Company Details
boomerang_2
49
315
337
boomerangofficefurniture.com
0
BOO_2014324
In-progress

Boomerang Company CyberSecurity Posture
boomerangofficefurniture.comImagine an office environment where quality design and innovative planning can maximize your savings and improve productivity. As a leading provider of office planning solutions, Boomerang is dedicated to helping you with every aspect of improving your work environment. Our expertise in high quality, pre-owned furniture from premier brands such as Knoll, Steelcase and Herman Miller is intuitively balanced with a smart selection of new products. Our innovative approach in choosing the right solution for your office space will exceed your every expectation while providing a comfortable and efficient setting for the people who work there. Whether you are buying or selling, Boomerang can offer a wide range of services from reconfiguring your offices to relocation, buyback or asset management. Whatever the challenge, Boomerang is your perfect partner to provide the optimum plan and value for your office needs. Our warehouse is filled with outstanding values on high quality, pre-owned office furniture for reception areas, conference rooms, cubicles, files, seating and workstations from some of the finest brands available. And we can easily complement any selection with great savings on brand new furniture as well.
Company Details
boomerang_2
49
315
337
boomerangofficefurniture.com
0
BOO_2014324
In-progress
Between 750 and 799

Boomerang Global Score (TPRM)XXXX



No incidents recorded for Boomerang in 2025.
No incidents recorded for Boomerang in 2025.
No incidents recorded for Boomerang in 2025.
Boomerang cyber incidents detection timeline including parent company and subsidiaries

Imagine an office environment where quality design and innovative planning can maximize your savings and improve productivity. As a leading provider of office planning solutions, Boomerang is dedicated to helping you with every aspect of improving your work environment. Our expertise in high quality, pre-owned furniture from premier brands such as Knoll, Steelcase and Herman Miller is intuitively balanced with a smart selection of new products. Our innovative approach in choosing the right solution for your office space will exceed your every expectation while providing a comfortable and efficient setting for the people who work there. Whether you are buying or selling, Boomerang can offer a wide range of services from reconfiguring your offices to relocation, buyback or asset management. Whatever the challenge, Boomerang is your perfect partner to provide the optimum plan and value for your office needs. Our warehouse is filled with outstanding values on high quality, pre-owned office furniture for reception areas, conference rooms, cubicles, files, seating and workstations from some of the finest brands available. And we can easily complement any selection with great savings on brand new furniture as well.


The traditional Swiss company Bauwerk Parkett manufactures parquet flooring for the highest demands with reliability and precision. Bauwerk is proud of its origins, but at the same time focuses on innovation. In recent years, the company has undergone a major transformation and is now breaking new g

Sourcing manufacturing companies in Bali. Oktapoenya Teamwork production our own products, we can also source many types of craft from Java, Bali, Lombok and other areas in Indonesia. We have an extensive network of rural indigenous craftsmen and small factories on the island of Java, Bali and Lombo

who we are Buro 45 is an established, progressive company, offering a broad range of modern commercial furniture complemented by related services to clients and designers across the Gulf Region. Our goal is to assist clients in getting the most from their business by designing dynamic, tailor-made
Since 2006, Walker Edison has been a leader in the e-commerce furniture industry, partnering with some of the largest retailers to deliver exceptional value to homes across the U.S. and Canada. Headquartered in Salt Lake City, UT, with operations in Brazil, Vietnam, China, and across the United Stat

PSI-New England Storage Products is proud to be the exclusive distributor of ESTEY library shelving. Having the New England Territory for over 30 year, PSI prides themselves on their customer service. PSI-NESP is more than just shelving, We sell, install and service products from manufacturers like

Southern Aluminum is the leading producer of forward-thinking, stylish lightweight furniture solutions. Since 1978, our talented and highly skilled teams have delivered a unique line of exceptionally crafted linenless furniture to industries ranging from hospitality and education to government, heal
.png)
Tariffs will revert back to their April 2 rates on Aug. 1 for countries that fail to nail down new trade deals with the United States,...
The cybersecurity community has been buzzing about JPMorgan Chase CISO Pat Opet's open letter to third-party suppliers since its release right before RSA.
COMMENTARY: CISOs and senior cybersecurity leaders have the power to shape their organization's technical defenses, as well as its security...
It's an ironic twist: European laws meant to rein in tech giants like Google, Amazon, and Meta often give them an edge.
Boomerangs Roadhouse of West Warwick, Rhode Island is helping us celebrate National Bacon Lover's Day with a plethora of their delicious...
Ahluwalia says the Pacific has had enough of the boomerang aid that is often married into many donor-funded projects.
In 2021, the Great Resignation marked the largest exodus of workers from their jobs in US history. Over 47 million Americans voluntarily...
Safety campaigns can have a serious boomerang effect, meaning make everyone less safe.
Join our engineering teams that build massively scalable software and systems, architect low latency infrastructure solutions, proactively guard against cyber...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Boomerang is http://www.boomerangofficefurniture.com.
According to Rankiteo, Boomerang’s AI-generated cybersecurity score is 756, reflecting their Fair security posture.
According to Rankiteo, Boomerang currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Boomerang is not certified under SOC 2 Type 1.
According to Rankiteo, Boomerang does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Boomerang is not listed as GDPR compliant.
According to Rankiteo, Boomerang does not currently maintain PCI DSS compliance.
According to Rankiteo, Boomerang is not compliant with HIPAA regulations.
According to Rankiteo,Boomerang is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Boomerang operates primarily in the Furniture and Home Furnishings Manufacturing industry.
Boomerang employs approximately 49 people worldwide.
Boomerang presently has no subsidiaries across any sectors.
Boomerang’s official LinkedIn profile has approximately 315 followers.
Boomerang is classified under the NAICS code 337, which corresponds to Furniture and Related Product Manufacturing.
No, Boomerang does not have a profile on Crunchbase.
Yes, Boomerang maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/boomerang_2.
As of November 28, 2025, Rankiteo reports that Boomerang has not experienced any cybersecurity incidents.
Boomerang has an estimated 2,617 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Boomerang has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.