
ShareThis Company Cyber Security Posture
sharethis.comShareThis, a Predactiv Company has unlocked the power of global digital behavior by synthesizing social share, interest, and intent data since 2007. Powered by consumer behavior on over three million global domains, ShareThis, a Predactiv Company observes real-time actions from real people on real digital destinations. We transform user-level behavioral data to better understand, validate, and expand consumer behavior for targeting and activation, customer acquisition, and insights and analytics.
ShareThis Company Details
sharethis
48 employees
8580.0
none
Technology, Information and Internet
sharethis.com
Scan still pending
SHA_3226677
In-progress

Between 200 and 800
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

ShareThis Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 200 and 800 |
ShareThis Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
ShareThis, Inc. | Breach | 85 | 4 | 7/2018 | SHA130072725 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: The California Office of the Attorney General reported on February 28, 2019, that ShareThis, Inc. experienced a data breach likely occurring in July 2018. The breach involved unauthorized access to names, email addresses, hashed passwords, and some birth dates of an unknown number of California residents, following a report by The Register indicating that the affected data was posted for sale on the dark web. |
ShareThis Company Subsidiaries

ShareThis, a Predactiv Company has unlocked the power of global digital behavior by synthesizing social share, interest, and intent data since 2007. Powered by consumer behavior on over three million global domains, ShareThis, a Predactiv Company observes real-time actions from real people on real digital destinations. We transform user-level behavioral data to better understand, validate, and expand consumer behavior for targeting and activation, customer acquisition, and insights and analytics.
Access Data Using Our API

Get company history
.png)
ShareThis Cyber Security News
UM, Blackfoot Communications Partner on Critical Cybersecurity Effort
The University of Montana and Blackfoot Communications have launched a partnership to strengthen cybersecurity defense in rural areas of Montana.
UM partners with Blackfoot on cybersecurity program
(Missoula Current) The University of Montana and Blackfoot Communications have launched a partnership to strengthen cybersecurity defense inย ...
Home for the holidays? Share this top cybersecurity advice with friends and family
The best password is one that you never have to remember, and that's where a password manager can help. Password managers save your loginย ...
Cyble and FinTech Australia Partner to Fortify Cybersecurity in the FinTech Industry
Cyble, a global leader in AI-native cybersecurity solutions, has announced a strategic partnership with FinTech Australia, the premier industryย ...
Digital resilience and cyber security reporting requirements in the UK and EU
We provide a high level overview of UK and EU cyber security and digital resilience reporting requirements.
Exabeam Nova Unleashes the Future of Agentic AI in Cybersecurity
Exabeam is now the first and only security operations vendor delivering a multi-agent experience where specialized AI components are integratedย ...
FintechOS Extends Longstanding Partnership with Fort for Global Cybersecurity Readiness
FintechOS, a leading AI-driven financial product management platform, has extended its longstanding partnership with cybersecurity servicesย ...

ShareThis Similar Companies

Meesho
Meesho is Indiaโs fastest growing internet commerce company. We want to make eCommerce accessible to all. Our vision is to enable 100 million small businesses in India, including individual entrepreneurs, to succeed online. Our mission is to democratise internet commerce by bringing a range of produ

Taobao Marketplace
Launched in May 2003, Taobao Marketplace (www.taobao.com) is the online shopping destination of choice for Chinese consumers looking for wide selection, value and convenience. Shoppers choose from a wide range of products and services on Taobao Marketplace, which features hundreds of millions of pro

NetEase
As a leading internet technology company based in China, NetEase, Inc. (NASDAQ: NTES and HKEX:9999, "NetEase") provides premium online services centered around content creation. With extensive offerings across its expanding gaming ecosystem, NetEase develops and operates some of China's most popula

Sohu.com
Sohu.com Inc. (NASDAQ: SOHU) is China's premier online brand and indispensable to the daily life of millions of Chinese, providing a network of web properties and community based/web 2.0 products which offer the vast Sohu user community a broad array of choices regarding information, entertainment a

Delivery Hero
As the worldโs leading local delivery platform, our mission is to deliver an amazing experience, fast, easy, and to your door. We operate in over 70+ countries worldwide, powered by tech but driven by people. As one of Europeโs largest tech platforms, we enable ambitious talent to deliver solutions

MyFunLIFE
MyFunLIFE is a new way to give people the FUN they really want in life and the FREEDOM they deserve! At MyFunLIFE it is our mission to create more fun, freedom and fulfillment in peoples lives by offering amazing products, cutting edge technology and unparalleled opportunity. See you on the beach

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
ShareThis CyberSecurity History Information
How many cyber incidents has ShareThis faced?
Total Incidents: According to Rankiteo, ShareThis has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at ShareThis?
Incident Types: The types of cybersecurity incidents that have occurred incident Breach.
Incident Details
Can you provide details on each incident?

Incident : Data Breach
Title: ShareThis, Inc. Data Breach
Description: The California Office of the Attorney General reported on February 28, 2019, that ShareThis, Inc. experienced a data breach likely occurring in July 2018. The breach involved unauthorized access to names, email addresses, hashed passwords, and some birth dates of an unknown number of California residents, following a report by The Register indicating that the affected data was posted for sale on the dark web.
Date Detected: 2019-02-28
Date Publicly Disclosed: 2019-02-28
Type: Data Breach
Attack Vector: Unauthorized Access
Motivation: Financial Gain
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Breach.
Impact of the Incidents
What was the impact of each incident?

Incident : Data Breach SHA130072725
Data Compromised: Names, Email Addresses, Hashed Passwords, Birth Dates
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Names, Email Addresses, Hashed Passwords and Birth Dates.
Which entities were affected by each incident?

Incident : Data Breach SHA130072725
Entity Type: Company
Industry: Technology
Location: California
Customers Affected: Unknown number of California residents
Data Breach Information
What type of data was compromised in each breach?

Incident : Data Breach SHA130072725
Type of Data Compromised: Names, Email Addresses, Hashed Passwords, Birth Dates
Sensitivity of Data: Medium
Data Exfiltration: True
Personally Identifiable Information: True
References
Where can I find more information about each incident?

Incident : Data Breach SHA130072725
Source: The Register
Where can stakeholders find additional resources on cybersecurity best practices?
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: The Register.
Initial Access Broker
How did the initial access broker gain entry for each incident?

Incident : Data Breach SHA130072725
Additional Questions
Incident Details
What was the most recent incident detected?
Most Recent Incident Detected: The most recent incident detected was on 2019-02-28.
What was the most recent incident publicly disclosed?
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2019-02-28.
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were Names, Email Addresses, Hashed Passwords and Birth Dates.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Names, Email Addresses, Hashed Passwords and Birth Dates.
References
What is the most recent source of information about an incident?
Most Recent Source: The most recent source of information about an incident is The Register.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
