ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

African Heritage Collection was launched in 1994 with a mission to educate and showcase African History and Culture through its Art and Home decorating products. That includes a line of Multicultural Trophies & Recognition Awards that draw on Africa’s Wisdom and Heritage. In the process, the company provides a much needed platform for many indigenous skilled carvers to support their families and help sustain their trade and the environment.

African Heritage Collection A.I CyberSecurity Scoring

AHC

Company Details

Linkedin ID:

african-heritage-collection

Employees number:

4

Number of followers:

109

NAICS:

4541

Industry Type:

Online and Mail Order Retail

Homepage:

africanheritagecollection.com

IP Addresses:

0

Company ID:

AFR_2862124

Scan Status:

In-progress

AI scoreAHC Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/african-heritage-collection.jpeg
AHC Online and Mail Order Retail
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreAHC Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/african-heritage-collection.jpeg
AHC Online and Mail Order Retail
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

AHC Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

AHC Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for AHC

Incidents vs Online and Mail Order Retail Industry Average (This Year)

No incidents recorded for African Heritage Collection in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for African Heritage Collection in 2025.

Incident Types AHC vs Online and Mail Order Retail Industry Avg (This Year)

No incidents recorded for African Heritage Collection in 2025.

Incident History — AHC (X = Date, Y = Severity)

AHC cyber incidents detection timeline including parent company and subsidiaries

AHC Company Subsidiaries

SubsidiaryImage

African Heritage Collection was launched in 1994 with a mission to educate and showcase African History and Culture through its Art and Home decorating products. That includes a line of Multicultural Trophies & Recognition Awards that draw on Africa’s Wisdom and Heritage. In the process, the company provides a much needed platform for many indigenous skilled carvers to support their families and help sustain their trade and the environment.

Loading...
similarCompanies

AHC Similar Companies

Lenstore is an innovative online retailer of contact lenses that was founded in London in 2008. Headquartered in Wimbledon, South West London, Lenstore’s annual turnover has continually grown year on year. The company has also expanded internationally and is looking to double the number of its emplo

flaconi

With more than three million active customers, flaconi is one of Germany’s leading online beauty and self-care retailers. The online shop’s extensive portfolio consists of almost 1000 national and international brands you love and 50.000 products you secretly need. From drugstore over organic cosmet

Mirafit is strength and conditioning equipment brand based in the UK. The core principle of Mirafit is that exercise improves lives. We are passionate about the benefits that strength training brings in terms of health and wellbeing. Through our products and services, we aim to improve accessibi

The Textile District LLC | Online Fabric Store + Custom Print Fabric

The Textile District is NC-based online retailer and custom fabric printer serving professional designers, custom clothiers, small batch manufacturers, special events planners, and do-it-yourself sewing, interior design and hobby enthusiasts. Our eco-friendly, OEKO-TEX® certified process and colorfa

Stashbox.ai

Stashbox.ai stands as the ultimate destination where creativity finds its perfect expression. With an exquisite array of exclusive merchandise, we redefine the very essence of art and style. From fashion-forward apparel and chic accessories to captivating home decor and lifestyle products, our curat

Viva la Mama

Viva la Mama ist eine spezialisierte D2C-Brand für funktionale Bekleidung rund um Schwangerschaft und Babytragen. Wir entwickeln hochwertige, langlebige Jacken und Westen, die Eltern von der Schwangerschaft über die Tragezeit bis weit darüber hinaus begleiten. Unsere Produkte verbinden durchdachtes

newsone

AHC CyberSecurity News

December 01, 2025 06:28 AM
emt set to unveil expanded cybersecurity and IT portfolio at Black Hat MEA 2025

emt – A QBS Technology Group Company is set to make its strongest appearance at Black Hat MEA 2025, bringing an expanded cybersecurity and...

November 18, 2025 08:00 AM
The Complete List of Hacker And Cybersecurity Movies

Hacker's Movie Guide” with Foreword by Steve Wozniak, co-founder of Apple.

November 14, 2025 08:00 AM
Cassava Technologies and Entanglement ink deal to boost AI infrastructure and quantum innovation across Africa and Middle East – W.Media

Cassava Technologies has signed a Memorandum of Understanding with U.S.-based Entanglement, Inc. to accelerate the rollout of advanced AI,...

November 13, 2025 08:00 AM
Cassava and Entanglement Team Up to Strengthen Africa’s Digital Economy and Cybersecurity Resilience

The partnership combines Cassava's extensive infrastructure – including high-speed fibre networks, GPU-enabled compute, and regional data...

October 24, 2025 07:00 AM
Africa Tech Festival 2025 Cybersecurity: Important Things To Know

Join the Africa Tech Festival 2025 cybersecurity in Cape Town, focusing on digital innovation, cybersecurity, cloud resilience, and Africa's...

September 08, 2025 06:57 PM
Black History Month October 2025

H&F is full of events this October celebrating Black History Month. Some events may require booking.

September 04, 2025 07:00 AM
UCL Information Studies Summer School for Students of Black Heritage Backgrounds

The programme included sessions on cyber security, programming, academic writing, database systems, and data science, complemented by...

June 18, 2025 09:20 AM
Liquid C2 achieves Sophos Platinum Partner status, elevating cloud and cybermanaged services across Africa

Liquid C2, a business of Cassava Technologies, a global technology leader of African heritage, is proud to announce that it has attained Platinum Partner...

December 20, 2024 08:00 AM
Priorities for the New U.S. Administration and Congress on Strengthening Economic Relations with Africa

The incoming administration of President-elect Donald Trump has an opportunity to boldly reimagine the U.S. economic relationship with...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

AHC CyberSecurity History Information

Official Website of African Heritage Collection

The official website of African Heritage Collection is http://www.africanheritagecollection.com.

African Heritage Collection’s AI-Generated Cybersecurity Score

According to Rankiteo, African Heritage Collection’s AI-generated cybersecurity score is 754, reflecting their Fair security posture.

How many security badges does African Heritage Collection’ have ?

According to Rankiteo, African Heritage Collection currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does African Heritage Collection have SOC 2 Type 1 certification ?

According to Rankiteo, African Heritage Collection is not certified under SOC 2 Type 1.

Does African Heritage Collection have SOC 2 Type 2 certification ?

According to Rankiteo, African Heritage Collection does not hold a SOC 2 Type 2 certification.

Does African Heritage Collection comply with GDPR ?

According to Rankiteo, African Heritage Collection is not listed as GDPR compliant.

Does African Heritage Collection have PCI DSS certification ?

According to Rankiteo, African Heritage Collection does not currently maintain PCI DSS compliance.

Does African Heritage Collection comply with HIPAA ?

According to Rankiteo, African Heritage Collection is not compliant with HIPAA regulations.

Does African Heritage Collection have ISO 27001 certification ?

According to Rankiteo,African Heritage Collection is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of African Heritage Collection

African Heritage Collection operates primarily in the Online and Mail Order Retail industry.

Number of Employees at African Heritage Collection

African Heritage Collection employs approximately 4 people worldwide.

Subsidiaries Owned by African Heritage Collection

African Heritage Collection presently has no subsidiaries across any sectors.

African Heritage Collection’s LinkedIn Followers

African Heritage Collection’s official LinkedIn profile has approximately 109 followers.

NAICS Classification of African Heritage Collection

African Heritage Collection is classified under the NAICS code 4541, which corresponds to Electronic Shopping and Mail-Order Houses.

African Heritage Collection’s Presence on Crunchbase

No, African Heritage Collection does not have a profile on Crunchbase.

African Heritage Collection’s Presence on LinkedIn

Yes, African Heritage Collection maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/african-heritage-collection.

Cybersecurity Incidents Involving African Heritage Collection

As of December 30, 2025, Rankiteo reports that African Heritage Collection has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

African Heritage Collection has an estimated 86 peer or competitor companies worldwide.

African Heritage Collection CyberSecurity History Information

How many cyber incidents has African Heritage Collection faced ?

Total Incidents: According to Rankiteo, African Heritage Collection has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at African Heritage Collection ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability was found in Tenda WH450 1.0.0.18. Affected is an unknown function of the file /goform/PPTPUserSetting. Performing manipulation of the argument delno results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been made public and could be used.

Risk Information
cvss2
Base: 8.3
Severity: LOW
AV:N/AC:L/Au:M/C:C/I:C/A:C
cvss3
Base: 7.2
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability has been found in Tenda WH450 1.0.0.18. This impacts an unknown function of the file /goform/PPTPServer. Such manipulation of the argument ip1 leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

Risk Information
cvss2
Base: 8.3
Severity: LOW
AV:N/AC:L/Au:M/C:C/I:C/A:C
cvss3
Base: 7.2
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A flaw has been found in omec-project UPF up to 2.1.3-dev. This affects the function handleSessionEstablishmentRequest of the file /pfcpiface/pfcpiface/messages_session.go of the component PFCP Session Establishment Request Handler. This manipulation causes null pointer dereference. The attack may be initiated remotely. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:N/I:N/A:P
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was detected in floooh sokol up to 16cbcc864012898793cd2bc57f802499a264ea40. The impacted element is the function _sg_pipeline_desc_defaults in the library sokol_gfx.h. The manipulation results in stack-based buffer overflow. The attack requires a local approach. The exploit is now public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is identified as 5d11344150973f15e16d3ec4ee7550a73fb995e0. It is advisable to implement a patch to correct this issue.

Risk Information
cvss2
Base: 4.3
Severity: LOW
AV:L/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 4.8
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security vulnerability has been detected in PbootCMS up to 3.2.12. The affected element is the function get_user_ip of the file core/function/handle.php of the component Header Handler. The manipulation of the argument X-Forwarded-For leads to use of less trusted source. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:P/A:N
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 5.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=african-heritage-collection' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge