Company Details
durham-furniture-inc
51
441
337
durhamfurniture.com
0
DUR_8774886
In-progress

Durham Furniture Inc Company CyberSecurity Posture
durhamfurniture.comManufacturer of high quality solid wood products specializing in bedroom, living room, occassional and home office furniture. We have a long history of making products that demonstrate exceptional quality, high value and great design. We are located 2 hours north of Toronto in the quaint town of Durham - hence the clever name.
Company Details
durham-furniture-inc
51
441
337
durhamfurniture.com
0
DUR_8774886
In-progress
Between 750 and 799

DFI Global Score (TPRM)XXXX



No incidents recorded for Durham Furniture Inc in 2025.
No incidents recorded for Durham Furniture Inc in 2025.
No incidents recorded for Durham Furniture Inc in 2025.
DFI cyber incidents detection timeline including parent company and subsidiaries

Manufacturer of high quality solid wood products specializing in bedroom, living room, occassional and home office furniture. We have a long history of making products that demonstrate exceptional quality, high value and great design. We are located 2 hours north of Toronto in the quaint town of Durham - hence the clever name.


Inmod was founded in 2003 by Casey Choron and Alan Finkelstein out of a passion for great design and a vision to offer it at prices truly within reach. Quickly becoming one of the top ten trafficked sites for modern furniture, Inmod offers an growing collection of popular brands in addition to manuf

Becker Furniture World is a furniture and mattress retailer in Minnesota. We strive to provide our customers with exceptional value in every product and service we provide. Quite simply: If it isn't a good value, it's not good enough for our customers. In 2010, to better service our customers, Beck

We are a design company founded in 2011 with a vision to continuously create design that sparks curiosity. Our mission is to create timeless pieces on the leading edge of design. Driven by the desire to challenge boundaries between disparate time periods, design directions, cultures and materials

A&A Design is a furniture company providing furniture to public spaces and homes in Finland. Main focus in restaurants, bars, offices, hotels and homes. A&A Design shop in Iso Roobetinkatu 32 Helsinki, Finland is full of design, vintage and industrial age themed furniture and home decoration access

We help create dynamic commercial spaces with intelligent furniture solutions. Over three decades we have built a strong reputation in the design industry, delivering furniture solutions across Australia. We work in a range of sectors including commercial, health, government and education, and provi

Creative has been providing comprehensive expertise in commercial interiors since 1991 with showrooms in Milwaukee, Madison and Green Bay. Known as a “Specialty Contractor” our services include interior design, interior construction, painting, commercial furnishings and facility services. Creative i
.png)
This is about creating more ladders,” said entrepreneur Scot Wingo, who is launching a new investment fund for Triangle startups.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Durham Furniture Inc is http://www.durhamfurniture.com.
According to Rankiteo, Durham Furniture Inc’s AI-generated cybersecurity score is 755, reflecting their Fair security posture.
According to Rankiteo, Durham Furniture Inc currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Durham Furniture Inc is not certified under SOC 2 Type 1.
According to Rankiteo, Durham Furniture Inc does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Durham Furniture Inc is not listed as GDPR compliant.
According to Rankiteo, Durham Furniture Inc does not currently maintain PCI DSS compliance.
According to Rankiteo, Durham Furniture Inc is not compliant with HIPAA regulations.
According to Rankiteo,Durham Furniture Inc is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Durham Furniture Inc operates primarily in the Furniture and Home Furnishings Manufacturing industry.
Durham Furniture Inc employs approximately 51 people worldwide.
Durham Furniture Inc presently has no subsidiaries across any sectors.
Durham Furniture Inc’s official LinkedIn profile has approximately 441 followers.
Durham Furniture Inc is classified under the NAICS code 337, which corresponds to Furniture and Related Product Manufacturing.
No, Durham Furniture Inc does not have a profile on Crunchbase.
Yes, Durham Furniture Inc maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/durham-furniture-inc.
As of November 28, 2025, Rankiteo reports that Durham Furniture Inc has not experienced any cybersecurity incidents.
Durham Furniture Inc has an estimated 2,617 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Durham Furniture Inc has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.