Company Details
general-mills
24,800
776,292
30
generalmills.com
77
GEN_9070107
Completed


General Mills Vendor Cyber Rating & Cyber Score
generalmills.comWe exist to make food the world loves. But we do more than that. General Mills is a place that prioritizes being a force for good, a place to expand learning, explore new perspectives and reimagine new possibilities, every day. We look for people who want to bring their best—bold thinkers with big hearts who challenge one other and grow together. Because becoming the undisputed leader in food means surrounding ourselves with people who are hungry for what’s next.
Company Details
general-mills
24,800
776,292
30
generalmills.com
77
GEN_9070107
Completed
Between 700 and 749

General Mills Global Score (TPRM)XXXX

Description: Project Compass Disrupts "The Com" Extremist Network in First Year of Operation In its inaugural year, Project Compass a multinational initiative has achieved significant operational results against "The Com", a decentralized extremist network targeting minors and vulnerable individuals both online and offline. The project, which facilitates coordinated investigations, rapid threat response, and structured information sharing among 28 countries, has led to the identification of 179 perpetrators and 62 victims since January 2025. Among its key outcomes, Project Compass has supported nine joint awareness-raising activities, reinforcing cross-border collaboration in countering digital extremism. The effort underscores the growing role of international partnerships in addressing transnational cyber threats. Separately, a recent legal ruling by the Tenth Circuit Court determined that the Fourth Amendment does not justify broad searches of protesters’ digital devices, setting a precedent for digital privacy protections. Meanwhile, a convicted online predator pleaded guilty to hacking social media accounts and extorting hundreds of teens and young adults, highlighting the persistent risks of digital exploitation. In other developments, Israel reportedly launched the largest cyberattack in history against Iran, causing widespread disruptions. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) also released new guidance on establishing multi-disciplinary insider threat management teams, while hacktivists claimed to have breached the Department of Homeland Security (DHS), leaking ICE contract data. Additional incidents include a South Korean police error that resulted in the loss of seized cryptocurrency after posting a password online, and a Connecticut Senate bill proposing stricter data breach response requirements. Meanwhile, Iowa accused General Motors of failing to disclose OnStar data-sharing practices, and Insight Hospital and Medical Center suffered a data leak exposing sensitive information on the dark web.
Description: The Washington State Office of the Attorney General reported a data breach involving General Mills, Inc. on January 12, 2023. The breach, which occurred between November 18 and December 31, 2022, compromised the names and full dates of birth of approximately 18,268 users. This incident highlights the vulnerability of personal information and the importance of robust cybersecurity measures to protect sensitive data.


No incidents recorded for General Mills in 2026.
No incidents recorded for General Mills in 2026.
No incidents recorded for General Mills in 2026.
General Mills cyber incidents detection timeline including parent company and subsidiaries

We exist to make food the world loves. But we do more than that. General Mills is a place that prioritizes being a force for good, a place to expand learning, explore new perspectives and reimagine new possibilities, every day. We look for people who want to bring their best—bold thinkers with big hearts who challenge one other and grow together. Because becoming the undisputed leader in food means surrounding ourselves with people who are hungry for what’s next.

About Working with Future Group gives you an opportunity to be part of a family with a unique culture and beliefs. Drawing from the vision of modern Indian retail, we have built a company that our people are proud of and our customers and communities value. Mission We share the vision and b

Amway is a business owner-led health and wellbeing company based in Ada, Michigan, USA. It is committed to helping people live better, healthier lives across more than 100 markets and territories worldwide. Top-selling brands for Amway are Nutrilite™, Artistry™, and XS™ —all sold exclusively by entr

Prysmian is a global cabling solutions provider leading the energy transition and digital transformation. By leveraging its wide geographical footprint and extensive product range, its track record of technological leadership and innovation, and a strong customer base, the company is well-placed to

As a company, we dream big to create a future with more cheers. We are always looking to serve up new ways to meet life’s moments, move our industry forward and make a meaningful impact in the world. We are committed to building great brands that stand the test of time and to brewing the best beers

We operate on the belief that our people are our core assets and we consistently endeavour towards developing their potential to be our future leaders and key employees. We currently operate in India, South Africa, Liberia and Namibia, through our various subsidiaries. We seek to attract talent espe

We are the LEGO Group, the company behind the world’s most loved LEGO® bricks. Our brand name derived from the two Danish words Leg Godt, which mean “Play Well”. We’ve been sparking imaginations and inspiring the builders of tomorrow since 1932. This is our mission and what motivates our colleague

Beware of recruitment scams! Please read important information for job seekers: https://www.dupont.com/careers/hiring-faqs.html We’re creating advanced solutions that help transform industries and improve everyday life across our key markets of healthcare, water, construction and transformation. At

P&G was founded more than 185 years ago as a soap and candle company. Today, we’re one of the world’s largest consumer goods companies and home to iconic, trusted brands, including Always®, Charmin®, Braun®, Fairy®, Febreze®, Gillette®, Head & Shoulders®, Oral B®, Pantene®, Pampers®, Tide®, and Vick

RPG Group, established in 1979 and headquartered in Mumbai, is one of India's fastest growing diversified business group with a turnover in excess of US$5.2 billion. The Group has a presence in the core sectors of the economy - Infrastructure (KEC International), Mobility (CEAT), Information Technol
.png)
The world's largest outdoor 4K video boards, interconnected LED screens and ribbon boards will provide an immersive game day experience,...
The food and beverage industry runs on complex supply chains where every system depends on the other. And with digital tools now handling...
Bessemer Venture Partners leads Valence's $50M Series B to make AI coaching accessible across the Fortune 1000.
Over the weekend, the human resources technology giant confirmed that threat actors accessed a third-party customer relationship database,...
CNBC's Jim Cramer on Wednesday picked out five sectors that he thinks are performing well in the current economic environment, and he gave...
General Mills is shifting away from using certified colors in all foods, starting with what's being served in K-12 schools.
Here are the cybersecurity job openings in the USA as of March 20, 2025, including on-site, hybrid, and remote roles.
An in-depth analysis chronicling more than 300 school cyberattacks over the past five years reveals the degree to which school leaders in virtually every state...
General Mills India, a division of US-based General Mills Inc., known for popular food brands, including Pillsbury, Betty Crocker,...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of General Mills is http://www.generalmills.com.
According to Rankiteo, General Mills’s AI-generated cybersecurity score is 737, reflecting their Moderate security posture.
According to Rankiteo, General Mills currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, General Mills has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, General Mills is not certified under SOC 2 Type 1.
According to Rankiteo, General Mills does not hold a SOC 2 Type 2 certification.
According to Rankiteo, General Mills is not listed as GDPR compliant.
According to Rankiteo, General Mills does not currently maintain PCI DSS compliance.
According to Rankiteo, General Mills is not compliant with HIPAA regulations.
According to Rankiteo,General Mills is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
General Mills operates primarily in the Manufacturing industry.
General Mills employs approximately 24,800 people worldwide.
General Mills presently has no subsidiaries across any sectors.
General Mills’s official LinkedIn profile has approximately 776,292 followers.
General Mills is classified under the NAICS code 30, which corresponds to Manufacturing.
No, General Mills does not have a profile on Crunchbase.
Yes, General Mills maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/general-mills.
As of April 03, 2026, Rankiteo reports that General Mills has experienced 2 cybersecurity incidents.
General Mills has an estimated 8,082 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with project compass (multinational initiative), and containment measures with identification of 179 perpetrators, disruption of network operations, and communication strategy with joint awareness-raising activities (9)..
Title: Data Breach at General Mills, Inc.
Description: The Washington State Office of the Attorney General reported a data breach involving General Mills, Inc. on January 12, 2023. The breach, which occurred between November 18 and December 31, 2022, compromised the names and full dates of birth of approximately 18,268 users.
Date Detected: 2023-01-12
Date Publicly Disclosed: 2023-01-12
Type: Data Breach
Title: Project Compass Disrupts 'The Com' Extremist Network
Description: Project Compass, a multinational initiative, disrupted 'The Com', a decentralized extremist network targeting minors and vulnerable individuals online and offline. The project identified 179 perpetrators and 62 victims, supported joint awareness-raising activities, and reinforced cross-border collaboration in countering digital extremism.
Date Detected: 2025-01-01
Type: Cyber Extremism
Attack Vector: Social EngineeringAccount Hacking
Threat Actor: The Com (Decentralized Extremist Network)
Motivation: Ideological ExtremismExploitation of Minors
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Names, Full dates of birth

Operational Impact: Disruption of extremist network operations
Identity Theft Risk: High (for victims)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Full Dates Of Birth, , Sensitive Information, Personally Identifiable Information and .

Entity Name: General Mills, Inc.
Entity Type: Corporation
Industry: Food and Beverage
Customers Affected: 18268

Entity Name: The Com
Entity Type: Extremist Network
Industry: Cyber Extremism
Location: Global (28 countries)
Customers Affected: 62 victims (minors and vulnerable individuals)

Entity Name: Online Predator (Unnamed)
Entity Type: Individual
Location: United States
Customers Affected: Hundreds of teens and young adults

Entity Name: Insight Hospital and Medical Center
Entity Type: Healthcare Provider
Industry: Healthcare
Location: United States

Third Party Assistance: Project Compass (Multinational Initiative)
Containment Measures: Identification of 179 perpetrators, disruption of network operations
Communication Strategy: Joint awareness-raising activities (9)
Third-Party Assistance: The company involves third-party assistance in incident response through Project Compass (Multinational Initiative).

Type of Data Compromised: Names, Full dates of birth
Number of Records Exposed: 18268

Type of Data Compromised: Sensitive information, Personally identifiable information
Sensitivity of Data: High
Data Exfiltration: Leaked on dark web (Insight Hospital and Medical Center)
Personally Identifiable Information: Yes
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by identification of 179 perpetrators and disruption of network operations.

Legal Actions: Tenth Circuit Court ruling on Fourth Amendment and digital device searches, Connecticut Senate bill proposing stricter data breach response requirements,
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Tenth Circuit Court ruling on Fourth Amendment and digital device searches, Connecticut Senate bill proposing stricter data breach response requirements, .

Lessons Learned: Importance of international partnerships in countering transnational cyber threats and digital extremism.

Recommendations: Enhance cross-border collaboration in cyber threat investigations, Implement stricter data privacy protections for minors, Adopt multi-disciplinary insider threat management teams (CISA guidance)Enhance cross-border collaboration in cyber threat investigations, Implement stricter data privacy protections for minors, Adopt multi-disciplinary insider threat management teams (CISA guidance)Enhance cross-border collaboration in cyber threat investigations, Implement stricter data privacy protections for minors, Adopt multi-disciplinary insider threat management teams (CISA guidance)
Key Lessons Learned: The key lessons learned from past incidents are Importance of international partnerships in countering transnational cyber threats and digital extremism.

Source: Washington State Office of the Attorney General
Date Accessed: 2023-01-12

Source: Project Compass

Source: Tenth Circuit Court Ruling

Source: CISA Guidance on Insider Threat Management
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Washington State Office of the Attorney GeneralDate Accessed: 2023-01-12, and Source: Project Compass, and Source: Tenth Circuit Court Ruling, and Source: CISA Guidance on Insider Threat Management.

Investigation Status: Ongoing
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Joint awareness-raising activities (9).

Stakeholder Advisories: Cross-border collaboration and awareness-raising activities
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Cross-border collaboration and awareness-raising activities.

High Value Targets: Minors and vulnerable individuals
Data Sold on Dark Web: Minors and vulnerable individuals

Root Causes: Decentralized Extremist Networks Exploiting Digital Platforms, Lack Of Stringent Data Privacy Protections For Minors,
Corrective Actions: Strengthening International Cyber Threat Response Frameworks, Enhancing Digital Privacy Laws,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Project Compass (Multinational Initiative).
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Strengthening International Cyber Threat Response Frameworks, Enhancing Digital Privacy Laws, .
Last Attacking Group: The attacking group in the last incident was an The Com (Decentralized Extremist Network).
Most Recent Incident Detected: The most recent incident detected was on 2023-01-12.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2023-01-12.
Most Significant Data Compromised: The most significant data compromised in an incident were names, full dates of birth and .
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Project Compass (Multinational Initiative).
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Identification of 179 perpetrators and disruption of network operations.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were names and full dates of birth.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 250.0.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Tenth Circuit Court ruling on Fourth Amendment and digital device searches, Connecticut Senate bill proposing stricter data breach response requirements, .
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Importance of international partnerships in countering transnational cyber threats and digital extremism.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Implement stricter data privacy protections for minors, Adopt multi-disciplinary insider threat management teams (CISA guidance) and Enhance cross-border collaboration in cyber threat investigations.
Most Recent Source: The most recent source of information about an incident are Washington State Office of the Attorney General, CISA Guidance on Insider Threat Management, Project Compass and Tenth Circuit Court Ruling.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Cross-border collaboration and awareness-raising activities, .
.png)
A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.