Badge
11,371 badges added since 01 January 2025
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions

At Five Below our growth is a result of the people who embrace our purpose: We know life is way better when you are free to Let Go & Have Fun in an amazing experience, filled with unlimited possibilities, priced so low, you can always say yes to the newest, coolest stuff! Just ask any of our over 27,000 associates who work at Five Below and they’ll tell you there’s no other place like it. It all starts with our purpose and then, The Five Below Way, which is our values and behaviors that each and every associate believes in. So if your heart is beating a little quicker and your smile is getting bigger now that you know what we’re all about, let’s just say your search for a one-of-a-kind experience that’s much more than a j-o-b just might be officially ending HERE. It’s all about culture at Five Below, making this a place that can inspire you as much as you inspire us with big ideas, super energy, passion, and the ability to make the workplace a WOWplace!

Five Below A.I CyberSecurity Scoring

Five Below

Company Details

Linkedin ID:

five-below

Employees number:

13,637

Number of followers:

216,246

NAICS:

43

Industry Type:

Retail

Homepage:

fivebelow.com

IP Addresses:

0

Company ID:

FIV_4813942

Scan Status:

In-progress

AI scoreFive Below Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/five-below.jpeg
Five Below Retail
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
Get a Score Increase
globalscoreFive Below Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/five-below.jpeg
Five Below Retail
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Five Below Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
Five BelowBreach85411/2018NA
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: The California Office of the Attorney General reported a data breach involving Five Below, Inc. on February 14, 2019. The breach, which occurred between November 13, 2018, and January 11, 2019, involved unauthorized access to customers' payment card information, such as card numbers and security codes. The number of affected individuals is currently unknown.

Five Below, Inc.
Breach
Severity: 85
Impact: 4
Seen: 11/2018
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: The California Office of the Attorney General reported a data breach involving Five Below, Inc. on February 14, 2019. The breach, which occurred between November 13, 2018, and January 11, 2019, involved unauthorized access to customers' payment card information, such as card numbers and security codes. The number of affected individuals is currently unknown.

Ailogo

Five Below Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Five Below

Incidents vs Retail Industry Average (This Year)

No incidents recorded for Five Below in 2026.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Five Below in 2026.

Incident Types Five Below vs Retail Industry Avg (This Year)

No incidents recorded for Five Below in 2026.

Incident History — Five Below (X = Date, Y = Severity)

Five Below cyber incidents detection timeline including parent company and subsidiaries

Five Below Company Subsidiaries

SubsidiaryImage

At Five Below our growth is a result of the people who embrace our purpose: We know life is way better when you are free to Let Go & Have Fun in an amazing experience, filled with unlimited possibilities, priced so low, you can always say yes to the newest, coolest stuff! Just ask any of our over 27,000 associates who work at Five Below and they’ll tell you there’s no other place like it. It all starts with our purpose and then, The Five Below Way, which is our values and behaviors that each and every associate believes in. So if your heart is beating a little quicker and your smile is getting bigger now that you know what we’re all about, let’s just say your search for a one-of-a-kind experience that’s much more than a j-o-b just might be officially ending HERE. It’s all about culture at Five Below, making this a place that can inspire you as much as you inspire us with big ideas, super energy, passion, and the ability to make the workplace a WOWplace!

Loading...
similarCompanies

Five Below Similar Companies

Hy-Vee, Inc.

Hy-Vee, Inc. is an employee-owned corporation operating more than 563 business units across nine Midwestern states with sales of more than $13 billion annually. The supermarket chain is synonymous with quality, variety, convenience, healthy lifestyles, culinary expertise and superior customer servic

The TJX Companies, Inc.

TJX is the leading off-price apparel and home fashions retailer in the U.S. and worldwide, with four global home offices, seven brands, nearly 4,700 stores in nine countries, and five distinctive branded e-commerce sites. As Associates, we make a difference with our contributions—collaborating in de

PT Lion Super Indo

Sejak tahun 1997, Super Indo telah bertumbuh dan berkembang di Indonesia melalui kemitraan bersama Ahold Delhaize yang berasal dari Belanda dan Salim Group dari Indonesia. Didukung lebih dari 10,000 karyawan* yang terlatih, Super Indo berhasil menyediakan berbagai macam barang kebutuhan sehari-hari

Sprouts Farmers Market

Sprouts is the place where goodness grows. True to its farm-stand heritage, Sprouts offers a unique grocery experience featuring an open layout with fresh produce at the heart of the store. Sprouts inspires wellness naturally with a carefully curated assortment of better-for-you products paired wit

Morrisons

Our team of friendly faces works as one to provide shopping trips and a career experience you won’t find anywhere else. Together we work the Morrisons way. Constantly looking to do things even better, we work in partnership with our communities, colleagues, suppliers and British farmers to provide

Bath & Body Works

We were founded on a simple idea: to make the world a brighter, happier place through the power of fragrance. As we've grown, so has our purpose and today, we help the world live more fully through the power of fragrance. We’re a team that cares about our customers and believes in giving them a rea

Al-Futtaim

Founded in the 1930s, Al-Futtaim has evolved into a leading conglomerate with a rich history of long-lasting and diverse expertise across automotive, retail, real estate, and finance sectors. As a family-owned business, we take a long-term view in everything we do because we believe that sustainable

Woolworths Group

Woolworths Group is one of Australia and New Zealand’s leading retail groups, supporting well-known brands such as Woolworths, Big W and Countdown. Our great team is focused on creating better experiences together, for our customers, our communities, and for each other. People are at the heart of e

Lojas Renner S.A.

We are a fashion and lifestyle ecosystem connected to our customers through digital channels and more than 600 stores in Brazil, Argentina and Uruguay. From the beginning, everything we do is to enchant. This is how our story began, in 1965, conquering important milestones, and today we are the lead

newsone

Five Below CyberSecurity News

March 30, 2026 06:06 AM
A Look At Five Below (FIVE) Valuation After Earnings Beat And 2026 Growth Guidance

Earnings and guidance put Five Below (FIVE) in focus Five Below (FIVE) has attracted fresh attention after reporting fourth quarter and full...

March 25, 2026 02:58 PM
Cramer: Five Below has ‘more room to run’ despite tripling in 12 months

Jim Cramer made a bold call on Five Below this week, and the numbers behind it are hard to argue with. “Stock has already more than tripled...

March 25, 2026 06:58 AM
Five Below’s Q4 Earnings Call: Our Top 5 Analyst Questions

Five Below delivered a strong fourth quarter, with management crediting its performance to a renewed focus on its core customer base—Gen...

March 25, 2026 06:49 AM
Zacks.com featured highlights include Micron, Five Below and Compania de Minas Buenaventura

Micron, Five Below and Buenaventura surge over 100% as momentum investing highlights strong earnings surprises and sustained price uptrends.

March 21, 2026 07:00 AM
CISA Flags Apple, Craft CMS, Laravel Bugs in KEV, Orders Patching by April 3, 2026

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added five security flaws impacting Apple, Craft CMS, and Laravel...

March 11, 2026 07:00 AM
Five Malicious Rust Crates and AI Bot Exploit CI/CD Pipelines to Steal Developer Secrets

Cybersecurity researchers have discovered five malicious Rust crates that masquerade as time-related utilities to transmit .env file data to...

March 04, 2026 08:00 AM
Top Ethical Hacking Tools With Starter Toolkits (2026)

Explore the top ethical hacking tools for validation, scanning, analysis, and more. Learn what each tool does and how it supports effective...

February 04, 2026 08:00 AM
Energy Subcommittee Advances Five Bills to Strengthen American Cybersecurity

WASHINGTON, D.C. – Today, Congressman Bob Latta (OH-05), Chairman of the Subcommittee on Energy, led a markup of five bills.

January 20, 2026 08:00 AM
15 Best Cybersecurity Certifications In 2026

Explore the 15 best cybersecurity certifications, including the requirements needed to earn them and the benefits each credential can have...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Five Below CyberSecurity History Information

Official Website of Five Below

The official website of Five Below is https://careers.fivebelow.com/us/en.

Five Below’s AI-Generated Cybersecurity Score

According to Rankiteo, Five Below’s AI-generated cybersecurity score is 793, reflecting their Fair security posture.

How many security badges does Five Below’ have ?

According to Rankiteo, Five Below currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has Five Below been affected by any supply chain cyber incidents ?

According to Rankiteo, Five Below has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.

Does Five Below have SOC 2 Type 1 certification ?

According to Rankiteo, Five Below is not certified under SOC 2 Type 1.

Does Five Below have SOC 2 Type 2 certification ?

According to Rankiteo, Five Below does not hold a SOC 2 Type 2 certification.

Does Five Below comply with GDPR ?

According to Rankiteo, Five Below is not listed as GDPR compliant.

Does Five Below have PCI DSS certification ?

According to Rankiteo, Five Below does not currently maintain PCI DSS compliance.

Does Five Below comply with HIPAA ?

According to Rankiteo, Five Below is not compliant with HIPAA regulations.

Does Five Below have ISO 27001 certification ?

According to Rankiteo,Five Below is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Five Below

Five Below operates primarily in the Retail industry.

Number of Employees at Five Below

Five Below employs approximately 13,637 people worldwide.

Subsidiaries Owned by Five Below

Five Below presently has no subsidiaries across any sectors.

Five Below’s LinkedIn Followers

Five Below’s official LinkedIn profile has approximately 216,246 followers.

NAICS Classification of Five Below

Five Below is classified under the NAICS code 43, which corresponds to Retail Trade.

Five Below’s Presence on Crunchbase

No, Five Below does not have a profile on Crunchbase.

Five Below’s Presence on LinkedIn

Yes, Five Below maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/five-below.

Cybersecurity Incidents Involving Five Below

As of April 02, 2026, Rankiteo reports that Five Below has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Five Below has an estimated 15,730 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Five Below ?

Incident Types: The types of cybersecurity incidents that have occurred include Breach.

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Data Breach at Five Below, Inc.

Description: The California Office of the Attorney General reported a data breach involving Five Below, Inc. on February 14, 2019. The breach, which occurred between November 13, 2018, and January 11, 2019, involved unauthorized access to customers' payment card information, such as card numbers and security codes. The number of affected individuals is currently unknown.

Date Detected: 2019-02-14

Date Publicly Disclosed: 2019-02-14

Type: Data Breach

Attack Vector: Unauthorized Access

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach FIV856080425

Data Compromised: Payment card information, Card numbers, Security codes

Payment Information Risk: High

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Payment Card Information, Card Numbers, Security Codes and .

Which entities were affected by each incident ?

Incident : Data Breach FIV856080425

Entity Name: Five Below, Inc.

Entity Type: Retail

Industry: Retail

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach FIV856080425

Type of Data Compromised: Payment card information, Card numbers, Security codes

Sensitivity of Data: High

References

Where can I find more information about each incident ?

Incident : Data Breach FIV856080425

Source: California Office of the Attorney General

Date Accessed: 2019-02-14

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney GeneralDate Accessed: 2019-02-14.

Additional Questions

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2019-02-14.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2019-02-14.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Payment card information, Card numbers, Security codes and .

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Security codes, Card numbers and Payment card information.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is California Office of the Attorney General.

cve

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:N/A:P
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=five-below' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge