Company Details
diesco
18
425
337
diesco.com.mx
0
DIE_4814687
In-progress

Diesco Company CyberSecurity Posture
diesco.com.mxDiesco, empresa de Grupo Riviera, se especializa en fabricación de mobiliario para Hospitality & Contract. Nuestro objetivo es convertir las ideas de nuestros clientes en espacios reales. Mantenemos constante comunicación con nuestros clientes para llevarlos de la mano a través de los procesos de diseño, selección de materiales, desarrollo de ingeniería, manufactura, entrega e instalación.
Company Details
diesco
18
425
337
diesco.com.mx
0
DIE_4814687
In-progress
Between 750 and 799

Diesco Global Score (TPRM)XXXX



No incidents recorded for Diesco in 2025.
No incidents recorded for Diesco in 2025.
No incidents recorded for Diesco in 2025.
Diesco cyber incidents detection timeline including parent company and subsidiaries

Diesco, empresa de Grupo Riviera, se especializa en fabricación de mobiliario para Hospitality & Contract. Nuestro objetivo es convertir las ideas de nuestros clientes en espacios reales. Mantenemos constante comunicación con nuestros clientes para llevarlos de la mano a través de los procesos de diseño, selección de materiales, desarrollo de ingeniería, manufactura, entrega e instalación.


Established in 1972 by Bob Evans hence the B.E The Company director is Simon Evans with Kris Hart and Ant Hart completing the management team. Initially event organisers, we soon learnt how much pressure organisers are under and how they need reliable and professional suppliers. Our team are hardwor

Chicago Style Furniture - Featured on ABC Morning News as Chicago land's Best Bargain Furniture Store. - Mr. Cheap’s Chicago as one of the best furniture bargains in Chicago. - Chicago Magazine’s Best Store Issue. Shop Small We opened in 1977 as one of Chicago's first stores to carry ready to ass

General Contracting – R.C. Taylor, Inc. is a licensed, bonded, and insured, general contractor able to provide you with complete construction services. We are licensed to do both commercial and residential work. Furnishings – d.b.a. Southwest Partitions & Office Inter

Spaceoasis designs, manufactures and installs furniture to create amazing learning and work environments that enable our customers, their students, staff and co-workers to do, and achieve, more. Working with aspirational schools, colleges, universities, companies and public sector bodies, the env

Willoughby Ltd is a family-run manufacturing business based in the heart of the North Devon countryside. Close to the North Devon Link Road and only 20 minutes from the M5, we have excellent links to businesses across the Westcountry and beyond. We are a British manufacturer with over 30 years exper

Gotcha Covered helps add beauty and value to homes and businesses by providing custom window treatments for virtually any style or budget. -------------------------------------------------------------- Whether you are looking for light or heat control, privacy, aesthetics, or all of the above, Gotc
.png)
Sotheby's suffers cyberattack, Hackers exploit Cisco in “Zero Disco' attacks, Microsoft revokes certificates to disrupt ransomware campaign.
Cybersecurity researchers have disclosed details of a new campaign that exploited a recently disclosed security flaw impacting Cisco IOS...
Cybersecurity researchers at Trend Micro have discovered an active attack campaign dubbed “Operation Zero Disco” that exploits a critical...
Trend™ Research has uncovered an attack campaign exploiting the Cisco SNMP vulnerability CVE-2025-20352, allowing remote code execution and...
A sophisticated attack campaign dubbed "Operation Zero Disco," where threat actors are actively exploiting a critical Cisco Simple Network...
On September 22, world leaders will gather in New York City for the High-Level Week of the 80th Session of the UN General Assembly.
Malwarebytes announced they're done with April Fools' pranks because we have enough fake crap on the internet already. The cybersecurity...
It's been five years since the EU started debating how to unify and provide robust security standards for cloud services across all Member...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Diesco is http://www.diesco.com.mx/.
According to Rankiteo, Diesco’s AI-generated cybersecurity score is 754, reflecting their Fair security posture.
According to Rankiteo, Diesco currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Diesco is not certified under SOC 2 Type 1.
According to Rankiteo, Diesco does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Diesco is not listed as GDPR compliant.
According to Rankiteo, Diesco does not currently maintain PCI DSS compliance.
According to Rankiteo, Diesco is not compliant with HIPAA regulations.
According to Rankiteo,Diesco is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Diesco operates primarily in the Furniture and Home Furnishings Manufacturing industry.
Diesco employs approximately 18 people worldwide.
Diesco presently has no subsidiaries across any sectors.
Diesco’s official LinkedIn profile has approximately 425 followers.
Diesco is classified under the NAICS code 337, which corresponds to Furniture and Related Product Manufacturing.
No, Diesco does not have a profile on Crunchbase.
Yes, Diesco maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/diesco.
As of November 28, 2025, Rankiteo reports that Diesco has not experienced any cybersecurity incidents.
Diesco has an estimated 2,615 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Diesco has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.