
Bumble Inc. Company Cyber Security Posture
bumble.comBumble Inc. is a connections company with a suite of products that bring people together throughout their lives. The companyโs foundations began in 2014, when Whitney Wolfe Herd founded Bumble, our women-first app which is built around the principles of kindness, respect and equality. Bumble connects people across dating (Bumble Date), friendship (Bumble For Friends) and professional networking (Bumble Bizz). Our wider portfolio includes dating apps Badoo, which was founded in 2006 as one of the pioneers of web and mobile dating products, Fruitz founded in 2017, which encourages open and honest communication of dating intentions through playful fruit metaphors, and Official, an app for couples that promotes open and honest communication between partners and was founded in 2020. In 2024, Bumble Inc. also acquired Geneva to help people discover and find groups of friends online to build connections offline.
Bumble Inc. Company Details
bumbleinc
1299 employees
247227.0
511
Software Development
bumble.com
Scan still pending
BUM_2520525
In-progress

Between 900 and 1000
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

Bumble Inc. Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 900 and 1000 |
Bumble Inc. Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
Badoo | Data Leak | 85 | 4 | 06/2016 | BAD225424123 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: In June 2016, the social website Badoo suffered a data breach. The exposed data contained 112 million unique email addresses with personal data including names, birthdates and passwords stored as MD5 hashes. |
Bumble Inc. Company Subsidiaries

Bumble Inc. is a connections company with a suite of products that bring people together throughout their lives. The companyโs foundations began in 2014, when Whitney Wolfe Herd founded Bumble, our women-first app which is built around the principles of kindness, respect and equality. Bumble connects people across dating (Bumble Date), friendship (Bumble For Friends) and professional networking (Bumble Bizz). Our wider portfolio includes dating apps Badoo, which was founded in 2006 as one of the pioneers of web and mobile dating products, Fruitz founded in 2017, which encourages open and honest communication of dating intentions through playful fruit metaphors, and Official, an app for couples that promotes open and honest communication between partners and was founded in 2020. In 2024, Bumble Inc. also acquired Geneva to help people discover and find groups of friends online to build connections offline.
Access Data Using Our API

Get company history
.png)
Bumble Inc. Cyber Security News
Credential-Harvesting Blitz Puts Tinder, News Corp, Chick-fil-A on Alert
Scattered Spider has spent months trying to trick workers for some of the world's biggest brands into sharing their passwords.
Bumble names Ronald Fior as interim finance chief
Bumble (BMBL.O) on Friday named Ronald Fior, currently a partner of financial consulting firm FLG Partners, as the interim finance chief of the dating appย ...
From Swipe to Scare: Data Privacy and Cyber Security Concerns in Dating Apps
How can dating apps put my personal information at risk? Some sites might lack strong security systems. This leaves your account vulnerable.
Bumble (BMBL) Appoints Interim Chief Financial Officer
Bumble Inc. (NASDAQ: BMBL) today announced the appointment of Ronald J. Fior as the Company's Interim Chief Financial Officer,ย ...
Candy Crush, Tinder, MyFitnessPal: See the Thousands of Apps Hijacked to Spy on Your Location
A hack of location data company Gravy Analytics has revealed which apps areโknowingly or notโbeing used to collect your information behindย ...
Are online dating and data privacy an incompatible match?
Dating is certainly fun, but it can be very stressful. What to wear, where to go, what details of your life to share, topics to avoid.
4 Tech Stocks Under $10 to Add to Your Portfolio in 2025
Here are four under-$10 tech stocks, SSYS, PHUN, BMBL and VTEX, which are poised for growth in 2025, driven by AI, cloud computing andย ...
Austin tech hiring update: SXSW's new president, Bumble's new business officer and crypto miner's interim CEO
In this story, we explore the most exciting new hires from the Austin tech and startup ecosystems. We look at key moves made by SXSW,ย ...
Tech layoffs update May 2025: Panasonic, Match Group, CrowdStrike, among latest to cut jobs
Panasonic Holdings, CrowdStrike, and dating app giant Match Group are among the tech companies that are reducing their workforces.

Bumble Inc. Similar Companies

Atlassian
Atlassian powers the collaboration that helps teams accomplish what would otherwise be impossible alone. From space missions and motor racing to bugs in code and IT requests, no task is too large or too small with the right team, the right tools, and the right practices. Over 300,000 global compa

Zoho
Zoho offers beautifully smart software to help you grow your business. With over 100 million users worldwide, Zoho's 55+ products aid your sales and marketing, support and collaboration, finance, and recruitment needsโletting you focus only on your business. Zoho respects user privacy and does not h

Founded in 2003, LinkedIn connects the world's professionals to make them more productive and successful. With more than 1 billion members worldwide, including executives from every Fortune 500 company, LinkedIn is the world's largest professional network. The company has a diversified business mode

Thomson Reuters
Thomson Reuters is the worldโs leading provider of news and information-based tools to professionals. Our worldwide network of journalists and specialist editors keep customers up to speed on global developments, with a particular focus on legal, regulatory and tax changes. Our customers operat

Groupon
Groupon is an experiences marketplace that brings people more ways to get the most out of their city or wherever they may be. By enabling real-time mobile commerce across local businesses, live events and travel destinations, Groupon helps people find and discover experiencesโโbig and small, new and

Microsoft Mechanics
Apply the newest engineering from Microsoft to the work you do every day. Mechanics is Microsoft's official video series for IT Pros, Solution Architects, Developers, and Tech Enthusiasts. Watch as Microsoft engineers show you how to get the most from the software, service, and hardware they built

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
Bumble Inc. CyberSecurity History Information
How many cyber incidents has Bumble Inc. faced?
Total Incidents: According to Rankiteo, Bumble Inc. has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at Bumble Inc.?
Incident Types: The types of cybersecurity incidents that have occurred incident Data Leak.
Incident Details
Can you provide details on each incident?

Incident : Data Breach
Title: Badoo Data Breach
Description: In June 2016, the social website Badoo suffered a data breach. The exposed data contained 112 million unique email addresses with personal data including names, birthdates and passwords stored as MD5 hashes.
Date Detected: June 2016
Type: Data Breach
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Data Leak.
Impact of the Incidents
What was the impact of each incident?

Incident : Data Breach BAD225424123
Data Compromised: Email addresses, Names, Birthdates, Passwords (MD5 hashes)
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Email addresses, Names, Birthdates and Passwords (MD5 hashes).
Which entities were affected by each incident?

Incident : Data Breach BAD225424123
Entity Type: Social Website
Industry: Social Media
Customers Affected: 112000000
Data Breach Information
What type of data was compromised in each breach?

Incident : Data Breach BAD225424123
Type of Data Compromised: Email addresses, Names, Birthdates, Passwords (MD5 hashes)
Number of Records Exposed: 112000000
Additional Questions
Incident Details
What was the most recent incident detected?
Most Recent Incident Detected: The most recent incident detected was on June 2016.
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were Email addresses, Names, Birthdates and Passwords (MD5 hashes).
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Email addresses, Names, Birthdates and Passwords (MD5 hashes).
What was the number of records exposed in the most significant breach?
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 112.0.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
