local office or appoint a representative in China if collecting PI directly from individuals in China (as required by PIPL)., Train employees on PIPL compliance and data security best practices, with a focus on luxury sector risks., Develop and test contingency plans for PI security incidents, including breach notification and regulatory reporting procedures., Monitor regulatory updates (e.g., CAC guidelines) and adjust compliance frameworks proactively to avoid penalties (up to RMB 50 million or 5% of annual turnover)., For luxury brands, prioritize security investments to protect high-net-worth client data and mitigate targeted cyber threats.Conduct a comprehensive data mapping exercise to identify cross-border PI transfers and assess regulatory triggers (Security Assessment, SCC Filing, or PI Protection Certification)., Implement localized privacy policies that fully comply with PIPL, including detailed disclosures for overseas recipients and separate consent mechanisms., Adopt technical safeguards such as encryption, de-identification, and access controls for PI handling., Perform a PI Protection Impact Assessment (PIPIA) for all cross-border transfers and retain reports for at least three years., Establish a local office or appoint a representative in China if collecting PI directly from individuals in China (as required by PIPL)., Train employees on PIPL compliance and data security best practices, with a focus on luxury sector risks., Develop and test contingency plans for PI security incidents, including breach notification and regulatory reporting procedures., Monitor regulatory updates (e.g., CAC guidelines) and adjust compliance frameworks proactively to avoid penalties (up to RMB 50 million or 5% of annual turnover)., For luxury brands, prioritize security investments to protect high-net-worth client data and mitigate targeted cyber threats.Conduct a comprehensive data mapping exercise to identify cross-border PI transfers and assess regulatory triggers (Security Assessment, SCC Filing, or PI Protection Certification)., Implement localized privacy policies that fully comply with PIPL, including detailed disclosures for overseas recipients and separate consent mechanisms., Adopt technical safeguards such as encryption, de-identification, and access controls for PI handling., Perform a PI Protection Impact Assessment (PIPIA) for all cross-border transfers and retain reports for at least three years., Establish a local office or appoint a representative in China if collecting PI directly from individuals in China (as required by PIPL)., Train employees on PIPL compliance and data security best practices, with a focus on luxury sector risks., Develop and test contingency plans for PI security incidents, including breach notification and regulatory reporting procedures., Monitor regulatory updates (e.g., CAC guidelines) and adjust compliance frameworks proactively to avoid penalties (up to RMB 50 million or 5% of annual turnover)., For luxury brands, prioritize security investments to protect high-net-worth client data and mitigate targeted cyber threats.Conduct a comprehensive data mapping exercise to identify cross-border PI transfers and assess regulatory triggers (Security Assessment, SCC Filing, or PI Protection Certification)., Implement localized privacy policies that fully comply with PIPL, including detailed disclosures for overseas recipients and separate consent mechanisms., Adopt technical safeguards such as encryption, de-identification, and access controls for PI handling., Perform a PI Protection Impact Assessment (PIPIA) for all cross-border transfers and retain reports for at least three years., Establish a local office or appoint a representative in China if collecting PI directly from individuals in China (as required by PIPL)., Train employees on PIPL compliance and data security best practices, with a focus on luxury sector risks., Develop and test contingency plans for PI security incidents, including breach notification and regulatory reporting procedures., Monitor regulatory updates (e.g., CAC guidelines) and adjust compliance frameworks proactively to avoid penalties (up to RMB 50 million or 5% of annual turnover)., For luxury brands, prioritize security investments to protect high-net-worth client data and mitigate targeted cyber threats.Conduct a comprehensive data mapping exercise to identify cross-border PI transfers and assess regulatory triggers (Security Assessment, SCC Filing, or PI Protection Certification)., Implement localized privacy policies that fully comply with PIPL, including detailed disclosures for overseas recipients and separate consent mechanisms., Adopt technical safeguards such as encryption, de-identification, and access controls for PI handling., Perform a PI Protection Impact Assessment (PIPIA) for all cross-border transfers and retain reports for at least three years., Establish a local office or appoint a representative in China if collecting PI directly from individuals in China (as required by PIPL)., Train employees on PIPL compliance and data security best practices, with a focus on luxury sector risks., Develop and test contingency plans for PI security incidents, including breach notification and regulatory reporting procedures., Monitor regulatory updates (e.g., CAC guidelines) and adjust compliance frameworks proactively to avoid penalties (up to RMB 50 million or 5% of annual turnover)., For luxury brands, prioritize security investments to protect high-net-worth client data and mitigate targeted cyber threats.Conduct a comprehensive data mapping exercise to identify cross-border PI transfers and assess regulatory triggers (Security Assessment, SCC Filing, or PI Protection Certification)., Implement localized privacy policies that fully comply with PIPL, including detailed disclosures for overseas recipients and separate consent mechanisms., Adopt technical safeguards such as encryption, de-identification, and access controls for PI handling., Perform a PI Protection Impact Assessment (PIPIA) for all cross-border transfers and retain reports for at least three years., Establish a local office or appoint a representative in China if collecting PI directly from individuals in China (as required by PIPL)., Train employees on PIPL compliance and data security best practices, with a focus on luxury sector risks., Develop and test contingency plans for PI security incidents, including breach notification and regulatory reporting procedures., Monitor regulatory updates (e.g., CAC guidelines) and adjust compliance frameworks proactively to avoid penalties (up to RMB 50 million or 5% of annual turnover)., For luxury brands, prioritize security investments to protect high-net-worth client data and mitigate targeted cyber threats.
Key Lessons Learned: The key lessons learned from past incidents are Strict deadlines (**30–60 minutes**) require **automated detection** and **prepared response teams**.,Cross-border data transfers must comply with **encryption** and **disclosure** requirements.,Proactive **government coordination** is critical for 'particularly major' incidents.China’s cross-border data regime has shifted from rulemaking to active enforcement, making compliance an urgent priority for MNCs.,MNCs must reassess and localize their data compliance frameworks in China to align with PIPL requirements, which differ substantively from GDPR.,Superficial adjustments to global privacy policies (e.g., GDPR-based) are insufficient; clause-by-clause localization is required.,Separate user consent for cross-border PI transfers is a unique PIPL requirement and must be explicitly obtained.,Luxury brands must elevate data security investments to protect high-value client PI and mitigate reputational/regulatory risks.,Technical safeguards (e.g., encryption, de-identification) and PI Protection Impact Assessments (PIPIA) are mandatory for cross-border transfers.,Thresholds for regulatory mechanisms (e.g., Security Assessment, SCC Filing) must be evaluated per entity, not at the group level.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Implement **real-time monitoring** to detect incidents promptly., Ensure **encryption** and **legal reviews** for cross-border data flows., Conduct **regular drills** to test incident response plans., Establish **clear escalation protocols** for 30/60-minute reporting., Leverage **CAC-provided channels** (hotline, WeChat and etc.) for compliance..

