Company Details
4room
29
0
337
4room.ee
0
4RO_2337024
In-progress

4ROOM Company CyberSecurity Posture
4room.eeYOUR TAYLOR IN THE WORLD OF LIGHTS The products of 4ROOM are born at our 4ROOM factory in Estonia from the idea to the ready-made product. We always have a wide selection of solutions, which enable to fulfil the wishes of even the most demanding clients quickly and with high quality! Our history and experience reach back to 1959; since 2003, we are operating under the trademark 4ROOM, which reflects our activities and face best. FOR room or 4 different room-s :) IDEA and DESIGN We take inspiration from life and nature, the product is finished in teamwork with the help of the factory and designers. We never stop before the product is “completely designed”; this is the goal that we follow. It is our desire to be and remain unique and to offer (our) clients bright and timeless lights through our peculiarity. PRODUCTION We create the products to last – just like our grandparents used to. Thus, we use carefully selected natural materials cost-efficiently, but without saving at the expense of quality. All materials and components are certified and manufactured in the EU! EMOTION We only make products that warm our hearts and are easy on our eyes. We sincerely wish to convey the passion put into our products through the products to the client!
Company Details
4room
29
0
337
4room.ee
0
4RO_2337024
In-progress
Between 800 and 849

4ROOM Global Score (TPRM)XXXX



No incidents recorded for 4ROOM in 2025.
No incidents recorded for 4ROOM in 2025.
No incidents recorded for 4ROOM in 2025.
4ROOM cyber incidents detection timeline including parent company and subsidiaries

YOUR TAYLOR IN THE WORLD OF LIGHTS The products of 4ROOM are born at our 4ROOM factory in Estonia from the idea to the ready-made product. We always have a wide selection of solutions, which enable to fulfil the wishes of even the most demanding clients quickly and with high quality! Our history and experience reach back to 1959; since 2003, we are operating under the trademark 4ROOM, which reflects our activities and face best. FOR room or 4 different room-s :) IDEA and DESIGN We take inspiration from life and nature, the product is finished in teamwork with the help of the factory and designers. We never stop before the product is “completely designed”; this is the goal that we follow. It is our desire to be and remain unique and to offer (our) clients bright and timeless lights through our peculiarity. PRODUCTION We create the products to last – just like our grandparents used to. Thus, we use carefully selected natural materials cost-efficiently, but without saving at the expense of quality. All materials and components are certified and manufactured in the EU! EMOTION We only make products that warm our hearts and are easy on our eyes. We sincerely wish to convey the passion put into our products through the products to the client!


NaughtOne is a British designer and manufacturer of furniture for commercial spaces. We believe that designs should be simple, purposeful and useful – and that choice of colour, fabric and finish should come as standard. We make it possible for specifiers to express their creativity, tailoring our p

At COE Distributing, we’re passionate about revolutionizing the way you work by delivering innovative and inspiring office furniture solutions. Founded in 1947 as a family-owned business, we’ve grown into a 100% employee-owned company—proof that we believe in investing in people. With a global netw

Master Totaalinrichting is gevestigd in Hoofddorp waar wij een showroom hebben van 2000 m². Hier kunt u werkelijk alles vinden op het gebied van inrichting, ontwerp en realisatie. Of het nu gaat om een nieuwe entreemat, een compleet interieur of een nieuwe bureaustoel. Werkwijze: Verhuizingen, v

The best comfort solutions for bedding and seating, made from premium latex and advanced foam products. We strive for innovation, excellent service and sustainability leadership with your comfort in mind. Novaya is a global leader in latex production, leading the way with innovative technologies su

Our one goal is to provide exceptional services required to make your office furniture installations and transitions successful, with the least amount of disruption to your company’s day to day operations. Started in 1990 as an installation and refurbishing company, MORE employees have been trained

D&R Office Works is Southern California's premier workspace solutions partner, transforming environments for healthcare, education, and corporate clients for over 35 years. Our comprehensive in-house approach handles every project phase, ensuring harmonious execution and exceptional results. Our loc
.png)
Manufacturers looking to enter the European Union market must understand and are required to implement Cyber Resilience Act requirements.
As Mexico pivots toward digital transformation, cybersecurity will be key to managing critical infrastructure, writes Israel Quiroz Plata.
IQSTEL and Cycurion Enter New Era of AI-Cybersecurity Putting Customers First. Vancouver, Kelowna, and Delta, British Columbia--(Newsfile...
Launched nationwide in 2024, the Digital and Intelligence Service (DIS) Sentinel Programme aims to equip our youths with cybersecurity and...
IQSTEL (NASDAQ: IQST) and Cycurion announced Phase One completion of a joint AI-cybersecurity program on November 28, 2025,...
A report released by the U.S. Department of Health and Human Services (HHS) Office of Inspector General revealed that the National...
By Apoorva Chhabra. CIOs often struggle to convey the true value of cybersecurity to their organizations and secure buy-in from C-suite...
Microsoft to block unauthorized scripts in Entra ID logins, new legislation targets scammers that use AI, ASUS patches AiCloud...
Mobile operators are so overwhelmed by fragmented cybersecurity rules that they are actually at greater risk of being hacked.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of 4ROOM is http://www.4room.ee.
According to Rankiteo, 4ROOM’s AI-generated cybersecurity score is 813, reflecting their Good security posture.
According to Rankiteo, 4ROOM currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, 4ROOM is not certified under SOC 2 Type 1.
According to Rankiteo, 4ROOM does not hold a SOC 2 Type 2 certification.
According to Rankiteo, 4ROOM is not listed as GDPR compliant.
According to Rankiteo, 4ROOM does not currently maintain PCI DSS compliance.
According to Rankiteo, 4ROOM is not compliant with HIPAA regulations.
According to Rankiteo,4ROOM is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
4ROOM operates primarily in the Furniture and Home Furnishings Manufacturing industry.
4ROOM employs approximately 29 people worldwide.
4ROOM presently has no subsidiaries across any sectors.
4ROOM’s official LinkedIn profile has approximately 0 followers.
4ROOM is classified under the NAICS code 337, which corresponds to Furniture and Related Product Manufacturing.
No, 4ROOM does not have a profile on Crunchbase.
Yes, 4ROOM maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/4room.
As of November 28, 2025, Rankiteo reports that 4ROOM has not experienced any cybersecurity incidents.
4ROOM has an estimated 2,617 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, 4ROOM has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.