ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Chunky Move was established in 1995 and has since carved out a place as one of the most influential dance companies in Australia. The company champions visually striking and genre-defying works that merge the body with other artistic mediums, with the program consisting of works by the Artistic Director, the Resident Choreographer and commissioned independent artists. Exploring contemporary themes and culture, Chunky Move’s works interact with varied spaces and presentation contexts, and are underpinned by an ethos of collaboration and experimentation.

CHUNKY MOVE A.I CyberSecurity Scoring

CHUNKY MOVE

Company Details

Linkedin ID:

chunky-move

Employees number:

26

Number of followers:

1,049

NAICS:

7111

Industry Type:

Performing Arts

Homepage:

chunkymove.com

IP Addresses:

0

Company ID:

CHU_1109104

Scan Status:

In-progress

AI scoreCHUNKY MOVE Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/chunky-move.jpeg
CHUNKY MOVE Performing Arts
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreCHUNKY MOVE Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/chunky-move.jpeg
CHUNKY MOVE Performing Arts
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

CHUNKY MOVE Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

CHUNKY MOVE Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for CHUNKY MOVE

Incidents vs Performing Arts Industry Average (This Year)

No incidents recorded for CHUNKY MOVE in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for CHUNKY MOVE in 2025.

Incident Types CHUNKY MOVE vs Performing Arts Industry Avg (This Year)

No incidents recorded for CHUNKY MOVE in 2025.

Incident History — CHUNKY MOVE (X = Date, Y = Severity)

CHUNKY MOVE cyber incidents detection timeline including parent company and subsidiaries

CHUNKY MOVE Company Subsidiaries

SubsidiaryImage

Chunky Move was established in 1995 and has since carved out a place as one of the most influential dance companies in Australia. The company champions visually striking and genre-defying works that merge the body with other artistic mediums, with the program consisting of works by the Artistic Director, the Resident Choreographer and commissioned independent artists. Exploring contemporary themes and culture, Chunky Move’s works interact with varied spaces and presentation contexts, and are underpinned by an ethos of collaboration and experimentation.

Loading...
similarCompanies

CHUNKY MOVE Similar Companies

Association Catalyse

Depuis 2003, Catalyse développe un écosystème dédié à la voix et ses pouvoirs transformateurs. Lieu de vie, de formation, de pratique et de spectacles, Catalyse est une école spécialisée dans le domaine de la voix (théâtre / chant / improvisation) qui avoisine les 300 élèves et qui propose une métho

National Sawdust

The mission of National Sawdust (NS) is to curate and produce music and artistic works rooted in curiosity, experimentation, innovation, and inclusivity that engage communities of artists and audiences at our state-of-the-art Williamsburg home and on our digital stage. Embedded into the mission is t

Sheffield Theatres

We’re the world-famous Crucible, a Sheffield landmark with a distinctive stage and a reputation for unforgettable productions. We’re the Playhouse, an intimate, versatile space for getting even closer to the action. We’re the beautiful Lyceum, the gleaming traditional proscenium arch theatre that ho

The Studio, Liberty Dance and Glee

The Studio, Liberty's newest performing arts studio specializes in dance and glee (singing with choreography). We offer classes as young as 18 months through adult and offer such genres as ballet, tap, hip hop, pom, contemporary, pointe, musical theater as well as all boy tap and hip hop classes.

Grand Rapids Ballet School

From beginner to advanced, students at Grand Rapids Ballet School will receive the nurturing instruction of our professional teaching faculty to develop a thorough knowledge of technique, the invaluable skill of self-discipline, and a lasting love of dance. Elements from the French, Italian, and Ru

Raw Art

[Raw Art] project was created in 2005 by a Ukrainian director Taras Pozdnyakov. The project casts graduates of Kiev Circus Academy – one of the best circus schools in the world. The actors are trained by Nataliya and Yuriy Pozdnyakovs. For quite a while, the project was described as ‘alternative

newsone

CHUNKY MOVE CyberSecurity News

August 12, 2024 07:00 AM
Joy, stress, trust and exhaustion: Groundbreaking dance collab captured in beautiful new documentary

When Rewards for the Tribe, a new work performed by a troupe of dancers with and without disability, went on tour, director Rhys Graham was...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

CHUNKY MOVE CyberSecurity History Information

Official Website of CHUNKY MOVE

The official website of CHUNKY MOVE is http://www.chunkymove.com.

CHUNKY MOVE’s AI-Generated Cybersecurity Score

According to Rankiteo, CHUNKY MOVE’s AI-generated cybersecurity score is 758, reflecting their Fair security posture.

How many security badges does CHUNKY MOVE’ have ?

According to Rankiteo, CHUNKY MOVE currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does CHUNKY MOVE have SOC 2 Type 1 certification ?

According to Rankiteo, CHUNKY MOVE is not certified under SOC 2 Type 1.

Does CHUNKY MOVE have SOC 2 Type 2 certification ?

According to Rankiteo, CHUNKY MOVE does not hold a SOC 2 Type 2 certification.

Does CHUNKY MOVE comply with GDPR ?

According to Rankiteo, CHUNKY MOVE is not listed as GDPR compliant.

Does CHUNKY MOVE have PCI DSS certification ?

According to Rankiteo, CHUNKY MOVE does not currently maintain PCI DSS compliance.

Does CHUNKY MOVE comply with HIPAA ?

According to Rankiteo, CHUNKY MOVE is not compliant with HIPAA regulations.

Does CHUNKY MOVE have ISO 27001 certification ?

According to Rankiteo,CHUNKY MOVE is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of CHUNKY MOVE

CHUNKY MOVE operates primarily in the Performing Arts industry.

Number of Employees at CHUNKY MOVE

CHUNKY MOVE employs approximately 26 people worldwide.

Subsidiaries Owned by CHUNKY MOVE

CHUNKY MOVE presently has no subsidiaries across any sectors.

CHUNKY MOVE’s LinkedIn Followers

CHUNKY MOVE’s official LinkedIn profile has approximately 1,049 followers.

NAICS Classification of CHUNKY MOVE

CHUNKY MOVE is classified under the NAICS code 7111, which corresponds to Performing Arts Companies.

CHUNKY MOVE’s Presence on Crunchbase

No, CHUNKY MOVE does not have a profile on Crunchbase.

CHUNKY MOVE’s Presence on LinkedIn

Yes, CHUNKY MOVE maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/chunky-move.

Cybersecurity Incidents Involving CHUNKY MOVE

As of December 13, 2025, Rankiteo reports that CHUNKY MOVE has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

CHUNKY MOVE has an estimated 2,699 peer or competitor companies worldwide.

CHUNKY MOVE CyberSecurity History Information

How many cyber incidents has CHUNKY MOVE faced ?

Total Incidents: According to Rankiteo, CHUNKY MOVE has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at CHUNKY MOVE ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, there is no handler for JSON parsing errors; SyntaxError from express.json() includes user input in the error message, which gets reflected in responses. User input (including HTML/JavaScript) can be exposed in error responses, creating an XSS risk if Content-Type isn't strictly enforced. This issue does not have a fix at the time of publication.

Risk Information
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, when creating prompts, JSON requests are sent to define and modify the prompts via PATCH endpoint for prompt groups (/api/prompts/groups/:groupId). However, the request bodies are not sufficiently validated for proper input, enabling users to modify prompts in a way that was not intended as part of the front end system. The patchPromptGroup function passes req.body directly to updatePromptGroup() without filtering sensitive fields. This issue is fixed in version 0.8.1.

Risk Information
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

LibreChat is a ChatGPT clone with additional features. In versions 0.8.0 and below, when a user posts a question, the iconURL parameter of the POST request can be modified by an attacker. The malicious code is then stored in the chat which can then be shared to other users. When sharing chats with a potentially malicious “tracker”, resources loaded can lead to loss of privacy for users who view the chat link that is sent to them. This issue is fixed in version 0.8.1.

Risk Information
cvss4
Base: 8.6
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

MaxKB is an open-source AI assistant for enterprise. Versions 2.3.1 and below have improper file permissions which allow attackers to overwrite the built-in dynamic linker and other critical files, potentially resulting in privilege escalation. This issue is fixed in version 2.4.0.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Description

MaxKB is an open-source AI assistant for enterprise. In versions 2.3.1 and below, the tool module allows an attacker to escape the sandbox environment and escalate privileges under certain concurrent conditions. This issue is fixed in version 2.4.0.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=chunky-move' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge