Company Details
five-below
13,637
216,246
43
fivebelow.com
0
FIV_4813942
In-progress


Five Below Vendor Cyber Rating & Cyber Score
fivebelow.comAt Five Below our growth is a result of the people who embrace our purpose: We know life is way better when you are free to Let Go & Have Fun in an amazing experience, filled with unlimited possibilities, priced so low, you can always say yes to the newest, coolest stuff! Just ask any of our over 27,000 associates who work at Five Below and they’ll tell you there’s no other place like it. It all starts with our purpose and then, The Five Below Way, which is our values and behaviors that each and every associate believes in. So if your heart is beating a little quicker and your smile is getting bigger now that you know what we’re all about, let’s just say your search for a one-of-a-kind experience that’s much more than a j-o-b just might be officially ending HERE. It’s all about culture at Five Below, making this a place that can inspire you as much as you inspire us with big ideas, super energy, passion, and the ability to make the workplace a WOWplace!
Company Details
five-below
13,637
216,246
43
fivebelow.com
0
FIV_4813942
In-progress
Between 750 and 799

Five Below Global Score (TPRM)XXXX

Description: The California Office of the Attorney General reported a data breach involving Five Below, Inc. on February 14, 2019. The breach, which occurred between November 13, 2018, and January 11, 2019, involved unauthorized access to customers' payment card information, such as card numbers and security codes. The number of affected individuals is currently unknown.


No incidents recorded for Five Below in 2026.
No incidents recorded for Five Below in 2026.
No incidents recorded for Five Below in 2026.
Five Below cyber incidents detection timeline including parent company and subsidiaries

At Five Below our growth is a result of the people who embrace our purpose: We know life is way better when you are free to Let Go & Have Fun in an amazing experience, filled with unlimited possibilities, priced so low, you can always say yes to the newest, coolest stuff! Just ask any of our over 27,000 associates who work at Five Below and they’ll tell you there’s no other place like it. It all starts with our purpose and then, The Five Below Way, which is our values and behaviors that each and every associate believes in. So if your heart is beating a little quicker and your smile is getting bigger now that you know what we’re all about, let’s just say your search for a one-of-a-kind experience that’s much more than a j-o-b just might be officially ending HERE. It’s all about culture at Five Below, making this a place that can inspire you as much as you inspire us with big ideas, super energy, passion, and the ability to make the workplace a WOWplace!

Hy-Vee, Inc. is an employee-owned corporation operating more than 563 business units across nine Midwestern states with sales of more than $13 billion annually. The supermarket chain is synonymous with quality, variety, convenience, healthy lifestyles, culinary expertise and superior customer servic

TJX is the leading off-price apparel and home fashions retailer in the U.S. and worldwide, with four global home offices, seven brands, nearly 4,700 stores in nine countries, and five distinctive branded e-commerce sites. As Associates, we make a difference with our contributions—collaborating in de

Sejak tahun 1997, Super Indo telah bertumbuh dan berkembang di Indonesia melalui kemitraan bersama Ahold Delhaize yang berasal dari Belanda dan Salim Group dari Indonesia. Didukung lebih dari 10,000 karyawan* yang terlatih, Super Indo berhasil menyediakan berbagai macam barang kebutuhan sehari-hari
Sprouts is the place where goodness grows. True to its farm-stand heritage, Sprouts offers a unique grocery experience featuring an open layout with fresh produce at the heart of the store. Sprouts inspires wellness naturally with a carefully curated assortment of better-for-you products paired wit

Our team of friendly faces works as one to provide shopping trips and a career experience you won’t find anywhere else. Together we work the Morrisons way. Constantly looking to do things even better, we work in partnership with our communities, colleagues, suppliers and British farmers to provide

We were founded on a simple idea: to make the world a brighter, happier place through the power of fragrance. As we've grown, so has our purpose and today, we help the world live more fully through the power of fragrance. We’re a team that cares about our customers and believes in giving them a rea

Founded in the 1930s, Al-Futtaim has evolved into a leading conglomerate with a rich history of long-lasting and diverse expertise across automotive, retail, real estate, and finance sectors. As a family-owned business, we take a long-term view in everything we do because we believe that sustainable
Woolworths Group is one of Australia and New Zealand’s leading retail groups, supporting well-known brands such as Woolworths, Big W and Countdown. Our great team is focused on creating better experiences together, for our customers, our communities, and for each other. People are at the heart of e

We are a fashion and lifestyle ecosystem connected to our customers through digital channels and more than 600 stores in Brazil, Argentina and Uruguay. From the beginning, everything we do is to enchant. This is how our story began, in 1965, conquering important milestones, and today we are the lead
.png)
Earnings and guidance put Five Below (FIVE) in focus Five Below (FIVE) has attracted fresh attention after reporting fourth quarter and full...
Jim Cramer made a bold call on Five Below this week, and the numbers behind it are hard to argue with. “Stock has already more than tripled...
Five Below delivered a strong fourth quarter, with management crediting its performance to a renewed focus on its core customer base—Gen...
Micron, Five Below and Buenaventura surge over 100% as momentum investing highlights strong earnings surprises and sustained price uptrends.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added five security flaws impacting Apple, Craft CMS, and Laravel...
Cybersecurity researchers have discovered five malicious Rust crates that masquerade as time-related utilities to transmit .env file data to...
Explore the top ethical hacking tools for validation, scanning, analysis, and more. Learn what each tool does and how it supports effective...
WASHINGTON, D.C. – Today, Congressman Bob Latta (OH-05), Chairman of the Subcommittee on Energy, led a markup of five bills.
Explore the 15 best cybersecurity certifications, including the requirements needed to earn them and the benefits each credential can have...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Five Below is https://careers.fivebelow.com/us/en.
According to Rankiteo, Five Below’s AI-generated cybersecurity score is 793, reflecting their Fair security posture.
According to Rankiteo, Five Below currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Five Below has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Five Below is not certified under SOC 2 Type 1.
According to Rankiteo, Five Below does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Five Below is not listed as GDPR compliant.
According to Rankiteo, Five Below does not currently maintain PCI DSS compliance.
According to Rankiteo, Five Below is not compliant with HIPAA regulations.
According to Rankiteo,Five Below is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Five Below operates primarily in the Retail industry.
Five Below employs approximately 13,637 people worldwide.
Five Below presently has no subsidiaries across any sectors.
Five Below’s official LinkedIn profile has approximately 216,246 followers.
Five Below is classified under the NAICS code 43, which corresponds to Retail Trade.
No, Five Below does not have a profile on Crunchbase.
Yes, Five Below maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/five-below.
As of April 02, 2026, Rankiteo reports that Five Below has experienced 1 cybersecurity incidents.
Five Below has an estimated 15,730 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Title: Data Breach at Five Below, Inc.
Description: The California Office of the Attorney General reported a data breach involving Five Below, Inc. on February 14, 2019. The breach, which occurred between November 13, 2018, and January 11, 2019, involved unauthorized access to customers' payment card information, such as card numbers and security codes. The number of affected individuals is currently unknown.
Date Detected: 2019-02-14
Date Publicly Disclosed: 2019-02-14
Type: Data Breach
Attack Vector: Unauthorized Access
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Payment card information, Card numbers, Security codes
Payment Information Risk: High
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Payment Card Information, Card Numbers, Security Codes and .

Type of Data Compromised: Payment card information, Card numbers, Security codes
Sensitivity of Data: High

Source: California Office of the Attorney General
Date Accessed: 2019-02-14
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney GeneralDate Accessed: 2019-02-14.
Most Recent Incident Detected: The most recent incident detected was on 2019-02-14.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2019-02-14.
Most Significant Data Compromised: The most significant data compromised in an incident were Payment card information, Card numbers, Security codes and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Security codes, Card numbers and Payment card information.
Most Recent Source: The most recent source of information about an incident is California Office of the Attorney General.
.png)
A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.