ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Edizioni Condé Nast Spa, proprietà di Condé Nast International, è leader in Italia nel settore dei prodotti editoriali di alta gamma. La casa editrice pubblica 15 periodici- Vogue, L'Uomo Vogue, Vogue Bambini, Vogue Gioiello, Vogue Sposa, Glamour, AD, Sposabella, Condé Nast Traveller, GQ, Vanity Fair, GQ Style, Vogue Accessory, Wired, Myself- e ha consolidato la propria presenza sul web con il lancio di 6 siti - VanityFair.it, Vogue.it, Wired.it, Gq.com, Glamour.it, ADToday. Condé Nast, che si caratterizza per la sperimentazione e la ricerca della massima espressione della qualità sia offline sia online, ha inoltre sviluppato 5 app di prodotto - Glamour Personal Shopper, Wired Wi-Fi, Wired Mobility, Traveller Cards, Fashion in Vogue- 10 digital replica - AD, Vanity Fair, Traveller, Vogue Gioiello, Vogue Bambini, Vogue Accessory, Vogue Sposa, Sposabella, Glamour, Myself - e 3 interactive replica -Wired, GQ,Vogue-.

Condé Nast Italia A.I CyberSecurity Scoring

CNI

Company Details

Linkedin ID:

conde-nast-italy

Employees number:

484

Number of followers:

51,108

NAICS:

511

Industry Type:

Book and Periodical Publishing

Homepage:

condenast.it

IP Addresses:

0

Company ID:

CON_3080507

Scan Status:

In-progress

AI scoreCNI Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/conde-nast-italy.jpeg
CNI Book and Periodical Publishing
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreCNI Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/conde-nast-italy.jpeg
CNI Book and Periodical Publishing
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

CNI Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Condé NastBreach100405/2019
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Condé Nast notified about 1,100 WIRED subscribers of a breach involving their payment information. They stated that an unauthorized party accessed their vendor’s systems in an attempt to acquire information. The compromised information includes names, postal and email addresses, credit/debit card numbers, security codes, and card expiration dates.

Condé Nast
Breach
Severity: 100
Impact: 4
Seen: 05/2019
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Condé Nast notified about 1,100 WIRED subscribers of a breach involving their payment information. They stated that an unauthorized party accessed their vendor’s systems in an attempt to acquire information. The compromised information includes names, postal and email addresses, credit/debit card numbers, security codes, and card expiration dates.

Ailogo

CNI Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for CNI

Incidents vs Book and Periodical Publishing Industry Average (This Year)

No incidents recorded for Condé Nast Italia in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Condé Nast Italia in 2025.

Incident Types CNI vs Book and Periodical Publishing Industry Avg (This Year)

No incidents recorded for Condé Nast Italia in 2025.

Incident History — CNI (X = Date, Y = Severity)

CNI cyber incidents detection timeline including parent company and subsidiaries

CNI Company Subsidiaries

SubsidiaryImage

Edizioni Condé Nast Spa, proprietà di Condé Nast International, è leader in Italia nel settore dei prodotti editoriali di alta gamma. La casa editrice pubblica 15 periodici- Vogue, L'Uomo Vogue, Vogue Bambini, Vogue Gioiello, Vogue Sposa, Glamour, AD, Sposabella, Condé Nast Traveller, GQ, Vanity Fair, GQ Style, Vogue Accessory, Wired, Myself- e ha consolidato la propria presenza sul web con il lancio di 6 siti - VanityFair.it, Vogue.it, Wired.it, Gq.com, Glamour.it, ADToday. Condé Nast, che si caratterizza per la sperimentazione e la ricerca della massima espressione della qualità sia offline sia online, ha inoltre sviluppato 5 app di prodotto - Glamour Personal Shopper, Wired Wi-Fi, Wired Mobility, Traveller Cards, Fashion in Vogue- 10 digital replica - AD, Vanity Fair, Traveller, Vogue Gioiello, Vogue Bambini, Vogue Accessory, Vogue Sposa, Sposabella, Glamour, Myself - e 3 interactive replica -Wired, GQ,Vogue-.

Loading...
similarCompanies

CNI Similar Companies

Ministry Matters™

Ministry Matters™ is a community of resources for church leaders. Whether your church has ten pews or a thousand seats, a praise band or a pipe organ, one-room Sunday school or a network of small groups, a huge staff or just you . . . We're here for you. This is a place for you to brainstorm,

Thames & Hudson

Thames & Hudson was founded in 1949 by Walter and Eva Neurath. Their passion and mission was to create a ‘museum without walls’ and to make accessible to a large reading public the world of art and the research of top scholars. To reflect its international outlook the name for the company linked the

Rock Sound

Rock Sound is the UK’s leading independent multi-media new music brand. Targeting 15 to 24 year olds, the brand boasts a monthly audience of over 1.5 million fans of alternative music. Amongst competitors Rock Sound is the only title to achieve an ABC audited sales-increase in each of the last tw

Off the Cuff Magazine

Off the Cuff is Boston University's only award winning fashion and art publication. We strive to push the limits and engage the community to discuss difficult topics. We push boundaries. We use fashion and art to create positive change and ignite conversations.We produce a range of multimedia conten

Golf Fitness Magazine, Inc.

Golf Fitness Magazine is the only national consumer publication dedicated to golf-specific fitness, mental focus, and improving ability, performance and health among all golfers. Our priority is to maximize your potential lower your scores, reduce your risk of injury, and extend your golfing years.

She Writes for Him

We live in tenuous times and how will we as writers and communicators rise to the challenge? As women of faith, we have the opportunity to shine in the face of uncertainty. Daughter of the King, perhaps it was for a moment like this that you came to be a part of the royal family. – Esther 4:14 CEB

newsone

CNI CyberSecurity News

January 07, 2020 08:00 AM
The New Issue of Italian 'Vogue' Features Zero Fashion Photoshoots For a Very Good Reason

As is often the way when it comes to fashion, what's old is new again: Vogue Italia's January 2020 issue is replacing its usual glossy...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

CNI CyberSecurity History Information

Official Website of Condé Nast Italia

The official website of Condé Nast Italia is http://www.condenast.it.

Condé Nast Italia’s AI-Generated Cybersecurity Score

According to Rankiteo, Condé Nast Italia’s AI-generated cybersecurity score is 756, reflecting their Fair security posture.

How many security badges does Condé Nast Italia’ have ?

According to Rankiteo, Condé Nast Italia currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Condé Nast Italia have SOC 2 Type 1 certification ?

According to Rankiteo, Condé Nast Italia is not certified under SOC 2 Type 1.

Does Condé Nast Italia have SOC 2 Type 2 certification ?

According to Rankiteo, Condé Nast Italia does not hold a SOC 2 Type 2 certification.

Does Condé Nast Italia comply with GDPR ?

According to Rankiteo, Condé Nast Italia is not listed as GDPR compliant.

Does Condé Nast Italia have PCI DSS certification ?

According to Rankiteo, Condé Nast Italia does not currently maintain PCI DSS compliance.

Does Condé Nast Italia comply with HIPAA ?

According to Rankiteo, Condé Nast Italia is not compliant with HIPAA regulations.

Does Condé Nast Italia have ISO 27001 certification ?

According to Rankiteo,Condé Nast Italia is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Condé Nast Italia

Condé Nast Italia operates primarily in the Book and Periodical Publishing industry.

Number of Employees at Condé Nast Italia

Condé Nast Italia employs approximately 484 people worldwide.

Subsidiaries Owned by Condé Nast Italia

Condé Nast Italia presently has no subsidiaries across any sectors.

Condé Nast Italia’s LinkedIn Followers

Condé Nast Italia’s official LinkedIn profile has approximately 51,108 followers.

NAICS Classification of Condé Nast Italia

Condé Nast Italia is classified under the NAICS code 511, which corresponds to Publishing Industries (except Internet).

Condé Nast Italia’s Presence on Crunchbase

No, Condé Nast Italia does not have a profile on Crunchbase.

Condé Nast Italia’s Presence on LinkedIn

Yes, Condé Nast Italia maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/conde-nast-italy.

Cybersecurity Incidents Involving Condé Nast Italia

As of November 28, 2025, Rankiteo reports that Condé Nast Italia has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

Condé Nast Italia has an estimated 4,881 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Condé Nast Italia ?

Incident Types: The types of cybersecurity incidents that have occurred include Breach.

How does Condé Nast Italia detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an communication strategy with subscriber notification..

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: Condé Nast Data Breach

Description: Condé Nast notified about 1,100 WIRED subscribers of a breach involving their payment information. An unauthorized party accessed their vendor’s systems in an attempt to acquire information. The compromised information includes names, postal and email addresses, credit/debit card numbers, security codes, and card expiration dates.

Type: Data Breach

Attack Vector: Unauthorized Access

Threat Actor: Unauthorized Party

Motivation: Data Theft

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

How does the company identify the attack vectors used in incidents ?

Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Vendor's Systems.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach CON202224323

Data Compromised: Names, Postal and email addresses, Credit/debit card numbers, Security codes, Card expiration dates

Payment Information Risk: High

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information, Payment Information and .

Which entities were affected by each incident ?

Incident : Data Breach CON202224323

Entity Name: Condé Nast

Entity Type: Company

Industry: Media

Customers Affected: 1100

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Data Breach CON202224323

Communication Strategy: Subscriber Notification

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach CON202224323

Type of Data Compromised: Personal information, Payment information

Number of Records Exposed: 1100

Sensitivity of Data: High

Personally Identifiable Information: namespostal and email addresses

Investigation Status

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Subscriber Notification.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Data Breach CON202224323

Customer Advisories: Notification to Subscribers

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Notification to Subscribers.

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Data Breach CON202224323

Entry Point: Vendor's Systems

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident was an Unauthorized Party.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were names, postal and email addresses, credit/debit card numbers, security codes, card expiration dates and .

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were credit/debit card numbers, card expiration dates, names, security codes and postal and email addresses.

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 110.0.

Stakeholder and Customer Advisories

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued was an Notification to Subscribers.

Initial Access Broker

What was the most recent entry point used by an initial access broker ?

Most Recent Entry Point: The most recent entry point used by an initial access broker was an Vendor's Systems.

cve

Latest Global CVEs (Not Company-Specific)

Description

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.

Risk Information
cvss4
Base: 6.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=conde-nast-italy' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge