ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Since 1904, Coty has fearlessly pioneered innovation across the beauty industry. We have a reputation for breaking new ground; a history of ‘firsts’ and ‘bests’ that has laid the foundation for the industry as we know it today. For over a century, our brands have been empowering people to express themselves and create their own vision of beauty. It’s a legacy we’re proud to own and grow. We work hand-in-hand with our people, our partners and our customers. Together, we unleash every vision of beauty. We stand for the beauty of diversity and the diversity of beauty - celebrating and inspiring all the expressions of beauty that exist and that will exist. We honor you, and we honor our planet. We create Beauty That Lasts. A beauty that is both good to people and the world. Our mission is to create a forward thinking beauty; Products that provide new, innovative and simply better science based solutions. Let’s keep making over the beauty world TOGETHER.

Coty A.I CyberSecurity Scoring

Coty

Company Details

Linkedin ID:

coty

Employees number:

11,158

Number of followers:

884,587

NAICS:

32562

Industry Type:

Personal Care Product Manufacturing

Homepage:

coty.com

IP Addresses:

0

Company ID:

COT_3499623

Scan Status:

In-progress

AI scoreCoty Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/coty.jpeg
Coty Personal Care Product Manufacturing
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreCoty Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/coty.jpeg
Coty Personal Care Product Manufacturing
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Coty Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Coty, Inc.Breach6031/2018
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: The California Office of the Attorney General reported a data breach involving Coty, Inc. on July 6, 2018. The breach occurred on January 12, 2018, due to phishing attacks that compromised employee email accounts. The number of affected individuals and specific types of personal data are unknown.

Coty, Inc.
Breach
Severity: 60
Impact: 3
Seen: 1/2018
Blog:
Rankiteo Explanation
Attack with significant impact with internal employee data leaks

Description: The California Office of the Attorney General reported a data breach involving Coty, Inc. on July 6, 2018. The breach occurred on January 12, 2018, due to phishing attacks that compromised employee email accounts. The number of affected individuals and specific types of personal data are unknown.

Ailogo

Coty Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Coty

Incidents vs Personal Care Product Manufacturing Industry Average (This Year)

No incidents recorded for Coty in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Coty in 2025.

Incident Types Coty vs Personal Care Product Manufacturing Industry Avg (This Year)

No incidents recorded for Coty in 2025.

Incident History — Coty (X = Date, Y = Severity)

Coty cyber incidents detection timeline including parent company and subsidiaries

Coty Company Subsidiaries

SubsidiaryImage

Since 1904, Coty has fearlessly pioneered innovation across the beauty industry. We have a reputation for breaking new ground; a history of ‘firsts’ and ‘bests’ that has laid the foundation for the industry as we know it today. For over a century, our brands have been empowering people to express themselves and create their own vision of beauty. It’s a legacy we’re proud to own and grow. We work hand-in-hand with our people, our partners and our customers. Together, we unleash every vision of beauty. We stand for the beauty of diversity and the diversity of beauty - celebrating and inspiring all the expressions of beauty that exist and that will exist. We honor you, and we honor our planet. We create Beauty That Lasts. A beauty that is both good to people and the world. Our mission is to create a forward thinking beauty; Products that provide new, innovative and simply better science based solutions. Let’s keep making over the beauty world TOGETHER.

Loading...
similarCompanies

Coty Similar Companies

Founded in 1969, Natura is a Brazilian multinational in the cosmetics and personal care segment, a leader in direct sales in Brazil, and recognized for protecting the Amazon social biodiversity through its sustainable business model. Cruelty free. 100% vegan. With 7,000 employees and 2 million beaut

Mary Kay Global

About Mary Kay - Then. Now. Always. One of the original glass ceiling breakers, Mary Kay Ash founded her dream beauty brand in Texas in 1963 with one goal: to enrich women’s lives. That dream has blossomed into a global company with unlimited opportunities to do something beautiful for people around

Kenvue

Kenvue is the world’s largest pure-play consumer health company by revenue. Built on more than a century of heritage and propelled forward by science, our iconic brands — including Aveeno®, BAND-AID® Brand Adhesive Bandages, Johnson’s®, Listerine®, Neutrogena®, Tylenol® and Zyrtec® — are recommended

Think you know Avon? Think again. We’ve been doing beauty differently for 135 years. Pioneering in listening to women’s needs and speaking out for them. Standing for what matters to them. Supporting their endeavours. We’re a company that connects people through beauty, sharing passion, innovati

The Estée Lauder Companies Inc.

The Estée Lauder Companies Inc. is one of the world’s leading manufacturers, marketers, and sellers of quality skin care, makeup, fragrance, and hair care products, and is a steward of outstanding luxury and prestige brands globally. The company’s products are sold in approximately 150 countries and

L'Oréal

Leading the world in beauty and pioneering the world of beauty tech; we are 86K employees across 150 countries on five continents. Our 36 international brands are divided into four unique Divisions: Luxe, Consumer Products, Dermatological Beauty, and Professional Products. Our 36 international bra

Martina Berto

We are one of leading beauty companies in Indonesia, founded by Dr. (H.C) Martha Tilaar in 1970. Employing over 4,000 employees, our company divided into three business classifications, manufacturing and Marketing, Distribution, and Service. Our teams are creating innovation and best quality in beau

Grupo Boticário

Beleza é o negócio do Grupo Boticário. Para nós, ela se traduz em nossas quatro unidades de negócio com atuação no setor cosmético: O Boticário, Eudora, quem disse, berenice? e The Beauty Box. A beleza também está no empreendedorismo, na sustentabilidade, inovação, ética e integridade que inspiram n

Beiersdorf

Beiersdorf has been a pioneer in innovative, high-quality skin care products and groundbreaking skin research for over 140 years. Our internationally beloved brands, including NIVEA – the world’s no. 1 skin care brand –, Eucerin, Hansaplast, La Prairie and Chantecaille, are cherished by millions aro

newsone

Coty CyberSecurity News

November 09, 2025 08:00 AM
Manassas city schools closed Monday due to cybersecurity incident

"With Tuesday as a scheduled holiday, tomorrow's closure allows our internal IT department time to secure and restore our systems and to work...

November 09, 2025 08:00 AM
Manassas City Public Schools close on Monday due to cyberattack

Manassas City Public Schools are closed on Monday due to a cybersecurity incident that has led to connectivity disruptions and phone outages...

October 21, 2025 07:00 AM
How Memphis Uses AI to Strengthen Cybersecurity

Memphis, Tenn., Deputy CIO Augustine Boateng said that as cyber threats become more sophisticated, AI-powered tools can help local...

October 15, 2025 07:00 AM
Cyber Awareness Day

October is National Cybersecurity Awareness Month, and a great reminder for everyone to participate in growing security awareness!

October 15, 2025 07:00 AM
Agreement between Rapid City, Dakota State to shore up city cybersecurity

The memorandum of understanding connects the two in a $7-million State bill that funds training and other security initiatives. The API failed...

October 15, 2025 07:00 AM
Agreement between Rapid City, Dakota State to shore up city cybersecurity

The memorandum of understanding connects the two in a $7-million State bill that funds training and other security initiatives.

October 12, 2025 07:00 AM
Think you're safe from computer hackers? Think again. City's cybersecurity expert to speak at Carson City Chamber luncheon

Carson City's Chief Information Officer Frank Abella will present his views on how to protect yourself from cyber hackers, Oct. 21. By Ronni...

October 03, 2025 07:00 AM
Hamilton knew of ‘critical weaknesses’ in cybersecurity years before ransomware attack

A new audit shows the City of Hamilton knew it was vulnerable three years before 2024's devastating cyber attack — but did not implement...

October 03, 2025 07:00 AM
Hamilton auditor flagged cybersecurity weaknesses three years before major attack, says report

A new report from Hamilton's auditor general shows the City already knew its IT systems had "critical weaknesses" years before being hit by...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Coty CyberSecurity History Information

Official Website of Coty

The official website of Coty is http://www.Coty.com.

Coty’s AI-Generated Cybersecurity Score

According to Rankiteo, Coty’s AI-generated cybersecurity score is 753, reflecting their Fair security posture.

How many security badges does Coty’ have ?

According to Rankiteo, Coty currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Coty have SOC 2 Type 1 certification ?

According to Rankiteo, Coty is not certified under SOC 2 Type 1.

Does Coty have SOC 2 Type 2 certification ?

According to Rankiteo, Coty does not hold a SOC 2 Type 2 certification.

Does Coty comply with GDPR ?

According to Rankiteo, Coty is not listed as GDPR compliant.

Does Coty have PCI DSS certification ?

According to Rankiteo, Coty does not currently maintain PCI DSS compliance.

Does Coty comply with HIPAA ?

According to Rankiteo, Coty is not compliant with HIPAA regulations.

Does Coty have ISO 27001 certification ?

According to Rankiteo,Coty is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Coty

Coty operates primarily in the Personal Care Product Manufacturing industry.

Number of Employees at Coty

Coty employs approximately 11,158 people worldwide.

Subsidiaries Owned by Coty

Coty presently has no subsidiaries across any sectors.

Coty’s LinkedIn Followers

Coty’s official LinkedIn profile has approximately 884,587 followers.

NAICS Classification of Coty

Coty is classified under the NAICS code 32562, which corresponds to Toilet Preparation Manufacturing.

Coty’s Presence on Crunchbase

No, Coty does not have a profile on Crunchbase.

Coty’s Presence on LinkedIn

Yes, Coty maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/coty.

Cybersecurity Incidents Involving Coty

As of December 11, 2025, Rankiteo reports that Coty has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Coty has an estimated 1,644 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Coty ?

Incident Types: The types of cybersecurity incidents that have occurred include Breach.

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Data Breach at Coty, Inc.

Description: The California Office of the Attorney General reported a data breach involving Coty, Inc. on July 6, 2018. The breach occurred on January 12, 2018, due to phishing attacks that compromised employee email accounts, although the number of affected individuals and specific types of personal data are unknown.

Date Detected: 2018-01-12

Date Publicly Disclosed: 2018-07-06

Type: Data Breach

Attack Vector: Phishing

Vulnerability Exploited: Employee Email Accounts

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

Which entities were affected by each incident ?

Incident : Data Breach COT228072925

Entity Name: Coty, Inc.

Entity Type: Company

Industry: Beauty and Cosmetics

References

Where can I find more information about each incident ?

Incident : Data Breach COT228072925

Source: California Office of the Attorney General

Date Accessed: 2018-07-06

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney GeneralDate Accessed: 2018-07-06.

Additional Questions

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2018-01-12.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2018-07-06.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is California Office of the Attorney General.

cve

Latest Global CVEs (Not Company-Specific)

Description

FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions prior to 16.0.96 and 17.0.1 through 17.0.9 have a weak default password. By default, this is a 6 digit numeric value which can be brute forced. (This is the app_password parameter). Depending on local configuration, this password could be the extension, voicemail, user manager, DPMA or EPM phone admin password. This issue is fixed in versions 16.0.96 and 17.0.10.

Risk Information
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Neuron is a PHP framework for creating and orchestrating AI Agents. In versions 2.8.11 and below, the MySQLWriteTool executes arbitrary SQL provided by the caller using PDO::prepare() + execute() without semantic restrictions. This is consistent with the name (“write tool”), but in an LLM/agent context it becomes a high-risk capability: prompt injection or indirect prompt manipulation can cause execution of destructive queries such as DROP TABLE, TRUNCATE, DELETE, ALTER, or privilege-related statements (subject to DB permissions). Deployments that expose an agent with MySQLWriteTool enabled to untrusted input and/or run the tool with a DB user that has broad privileges are impacted. This issue is fixed in version 2.8.12.

Risk Information
cvss3
Base: 9.4
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
Description

Neuron is a PHP framework for creating and orchestrating AI Agents. Versions 2.8.11 and below use MySQLSelectTool, which is vulnerable to Read-Only Bypass. MySQLSelectTool is intended to be a read-only SQL tool (e.g., for LLM agent querying, however, validation based on the first keyword (e.g., SELECT) and a forbidden-keyword list does not block file-writing constructs such as INTO OUTFILE / INTO DUMPFILE. As a result, an attacker who can influence the tool input (e.g., via prompt injection through a public agent endpoint) may write arbitrary files to the DB server if the MySQL/MariaDB account has the FILE privilege and server configuration permits writes to a useful location (e.g., a web-accessible directory). This issue is fixed in version 2.8.12.

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
Description

Okta Java Management SDK facilitates interactions with the Okta management API. In versions 11.0.0 through 20.0.0, race conditions may arise from concurrent requests using the ApiClient class. This could cause a status code or response header from one request’s response to influence another request’s response. This issue is fixed in version 20.0.1.

Risk Information
cvss3
Base: 8.4
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L
Description

The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. When using versions 4.11.0 through 4.11.2 and 4.12.0, simultaneous requests on the same client may result in improper lookups in the TokenRequestCache for the request results. This issue is fixed in versions 4.11.2 and 4.12.1.

Risk Information
cvss3
Base: 5.4
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=coty' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge