Company Details
11th-house-agency
13
263
54192
11thhouseagency.com
0
11T_3235483
In-progress

11th House Agency Company CyberSecurity Posture
11thhouseagency.com11th House is a boutique agency representing exceptional artists in set design, creative direction, film, costume design, movement direction and casting direction. We partner with clients and creators who agree that art is a powerful exchange that can change how we view our world and ourselves. At 11th House Agency, we believe in combining creative vision, straight-forward communication and transparency to ensure successful and meaningful collaborations between our artists and clients. In our practice combining years of sought after professional experience, we deliver top level execution with a personalized attention to each individual project. We are based in NY and operate worldwide in fashion, film and events. Our mission is to turn any limitation into a creative opportunity, any obstacle into an advantage, and take every project to the next level through skill, knowledge and experience.
Company Details
11th-house-agency
13
263
54192
11thhouseagency.com
0
11T_3235483
In-progress
Between 750 and 799

1HA Global Score (TPRM)XXXX



No incidents recorded for 11th House Agency in 2025.
No incidents recorded for 11th House Agency in 2025.
No incidents recorded for 11th House Agency in 2025.
1HA cyber incidents detection timeline including parent company and subsidiaries

11th House is a boutique agency representing exceptional artists in set design, creative direction, film, costume design, movement direction and casting direction. We partner with clients and creators who agree that art is a powerful exchange that can change how we view our world and ourselves. At 11th House Agency, we believe in combining creative vision, straight-forward communication and transparency to ensure successful and meaningful collaborations between our artists and clients. In our practice combining years of sought after professional experience, we deliver top level execution with a personalized attention to each individual project. We are based in NY and operate worldwide in fashion, film and events. Our mission is to turn any limitation into a creative opportunity, any obstacle into an advantage, and take every project to the next level through skill, knowledge and experience.


DigitalFusion is LA's premiere digital photographic rental & post-production facility and creator of the cloud-based photography management and workflow solution, DF Studio*. We specialize in state of the art studio and location digital capture, retouching, scanning, printing and archiving. Digit

Dorian Studio has been a trusted name in photography since 1914. Founded in Spokane, Washington, we’re a family-owned and operated business led by Joe and Yvonne Mark and their three children—Holly, John, and Jake. We proudly serve schools and communities across Arizona, California, Colorado, Idaho

Located in Oxnard, CA, Viewfinders Visual Communications is a full service commercial photography and graphic imaging studio. Our 3,000 sq. ft. facility has a massive 3 wall cyclorama for shooting with drive-in access for vehicles and large industrial equipment. Our studio is equipped with stat

Photography for Your Business We take photos to publicize or celebrate your people, events and places. And handle all details from scheduling qualified photographers in your city through presenting final images. In one location or many from coast to coast in the U.S. and Canada. Even simultaneous
The Blink Inc app is the first and only gig platform connecting Photographers and Customers everywhere...anytime! With just a few taps Photographers make themselves available to Customers for photoshoots anywhere at any time! Customers everywhere use the Blink app to book Photographers for photosh

Award Winning Photography Studio. Studio space available for portraits and commercial product photography. Also at our disposal we have a 100% mobile studio with multiple backdrops including green screen. A good portion of our business is with the convention, conference and group meeting industry.
.png)
CISA 2015, a key cyber info sharing law, lapsed for six weeks. Now, the question is whether Congress can find a path to a long-term...
The U.S. Congressional Budget Office said on Thursday it had identified a security incident and acted to contain the breach at the...
Our daily life, economic vitality, and national security depend on a stable, safe, and resilient cyberspace.
The federal government has paused its support for cyber and physical security activities that state election officials have come to rely on.
WASHINGTON, March 11 (Reuters) - President Donald Trump has nominated Sean Plankey to serve as the chief of the Cybersecurity and...
WASHINGTON, Dec 11 (Reuters) - The United States must do more to address hacking threats after China's alleged efforts known as Salt Typhoon...
GREENWIRE | The Atlantic Ocean swallowed another unoccupied beach house Friday on North Carolina's Cape Hatteras National Seashore.
The incoming chair of the Senate Homeland Security Committee has pledged to severely cut the powers of the Cybersecurity and Infrastructure...
Mr. Krebs had overseen election cybersecurity efforts, and had joined other officials in declaring the 2020 election “the most secure in...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of 11th House Agency is http://www.11thhouseagency.com.
According to Rankiteo, 11th House Agency’s AI-generated cybersecurity score is 750, reflecting their Fair security posture.
According to Rankiteo, 11th House Agency currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, 11th House Agency is not certified under SOC 2 Type 1.
According to Rankiteo, 11th House Agency does not hold a SOC 2 Type 2 certification.
According to Rankiteo, 11th House Agency is not listed as GDPR compliant.
According to Rankiteo, 11th House Agency does not currently maintain PCI DSS compliance.
According to Rankiteo, 11th House Agency is not compliant with HIPAA regulations.
According to Rankiteo,11th House Agency is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
11th House Agency operates primarily in the Photography industry.
11th House Agency employs approximately 13 people worldwide.
11th House Agency presently has no subsidiaries across any sectors.
11th House Agency’s official LinkedIn profile has approximately 263 followers.
11th House Agency is classified under the NAICS code 54192, which corresponds to Photographic Services.
No, 11th House Agency does not have a profile on Crunchbase.
Yes, 11th House Agency maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/11th-house-agency.
As of December 17, 2025, Rankiteo reports that 11th House Agency has not experienced any cybersecurity incidents.
11th House Agency has an estimated 2,458 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, 11th House Agency has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Nagios XI versions prior to 2026R1.1 are vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A user‑accessible maintenance script may be executed as root via sudo and includes an application file that is writable by a lower‑privileged user. A local attacker with access to the application account can modify this file to introduce malicious code, which is then executed with elevated privileges when the script is run. Successful exploitation results in arbitrary code execution as the root user.
Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
SIPGO is a library for writing SIP services in the GO language. Starting in version 0.3.0 and prior to version 1.0.0-alpha-1, a nil pointer dereference vulnerability is in the SIPGO library's `NewResponseFromRequest` function that affects all normal SIP operations. The vulnerability allows remote attackers to crash any SIP application by sending a single malformed SIP request without a To header. The vulnerability occurs when SIP message parsing succeeds for a request missing the To header, but the response creation code assumes the To header exists without proper nil checks. This affects routine operations like call setup, authentication, and message handling - not just error cases. This vulnerability affects all SIP applications using the sipgo library, not just specific configurations or edge cases, as long as they make use of the `NewResponseFromRequest` function. Version 1.0.0-alpha-1 contains a patch for the issue.
GLPI is a free asset and IT management software package. Starting in version 9.1.0 and prior to version 10.0.21, an unauthorized user with an API access can read all knowledge base entries. Users should upgrade to 10.0.21 to receive a patch.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.