Comparison Overview

Artluxuria

VS

North Carolina Moulding

Artluxuria

None
Last Update: 2025-11-21
Between 750 and 799

Unique luxury items and family collections are created in the studio based on the individual requests of customers. These are unique, rare and distinctive samples of elite historical furniture of the Baroque, Renaissance and Louis XIV mannerist styles. Traditional techniques, including marquetry inlays, intarsia, carving and gilding, are used for the production of the mannerist style furniture. For the manufacture, only noble types of wood are used (ebony, maple, plum, elm, walnut, linden or poplar, etc.). Encrustation using inlays made from small pieces of colored wood or other materials such as mother of pearl, silver, brass, ivory, silver-leaf, gold, gold plates, etc. Handcrafted furniture, created using the technique of marquetry and intarsia, is an investment in art, delightful in its handmade beauty, which is transferred from generation to generation becoming heirlooms, items of private collections and magnificent interior decorations of any style. В студии ArtLuxuria, с учетом индивидуальных пожеланий заказчиков, создаются единичные предметы роскоши и фамильные коллекции. Это уникальные, редкие, оригинальные образцы элитной исторической мебели, в стилях барокко, ренессанс и маньеризма времен французского короля Людовика XIV. Для изготовления мебели в стиле маньеризма используются традиционные техники, включая отделку маркетри, интарсию, резьбу и позолоту, только благородные виды дерева (эбен, клен, слива, ильм, орех, корневая часть липы или тополя и т.д.). Инкрустация делается шпоном, а также материалами, как, например, перламутр, серебро, латунь, кость, сусальное серебро, золото, золотые пластины и тд. Мебель ручной работы с использованием техник маркетри и интарсия - это инвестиции в предметы искусства, в восхитительные по своей красоте изделия тончайшей ручной работы, которые передаются из поколения в поколение становясь фамильными ценностями, предметами частных коллекций и великолепнейшими украшениями интерьеров любых стилей.

NAICS: 337
NAICS Definition: Furniture and Related Product Manufacturing
Employees: None
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

North Carolina Moulding

808 Martin Luther King Jr Blvd, Lexington, 27292, US
Last Update: 2025-11-21
Between 750 and 799

NC Moulding is a full-service custom moulding manufacturer with over 35 years of experience servicing the picture frame moulding industry. Our 120,000sqft facility in North Carolina and robust supply chain of sawmill partnerships allow us to service the art fulfilment, print on demand, and wholesale picture frame industries. We pride ourselves in designing and creating all tooling in-house, which gives us unlimited abilities to design specific profiles and finishes for all of our customers. While we produce over 30 million feet of our main products (which are: floater frames, stretcher bars, and picture frame mouldings) annually for our current customers, we are also capable of producing custom moulding profiles and finishes on demand.

NAICS: 337
NAICS Definition: Furniture and Related Product Manufacturing
Employees: 5
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/artluxuria.jpeg
Artluxuria
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/north-carolina-moulding.jpeg
North Carolina Moulding
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Artluxuria
100%
Compliance Rate
0/4 Standards Verified
North Carolina Moulding
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Furniture and Home Furnishings Manufacturing Industry Average (This Year)

No incidents recorded for Artluxuria in 2025.

Incidents vs Furniture and Home Furnishings Manufacturing Industry Average (This Year)

No incidents recorded for North Carolina Moulding in 2025.

Incident History — Artluxuria (X = Date, Y = Severity)

Artluxuria cyber incidents detection timeline including parent company and subsidiaries

Incident History — North Carolina Moulding (X = Date, Y = Severity)

North Carolina Moulding cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/artluxuria.jpeg
Artluxuria
Incidents

No Incident

https://images.rankiteo.com/companyimages/north-carolina-moulding.jpeg
North Carolina Moulding
Incidents

No Incident

FAQ

Artluxuria company demonstrates a stronger AI Cybersecurity Score compared to North Carolina Moulding company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, North Carolina Moulding company has disclosed a higher number of cyber incidents compared to Artluxuria company.

In the current year, North Carolina Moulding company and Artluxuria company have not reported any cyber incidents.

Neither North Carolina Moulding company nor Artluxuria company has reported experiencing a ransomware attack publicly.

Neither North Carolina Moulding company nor Artluxuria company has reported experiencing a data breach publicly.

Neither North Carolina Moulding company nor Artluxuria company has reported experiencing targeted cyberattacks publicly.

Neither Artluxuria company nor North Carolina Moulding company has reported experiencing or disclosing vulnerabilities publicly.

Neither Artluxuria nor North Carolina Moulding holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Artluxuria company nor North Carolina Moulding company has publicly disclosed detailed information about the number of their subsidiaries.

Neither Artluxuria nor North Carolina Moulding holds SOC 2 Type 1 certification.

Neither Artluxuria nor North Carolina Moulding holds SOC 2 Type 2 certification.

Neither Artluxuria nor North Carolina Moulding holds ISO 27001 certification.

Neither Artluxuria nor North Carolina Moulding holds PCI DSS certification.

Neither Artluxuria nor North Carolina Moulding holds HIPAA certification.

Neither Artluxuria nor North Carolina Moulding holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.

Risk Information
cvss4
Base: 6.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.