Company Details
nike
85,136
6,052,402
43
nike.com/careers
0
NIK_8771416
In-progress

Nike Company CyberSecurity Posture
nike.com/careersNIKE, Inc. is a purpose-driven organization energized by a shared commitment to move the world forward through the power of sport. We champion diversity and amplify individual passions to bring inspiration and innovation to every athlete* in the world. Here, every teammate has a role to play. We work together, embracing our differences and pushing boundaries, to achieve collective success. For more information on how you can contribute to a world-class team, visit our career site at nike.com/careers and join our talent community at https://nikeats.avature.net/niketalentcommunity.
Company Details
nike
85,136
6,052,402
43
nike.com/careers
0
NIK_8771416
In-progress
Between 800 and 849

Nike Global Score (TPRM)XXXX



No incidents recorded for Nike in 2025.
No incidents recorded for Nike in 2025.
No incidents recorded for Nike in 2025.
Nike cyber incidents detection timeline including parent company and subsidiaries

NIKE, Inc. is a purpose-driven organization energized by a shared commitment to move the world forward through the power of sport. We champion diversity and amplify individual passions to bring inspiration and innovation to every athlete* in the world. Here, every teammate has a role to play. We work together, embracing our differences and pushing boundaries, to achieve collective success. For more information on how you can contribute to a world-class team, visit our career site at nike.com/careers and join our talent community at https://nikeats.avature.net/niketalentcommunity.


Arbonne, creates personal skincare and wellness products that are crafted with premium botanical ingredients and innovative scientific discovery. Delivering on the Company’s commitment to pure, safe and beneficial products, Arbonne’s personal care and nutrition formulas are vegan certified and adher

The Home Depot, the world’s largest home improvement specialty retailer, values and rewards dedicated, knowledgeable, and experienced professionals. We operate more than 2,300 retail stores in all 50 states, the District of Columbia, Puerto Rico, the U.S. Virgin Islands, Guam, Canada, and Mexico. A

Somos un espacio físico y digital que por más de 135 años ha inspirado y enriquecido la vida de nuestros clientes. Trabajamos con las mejores marcas del mundo para brindar una experiencia especialista omnicanal en vestuario, belleza, calzado, tecnología y hogar. Buscamos ser un espacio de encuentro

To create new-generation retailing that improves people’s lives, Auchan Retail places customers at the centre of its actions and reaffirms the retailer’s role: that of a multi-format, “phygital” activist for good, healthy, local produce that constantly reinvents itself to deliver a new customer expe

ICA Gruppen´s core business is retail. The Group includes ICA Sweden which mainly conduct grocery retail, ICA Real Estate which owns and manages properties, ICA Bank which offers financial services and insurances, Apotek Hjärtat which conducts pharmacy operations. Guidelines: Comments in our chan

Founded in 1964 by Tom Love, Love’s Family of Companies is headquartered in Oklahoma City, and remains entirely family-owned and operated. With more than 600 locations in 42 states, Love’s approximate growth rate is 40 stores per year. From the first filling station in Watonga, Oklahoma, the Love’s

The Kroger Co., together with its subsidiaries, operates as a food retailer in the United States. The company operates three formats of supermarkets: combination food and drug stores (combo stores), multi department stores, and price impact warehouse stores or marketplace stores. The combo stores op

As one of only two national grocery retailers in Canada, Sobeys Inc. serves the food shopping needs of Canadians with more than 1,500 stores in 10 provinces with retail banners that include Sobeys, Safeway, IGA, Foodland, FreshCo, Price Chopper, Thrifty Foods and Lawtons Drugs, as well as more than

Electrolux Home grundades 1995 som ett Franchisekoncept, idag består kedjan av 25 butiker över hela Sverige samt e-handel. Electrolux Home är butikskedjan för hela köket och erbjuder kompletta köks- och förvaringsinredningar, vitvaror och ett brett sortiment av utvalda cookshop och småelspro
.png)
Nike's popular long-sleeve running shirts are on sale for just $28. Shoppers call them “very comfortable,” and they're selling fast during...
The shoes have a foam midsole, outsole with flex grooves, come with free shipping, and will get you tons of compliments.
Men's Journal aims to feature only the best products and services. If you buy something via one of our links, we may earn a commission.
Nike's new “Why Do It” campaign speaks to rising anxiety. The real lesson: leaders need a why aligned across ME, WE, and WORLD to avoid...
The winter version of the innovative Air Max Dn is down to get dirty.
Nike is asking Gen-Z a whole new question about sports, one that is just begging to be answered. Just recently, the iconic shoe brand...
When you buy through links on our articles, Future and its syndication partners may earn a commission. Nike Strength VOLT Collection.
Ahead of this year's Digital Transformation Expo Europe, we spoke to Nike's Linda Cereda.
The cybersecurity landscape witnessed a sophisticated and ongoing attack campaign throughout 2025 that has successfully compromised major...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Nike is nike.com/careers.
According to Rankiteo, Nike’s AI-generated cybersecurity score is 839, reflecting their Good security posture.
According to Rankiteo, Nike currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Nike is not certified under SOC 2 Type 1.
According to Rankiteo, Nike does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Nike is not listed as GDPR compliant.
According to Rankiteo, Nike does not currently maintain PCI DSS compliance.
According to Rankiteo, Nike is not compliant with HIPAA regulations.
According to Rankiteo,Nike is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Nike operates primarily in the Retail industry.
Nike employs approximately 85,136 people worldwide.
Nike presently has no subsidiaries across any sectors.
Nike’s official LinkedIn profile has approximately 6,052,402 followers.
Nike is classified under the NAICS code 43, which corresponds to Retail Trade.
No, Nike does not have a profile on Crunchbase.
Yes, Nike maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/nike.
As of December 11, 2025, Rankiteo reports that Nike has not experienced any cybersecurity incidents.
Nike has an estimated 15,469 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Nike has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions prior to 16.0.96 and 17.0.1 through 17.0.9 have a weak default password. By default, this is a 6 digit numeric value which can be brute forced. (This is the app_password parameter). Depending on local configuration, this password could be the extension, voicemail, user manager, DPMA or EPM phone admin password. This issue is fixed in versions 16.0.96 and 17.0.10.
Neuron is a PHP framework for creating and orchestrating AI Agents. In versions 2.8.11 and below, the MySQLWriteTool executes arbitrary SQL provided by the caller using PDO::prepare() + execute() without semantic restrictions. This is consistent with the name (“write tool”), but in an LLM/agent context it becomes a high-risk capability: prompt injection or indirect prompt manipulation can cause execution of destructive queries such as DROP TABLE, TRUNCATE, DELETE, ALTER, or privilege-related statements (subject to DB permissions). Deployments that expose an agent with MySQLWriteTool enabled to untrusted input and/or run the tool with a DB user that has broad privileges are impacted. This issue is fixed in version 2.8.12.
Neuron is a PHP framework for creating and orchestrating AI Agents. Versions 2.8.11 and below use MySQLSelectTool, which is vulnerable to Read-Only Bypass. MySQLSelectTool is intended to be a read-only SQL tool (e.g., for LLM agent querying, however, validation based on the first keyword (e.g., SELECT) and a forbidden-keyword list does not block file-writing constructs such as INTO OUTFILE / INTO DUMPFILE. As a result, an attacker who can influence the tool input (e.g., via prompt injection through a public agent endpoint) may write arbitrary files to the DB server if the MySQL/MariaDB account has the FILE privilege and server configuration permits writes to a useful location (e.g., a web-accessible directory). This issue is fixed in version 2.8.12.
Okta Java Management SDK facilitates interactions with the Okta management API. In versions 11.0.0 through 20.0.0, race conditions may arise from concurrent requests using the ApiClient class. This could cause a status code or response header from one request’s response to influence another request’s response. This issue is fixed in version 20.0.1.
The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. When using versions 4.11.0 through 4.11.2 and 4.12.0, simultaneous requests on the same client may result in improper lookups in the TokenRequestCache for the request results. This issue is fixed in versions 4.11.2 and 4.12.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.