Company Details
15abel
1
45
541613
isabelepstein.com
0
15 _2936723
In-progress

15 Abel Company CyberSecurity Posture
isabelepstein.com15 Abel is a photography and creative studio led by Isabel Epstein, serving hospitality, corporate, commercial, and nonprofit clients across the Northeast and beyond. With over a decade of experience and a background in branding and design, Isabel helps brands translate their identity into emotionally resonant, strategically aligned visuals. While all projects are led and executed by Isabel directly, 15 Abel also scales when needed—bringing on trusted videographers, designers, and production specialists to support more complex creative needs. This allows clients to access both high-touch solo artistry and collaborative project support, depending on scope. Past clients include Columbia University, Turner & Townsend, The Thayer Hotel, and numerous nonprofit organizations. Whether you’re building a new brand story or elevating your existing one, 15 Abel offers the clarity, craft, and care to bring it to life.
Company Details
15abel
1
45
541613
isabelepstein.com
0
15 _2936723
In-progress
Between 650 and 699

15 Abel Global Score (TPRM)XXXX

Description: The Thayer Hotel, located at the United States Military Academy (West Point), suffered a cybersecurity breach exposing the **personally identifiable information (PII)** of **33,053 individuals**, including military personnel and their families. Unauthorized access occurred on **September 19, 2025**, with attackers extracting **names, driver’s license numbers, passport numbers, dates of birth, and state ID card numbers**, while a small subset had **Social Security numbers (SSNs) compromised**.The breach poses severe risks, including **identity theft, account takeovers, and targeted phishing**, particularly dangerous given the victim demographic (military-affiliated individuals). The hotel engaged **third-party forensic experts**, notified regulators, and offered **12 months of identity-theft protection and credit monitoring** via Kroll Security. Guests were advised to implement **fraud alerts or credit freezes**.The incident underscores vulnerabilities in **hospitality venues near military installations**, where sensitive credentials are routinely collected, emphasizing the need for **real-time monitoring, third-party risk management, and tailored incident-response protocols** for high-risk populations.


15 Abel has 9.89% more incidents than the average of same-industry companies with at least one recorded incident.
15 Abel has 56.25% more incidents than the average of all companies with at least one recorded incident.
15 Abel reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.
15 Abel cyber incidents detection timeline including parent company and subsidiaries

15 Abel is a photography and creative studio led by Isabel Epstein, serving hospitality, corporate, commercial, and nonprofit clients across the Northeast and beyond. With over a decade of experience and a background in branding and design, Isabel helps brands translate their identity into emotionally resonant, strategically aligned visuals. While all projects are led and executed by Isabel directly, 15 Abel also scales when needed—bringing on trusted videographers, designers, and production specialists to support more complex creative needs. This allows clients to access both high-touch solo artistry and collaborative project support, depending on scope. Past clients include Columbia University, Turner & Townsend, The Thayer Hotel, and numerous nonprofit organizations. Whether you’re building a new brand story or elevating your existing one, 15 Abel offers the clarity, craft, and care to bring it to life.


Ogilvy has been creating impact for brands through iconic, culture-changing, value-driving ideas since the company was founded by David Ogilvy 75 years ago. We build on that rich legacy through Borderless Creativity – innovating at the intersections of its advertising, public relations, relationship

TBWA is The Disruption Company®. We are a Collective of creative minds with an unlimited creative canvas. We create brand platforms that defy convention and compete with culture. Thanks to our trademarked Disruption® methodology, we build the world’s strongest brands. Brands that own an unfair share

We are dentsu. We team together to help brands predict and plan for disruptive future opportunities and create new paths to growth in the sustainable economy. We know people better than anyone else and we use those insights to connect brand, content, commerce and experience, underpinned by modern cr

TO MAKE A MEANINGFUL DIFFERENCE TO BRANDS, TO BUSINESSES AND TO PEOPLE Founded in 1835 in Paris, Havas is one of the world’s largest global communications networks, with more than 23,000 people in over 100 markets sharing one single mission: to make a meaningful difference to brands, businesses, a
Quad (NYSE: QUAD) is a global marketing experience company that helps brands make direct consumer connections, from household to in-store to online. Supported by state-of-the-art technology and data-driven intelligence, Quad uses its suite of media, creative and production solutions to streamline th
Founded in 1926 by Marcel Bleustein-Blanchet, today Publicis Groupe is the largest communications group in the world and a leader in marketing, communication, and digital business transformation, led by Arthur Sadoun, the third CEO in its history. Publicis Groupe is positioned at every step of the

VML is a global powerhouse born from the unification of Wunderman Thompson and VMLY&R — two of the world's most powerful and accomplished creative agencies with complementary capabilities and geographic strengths. We have an industry-unique opportunity to provide our client partners with a fully int

IPG Mediabrands is the media and marketing solutions division of Interpublic Group (NYSE: IPG). IPG Mediabrands manages over $47 billion in marketing investment globally on behalf of its clients across its full-service agency networks UM, Initiative and Mediahub and through its award-winning special

Interpublic (NYSE: IPG) is a values-based, data-fueled, and creatively-driven provider of marketing solutions. Home to some of the world’s best-known and most innovative communications specialists, IPG global brands include Acxiom, Craft, FCB, FutureBrand, Golin, Initiative, IPG Health, IPG Mediabra
.png)
Abel Fragrance spent twelve years refusing to compromise on natural ingredients. Now, its biotech-powered rebrand proves patient innovation...
Cyber security tools consists of several free, paid, and open-source applications that enable the protection of data. Read further for more...
Best WiFI hacking tools & app: Aircrack-ng, WiFi WPS WPA Tester, Cain & Abel, Kismet, AirSnort, Wifiphisher, Airjack, inSSIDer, CoWPAtty,...
From the deserts of Argentina and Australia to the fjords of Greenland and the tundra of the Yukon, these trips are designed with positive...
The largest tech companies in France include IT providers, software developers and semiconductor companies. Many are actively hiring.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of 15 Abel is https://www.isabelepstein.com.
According to Rankiteo, 15 Abel’s AI-generated cybersecurity score is 668, reflecting their Weak security posture.
According to Rankiteo, 15 Abel currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, 15 Abel is not certified under SOC 2 Type 1.
According to Rankiteo, 15 Abel does not hold a SOC 2 Type 2 certification.
According to Rankiteo, 15 Abel is not listed as GDPR compliant.
According to Rankiteo, 15 Abel does not currently maintain PCI DSS compliance.
According to Rankiteo, 15 Abel is not compliant with HIPAA regulations.
According to Rankiteo,15 Abel is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
15 Abel operates primarily in the Advertising Services industry.
15 Abel employs approximately 1 people worldwide.
15 Abel presently has no subsidiaries across any sectors.
15 Abel’s official LinkedIn profile has approximately 45 followers.
15 Abel is classified under the NAICS code 541613, which corresponds to Marketing Consulting Services.
No, 15 Abel does not have a profile on Crunchbase.
Yes, 15 Abel maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/15abel.
As of December 04, 2025, Rankiteo reports that 15 Abel has experienced 1 cybersecurity incidents.
15 Abel has an estimated 32,426 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with cybersecurity professionals, third party assistance with forensic specialists, and containment measures with system access restoration, containment measures with environment securing, and recovery measures with notification letters to affected individuals (sent starting 2025-10-31), and communication strategy with public disclosure via pr newswire, communication strategy with direct notification to affected individuals, communication strategy with regulatory notifications..
Title: Cybersecurity Incident at The Thayer Hotel Affecting 33,053 Individuals
Description: The Thayer Hotel, located on the grounds of the United States Military Academy at West Point, disclosed a cybersecurity incident exposing the personally identifiable information (PII) of approximately 33,053 individuals, including military personnel and their families. Attackers accessed names, driver’s licence numbers, passport numbers, dates of birth, state identification card numbers, and, in a small number of cases, Social Security numbers. The breach poses heightened risks for identity theft, account takeover, and targeted phishing campaigns due to the sensitive nature of the affected population.
Date Detected: 2025-09-19
Date Publicly Disclosed: 2025-10-31
Type: data breach
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Names, Driver’s licence numbers, Passport numbers, Dates of birth, State identification card numbers, Social security numbers (small subset)
Systems Affected: computer systems
Downtime: several days (system access restoration)
Operational Impact: Entire IT staff occupied for several days; third-party forensic investigation required
Brand Reputation Impact: Potential reputational damage due to exposure of military-affiliated PII
Identity Theft Risk: High (due to exposure of government-issued IDs and PII of military personnel)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personally Identifiable Information (Pii), Government-Issued Identification Documents and .

Entity Name: The Thayer Hotel
Entity Type: hospitality
Industry: hotel and lodging
Location: West Point, New York, USA (on the grounds of the United States Military Academy)
Customers Affected: 33,053 individuals

Incident Response Plan Activated: True
Third Party Assistance: Cybersecurity Professionals, Forensic Specialists.
Containment Measures: system access restorationenvironment securing
Recovery Measures: notification letters to affected individuals (sent starting 2025-10-31)
Communication Strategy: public disclosure via PR Newswiredirect notification to affected individualsregulatory notifications
Third-Party Assistance: The company involves third-party assistance in incident response through cybersecurity professionals, forensic specialists, .

Type of Data Compromised: Personally identifiable information (pii), Government-issued identification documents
Number of Records Exposed: 33,053
Sensitivity of Data: High (includes military personnel and family PII, risk of identity theft/phishing)
Data Exfiltration: Likely (based on exposure of PII)
Personally Identifiable Information: namesdriver’s licence numberspassport numbersdates of birthstate identification card numbersSocial Security numbers (small subset)
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by system access restoration, environment securing and .
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through notification letters to affected individuals (sent starting 2025-10-31), .


Lessons Learned: Hospitality venues near military installations face elevated risks due to collection of sensitive identity credentials., Need for rigorous third-party risk management and real-time monitoring of privileged access., Incident-response preparedness must be tailored to populations with elevated protection requirements (e.g., military personnel)., Even well-resourced venues can suffer materially impactful breaches.

Recommendations: Implement enhanced monitoring for privileged access and third-party vendors., Develop specialized incident response plans for high-risk populations (e.g., military-affiliated guests)., Offer proactive identity protection services (e.g., credit monitoring, fraud alerts) to affected individuals., Conduct regular security audits and penetration testing, particularly for systems handling government-issued IDs.Implement enhanced monitoring for privileged access and third-party vendors., Develop specialized incident response plans for high-risk populations (e.g., military-affiliated guests)., Offer proactive identity protection services (e.g., credit monitoring, fraud alerts) to affected individuals., Conduct regular security audits and penetration testing, particularly for systems handling government-issued IDs.Implement enhanced monitoring for privileged access and third-party vendors., Develop specialized incident response plans for high-risk populations (e.g., military-affiliated guests)., Offer proactive identity protection services (e.g., credit monitoring, fraud alerts) to affected individuals., Conduct regular security audits and penetration testing, particularly for systems handling government-issued IDs.Implement enhanced monitoring for privileged access and third-party vendors., Develop specialized incident response plans for high-risk populations (e.g., military-affiliated guests)., Offer proactive identity protection services (e.g., credit monitoring, fraud alerts) to affected individuals., Conduct regular security audits and penetration testing, particularly for systems handling government-issued IDs.
Key Lessons Learned: The key lessons learned from past incidents are Hospitality venues near military installations face elevated risks due to collection of sensitive identity credentials.,Need for rigorous third-party risk management and real-time monitoring of privileged access.,Incident-response preparedness must be tailored to populations with elevated protection requirements (e.g., military personnel).,Even well-resourced venues can suffer materially impactful breaches.

Source: California Attorney General (oag.ca.gov)

Source: PR Newswire
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Attorney General (oag.ca.gov), and Source: PR Newswire.

Investigation Status: Completed (with third-party forensic assistance)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public Disclosure Via Pr Newswire, Direct Notification To Affected Individuals and Regulatory Notifications.

Stakeholder Advisories: Notification Letters To Affected Individuals (Sent Starting 2025-10-31)., Offer Of 12 Months Of Complimentary Identity-Theft Protection And Credit-Monitoring Services Via Kroll Security., Advisory To Place Fraud Alerts/Credit Freezes And Review Credit Reports..
Customer Advisories: Encouraged to place fraud alerts or credit freezes with credit bureaus.Advised to review credit reports for suspicious activity.Offered 12 months of identity-theft protection and credit-monitoring services (Kroll Security).
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Notification Letters To Affected Individuals (Sent Starting 2025-10-31)., Offer Of 12 Months Of Complimentary Identity-Theft Protection And Credit-Monitoring Services Via Kroll Security., Advisory To Place Fraud Alerts/Credit Freezes And Review Credit Reports., Encouraged To Place Fraud Alerts Or Credit Freezes With Credit Bureaus., Advised To Review Credit Reports For Suspicious Activity., Offered 12 Months Of Identity-Theft Protection And Credit-Monitoring Services (Kroll Security). and .

High Value Targets: Military Personnel Pii, Government-Issued Identification Documents,
Data Sold on Dark Web: Military Personnel Pii, Government-Issued Identification Documents,

Corrective Actions: Retained External Cybersecurity And Forensic Experts For Investigation., Implemented Identity Protection Services For Affected Individuals., Likely Review Of Third-Party Risk Management And Access Controls (Inferred From Lessons Learned).,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Cybersecurity Professionals, Forensic Specialists, .
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Retained External Cybersecurity And Forensic Experts For Investigation., Implemented Identity Protection Services For Affected Individuals., Likely Review Of Third-Party Risk Management And Access Controls (Inferred From Lessons Learned)., .
Most Recent Incident Detected: The most recent incident detected was on 2025-09-19.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-10-31.
Most Significant Data Compromised: The most significant data compromised in an incident were names, driver’s licence numbers, passport numbers, dates of birth, state identification card numbers, Social Security numbers (small subset) and .
Most Significant System Affected: The most significant system affected in an incident was computer systems.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was cybersecurity professionals, forensic specialists, .
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was system access restorationenvironment securing.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were passport numbers, names, dates of birth, Social Security numbers (small subset), driver’s licence numbers and state identification card numbers.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 33.1K.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Even well-resourced venues can suffer materially impactful breaches.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Develop specialized incident response plans for high-risk populations (e.g., military-affiliated guests)., Implement enhanced monitoring for privileged access and third-party vendors., Offer proactive identity protection services (e.g., credit monitoring, fraud alerts) to affected individuals., Conduct regular security audits and penetration testing and particularly for systems handling government-issued IDs..
Most Recent Source: The most recent source of information about an incident are California Attorney General (oag.ca.gov) and PR Newswire.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Completed (with third-party forensic assistance).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Notification letters to affected individuals (sent starting 2025-10-31)., Offer of 12 months of complimentary identity-theft protection and credit-monitoring services via Kroll Security., Advisory to place fraud alerts/credit freezes and review credit reports., .
Most Recent Customer Advisory: The most recent customer advisory issued was an Encouraged to place fraud alerts or credit freezes with credit bureaus.Advised to review credit reports for suspicious activity.Offered 12 months of identity-theft protection and credit-monitoring services (Kroll Security).
.png)
MCP Server Kubernetes is an MCP Server that can connect to a Kubernetes cluster and manage it. Prior to 2.9.8, there is a security issue exists in the exec_in_pod tool of the mcp-server-kubernetes MCP Server. The tool accepts user-provided commands in both array and string formats. When a string format is provided, it is passed directly to shell interpretation (sh -c) without input validation, allowing shell metacharacters to be interpreted. This vulnerability can be exploited through direct command injection or indirect prompt injection attacks, where AI agents may execute commands without explicit user intent. This vulnerability is fixed in 2.9.8.
XML external entity (XXE) injection in eyoucms v1.7.1 allows remote attackers to cause a denial of service via crafted body of a POST request.
An issue was discovered in Fanvil x210 V2 2.12.20 allowing unauthenticated attackers on the local network to access administrative functions of the device (e.g. file upload, firmware update, reboot...) via a crafted authentication bypass.
Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.
Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.