Source: Dior Official Notification

Source: The Register
URL: https://www.theregister.com/2024/10/01/china_cybersecurity_reporting_rules/
Date Accessed: 2024-10-01

Source: Cyberspace Administration of China (CAC)
Date Accessed: 2024-10-01

Source: China’s Cyberspace Administration (CAC) - Personal Information Protection Law (PIPL)

Source: Guangzhou Internet Court Judgment (Accor Case, September 2023)

Source: Measures for Security Assessment of Outbound Data Transfers (Effective September 1, 2022)

Source: Measures on Standard Contracts for Cross-Border Transfers of PI (Effective June 1, 2023)

Source: Provisions on Promoting and Regulating Cross-Border Data Flows (Effective March 22, 2024)

Source: BleepingComputer
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Dior Official Notification, and Source: The RegisterUrl: https://www.theregister.com/2024/10/01/china_cybersecurity_reporting_rules/Date Accessed: 2024-10-01, and Source: Cyberspace Administration of China (CAC)Url: http://www.cac.gov.cn/Date Accessed: 2024-10-01, and Source: China’s Cyberspace Administration (CAC) - Personal Information Protection Law (PIPL), and Source: Guangzhou Internet Court Judgment (Accor Case, September 2023), and Source: Measures for Security Assessment of Outbound Data Transfers (Effective September 1, 2022), and Source: Measures on Standard Contracts for Cross-Border Transfers of PI (Effective June 1, 2023), and Source: Provisions on Promoting and Regulating Cross-Border Data Flows (Effective March 22, 2024), and Source: BleepingComputer.

Investigation Status: Completed

Investigation Status: Ongoing (regulatory framework rollout; Dior case resolved with fine).

Investigation Status: Completed (Administrative Penalty Imposed)

Investigation Status: Ongoing
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Customer notifications and dedicated breach response line, Multi-channel reporting (hotline **12387**, website, WeChat, email)., Official Warning Messages To Users and Customers urged to be mindful of phishing attacks.

Customer Advisories: Dedicated breach response line: 1-833-918-5938, engagement number B147873

Stakeholder Advisories: Network operators must prepare for **Nov 1 enforcement**; government agencies to monitor compliance.

Stakeholder Advisories: Mncs Operating In China Must Urgently Review Cross-Border Data Transfer Practices To Ensure Compliance With Pipl., Luxury Brands Should Treat This Case As A Warning To Strengthen Data Security And Localization Efforts., Legal And Compliance Teams Should Collaborate To Align Global Privacy Policies With Pipl’S Substantive Requirements..
Customer Advisories: Users in China received official warning messages from Dior regarding the data breach.Consumers are advised to monitor for potential harassment, spam, or fraud resulting from the breach.Affected individuals may have recourse for damages under PIPL (as demonstrated in the Accor case).

Stakeholder Advisories: Customers advised to be cautious of phishing attempts
Customer Advisories: Customers urged to be mindful of potential phishing attacks due to data exposure
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Dedicated breach response line: 1-833-918-5938, engagement number B147873, Network operators must prepare for **Nov 1 enforcement**; government agencies to monitor compliance., Mncs Operating In China Must Urgently Review Cross-Border Data Transfer Practices To Ensure Compliance With Pipl., Luxury Brands Should Treat This Case As A Warning To Strengthen Data Security And Localization Efforts., Legal And Compliance Teams Should Collaborate To Align Global Privacy Policies With Pipl’S Substantive Requirements., Users In China Received Official Warning Messages From Dior Regarding The Data Breach., Consumers Are Advised To Monitor For Potential Harassment, Spam, Or Fraud Resulting From The Breach., Affected Individuals May Have Recourse For Damages Under Pipl (As Demonstrated In The Accor Case)., , Customers advised to be cautious of phishing attempts and Customers urged to be mindful of potential phishing attacks due to data exposure.

Entry Point: Customer database systems

High Value Targets: Personal Information Of High-Net-Worth Clients,
Data Sold on Dark Web: Personal Information Of High-Net-Worth Clients,

Corrective Actions: Enhanced network security measures

Root Causes: Lack Of **Real-Time Detection** Capabilities In Some Organizations., Inadequate **Cross-Border Data Protection** (E.G., Dior Case)., Potential **Underreporting** Due To Fear Of Penalties.,
Corrective Actions: Mandatory **30-Day Postmortem** Reports For Major Incidents., **Fines And Legal Actions** For Non-Compliance., Expanded **Reporting Channels** To Reduce Ignorance Claims.,

Root Causes: Failure To Complete A Cross-Border Data Transfer Security Assessment Or File A Standard Contract (Scc) With Provincial Authorities., Inadequate User Notice And Lack Of ‘Separate Consent’ For Pi Transfers To Dior’S Headquarters In France., Absence Of Technical Safeguards (E.G., Encryption, De-Identification) For Collected Pi., Overreliance On Gdpr-Based Global Privacy Policies Without Sufficient Localization For Pipl Compliance., Insufficient Attention To Data Security In The Luxury Sector, Where High-Value Client Pi Is A Prime Target For Hackers.,
Corrective Actions: Implement Pipl-Compliant Cross-Border Transfer Mechanisms (Security Assessment, Scc Filing, Or Pi Protection Certification)., Revise Privacy Policies To Include Pipl-Mandated Disclosures (E.G., Overseas Recipient Details, Separate Consent Requirements)., Deploy Encryption, De-Identification, And Access Controls For Pi Handling., Conduct Regular Pi Protection Impact Assessments (Pipia) And Retain Documentation For Audits., Establish A China-Specific Data Compliance Team To Monitor Regulatory Updates And Enforcement Trends., Enhance Incident Response Capabilities To Detect And Mitigate Breaches Promptly.,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Expected to be adopted by organizations to meet real-time reporting requirements..
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Enhanced network security measures, Mandatory **30-Day Postmortem** Reports For Major Incidents., **Fines And Legal Actions** For Non-Compliance., Expanded **Reporting Channels** To Reduce Ignorance Claims., , Implement Pipl-Compliant Cross-Border Transfer Mechanisms (Security Assessment, Scc Filing, Or Pi Protection Certification)., Revise Privacy Policies To Include Pipl-Mandated Disclosures (E.G., Overseas Recipient Details, Separate Consent Requirements)., Deploy Encryption, De-Identification, And Access Controls For Pi Handling., Conduct Regular Pi Protection Impact Assessments (Pipia) And Retain Documentation For Audits., Establish A China-Specific Data Compliance Team To Monitor Regulatory Updates And Enforcement Trends., Enhance Incident Response Capabilities To Detect And Mitigate Breaches Promptly., .
Last Attacking Group: The attacking group in the last incident was an Unspecified third party.
Most Recent Incident Detected: The most recent incident detected was on 2025-05-07.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-09-09.
Most Significant Data Compromised: The most significant data compromised in an incident were names, addresses, dates of birth, passport numbers, government-issued ID numbers, Social Security numbers, , Personal Information (PI) of Users in China, , Full names, Gender, Phone numbers, Email addresses, Postal addresses, Purchase histories, Contact details, Shared preferences and .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Comprehensive investigation and containment measures.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Social Security numbers, Phone numbers, addresses, government-issued ID numbers, passport numbers, Full names, names, Shared preferences, Postal addresses, Contact details, Personal Information (PI) of Users in China, Email addresses, dates of birth, Purchase histories and Gender.
Highest Fine Imposed: The highest fine imposed for a regulatory violation was Dior Shanghai fined for **unauthorized data transfer** without security screening or encryption., Administrative Penalty (Details Undisclosed), .
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Penalties for non-compliant operators (late/false reporting) under CAC rules., Regulatory Investigation by China’s Public Security Authority, , Criticism from Korean legislators for delayed notification to authorities.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Thresholds for regulatory mechanisms (e.g., Security Assessment, SCC Filing) must be evaluated per entity, not at the group level.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Implement **real-time monitoring** to detect incidents promptly., For luxury brands, prioritize security investments to protect high-net-worth client data and mitigate targeted cyber threats., Ensure **encryption** and **legal reviews** for cross-border data flows., Establish a local office or appoint a representative in China if collecting PI directly from individuals in China (as required by PIPL)., Adopt technical safeguards such as encryption, de-identification, and access controls for PI handling., Perform a PI Protection Impact Assessment (PIPIA) for all cross-border transfers and retain reports for at least three years., Conduct **regular drills** to test incident response plans., Implement localized privacy policies that fully comply with PIPL, including detailed disclosures for overseas recipients and separate consent mechanisms., Monitor regulatory updates (e.g., CAC guidelines) and adjust compliance frameworks proactively to avoid penalties (up to RMB 50 million or 5% of annual turnover)., Establish **clear escalation protocols** for 30/60-minute reporting., Leverage **CAC-provided channels** (hotline, WeChat, etc.) for compliance., Conduct a comprehensive data mapping exercise to identify cross-border PI transfers and assess regulatory triggers (Security Assessment, SCC Filing, or PI Protection Certification)., Develop and test contingency plans for PI security incidents, including breach notification and regulatory reporting procedures., Train employees on PIPL compliance and data security best practices and with a focus on luxury sector risks..
Most Recent Source: The most recent source of information about an incident are China’s Cyberspace Administration (CAC) - Personal Information Protection Law (PIPL), Dior Official Notification, The Register, Guangzhou Internet Court Judgment (Accor Case, September 2023), Measures on Standard Contracts for Cross-Border Transfers of PI (Effective June 1, 2023), Provisions on Promoting and Regulating Cross-Border Data Flows (Effective March 22, 2024), BleepingComputer, Measures for Security Assessment of Outbound Data Transfers (Effective September 1, 2022) and Cyberspace Administration of China (CAC).
Most Recent URL for Additional Resources: The most recent URL for additional resources on cybersecurity best practices is https://www.theregister.com/2024/10/01/china_cybersecurity_reporting_rules/, http://www.cac.gov.cn/ .
Current Status of Most Recent Investigation: The current status of the most recent investigation is Completed.
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Network operators must prepare for **Nov 1 enforcement**; government agencies to monitor compliance., MNCs operating in China must urgently review cross-border data transfer practices to ensure compliance with PIPL., Luxury brands should treat this case as a warning to strengthen data security and localization efforts., Legal and compliance teams should collaborate to align global privacy policies with PIPL’s substantive requirements., Customers advised to be cautious of phishing attempts, .
Most Recent Customer Advisory: The most recent customer advisory issued were an Dedicated breach response line: 1-833-918-5938, engagement number B147873, Users in China received official warning messages from Dior regarding the data breach.Consumers are advised to monitor for potential harassment, spam, or fraud resulting from the breach.Affected individuals may have recourse for damages under PIPL (as demonstrated in the Accor case). and Customers urged to be mindful of potential phishing attacks due to data exposure.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an Customer database systems.
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Lack of **real-time detection** capabilities in some organizations.Inadequate **cross-border data protection** (e.g., Dior case).Potential **underreporting** due to fear of penalties., Failure to complete a cross-border data transfer security assessment or file a standard contract (SCC) with provincial authorities.Inadequate user notice and lack of ‘separate consent’ for PI transfers to Dior’s headquarters in France.Absence of technical safeguards (e.g., encryption, de-identification) for collected PI.Overreliance on GDPR-based global privacy policies without sufficient localization for PIPL compliance.Insufficient attention to data security in the luxury sector, where high-value client PI is a prime target for hackers..
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Enhanced network security measures, Mandatory **30-day postmortem** reports for major incidents.**Fines and legal actions** for non-compliance.Expanded **reporting channels** to reduce ignorance claims., Implement PIPL-compliant cross-border transfer mechanisms (Security Assessment, SCC Filing, or PI Protection Certification).Revise privacy policies to include PIPL-mandated disclosures (e.g., overseas recipient details, separate consent requirements).Deploy encryption, de-identification, and access controls for PI handling.Conduct regular PI Protection Impact Assessments (PIPIA) and retain documentation for audits.Establish a China-specific data compliance team to monitor regulatory updates and enforcement trends.Enhance incident response capabilities to detect and mitigate breaches promptly..
.png)
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions prior to 16.0.96 and 17.0.1 through 17.0.9 have a weak default password. By default, this is a 6 digit numeric value which can be brute forced. (This is the app_password parameter). Depending on local configuration, this password could be the extension, voicemail, user manager, DPMA or EPM phone admin password. This issue is fixed in versions 16.0.96 and 17.0.10.
Neuron is a PHP framework for creating and orchestrating AI Agents. In versions 2.8.11 and below, the MySQLWriteTool executes arbitrary SQL provided by the caller using PDO::prepare() + execute() without semantic restrictions. This is consistent with the name (“write tool”), but in an LLM/agent context it becomes a high-risk capability: prompt injection or indirect prompt manipulation can cause execution of destructive queries such as DROP TABLE, TRUNCATE, DELETE, ALTER, or privilege-related statements (subject to DB permissions). Deployments that expose an agent with MySQLWriteTool enabled to untrusted input and/or run the tool with a DB user that has broad privileges are impacted. This issue is fixed in version 2.8.12.
Neuron is a PHP framework for creating and orchestrating AI Agents. Versions 2.8.11 and below use MySQLSelectTool, which is vulnerable to Read-Only Bypass. MySQLSelectTool is intended to be a read-only SQL tool (e.g., for LLM agent querying, however, validation based on the first keyword (e.g., SELECT) and a forbidden-keyword list does not block file-writing constructs such as INTO OUTFILE / INTO DUMPFILE. As a result, an attacker who can influence the tool input (e.g., via prompt injection through a public agent endpoint) may write arbitrary files to the DB server if the MySQL/MariaDB account has the FILE privilege and server configuration permits writes to a useful location (e.g., a web-accessible directory). This issue is fixed in version 2.8.12.
Okta Java Management SDK facilitates interactions with the Okta management API. In versions 11.0.0 through 20.0.0, race conditions may arise from concurrent requests using the ApiClient class. This could cause a status code or response header from one request’s response to influence another request’s response. This issue is fixed in version 20.0.1.
The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. When using versions 4.11.0 through 4.11.2 and 4.12.0, simultaneous requests on the same client may result in improper lookups in the TokenRequestCache for the request results. This issue is fixed in versions 4.11.2 and 4.12.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.