Company Details
curtis-furniture
66
2,751
337
curtisfurniture.co.uk
0
CUR_1136081
In-progress

Curtis Hotel Bedroom Furniture Company CyberSecurity Posture
curtisfurniture.co.ukCurtis Hotel Bedroom Furniture are hotel bedroom furniture experts. We have over 25 years of experience specialising in the design, manufacture and installation of beautiful, quality furniture for hotel bedrooms. Take a look at our website to see some of our case studies and testimonials. From our 60,000 sq ft factory in Yorkshire, we manufacture bespoke products for both independent hotels and large hotel groups across the UK. We believe nobody is better placed to produce quality at pace. Our value engineering solutions can drive down your furniture costs without compromising on appearance or longevity. Give our friendly team a call on 0113 248 0605 to find out more.
Company Details
curtis-furniture
66
2,751
337
curtisfurniture.co.uk
0
CUR_1136081
In-progress
Between 750 and 799

CHBF Global Score (TPRM)XXXX



No incidents recorded for Curtis Hotel Bedroom Furniture in 2025.
No incidents recorded for Curtis Hotel Bedroom Furniture in 2025.
No incidents recorded for Curtis Hotel Bedroom Furniture in 2025.
CHBF cyber incidents detection timeline including parent company and subsidiaries

Curtis Hotel Bedroom Furniture are hotel bedroom furniture experts. We have over 25 years of experience specialising in the design, manufacture and installation of beautiful, quality furniture for hotel bedrooms. Take a look at our website to see some of our case studies and testimonials. From our 60,000 sq ft factory in Yorkshire, we manufacture bespoke products for both independent hotels and large hotel groups across the UK. We believe nobody is better placed to produce quality at pace. Our value engineering solutions can drive down your furniture costs without compromising on appearance or longevity. Give our friendly team a call on 0113 248 0605 to find out more.

Loctek is a public listed company in China, and a top manufacturer of ergonomic solution products which comprise height adjustable desk, desk converter, monitor arm, TV wall mount, and exercise bike. With the values of building a healthy, comfortable and innovative interior environment, Loctek focu

Since 1995, Vigilant has been at the forefront of transforming wine and cigar storage. As industry leaders, we pride ourselves on delivering luxury storage solutions that are both innovative and timeless. Our products are designed and handcrafted in the U.S., ensuring the highest quality and attenti

Rodenbeck Associates is an independent manufacturer rep group formed in 1978 and is based out of our showroom in Downtown Los Angeles, California. We pride ourselves in outstanding customer service and our excellent mix of high quality, contract furniture lines. Currently we represent 10 contract of

South Shore Furniture, founded in 1940, was the first Canadian manufacturing company to specialize in online furniture sales. Its success hinges on a team of almost 1,000 employees working in 3 factories and 3 distribution centers across North America. South Shore Furniture offers a product line of
Launched in 2015, Endy (endy.com) is revolutionizing the way people sleep, through their ridiculously comfortable, supportive and 100% Canadian-made mattress, and shaking up the industry by selling directly to consumers. At the core of the business is the award-winning mattress, which provides unpar

One of Australia’s most respected manufacturers; Workspace Commercial Furniture commenced in 1911 and has revolutionised to meet the changing needs of their clients and the market. Workspace is a leader in design and manufacture of commercial, educational, hospitality, health and aged care furniture
.png)
Microsoft to block unauthorized scripts in Entra ID logins, new legislation targets scammers that use AI, ASUS patches AiCloud...
Mobile operators are so overwhelmed by fragmented cybersecurity rules that they are actually at greater risk of being hacked.
The programme will be delivered across India through a hybrid model, combining direct engagement with universities and collaboration with...
~Reaffirms Its Leadership as a CERT-In Empanelled Cybersecurity Partner for India's Digital Future~. New Delhi, India – November 28,...
AI is transforming cybersecurity workflows, from threat modeling to vulnerability prioritization, said Bill Chen, CISO at Natera, underlining the need for...
An update from Cyviz AS ( ($DE:8P9) ) is now available. Cyviz AS has entered into a new partner contract with IBM to modernize and upgrade...
Dubai, UAE : RNTrust Group announces a high-level GCC Cybersecurity Summit taking place in Dubai on Wednesday, December 10, 2025.
A new Unit 42 report warns that underground AI models like WormGPT and KawaiiGPT are lowering the skill barrier for cybercrime,...
A recent Gartner survey found that more than half of government CIOs outside the US expect IT budgets to rise in 2026, with cybersecurity,...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Curtis Hotel Bedroom Furniture is https://www.curtisfurniture.co.uk.
According to Rankiteo, Curtis Hotel Bedroom Furniture’s AI-generated cybersecurity score is 754, reflecting their Fair security posture.
According to Rankiteo, Curtis Hotel Bedroom Furniture currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Curtis Hotel Bedroom Furniture is not certified under SOC 2 Type 1.
According to Rankiteo, Curtis Hotel Bedroom Furniture does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Curtis Hotel Bedroom Furniture is not listed as GDPR compliant.
According to Rankiteo, Curtis Hotel Bedroom Furniture does not currently maintain PCI DSS compliance.
According to Rankiteo, Curtis Hotel Bedroom Furniture is not compliant with HIPAA regulations.
According to Rankiteo,Curtis Hotel Bedroom Furniture is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Curtis Hotel Bedroom Furniture operates primarily in the Furniture and Home Furnishings Manufacturing industry.
Curtis Hotel Bedroom Furniture employs approximately 66 people worldwide.
Curtis Hotel Bedroom Furniture presently has no subsidiaries across any sectors.
Curtis Hotel Bedroom Furniture’s official LinkedIn profile has approximately 2,751 followers.
Curtis Hotel Bedroom Furniture is classified under the NAICS code 337, which corresponds to Furniture and Related Product Manufacturing.
No, Curtis Hotel Bedroom Furniture does not have a profile on Crunchbase.
Yes, Curtis Hotel Bedroom Furniture maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/curtis-furniture.
As of November 28, 2025, Rankiteo reports that Curtis Hotel Bedroom Furniture has not experienced any cybersecurity incidents.
Curtis Hotel Bedroom Furniture has an estimated 2,617 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Curtis Hotel Bedroom Furniture has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.