Company Details
apex-book-company
12
0
511
apexbookcompany.com
0
APE_2454454
In-progress

Apex Book Company Company CyberSecurity Posture
apexbookcompany.comStrange. Beautiful. Shocking. Surreal. Apex Publications is a small press publisher dedicated to producing exemplary works of science fiction, horror, fantasy and non-fiction. Based out of Lexington, Kentucky, Apex Book Company is owned and operated by Jason B. Sizemore. Apex Publications also operates The Zombie Feed Press. The Zombie Feed is a zombie imprint helmed by Ty Schwamberger and created to feed the carnivorous appetites of zombie fans. Our current catalog includes anthologies like the highly-acclaimed Dark Faith, novels and novellas like The Labyrinth of the Dead, non-fiction books like To Each Their Darkness and the ever-popular Apex Magazine. The company offers readers the ability to buy directly from the publisher or indirectly through other channels including Amazon.com, DriveThruFiction.com and BarnesAndNoble.com. In addition, most titles are available both digitally and as a print copy. Format and availability is indicated on each individual book's page within the store. For distributors and librarians, visit the wholesale and distribution for Apex Book Company page.
Company Details
apex-book-company
12
0
511
apexbookcompany.com
0
APE_2454454
In-progress
Between 800 and 849

ABC Global Score (TPRM)XXXX



No incidents recorded for Apex Book Company in 2025.
No incidents recorded for Apex Book Company in 2025.
No incidents recorded for Apex Book Company in 2025.
ABC cyber incidents detection timeline including parent company and subsidiaries

Strange. Beautiful. Shocking. Surreal. Apex Publications is a small press publisher dedicated to producing exemplary works of science fiction, horror, fantasy and non-fiction. Based out of Lexington, Kentucky, Apex Book Company is owned and operated by Jason B. Sizemore. Apex Publications also operates The Zombie Feed Press. The Zombie Feed is a zombie imprint helmed by Ty Schwamberger and created to feed the carnivorous appetites of zombie fans. Our current catalog includes anthologies like the highly-acclaimed Dark Faith, novels and novellas like The Labyrinth of the Dead, non-fiction books like To Each Their Darkness and the ever-popular Apex Magazine. The company offers readers the ability to buy directly from the publisher or indirectly through other channels including Amazon.com, DriveThruFiction.com and BarnesAndNoble.com. In addition, most titles are available both digitally and as a print copy. Format and availability is indicated on each individual book's page within the store. For distributors and librarians, visit the wholesale and distribution for Apex Book Company page.

Wenner Media LLC, a privately held company headquartered in New York City, publishes Rolling Stone, Men’s Journal, and Glixel. The company’s two print properties (Rolling Stone and Men’s Journal) attract more than 21 million readers each month, and the three digital properties reach 28 million gross

Our mission is to provide teachers, administrators, and other school staff with quality tools and resources that will better enable them to help every student achieve success. Our signature product is our quick-reference laminated guides—the original laminated guides for educators. Written by some o

The Intermedia Group is Australia’s leading independent business-to-business publishing company employing local expert editors and international publishers across a broad range of industry sectors, united by their passion for highly credible mastheads and engaging content. The Intermedia Group por

For more than 30 years, GQ has been the premier men’s magazine, providing intelligent coverage of style, culture, politics, lifestyle and more. Each month on the magazine, and daily on the website, we work with the finest photographers, and a stable of award-winning writers, to deliver stand-out sto

www.4rfv.co.uk is one of the largest on-line directory's in the film and television industry in UK and Ireland. We are gaining over 110,000 Unique visitors (all stats electronically ABC audited) making us by far the biggest site in this industry in terms of visitors. We also have approx 70% of our

WHO WE ARE: TwinCities.com/Pioneer Press is a time-honored hometown institution firmly centered in the Twin Cities community while sitting on the cutting edge of multi-media technology. Drawing upon a 165+year heritage of excellence that includes three Pulitzer prizes, we are an exciting, thrivi
.png)
Ireland was one of 25 countries, along with Nato members and partners as well as states from Asia and the Pacific, invited to join the...
The official San Diego Comic-Con schedule is normally released exactly two weeks before the convention (which would put this year's release...
Cybersecurity is at an inflection point, driven by a profound shift powered by artificial intelligence (AI). My recent conversation with...
PRNewswire/ -- News summary Dell APEX File Storage for Microsoft Azure is designed to deliver superior AI workload performance,...
The town of Apex is addressing resident concerns about unusually high utility bills, with some residents reporting charges as high as $1000.
Israeli cyber security start-up Apex, which focuses on protecting the rapid use of artificial intelligence (AI) tools, said on Thursday it received an...
The company reveals a reference customer, Kevin Mandia endorses the technical approach, Ted Schlein joins the Board of Directors and Marie...
Estimated reading time: 4 minutes. Last week was IPC APEX EXPO 2024 in Anaheim, California. There were more than 400 exhibitors, many displaying impressive...
Cyber security researchers discovered the first malicious app for the record-breaking video game, which is yet to be released on Android or...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Apex Book Company is http://apexbookcompany.com.
According to Rankiteo, Apex Book Company’s AI-generated cybersecurity score is 803, reflecting their Good security posture.
According to Rankiteo, Apex Book Company currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Apex Book Company is not certified under SOC 2 Type 1.
According to Rankiteo, Apex Book Company does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Apex Book Company is not listed as GDPR compliant.
According to Rankiteo, Apex Book Company does not currently maintain PCI DSS compliance.
According to Rankiteo, Apex Book Company is not compliant with HIPAA regulations.
According to Rankiteo,Apex Book Company is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Apex Book Company operates primarily in the Book and Periodical Publishing industry.
Apex Book Company employs approximately 12 people worldwide.
Apex Book Company presently has no subsidiaries across any sectors.
Apex Book Company’s official LinkedIn profile has approximately 0 followers.
Apex Book Company is classified under the NAICS code 511, which corresponds to Publishing Industries (except Internet).
No, Apex Book Company does not have a profile on Crunchbase.
Yes, Apex Book Company maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/apex-book-company.
As of November 28, 2025, Rankiteo reports that Apex Book Company has not experienced any cybersecurity incidents.
Apex Book Company has an estimated 4,881 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Apex Book Company has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.