Company Details
groupon
10,563
356,075
5112
greenhouse.io
0
GRO_7956297
In-progress


Groupon Vendor Cyber Rating & Cyber Score
greenhouse.ioGroupon is an experiences marketplace that brings people more ways to get the most out of their city or wherever they may be. By enabling real-time mobile commerce across local businesses, live events and travel destinations, Groupon helps people find and discover experiences––big and small, new and familiar––that make for a full, fun and rewarding life. Groupon helps local businesses grow and strengthen customer relationships––resulting in strong, vibrant communities. E-commerce never stands still, our transformation strategy, combined with our strong brand, customer base, and marketplace expertise, ensures we are constantly adapting to the evolving market landscape while delivering value for our customers and merchant partners. Groupon is on a radical journey to transform our business. To meet our aggressive goals we are in the process of building a culture that prioritises fast decisions, open communication, and relentless pursuit of results. In the spirit of transparency, things aren't perfect, there are still processes to change and bureaucracy to break so we need people who want to be on this journey with us. Check out our current opportunities with #TeamGroupon and join us on our exciting mission to become The Ultimate Destination For Local Experiences and Services.
Company Details
groupon
10,563
356,075
5112
greenhouse.io
0
GRO_7956297
In-progress
Between 700 and 749

Groupon Global Score (TPRM)XXXX

Description: A cybercriminal has admitted to hacking businesses like Uber, Sainsbury's, and Groupon to sell customers' personal information on the dark web. The other targets included Nectar, T-Mobile, Asda, Ladbrokes, Coral, and Argos. The data comprised all the information required to complete an online purchase and was then promoted and sold to clients through his dark website. The firm is thought to have lost more than £200,000 due to the theft, although no financial data was collected. West pleaded guilty to two counts of conspiring to defraud, one count of hacking a computer, four counts of possessing and supplying marijuana, two counts of having criminal property, and one crime of money laundering Bitcoins. The leaked data is related to a security breach on a third-party vendor.


No incidents recorded for Groupon in 2026.
No incidents recorded for Groupon in 2026.
No incidents recorded for Groupon in 2026.
Groupon cyber incidents detection timeline including parent company and subsidiaries

Groupon is an experiences marketplace that brings people more ways to get the most out of their city or wherever they may be. By enabling real-time mobile commerce across local businesses, live events and travel destinations, Groupon helps people find and discover experiences––big and small, new and familiar––that make for a full, fun and rewarding life. Groupon helps local businesses grow and strengthen customer relationships––resulting in strong, vibrant communities. E-commerce never stands still, our transformation strategy, combined with our strong brand, customer base, and marketplace expertise, ensures we are constantly adapting to the evolving market landscape while delivering value for our customers and merchant partners. Groupon is on a radical journey to transform our business. To meet our aggressive goals we are in the process of building a culture that prioritises fast decisions, open communication, and relentless pursuit of results. In the spirit of transparency, things aren't perfect, there are still processes to change and bureaucracy to break so we need people who want to be on this journey with us. Check out our current opportunities with #TeamGroupon and join us on our exciting mission to become The Ultimate Destination For Local Experiences and Services.


GlobalLogic, a Hitachi Group company, is a trusted partner in design, data, and digital engineering for the world’s largest and most innovative companies. Since our inception in 2000, we have been at the forefront of the digital revolution, helping to create some of the most widely used digital prod

The first business of Alibaba Group, Alibaba.com (www.alibaba.com) is the leading platform for global wholesale trade serving millions of buyers and suppliers around the world. Through Alibaba.com, small businesses can sell their products to companies in other countries. Sellers on Alibaba.com are t
Olá, somos a TOTVS! A maior empresa de tecnologia do Brasil. 🤓 Líder absoluta em sistemas e plataformas para empresas, a TOTVS possui mais de 70 mil clientes. Indo muito além do ERP, oferece tecnologia completa para digitalização dos negócios por meio de 3 unidades de negócio: - Gestão: ERPs, sol
Nielsen shapes the world’s media and content as a global leader in audience insights, data and analytics. Through our understanding of people and their behaviors across all channels and platforms, we empower our clients with independent and actionable intelligence so they can connect and engage with

About KPIT KPIT is reimagining the future of mobility, forging ahead with group companies and partners to shape a world that is cleaner, smarter, and safer. With over 25 years of specialized expertise in Mobility, KPIT is accelerating the transformation towards Software and AI-Defined Vehicles thr

Cisco is the worldwide technology leader that is revolutionizing the way organizations connect and protect in the AI era. For more than 40 years, Cisco has securely connected the world. With its industry leading AI-powered solutions and services, Cisco enables its customers, partners and communities

Autodesk is changing how the world is designed and made. Our technology spans architecture, engineering, construction, product design, manufacturing, and media and entertainment. We empower innovators everywhere to solve challenges, big and small. From greener buildings to smarter products and mo

A career at Booking.com is all about the journey, helping you explore new challenges in a place where you can be your best self. With plenty of exciting twists, turns and opportunities along the way. We’ve always been pioneers, on a mission to shape the future of travel through cutting edge techno
At Avaya, we give our customers the freedom to take their business in the directions that benefit them most. We provide the paths for both customers and their employees where every moment big and small can drive in the moment, memorable experiences. The journey is theirs at the pace that makes sense
.png)
Technology executive and AI entrepreneur to chair new committee as Company positions marketplace for the era of agentic commerceChicago,...
Many YouTubers partner with NordVPN to share exclusive discount codes with their audiences. These creators frequently endorse NordVPN for...
Data breaches are so common that you may be tempted to ignore them altogether. But doing so is a big mistake, cybersecurity experts say.
Coupons are a great way to save money on products and services, whether online or in physical stores.
The joke among cybersecurity experts is that there are two kinds of people: those who've been hacked and those who don't know it yet.
Atlanta startup Apptega, a cybersecurity management platform, has raised a $700K seed round to double their headcount and for product...
Fave on Feb 22 announced that Groupon Malaysia, a site for deals and discounts, will be consolidated under a single brand and operate as Fave moving forward.
Various outlets are reporting that Groupon accounts have been compromised and criminals are stealing thousands of dollars from Groupon users...
Groupon continues to streamline its business in Asia after it announced the sale of its operations in Indonesia to a somewhat unlikely buyer...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Groupon is https://job-boards.eu.greenhouse.io/groupon?.
According to Rankiteo, Groupon’s AI-generated cybersecurity score is 738, reflecting their Moderate security posture.
According to Rankiteo, Groupon currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Groupon has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Groupon is not certified under SOC 2 Type 1.
According to Rankiteo, Groupon does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Groupon is not listed as GDPR compliant.
According to Rankiteo, Groupon does not currently maintain PCI DSS compliance.
According to Rankiteo, Groupon is not compliant with HIPAA regulations.
According to Rankiteo,Groupon is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Groupon operates primarily in the Software Development industry.
Groupon employs approximately 10,563 people worldwide.
Groupon presently has no subsidiaries across any sectors.
Groupon’s official LinkedIn profile has approximately 356,075 followers.
Groupon is classified under the NAICS code 5112, which corresponds to Software Publishers.
Yes, Groupon has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/groupon.
Yes, Groupon maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/groupon.
As of April 02, 2026, Rankiteo reports that Groupon has experienced 1 cybersecurity incidents.
Groupon has an estimated 29,308 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Total Financial Loss: The total financial loss from these incidents is estimated to be $200 thousand.
Title: Cybercriminal Hacks Multiple Businesses to Sell Customer Data
Description: A cybercriminal has admitted to hacking businesses like Uber, Sainsbury's, and Groupon to sell customers' personal information on the dark web.
Type: Data Breach
Attack Vector: Third-Party Vendor Breach
Threat Actor: Cybercriminal (unspecified individual)
Motivation: Financial Gain
Common Attack Types: The most common types of attacks the company has faced is Breach.
Average Financial Loss: The average financial loss per incident is $200.00 thousand.
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information.

Entity Name: T-Mobile
Entity Type: Company
Industry: Telecommunications

Type of Data Compromised: Personal Information
Last Attacking Group: The attacking group in the last incident was an Cybercriminal (unspecified individual).
Highest Financial Loss: The highest financial loss from an incident was £200,000.
Most Significant Data Compromised: The most significant data compromised in an incident was Personal Information.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Personal Information.
.png)
A security flaw has been discovered in itsourcecode Payroll Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /manage_user.php of the component Parameter Handler. Performing a manipulation of the argument ID results in sql injection. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks.
A vulnerability was identified in Axiomatic Bento4 up to 1.6.0-641. Affected is the function AP4_BitReader::SkipBits of the file Ap4Dac4Atom.cpp of the component DSI v1 Parser. Such manipulation of the argument n_presentations leads to heap-based buffer overflow. The attack needs to be performed locally. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.
A vulnerability was determined in Axiomatic Bento4 up to 1.6.0-641. This impacts the function AP4_BitReader::ReadCache of the file Ap4Dac4Atom.cpp of the component MP4 File Parser. This manipulation causes heap-based buffer overflow. The attack needs to be launched locally. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.
iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, there is a heap-buffer-overflow (HBO) in icAnsiToUtf8() in the XML conversion path. The issue is triggered by a crafted ICC profile which causes icAnsiToUtf8(std::string&, char const*) to treat an input buffer as a C-string and call operations that rely on strlen()/null-termination. AddressSanitizer reports an out-of-bounds READ of size 115 past a 114-byte heap allocation, with the failure observed while running the iccToXml tool. This issue has been patched in version 2.3.1.6.
iccDEV provides a set of libraries and tools for working with ICC color management profiles. Prior to version 2.3.1.6, there is a stack-buffer-overflow (SBO) in CIccTagFixedNum<>::GetValues() and a related bug chain. The primary crash is an AddressSanitizer-reported WRITE of size 4 that overflows a 4-byte stack variable (rv) via the call chain CIccTagFixedNum::GetValues() -> CIccTagStruct::GetElemNumberValue(). This issue has been patched in version 2.3.1.6.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.