Company Details
dis-direct-llc
9
124
323
disdirect.com
0
DIS_1169946
In-progress

DIS Direct Company CyberSecurity Posture
disdirect.comWe’re the trusted printing ally for marketers and advertisers, acting as a reliable overflow printer for the industry. With our Half Web Press and its inline variable data features, we bring precision to every job. Paired with our Lettershop services, we provide a seamless, top-notch solution for Direct Mail campaigns.
Company Details
dis-direct-llc
9
124
323
disdirect.com
0
DIS_1169946
In-progress
Between 750 and 799

DIS Direct Global Score (TPRM)XXXX



No incidents recorded for DIS Direct in 2025.
No incidents recorded for DIS Direct in 2025.
No incidents recorded for DIS Direct in 2025.
DIS Direct cyber incidents detection timeline including parent company and subsidiaries

We’re the trusted printing ally for marketers and advertisers, acting as a reliable overflow printer for the industry. With our Half Web Press and its inline variable data features, we bring precision to every job. Paired with our Lettershop services, we provide a seamless, top-notch solution for Direct Mail campaigns.


McLogan Supply Co., Inc. is a silkscreen and sign supply company. We have been in business for 86 years. We pride ourselves with a well trained staff that is knowledgeable in all areas of screen printing and sign design. We are a valuable source of experience and information to our customers and we

A trouble free experience! That is the cornerstone of Horizon Printing Solutions and the foundation of our continued success. From digital to offset, printing your products is only a small component of the experience and services we offer our customers. When you partner with Horizon you receive qual

We are the one stop shop for all you custom printing and maketing needs. We offer everything from signs, car wraps, apparel, paper products, to just about any kind of promotional product you can think of. Need a fruit basket, custom printed golf ball, pens, USB drives etc. Visit www.vrcustompromos.

With the world becoming more eco-conscious, it’s important that we lead the way for our industry. With this in mind, we have worked hard to source and provide a range of materials produced from 100% recycled post-consumer waste, part recycled content and also a range of fully recyclable materials. W

Discount Labels is a wholesale manufacturer of custom printed pressure sensitive labels sold exclusively through a nationwide network of distributors. Founded in 1965 by Fred Conway in the basement of his home, Discount Labels has grown to be America’s leading label supplier, pioneering the ETS p

Luminescence Sun Chemical Security manufacture security and specialist printing inks for customers in over 100 countries. Our inks are suitable for offset, intaglio, flexo, gravure, screen, numbering and inkjet processes. Apart from inks we also supply stitching threads for passport booklets as wel
.png)
A lawsuit filed by Nebraska Attorney General Mike Hilgers over the 2024 Change Healthcare data breach has been allowed to proceed after...
Victoria's Secret did not provide many details about the security incident, or directly confirm whether it was a cyber or ransomware attack.
On Dec. 8, 2024, the US Treasury Department disclosed a major cybersecurity incident allegedly involving Chinese state-sponsored hackers.
A 74 investigative series: Meet the hired guns who make sure school cyberattacks stay hidden.
Cyberattacks inflict logistical, legal and financial damage on schools — and take an emotional and physical toll on their communities...
Shadowy criminal gangs with sinister names like The Dark Overlord are terrorizing schools. They hack into district networks and then demand hundreds of...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of DIS Direct is http://www.disdirect.com.
According to Rankiteo, DIS Direct’s AI-generated cybersecurity score is 754, reflecting their Fair security posture.
According to Rankiteo, DIS Direct currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, DIS Direct is not certified under SOC 2 Type 1.
According to Rankiteo, DIS Direct does not hold a SOC 2 Type 2 certification.
According to Rankiteo, DIS Direct is not listed as GDPR compliant.
According to Rankiteo, DIS Direct does not currently maintain PCI DSS compliance.
According to Rankiteo, DIS Direct is not compliant with HIPAA regulations.
According to Rankiteo,DIS Direct is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
DIS Direct operates primarily in the Printing Services industry.
DIS Direct employs approximately 9 people worldwide.
DIS Direct presently has no subsidiaries across any sectors.
DIS Direct’s official LinkedIn profile has approximately 124 followers.
DIS Direct is classified under the NAICS code 323, which corresponds to Printing and Related Support Activities.
No, DIS Direct does not have a profile on Crunchbase.
Yes, DIS Direct maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/dis-direct-llc.
As of December 17, 2025, Rankiteo reports that DIS Direct has not experienced any cybersecurity incidents.
DIS Direct has an estimated 5,156 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, DIS Direct has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Nagios XI versions prior to 2026R1.1 are vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A user‑accessible maintenance script may be executed as root via sudo and includes an application file that is writable by a lower‑privileged user. A local attacker with access to the application account can modify this file to introduce malicious code, which is then executed with elevated privileges when the script is run. Successful exploitation results in arbitrary code execution as the root user.
Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
SIPGO is a library for writing SIP services in the GO language. Starting in version 0.3.0 and prior to version 1.0.0-alpha-1, a nil pointer dereference vulnerability is in the SIPGO library's `NewResponseFromRequest` function that affects all normal SIP operations. The vulnerability allows remote attackers to crash any SIP application by sending a single malformed SIP request without a To header. The vulnerability occurs when SIP message parsing succeeds for a request missing the To header, but the response creation code assumes the To header exists without proper nil checks. This affects routine operations like call setup, authentication, and message handling - not just error cases. This vulnerability affects all SIP applications using the sipgo library, not just specific configurations or edge cases, as long as they make use of the `NewResponseFromRequest` function. Version 1.0.0-alpha-1 contains a patch for the issue.
GLPI is a free asset and IT management software package. Starting in version 9.1.0 and prior to version 10.0.21, an unauthorized user with an API access can read all knowledge base entries. Users should upgrade to 10.0.21 to receive a patch.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.