Evite Company Cyber Security Posture

evite.com

Evite is the worldโ€™s leading digital platform for bringing people together to celebrate their most important life moments. With over 120 million users, Evite has sent more than 3 billion event invitations in its history, enabling approximately 3 billion unique face-to-face connections across all types of gatherings. Through easy-to-use and modern digital invitations, text, email, and shareable link delivery, a private message feed, gifting and donation options, and inspiring party content, Evite provides hosts and guests with the creative and practical tools they want and need to make their get-togethers effortless and even more memorable.

Evite Company Details

Linkedin ID:

evite

Employees number:

116 employees

Number of followers:

10563.0

NAICS:

none

Industry Type:

Technology, Information and Internet

Homepage:

evite.com

IP Addresses:

Scan still pending

Company ID:

EVI_3138812

Scan Status:

In-progress

AI scoreEvite Risk Score (AI oriented)

Between 200 and 800

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

Ailogo

Evite Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 200 and 800

Evite Company Cyber Security News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
EviteBreach60406/2019EVI15726323Link
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Evite, a social planning and e-invitations service admitted that they have experienced a data breach. At the time, a hacker named Gnosticplayers put up for sale the customer data of six companies, including Evite. The compromised information includes names, usernames, email addresses, passwords, and, if optionally provided to us, dates of birth, phone numbers, and mailing addresses. The hacker claimed to be selling ten million Evite user records that included full names, email addresses, IP addresses, and cleartext passwords. Evite said the malicious intruder stole an inactive data storage file that was holding information on some Evite user accounts.

Evite Company Subsidiaries

SubsidiaryImage

Evite is the worldโ€™s leading digital platform for bringing people together to celebrate their most important life moments. With over 120 million users, Evite has sent more than 3 billion event invitations in its history, enabling approximately 3 billion unique face-to-face connections across all types of gatherings. Through easy-to-use and modern digital invitations, text, email, and shareable link delivery, a private message feed, gifting and donation options, and inspiring party content, Evite provides hosts and guests with the creative and practical tools they want and need to make their get-togethers effortless and even more memorable.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=evite' -H 'apikey: YOUR_API_KEY_HERE'
newsone

Evite Cyber Security News

2025-06-30T07:00:00.000Z
Mother of All Breaches: โ€‹a Historic Data Leak Reveals 26 Billion Records

โ€œThe dataset is extremely dangerous as threat actors could leverage the aggregated data for a wide range of attacks, including identity theft,ย ...

2025-03-13T07:00:00.000Z
6 Potential Security Concerns With the Eventual Rollout of 6G

6G promises ultra-fast speeds but also introduces cybersecurity risks. Learn about six key security concerns as the technology evolves.

2024-12-09T08:00:00.000Z
SC Awards 2025: Nominations are now open

Nominations for 2025 SC Awards are open, and we are delighted to announce the return of SC Media's in-person celebration.

2025-04-16T07:00:00.000Z
Destructive Code: The Most Infamous Malware Attacks in History

With October being Cybersecurity Awareness Month, let's look back at infamous malware incidents that have shaped modern cybersecurityย ...

2024-08-21T07:00:00.000Z
Sssshhhh? The secret is out: Fake Punchbowl invites are phishing attempts

The secret is out. It's fake. A phishing attempt to get access to your data: and even the experts admit, it's a good one.

2024-08-22T07:00:00.000Z
2024 International Symposium on Cybercrime Response (ISCR): platform for elevating global cybersecurity

The event will serve as a platform for experts dedicated to building a robust cyber ecosystem to share their visions, ideas and investigativeย ...

2024-06-28T07:00:00.000Z
Why Multifactor Authentication Should No Longer Be Optional in Kโ€“12

MFA was originally seen as too expensive and complex for districts to manage and operate, especially in classroom environments.

2023-12-07T08:00:00.000Z
Cyber criminals attack businesses in Adobe-themed phishing surge | Cyber Security Hub

Researchers warn of a sharp increase in phishing emails carrying Adobe InDesign links.

2024-09-13T07:00:00.000Z
Indonesiaโ€™s Vulnerable Cybersecurity Puts SIPD at Risk

The National Data Center (PDN) ransomware attack in Indonesia at 20th June has had a detrimental impact on various ministries/institutions,

similarCompanies

Evite Similar Companies

Primary School

www.primaryschool.com.au is a directory of sites for students and lesson plans and reference material for teachers and parents. It is currently averaging up to 350,000 unique visitors a month and has over 44,000 subscribers to its free weekly newsletter which showcases the latest internet based reso

OYO is a global platform that aims to empower entrepreneurs and small businesses with hotels and homes by providing full-stack technology products and services that aims to increase revenue and ease operations; bringing easy-to-book, affordable, and trusted accommodation to customers around the worl

YouTube

YouTube is a team-oriented, creative workplace where every single employee has a voice in the choices we make and the features we implement. We work together in small teams to design, develop, and roll out key features and products in very short time frames. Which means something you write today cou

Mercado Livre Brasil

Fundada em 1999, MercadoLivre รฉ uma companhia de tecnologia lรญder em comรฉrcio eletrรดnico na Amรฉrica Latina. Por meio de suas principais plataformas MercadoLivre.com e MercadoPago.com, oferece soluรงรตes de comรฉrcio eletrรดnico para que pessoas e empresas possam comprar, vender, pagar e anunciar produto

Joomla!

Joomla, The CMS Trusted By Millions for their Websites Joomla is an award-winning content management system (CMS), which enables you to build Web sites and powerful online applications. Joomla is the mobile-ready and user-friendly way to build your website. Choose from thousands of features and d

We are a technology company that unlocks access to energy for the benefit of all. As innovators, thatโ€™s been our mission for nearly a century. Today, we face a global imperative to create a future with more energy, but less carbon. Our diverse, innovative change makers are focused on going further i

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Evite CyberSecurity History Information

How many cyber incidents has Evite faced?

Total Incidents: According to Rankiteo, Evite has faced 1 incident in the past.

What types of cybersecurity incidents have occurred at Evite?

Incident Types: The types of cybersecurity incidents that have occurred incident Breach.

Incident Details

Can you provide details on each incident?

Incident : Data Breach

Title: Evite Data Breach

Description: Evite, a social planning and e-invitations service, experienced a data breach where a hacker named Gnosticplayers put up for sale the customer data of six companies, including Evite. The compromised information includes names, usernames, email addresses, passwords, and, if optionally provided, dates of birth, phone numbers, and mailing addresses. The hacker claimed to be selling ten million Evite user records that included full names, email addresses, IP addresses, and cleartext passwords. Evite stated that the malicious intruder stole an inactive data storage file that was holding information on some Evite user accounts.

Type: Data Breach

Threat Actor: Gnosticplayers

Motivation: Financial Gain

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident?

Incident : Data Breach EVI15726323

Data Compromised: names, usernames, email addresses, passwords, dates of birth, phone numbers, mailing addresses, IP addresses

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are names, usernames, email addresses, passwords, dates of birth, phone numbers, mailing addresses and IP addresses.

Which entities were affected by each incident?

Incident : Data Breach EVI15726323

Entity Type: Company

Industry: Social Planning and E-invitations

Customers Affected: Ten million user records

Data Breach Information

What type of data was compromised in each breach?

Incident : Data Breach EVI15726323

Type of Data Compromised: names, usernames, email addresses, passwords, dates of birth, phone numbers, mailing addresses, IP addresses

Number of Records Exposed: Ten million

Sensitivity of Data: High

Data Exfiltration: True

Personally Identifiable Information: True

Initial Access Broker

How did the initial access broker gain entry for each incident?

Incident : Data Breach EVI15726323

Additional Questions

General Information

Who was the attacking group in the last incident?

Last Attacking Group: The attacking group in the last incident was an Gnosticplayers.

Impact of the Incidents

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident were names, usernames, email addresses, passwords, dates of birth, phone numbers, mailing addresses and IP addresses.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were names, usernames, email addresses, passwords, dates of birth, phone numbers, mailing addresses and IP addresses.

What was the number of records exposed in the most significant breach?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 0.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge