ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Zomato’s mission statement is “better food for more people.” Since our inception in 2010, we have grown tremendously, both in scope and scale - and emerged as India’s most trusted brand during the pandemic, along with being one of the largest hyperlocal delivery networks in the country. Today, Zomato represents a wide range of cultures through its diversified 5000+ team members, 3.5 lakh+ delivery partners, and our biggest collective of the finest restaurant partners. We are grateful that our business is able to provide upward social and economic movement for millions of households – of our delivery partners, as well as restaurant staff. We think of all of us as one big family! Our passion is driven by purpose and we take immense pride in our initiative ‘Feeding India’, one of India’s largest not-for-profits working to ensure that nobody in India goes to bed hungry. As of now, Feeding India provides over 150,000 nutritious meals to the underprivileged every day. In April 2020, Feeding India ran one of the largest food distribution drives in the world during the first wave of COVID, and distributed 78 million meals to daily wagers across the length and breadth of the country. During the second wave of COVID-19, Feeding India was again the first to act. We were able to source over 9,000 oxygen concentrators and distributed them for free to government hospitals across the country. This helped save millions of lives during one of the worst humanitarian crises faced by India in the recent times. We’re innovating hard to make last-mile delivery carbon neutral, to eliminate the use of plastic packaging, create meaningful opportunities in the gig economy, and to feed our country’s ever-growing appetite for high-quality, affordable, and hygienic food, one delivery at a time!

Zomato A.I CyberSecurity Scoring

Zomato

Company Details

Linkedin ID:

zomato

Employees number:

14,195

Number of followers:

1,668,839

NAICS:

513

Industry Type:

Technology, Information and Internet

Homepage:

zomato.com

IP Addresses:

13

Company ID:

ZOM_1142464

Scan Status:

Completed

AI scoreZomato Risk Score (AI oriented)

Between 800 and 849

https://images.rankiteo.com/companyimages/zomato.jpeg
Zomato Technology, Information and Internet
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreZomato Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/zomato.jpeg
Zomato Technology, Information and Internet
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Zomato Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
ZomatoData Leak85405/2017
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Zomato suffered a data breach exposing 17 Million Accounts and Sold on Dark Web. The database contains registered Zomato users' emails and password hashes, and the set cost for the entire package is USD 1,001.43. (BTC 0.5587). No payment information or credit card data has been stolen. To prevent the chance of any human breach, an additional layer of authorisation will be implemented for internal teams to have access to this information.

Zomato
Data Leak
Severity: 85
Impact: 4
Seen: 05/2017
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Zomato suffered a data breach exposing 17 Million Accounts and Sold on Dark Web. The database contains registered Zomato users' emails and password hashes, and the set cost for the entire package is USD 1,001.43. (BTC 0.5587). No payment information or credit card data has been stolen. To prevent the chance of any human breach, an additional layer of authorisation will be implemented for internal teams to have access to this information.

Ailogo

Zomato Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Zomato

Incidents vs Technology, Information and Internet Industry Average (This Year)

No incidents recorded for Zomato in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Zomato in 2025.

Incident Types Zomato vs Technology, Information and Internet Industry Avg (This Year)

No incidents recorded for Zomato in 2025.

Incident History — Zomato (X = Date, Y = Severity)

Zomato cyber incidents detection timeline including parent company and subsidiaries

Zomato Company Subsidiaries

SubsidiaryImage

Zomato’s mission statement is “better food for more people.” Since our inception in 2010, we have grown tremendously, both in scope and scale - and emerged as India’s most trusted brand during the pandemic, along with being one of the largest hyperlocal delivery networks in the country. Today, Zomato represents a wide range of cultures through its diversified 5000+ team members, 3.5 lakh+ delivery partners, and our biggest collective of the finest restaurant partners. We are grateful that our business is able to provide upward social and economic movement for millions of households – of our delivery partners, as well as restaurant staff. We think of all of us as one big family! Our passion is driven by purpose and we take immense pride in our initiative ‘Feeding India’, one of India’s largest not-for-profits working to ensure that nobody in India goes to bed hungry. As of now, Feeding India provides over 150,000 nutritious meals to the underprivileged every day. In April 2020, Feeding India ran one of the largest food distribution drives in the world during the first wave of COVID, and distributed 78 million meals to daily wagers across the length and breadth of the country. During the second wave of COVID-19, Feeding India was again the first to act. We were able to source over 9,000 oxygen concentrators and distributed them for free to government hospitals across the country. This helped save millions of lives during one of the worst humanitarian crises faced by India in the recent times. We’re innovating hard to make last-mile delivery carbon neutral, to eliminate the use of plastic packaging, create meaningful opportunities in the gig economy, and to feed our country’s ever-growing appetite for high-quality, affordable, and hygienic food, one delivery at a time!

Loading...
similarCompanies

Zomato Similar Companies

Meesho

Meesho is India’s fastest growing internet commerce company. We want to make eCommerce accessible to all. Our vision is to enable 100 million small businesses in India, including individual entrepreneurs, to succeed online. Our mission is to democratise internet commerce by bringing a range of produ

Fanatics is a leading global digital sports platform. We ignite the passions of global sports fans and maximize the presence and reach for our hundreds of sports partners globally by offering products and services across Fanatics Commerce, Fanatics Collectibles, and Fanatics Betting & Gaming, allowi

OYO is a global platform that aims to empower entrepreneurs and small businesses with hotels and homes by providing full-stack technology products and services that aims to increase revenue and ease operations; bringing easy-to-book, affordable, and trusted accommodation to customers around the worl

At eBay, we create pathways to connect millions of sellers and buyers in more than 190 markets around the world. Our technology empowers our customers, providing everyone the opportunity to grow and thrive — no matter who they are or where they are in the world. And the ripple effect of our work cre

Swiggy

Swiggy is India’s pioneering on-demand convenience platform, catering to millions of consumers each month. Founded in 2014, its mission is to elevate the quality of life for the urban consumer by offering unparalleled convenience. With an extensive footprint in food delivery, Swiggy Food collaborate

Delivery Hero

As the world’s leading local delivery platform, our mission is to deliver an amazing experience, fast, easy, and to your door. We operate in over 70+ countries worldwide, powered by tech but driven by people. As one of Europe’s largest tech platforms, we enable ambitious talent to deliver solutions

YouTube

YouTube is a team-oriented, creative workplace where every single employee has a voice in the choices we make and the features we implement. We work together in small teams to design, develop, and roll out key features and products in very short time frames. Which means something you write today cou

Mercado Livre Brasil

Fundada em 1999, MercadoLivre é uma companhia de tecnologia líder em comércio eletrônico na América Latina. Por meio de suas principais plataformas MercadoLivre.com e MercadoPago.com, oferece soluções de comércio eletrônico para que pessoas e empresas possam comprar, vender, pagar e anunciar produto

Peraton

Do the can't be done. At Peraton, we're at the forefront of delivering the next big thing every day. We're the partner of choice to help solve some of the world's most daunting challenges, delivering bold, new solutions to keep people around the world safer and more secure. How do we do it? By thi

newsone

Zomato CyberSecurity News

November 20, 2025 08:39 AM
Vodafone Idea Extends Kyndryl Partnership for 3 Years to Boost Cybersecurity & Automation

Vodafone Idea has extended its partnership with Kyndryl for another three years, aiming to transform its IT operations and enhance...

November 20, 2025 06:35 AM
Zomato in Talks to Share Customer Data with Restaurants; User Consent to Remain Key

Food-delivery giant Zomato is preparing to share customer information with restaurants, marking a major shift after nearly a decade of...

July 29, 2025 07:00 AM
‘Draft telecom cybersecurity rules may raise compliance costs for firms, impact digital adoption’

Telecom News: Proposed amendments to telecom cybersecurity rules could significantly raise compliance costs for fintech, OTT, and ecommerce...

June 10, 2025 07:00 AM
Didn’t know Zomato, PolicyBazaar would become so big: InfoEdge Ventures partners on finding...

InfoEdge Ventures—the venture capital arm of tech holding company Info Edge and an early backer of Zomato and PolicyBazaar—is gearing up for its...

April 09, 2025 07:00 AM
Zomato COO Rinshul Chandra resigns with 'immediate effect': Read his 'resignation email' to CEO Deepinder

Tech News News: Zomato's food delivery business faces a leadership change as COO Rinshul Chandra resigns, effective April 7, 2025,...

April 07, 2025 07:00 AM
Manager of coffee chain applauds delivery agent carrying 2-year-old daughter to work: 'He touched our hea

Tech News News: Sonu, a Zomato delivery agent in Delhi, is receiving praise for managing work while caring for his two-year-old daughter.

April 07, 2025 07:00 AM
Zomato in Turmoil: COO Quits After Mass Layoffs, Future in Doubt

One of India's most prominent food-tech firms, Rinshul Chandra, the Chief Operating Officer of Zomato's food delivery vertical,...

April 02, 2025 07:00 AM
Zomato cuts 600 customer support jobs

India Business News: MUMBAI: Zomato (now Eternal) has laid off 500-600 employees working in customer support roles citing non-performance,...

April 01, 2025 07:00 AM
Zomato lays off 600 customer support employees without notice and citing these reasons

Tech News News: Zomato has laid off 600 customer support associates while automating its customer service with AI platform 'Nugget'.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Zomato CyberSecurity History Information

Official Website of Zomato

The official website of Zomato is https://www.zomato.com/.

Zomato’s AI-Generated Cybersecurity Score

According to Rankiteo, Zomato’s AI-generated cybersecurity score is 803, reflecting their Good security posture.

How many security badges does Zomato’ have ?

According to Rankiteo, Zomato currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Zomato have SOC 2 Type 1 certification ?

According to Rankiteo, Zomato is not certified under SOC 2 Type 1.

Does Zomato have SOC 2 Type 2 certification ?

According to Rankiteo, Zomato does not hold a SOC 2 Type 2 certification.

Does Zomato comply with GDPR ?

According to Rankiteo, Zomato is not listed as GDPR compliant.

Does Zomato have PCI DSS certification ?

According to Rankiteo, Zomato does not currently maintain PCI DSS compliance.

Does Zomato comply with HIPAA ?

According to Rankiteo, Zomato is not compliant with HIPAA regulations.

Does Zomato have ISO 27001 certification ?

According to Rankiteo,Zomato is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Zomato

Zomato operates primarily in the Technology, Information and Internet industry.

Number of Employees at Zomato

Zomato employs approximately 14,195 people worldwide.

Subsidiaries Owned by Zomato

Zomato presently has no subsidiaries across any sectors.

Zomato’s LinkedIn Followers

Zomato’s official LinkedIn profile has approximately 1,668,839 followers.

NAICS Classification of Zomato

Zomato is classified under the NAICS code 513, which corresponds to Others.

Zomato’s Presence on Crunchbase

Yes, Zomato has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/zomato.

Zomato’s Presence on LinkedIn

Yes, Zomato maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/zomato.

Cybersecurity Incidents Involving Zomato

As of December 11, 2025, Rankiteo reports that Zomato has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Zomato has an estimated 13,042 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Zomato ?

Incident Types: The types of cybersecurity incidents that have occurred include Data Leak.

How does Zomato detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an remediation measures with implementing an additional layer of authorisation for internal teams to access information..

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Zomato Data Breach

Description: Zomato suffered a data breach exposing 17 Million Accounts and Sold on Dark Web. The database contains registered Zomato users' emails and password hashes, and the set cost for the entire package is USD 1,001.43. (BTC 0.5587). No payment information or credit card data has been stolen. To prevent the chance of any human breach, an additional layer of authorisation will be implemented for internal teams to have access to this information.

Type: Data Breach

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Data Leak.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach ZOM95927922

Data Compromised: Emails, Password hashes

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Emails, Password Hashes and .

Which entities were affected by each incident ?

Incident : Data Breach ZOM95927922

Entity Name: Zomato

Entity Type: Company

Industry: Food Delivery

Customers Affected: 17 Million

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Data Breach ZOM95927922

Remediation Measures: Implementing an additional layer of authorisation for internal teams to access information

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach ZOM95927922

Type of Data Compromised: Emails, Password hashes

Number of Records Exposed: 17 Million

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Implementing an additional layer of authorisation for internal teams to access information, .

Additional Questions

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were emails, password hashes and .

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were password hashes and emails.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 17.0M.

cve

Latest Global CVEs (Not Company-Specific)

Description

FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions prior to 16.0.96 and 17.0.1 through 17.0.9 have a weak default password. By default, this is a 6 digit numeric value which can be brute forced. (This is the app_password parameter). Depending on local configuration, this password could be the extension, voicemail, user manager, DPMA or EPM phone admin password. This issue is fixed in versions 16.0.96 and 17.0.10.

Risk Information
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Neuron is a PHP framework for creating and orchestrating AI Agents. In versions 2.8.11 and below, the MySQLWriteTool executes arbitrary SQL provided by the caller using PDO::prepare() + execute() without semantic restrictions. This is consistent with the name (“write tool”), but in an LLM/agent context it becomes a high-risk capability: prompt injection or indirect prompt manipulation can cause execution of destructive queries such as DROP TABLE, TRUNCATE, DELETE, ALTER, or privilege-related statements (subject to DB permissions). Deployments that expose an agent with MySQLWriteTool enabled to untrusted input and/or run the tool with a DB user that has broad privileges are impacted. This issue is fixed in version 2.8.12.

Risk Information
cvss3
Base: 9.4
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
Description

Neuron is a PHP framework for creating and orchestrating AI Agents. Versions 2.8.11 and below use MySQLSelectTool, which is vulnerable to Read-Only Bypass. MySQLSelectTool is intended to be a read-only SQL tool (e.g., for LLM agent querying, however, validation based on the first keyword (e.g., SELECT) and a forbidden-keyword list does not block file-writing constructs such as INTO OUTFILE / INTO DUMPFILE. As a result, an attacker who can influence the tool input (e.g., via prompt injection through a public agent endpoint) may write arbitrary files to the DB server if the MySQL/MariaDB account has the FILE privilege and server configuration permits writes to a useful location (e.g., a web-accessible directory). This issue is fixed in version 2.8.12.

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
Description

Okta Java Management SDK facilitates interactions with the Okta management API. In versions 11.0.0 through 20.0.0, race conditions may arise from concurrent requests using the ApiClient class. This could cause a status code or response header from one request’s response to influence another request’s response. This issue is fixed in version 20.0.1.

Risk Information
cvss3
Base: 8.4
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L
Description

The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. When using versions 4.11.0 through 4.11.2 and 4.12.0, simultaneous requests on the same client may result in improper lookups in the TokenRequestCache for the request results. This issue is fixed in versions 4.11.2 and 4.12.1.

Risk Information
cvss3
Base: 5.4
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=zomato' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge