Company Details
bolt-eu
14,599
314,219
5112
bolt.eu
0
BOL_1334512
In-progress


Bolt Vendor Cyber Rating & Cyber Score
bolt.euAt Bolt, we're building a future where people don’t need to own personal cars to move around safely and conveniently. A future where people have the freedom to use transport on demand, choosing whatever vehicle's best for each occasion — be it a car, scooter, or e-bike. We're helping over 200 million customers move around in more than 600 cities globally while also supporting more than 4.5 million drivers and couriers to earn a living. The best bit? We're only just getting started. Read more at bolt.eu
Company Details
bolt-eu
14,599
314,219
5112
bolt.eu
0
BOL_1334512
In-progress
Between 750 and 799

Bolt Global Score (TPRM)XXXX



No incidents recorded for Bolt in 2026.
No incidents recorded for Bolt in 2026.
No incidents recorded for Bolt in 2026.
Bolt cyber incidents detection timeline including parent company and subsidiaries

At Bolt, we're building a future where people don’t need to own personal cars to move around safely and conveniently. A future where people have the freedom to use transport on demand, choosing whatever vehicle's best for each occasion — be it a car, scooter, or e-bike. We're helping over 200 million customers move around in more than 600 cities globally while also supporting more than 4.5 million drivers and couriers to earn a living. The best bit? We're only just getting started. Read more at bolt.eu


Tencent is a world-leading internet and technology company that develops innovative products and services to improve the quality of life of people around the world. Founded in 1998 with its headquarters in Shenzhen, China, Tencent's guiding principle is to use technology for good. Our communication

IGT is a leading global provider of gaming, digital and financial technology solutions, formed through the combination of International Game Technology PLC’s Gaming & Digital Business and Everi Holdings Inc. IGT’s offering spans gaming machines, game content and systems, iGaming, sports betting, cas

Dassault Systèmes is a catalyst for human progress. Since 1981, the company has pioneered virtual worlds to improve real life for consumers, patients and citizens. With Dassault Systèmes’ 3DEXPERIENCE platform, 370,000 customers of all sizes, in all industries, can collaborate, imagine and create

Just Eat Takeaway.com is a leading global online delivery marketplace, connecting consumers and restaurants through our platform in 16 countries. Like a dinner table, working at JET brings our office employees and couriers together. From coding to customer service to couriers, JET is a

About KPIT KPIT is reimagining the future of mobility, forging ahead with group companies and partners to shape a world that is cleaner, smarter, and safer. With over 25 years of specialized expertise in Mobility, KPIT is accelerating the transformation towards Software and AI-Defined Vehicles thr

Join us in our mission to help the world get well, help the world stay well, and help future generations be healthier. We hire smart and motivated people from all academic majors to code, test, and implement healthcare software that hundreds of millions of patients and doctors rely on to improve ca

Founded in 2003, LinkedIn connects the world's professionals to make them more productive and successful. With more than 1 billion members worldwide, including executives from every Fortune 500 company, LinkedIn is the world's largest professional network. The company has a diversified business mode

About Lazada Group Founded in 2012, Lazada Group is the leading eCommerce platform in Southeast Asia. We are accelerating progress in Indonesia, Malaysia, the Philippines, Singapore, Thailand and Vietnam through commerce and technology. With the largest logistics and payments networks in the regio

More than one billion people around the world use Instagram, and we’re proud to be bringing them closer to the people and things they love. Instagram inspires people to see the world differently, discover new interests, and express themselves. Since launching in 2010, our community has grown at a r
.png)
In the real-time cybersecurity race, having different, concurrent approaches and unique talents to spot patterns can make the difference between winning and...
Motilal Oswal Financial Services has modelled a scenario where rapid AI-led pricing pressure over 12-18 months could lead to earnings cuts of...
Hackers exploit Dell RecoverPoint flaw CVE-2026-22769 to deploy GrimBolt malware, prompting urgent security warnings for affected...
Manufacturers should address cybersecurity for older devices per IEC 81001-5-1, balancing costs and compliance. Medical device manufacturers that want to...
COMMENTARY: A seismic shift has taken place, one so profound that only a handful of companies will survive in its wake.
The Navy has the chance to bake in cybersecurity from the beginning as it builds its Golden Fleet concept.
Gartner recognition spotlights Airrived's composable multiagent architecture, domain-specialized cybersecurity agents, and leadership in...
Airrived today announced its launch from stealth, backed by $6.1 million in seed funding, to bring agentic AI to the core of enterprise...
ONCD chief Sean Cairncross also said a bedrock National Cyber Strategy, initially expected last month, is coming “sooner rather than later”...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Bolt is http://bolt.eu.
According to Rankiteo, Bolt’s AI-generated cybersecurity score is 782, reflecting their Fair security posture.
According to Rankiteo, Bolt currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Bolt has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Bolt is not certified under SOC 2 Type 1.
According to Rankiteo, Bolt does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Bolt is not listed as GDPR compliant.
According to Rankiteo, Bolt does not currently maintain PCI DSS compliance.
According to Rankiteo, Bolt is not compliant with HIPAA regulations.
According to Rankiteo,Bolt is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Bolt operates primarily in the Software Development industry.
Bolt employs approximately 14,599 people worldwide.
Bolt presently has no subsidiaries across any sectors.
Bolt’s official LinkedIn profile has approximately 314,219 followers.
Bolt is classified under the NAICS code 5112, which corresponds to Software Publishers.
Yes, Bolt has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/mtakso.
Yes, Bolt maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/bolt-eu.
As of April 02, 2026, Rankiteo reports that Bolt has not experienced any cybersecurity incidents.
Bolt has an estimated 29,308 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Bolt has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
A security flaw has been discovered in itsourcecode Payroll Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /manage_user.php of the component Parameter Handler. Performing a manipulation of the argument ID results in sql injection. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks.
A vulnerability was identified in Axiomatic Bento4 up to 1.6.0-641. Affected is the function AP4_BitReader::SkipBits of the file Ap4Dac4Atom.cpp of the component DSI v1 Parser. Such manipulation of the argument n_presentations leads to heap-based buffer overflow. The attack needs to be performed locally. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability was determined in Axiomatic Bento4 up to 1.6.0-641. This impacts the function AP4_BitReader::ReadCache of the file Ap4Dac4Atom.cpp of the component MP4 File Parser. This manipulation causes heap-based buffer overflow. The attack needs to be launched locally. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.
iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, there is a heap-buffer-overflow (HBO) in icAnsiToUtf8() in the XML conversion path. The issue is triggered by a crafted ICC profile which causes icAnsiToUtf8(std::string&, char const*) to treat an input buffer as a C-string and call operations that rely on strlen()/null-termination. AddressSanitizer reports an out-of-bounds READ of size 115 past a 114-byte heap allocation, with the failure observed while running the iccToXml tool. This issue has been patched in version 2.3.1.6.
iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, there is a stack-buffer-overflow (SBO) in CIccTagFixedNum<>::GetValues() and a related bug chain. The primary crash is an AddressSanitizer-reported WRITE of size 4 that overflows a 4-byte stack variable (rv) via the call chain CIccTagFixedNum::GetValues() -> CIccTagStruct::GetElemNumberValue(). This issue has been patched in version 2.3.1.6.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.