ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Welcome to 85 Supply, your one-stop shop for branded merchandise! We strive to provide you with the highest quality of products and service, allowing you to express yourself in style. From classic t-shirts to completely custom-made branded merchandise, 85 Supply has something for everyone. Our services include: - Screen Printing - Embroidery - Graphic Design - E-Commerce Stores - Fulfillment …and more! Let us help you bring your vision to life and show off your unique style with Merch, as custom as you.

85 Supply A.I CyberSecurity Scoring

85 Supply

Company Details

Linkedin ID:

85-supply

Employees number:

8

Number of followers:

90

NAICS:

323

Industry Type:

Printing Services

Homepage:

85supply.com

IP Addresses:

0

Company ID:

85 _3067780

Scan Status:

In-progress

AI score85 Supply Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/85-supply.jpeg
85 Supply Printing Services
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscore85 Supply Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/85-supply.jpeg
85 Supply Printing Services
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

85 Supply Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

85 Supply Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for 85 Supply

Incidents vs Printing Services Industry Average (This Year)

No incidents recorded for 85 Supply in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for 85 Supply in 2025.

Incident Types 85 Supply vs Printing Services Industry Avg (This Year)

No incidents recorded for 85 Supply in 2025.

Incident History — 85 Supply (X = Date, Y = Severity)

85 Supply cyber incidents detection timeline including parent company and subsidiaries

85 Supply Company Subsidiaries

SubsidiaryImage

Welcome to 85 Supply, your one-stop shop for branded merchandise! We strive to provide you with the highest quality of products and service, allowing you to express yourself in style. From classic t-shirts to completely custom-made branded merchandise, 85 Supply has something for everyone. Our services include: - Screen Printing - Embroidery - Graphic Design - E-Commerce Stores - Fulfillment …and more! Let us help you bring your vision to life and show off your unique style with Merch, as custom as you.

Loading...
similarCompanies

85 Supply Similar Companies

INTERPRINT Group

With more than 1,600 employees at 9 production sites worldwide, Interprint is one of the leading international decor printers. "Think global, act local" – this has been Interprint's philosophy for more than 50 years. Since 2019, we have been part of the Japanese Toppan Group, which increases the var

Omnipress

We help you deliver education. For over 45 years, Omnipress has helped associations, corporations, non-profits, and other organizations collect, produce, and deliver print and digital educational content for conferences, training courses, and member publications. Our technology and print solutions

Ogden Blue

Ogden Blue specializes in various types of printing and reprographic services, and engineering supply retail, specialty office and engineering printers and scanners, offset and digital press, print finishing services, sign and banner printing, web-site design, graphic design, art reproduction, and o

Complete Print & Design

We are one of the Gold Coast's most experienced printers, established for over 35 years. Servicing clients across SEQ and nationally we provide high quality expert service and personal attention from our base in Nerang. With our expertise and technical know-how, we ensure your ideas and business co

Clockwork Productions Inc

Consider us a one stop shop for all marketing and promotional needs. Anyone can push a print button, what we bring to the table is a can-do, detail-focused attitude where we collaborate with you to bring your vision to life. We believe in having a personal touch. It’s not uncommon to see Frank or

Skjern Serigrafi

SKJERN SERIGRAFI - TRYKKERI MED SPECIALE I SERIGRAFITRYK. ​Skjern Serigrafi er et erfarent, alsidigt serigrafisk trykkeri, der prioritere kvalitet og kort leveringstid på alle trykopgaver. ​ Vi kan tilbyde alt indenfor serigrafi (silketryk), og kan skabe både traditionelle og unikke løsninger.

newsone

85 Supply CyberSecurity News

October 24, 2025 07:00 AM
Shutdown Sparks 85% Increase in US Government Cyberattacks

Attackers are pouncing on financially strapped US government agencies and employees. And the effects of this period might be felt for a long...

October 20, 2025 03:52 PM
Top Strategic Technology Trends for 2026

Explore Gartner's Top Strategic Technology Trends for 2026 — 10 trends that will shape innovation, resilience and trust across industries.

October 14, 2025 07:00 AM
Cyber and AI oversight disclosures: what companies shared in 2025

Companies are expanding disclosures on artificial intelligence (AI) and cybersecurity governance as technology's role in business evolves.

October 07, 2025 07:00 AM
Cyberattack Leads to Beer Shortage as Asahi Recovers

In another demonstration of the disruption that ransomware can cause to supply chains, Japanese brewery and food giant Asahi Group Holdings...

October 06, 2025 07:00 AM
Nearly a third of bosses report increase in cyber-attacks on their supply chains

CIPS survey shows cyber threats have risen up the list of concerns for procurement managers.

October 01, 2025 07:00 AM
New world, new rules: Cybersecurity in an era of uncertainty - The C-suite playbook

Cybersecurity is entering uncharted waters. A rapidly shifting world order and threat environment ― powered by recent, exponential leaps in...

September 20, 2025 07:00 AM
Inside the Jaguar Land Rover hack: stalled smart factories, outsourced cybersecurity and supply chain woes

Being a carmaker where 'everything is connected' has left JLR unable to isolate its plants or functions, forcing a shutdown of most systems.

July 24, 2025 07:00 AM
AI-powered success—with more than 1,000 stories of customer transformation and innovation

We have come a long way with more than 85% of the Fortune 500 using Microsoft AI solutions to shape their future. With 66% of CEOs reporting...

July 15, 2025 07:00 AM
Newly Emerged GLOBAL GROUP RaaS Expands Operations with AI-Driven Negotiation Tools

Cybersecurity researchers have shed light on a new ransomware-as-a-service (RaaS) operation called GLOBAL GROUP that has targeted a wide...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

85 Supply CyberSecurity History Information

Official Website of 85 Supply

The official website of 85 Supply is http://www.85supply.com.

85 Supply’s AI-Generated Cybersecurity Score

According to Rankiteo, 85 Supply’s AI-generated cybersecurity score is 754, reflecting their Fair security posture.

How many security badges does 85 Supply’ have ?

According to Rankiteo, 85 Supply currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does 85 Supply have SOC 2 Type 1 certification ?

According to Rankiteo, 85 Supply is not certified under SOC 2 Type 1.

Does 85 Supply have SOC 2 Type 2 certification ?

According to Rankiteo, 85 Supply does not hold a SOC 2 Type 2 certification.

Does 85 Supply comply with GDPR ?

According to Rankiteo, 85 Supply is not listed as GDPR compliant.

Does 85 Supply have PCI DSS certification ?

According to Rankiteo, 85 Supply does not currently maintain PCI DSS compliance.

Does 85 Supply comply with HIPAA ?

According to Rankiteo, 85 Supply is not compliant with HIPAA regulations.

Does 85 Supply have ISO 27001 certification ?

According to Rankiteo,85 Supply is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of 85 Supply

85 Supply operates primarily in the Printing Services industry.

Number of Employees at 85 Supply

85 Supply employs approximately 8 people worldwide.

Subsidiaries Owned by 85 Supply

85 Supply presently has no subsidiaries across any sectors.

85 Supply’s LinkedIn Followers

85 Supply’s official LinkedIn profile has approximately 90 followers.

85 Supply’s Presence on Crunchbase

No, 85 Supply does not have a profile on Crunchbase.

85 Supply’s Presence on LinkedIn

Yes, 85 Supply maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/85-supply.

Cybersecurity Incidents Involving 85 Supply

As of December 17, 2025, Rankiteo reports that 85 Supply has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

85 Supply has an estimated 5,157 peer or competitor companies worldwide.

85 Supply CyberSecurity History Information

How many cyber incidents has 85 Supply faced ?

Total Incidents: According to Rankiteo, 85 Supply has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at 85 Supply ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

Nagios XI versions prior to 2026R1.1 are vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A user‑accessible maintenance script may be executed as root via sudo and includes an application file that is writable by a lower‑privileged user. A local attacker with access to the application account can modify this file to introduce malicious code, which is then executed with elevated privileges when the script is run. Successful exploitation results in arbitrary code execution as the root user.

Risk Information
cvss4
Base: 8.6
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Description

Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Description

SIPGO is a library for writing SIP services in the GO language. Starting in version 0.3.0 and prior to version 1.0.0-alpha-1, a nil pointer dereference vulnerability is in the SIPGO library's `NewResponseFromRequest` function that affects all normal SIP operations. The vulnerability allows remote attackers to crash any SIP application by sending a single malformed SIP request without a To header. The vulnerability occurs when SIP message parsing succeeds for a request missing the To header, but the response creation code assumes the To header exists without proper nil checks. This affects routine operations like call setup, authentication, and message handling - not just error cases. This vulnerability affects all SIP applications using the sipgo library, not just specific configurations or edge cases, as long as they make use of the `NewResponseFromRequest` function. Version 1.0.0-alpha-1 contains a patch for the issue.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

GLPI is a free asset and IT management software package. Starting in version 9.1.0 and prior to version 10.0.21, an unauthorized user with an API access can read all knowledge base entries. Users should upgrade to 10.0.21 to receive a patch.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=85-supply' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge