ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

acoupledesigns offers professional services in graphic, web, and motion design. We've got the design and multimedia B.A.'s, but we're no paper tigers mon amie. Our training is backed up by industry/agency training and an ever expanding list of satisfied clients. Contact us today for all your design and new media needs!

ACD A.I CyberSecurity Scoring

ACD

Company Details

Linkedin ID:

acd

Employees number:

195

Number of followers:

583

NAICS:

54143

Industry Type:

Graphic Design

Homepage:

http://www.acoupledesigns.com

IP Addresses:

0

Company ID:

ACD_7312093

Scan Status:

In-progress

AI scoreACD Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/acd.jpeg
ACD Graphic Design
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreACD Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/acd.jpeg
ACD Graphic Design
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

ACD Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

ACD Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for ACD

Incidents vs Graphic Design Industry Average (This Year)

No incidents recorded for ACD in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for ACD in 2025.

Incident Types ACD vs Graphic Design Industry Avg (This Year)

No incidents recorded for ACD in 2025.

Incident History — ACD (X = Date, Y = Severity)

ACD cyber incidents detection timeline including parent company and subsidiaries

ACD Company Subsidiaries

SubsidiaryImage

acoupledesigns offers professional services in graphic, web, and motion design. We've got the design and multimedia B.A.'s, but we're no paper tigers mon amie. Our training is backed up by industry/agency training and an ever expanding list of satisfied clients. Contact us today for all your design and new media needs!

Loading...
similarCompanies

ACD Similar Companies

mixdesign

Mixdesign, inc. is a full service branding agency dedicated to all your branding needs. As a branding agency, mixdesign, inc. places a great level of importance on identifying and meeting brand needs. Our team is dedicated to helping you, and your company, design and roll-out a memorable and unique

The Publishing Bureau

We are a team of communications specialists with the tools to get your message across both online and in print. We write content on a wide range of subjects in flawless English. Our team can help you prepare content for different target audiences including professionals and the public. We then link

Costa Leclerc Design Inc.

Costa Leclerc Design Inc. (CLD) is a bilingual, socially and culturally committed design firm located in downtown Toronto. Since forming in 1989, we have been guided by the principle that every client is unique, with their own specific needs and objectives. We take pride in our ability to listen and

Team Manila Graphic Design Studio

Founded in 2001 by Jowee Alviar and Raymund Punzalan, Team Manila started as a graphic design studio that aims to represent the Philippines in the design community. Team Manila Graphic Design Studio currently works with a number of projects ranging from branding, graphic design, packaging, space and

JJ Creative

JJ Creative is a creative design studio that helps entrepreneurs and businesses establish and grow their brands online. We pride ourselves on creating visual and innovative solutions for our clients that make them look their best. Our goal is to create an amazing brand for your business that makes y

Carrington Creative Services

Carrington Creative Services is owned by Theresa Carrington. Service offerings include Website Graphic Design for both the private and public sector including website strategic planning and consulting services. An equally important part of Carrington Creative is the offering of Photography Servi

newsone

ACD CyberSecurity News

November 10, 2025 08:00 AM
NCSC Set to Retire Web Check and Mail Check Tools

A UK government cybersecurity agency has advised companies relying on two of its popular external attack surface management (EASM) products...

September 19, 2025 07:00 AM
How Japan’s Active Cyber Defense Is Changing Its International Cooperation

While ACD removes structural barriers to cooperation, at the same time it is supposed to gradually reduce Japan's overreliance on U.S....

August 19, 2025 07:00 AM
Ex-Evelyn ACD funds still suspended a week after Linedata cyberattack

NMA has since learned that the hackers targeted Icon, its back office investment management, fund administration, valuation and fund pricing...

August 14, 2025 07:00 AM
Cybersecurity issue forces Tutman Fund Solutions to suspend dealing on raft of funds

Tutman Fund Solutions, a Chichester-based Authorised Corporate Director (ACD) has suspended its dealing on all funds.

August 14, 2025 07:00 AM
Cyberattack at French fund administrator Linedata led to fund suspensions

Revealed: Linedata, a technology, data and software business listed on the Euronext Paris, suffered a cyberattack three days ago, a source...

June 24, 2025 07:00 AM
U.S., Philippine Marines Begin ACD 25.3 Jungle Training

PUERTO PRINCESA, Philippines — U.S. Marines with Golf Company, 2nd Battalion, 1st Marine Regiment, Marine Rotational Force – Darwin (MRF-D)...

June 23, 2025 07:00 AM
Achieving Cross-Domain Security in New Frontiers through Active Cyber Defense

Active cyber defense is aimed at ensuring national security and differs fundamentally from conventional cybersecurity.

May 17, 2025 07:00 AM
Japan Passes Landmark Cybersecurity Law to Counter Foreign Threats

Japan has passed a historic piece of legislation that significantly expands its ability to respond to cyber threats, marking a turning point in its national...

May 17, 2025 07:00 AM
Hackers Beware: Here is Japan’s New Law to Fight Cyber Attacks!

Japan has enacted the Active Cyberdefence Law, a groundbreaking legislative shift that grants sweeping powers to national security agencies to counter growing...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

ACD CyberSecurity History Information

Official Website of ACD

The official website of ACD is http://www.acoupledesigns.com.

ACD’s AI-Generated Cybersecurity Score

According to Rankiteo, ACD’s AI-generated cybersecurity score is 754, reflecting their Fair security posture.

How many security badges does ACD’ have ?

According to Rankiteo, ACD currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does ACD have SOC 2 Type 1 certification ?

According to Rankiteo, ACD is not certified under SOC 2 Type 1.

Does ACD have SOC 2 Type 2 certification ?

According to Rankiteo, ACD does not hold a SOC 2 Type 2 certification.

Does ACD comply with GDPR ?

According to Rankiteo, ACD is not listed as GDPR compliant.

Does ACD have PCI DSS certification ?

According to Rankiteo, ACD does not currently maintain PCI DSS compliance.

Does ACD comply with HIPAA ?

According to Rankiteo, ACD is not compliant with HIPAA regulations.

Does ACD have ISO 27001 certification ?

According to Rankiteo,ACD is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of ACD

ACD operates primarily in the Graphic Design industry.

Number of Employees at ACD

ACD employs approximately 195 people worldwide.

Subsidiaries Owned by ACD

ACD presently has no subsidiaries across any sectors.

ACD’s LinkedIn Followers

ACD’s official LinkedIn profile has approximately 583 followers.

NAICS Classification of ACD

ACD is classified under the NAICS code 54143, which corresponds to Graphic Design Services.

ACD’s Presence on Crunchbase

No, ACD does not have a profile on Crunchbase.

ACD’s Presence on LinkedIn

Yes, ACD maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/acd.

Cybersecurity Incidents Involving ACD

As of December 03, 2025, Rankiteo reports that ACD has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

ACD has an estimated 2,656 peer or competitor companies worldwide.

ACD CyberSecurity History Information

How many cyber incidents has ACD faced ?

Total Incidents: According to Rankiteo, ACD has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at ACD ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

vLLM is an inference and serving engine for large language models (LLMs). Prior to 0.11.1, vllm has a critical remote code execution vector in a config class named Nemotron_Nano_VL_Config. When vllm loads a model config that contains an auto_map entry, the config class resolves that mapping with get_class_from_dynamic_module(...) and immediately instantiates the returned class. This fetches and executes Python from the remote repository referenced in the auto_map string. Crucially, this happens even when the caller explicitly sets trust_remote_code=False in vllm.transformers_utils.config.get_config. In practice, an attacker can publish a benign-looking frontend repo whose config.json points via auto_map to a separate malicious backend repo; loading the frontend will silently run the backend’s code on the victim host. This vulnerability is fixed in 0.11.1.

Risk Information
cvss3
Base: 7.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Description

fastify-reply-from is a Fastify plugin to forward the current HTTP request to another server. Prior to 12.5.0, by crafting a malicious URL, an attacker could access routes that are not allowed, even though the reply.from is defined for specific routes in @fastify/reply-from. This vulnerability is fixed in 12.5.0.

Risk Information
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to 21.0.2, 20.3.15, and 19.2.17, A Stored Cross-Site Scripting (XSS) vulnerability has been identified in the Angular Template Compiler. It occurs because the compiler's internal security schema is incomplete, allowing attackers to bypass Angular's built-in security sanitization. Specifically, the schema fails to classify certain URL-holding attributes (e.g., those that could contain javascript: URLs) as requiring strict URL security, enabling the injection of malicious scripts. This vulnerability is fixed in 21.0.2, 20.3.15, and 19.2.17.

Risk Information
cvss4
Base: 8.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Gin-vue-admin is a backstage management system based on vue and gin. In 2.8.6 and earlier, attackers can delete any file on the server at will, causing damage or unavailability of server resources. Attackers can control the 'FileMd5' parameter to delete any file and folder.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Portkey.ai Gateway is a blazing fast AI Gateway with integrated guardrails. Prior to 1.14.0, the gateway determined the destination baseURL by prioritizing the value in the x-portkey-custom-host request header. The proxy route then appends the client-specified path to perform an external fetch. This can be maliciously used by users for SSRF attacks. This vulnerability is fixed in 1.14.0.

Risk Information
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=acd' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge