Company Details
f-list
294
11,073
337
f-list.at
0
F/L_1055641
In-progress

F/LIST Company CyberSecurity Posture
f-list.atF/LIST is a worldwide luxury interior brand. We are a family-run business, driven by the vision to handcraft the future of interiors. F/LIST evolved from a traditional small carpentry shop to become a global player in custom-made high-end furnishings in luxury residences, and is recognized as a high-profile brand in the international aerospace sector. F/LIST continues to strive for the same excellence that originated as its founder, Franz List. Today, the founder’s granddaughter, CEO Katharina List-Nagl continues to realize the pioneering vision. The company has become a game changer in preparing for future market needs, partnering with start-ups, architects and designers to define and evolve system development that will shape future interiors. Since inception 70 years ago, F/LIST has grown to a family of more than 1000 employees located at the company headquarters in Thomasberg, and branch offices in Germany, Canada, Brazil, Great Britain, the US, and the UAE. Together, they fulfill the most exquisite, intricate desires and requirements for interiors of all kinds. F/LIST walks the fine line between creating authentic products using natural materials and optimizing high-end technology, making it a global trendsetter in interior innovation.
Company Details
f-list
294
11,073
337
f-list.at
0
F/L_1055641
In-progress
Between 750 and 799

F/LIST Global Score (TPRM)XXXX



No incidents recorded for F/LIST in 2025.
No incidents recorded for F/LIST in 2025.
No incidents recorded for F/LIST in 2025.
F/LIST cyber incidents detection timeline including parent company and subsidiaries

F/LIST is a worldwide luxury interior brand. We are a family-run business, driven by the vision to handcraft the future of interiors. F/LIST evolved from a traditional small carpentry shop to become a global player in custom-made high-end furnishings in luxury residences, and is recognized as a high-profile brand in the international aerospace sector. F/LIST continues to strive for the same excellence that originated as its founder, Franz List. Today, the founder’s granddaughter, CEO Katharina List-Nagl continues to realize the pioneering vision. The company has become a game changer in preparing for future market needs, partnering with start-ups, architects and designers to define and evolve system development that will shape future interiors. Since inception 70 years ago, F/LIST has grown to a family of more than 1000 employees located at the company headquarters in Thomasberg, and branch offices in Germany, Canada, Brazil, Great Britain, the US, and the UAE. Together, they fulfill the most exquisite, intricate desires and requirements for interiors of all kinds. F/LIST walks the fine line between creating authentic products using natural materials and optimizing high-end technology, making it a global trendsetter in interior innovation.


Bisley is a design and manufacturing powerhouse. For over ninety years we’ve been quietly creating innovative products that meet the evolving needs of our working world. Today, Bisley combines this spirit of innovation with a collective knowledge that can only come from experience. We’re unashamed

To assist organizations in creating optimal office space and to turn it into an asset which allows acquiring maximum efficiency from the investments into the staff, business processes and technologies. We will help you to create and to make a reality of: Future office conception Motivating office

Woodbridge Furniture is a high-end brand in the home furnishings marketplace offering case goods, dining and occasional furniture. Woodbridge from its inception has focused on high quality veneers and finishes combined with best in class construction. Founded in 2003, Woodbridge has been built on a

Nestled in furniture-rich Southern Indiana, Best Home Furnishings is a leading manufacturer of upholstered seating such as sofas, recliners, and chairs. Family owned and operated for over 60 years, Best has grown to be a top 20 furniture manufacturer in the world by focusing on four major competitiv

VersaDesk is the creator of The Original Electric Powered Push Button Sit-to-Stand Desk Riser and the leader in electric powered push button sit-stand desks. In addition, our state-of-the-art designs are registered and patent pending. We have an in-house team of skilled design engineers that help gi

Founded in 1948, American Signature, Inc. is a family-owned and -operated furniture retailer based in Columbus, Ohio. It is the parent company of Value City Furniture with more than 120 stores across the U.S. VCF and its Designer Looks offerings, including ComforTECH products, provide on-trend, high
.png)
We've tested all the best malware removal software to help you remove viruses, trojans, and ransomware, as well as protect your computer...
In 2019, the US data privacy framework changed significantly with the emergence of the California Consumer Privacy Act which created a...
Clean Creatives has spotlighted fossil fuel marketing, but Paul Mottram says the industry must now channel its influence into regulation,...
F/LIST, the Austria-headquartered pioneer of innovative luxury design for cabin interiors, is lighting up the skies.
You can stop wondering about those mysterious keyboard function keys on the top of your laptop and desktop keyboards. We have the answers!
This list features the top influencers of 2025 who are shaping the future of online security through education, advocacy, and cutting-edge insights.
Learn how ethical hackers use the open source Hydra password-cracking tool for good with our step-by-step instructions, screenshots and...
By the authority vested in me as President by the Constitution and the laws of the United States of America, including the International...
We analyzed more than 15 billion passwords to see the most common password phrases, including city, sports team, year, name, and more.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of F/LIST is https://f-list.at/en/.
According to Rankiteo, F/LIST’s AI-generated cybersecurity score is 756, reflecting their Fair security posture.
According to Rankiteo, F/LIST currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, F/LIST is not certified under SOC 2 Type 1.
According to Rankiteo, F/LIST does not hold a SOC 2 Type 2 certification.
According to Rankiteo, F/LIST is not listed as GDPR compliant.
According to Rankiteo, F/LIST does not currently maintain PCI DSS compliance.
According to Rankiteo, F/LIST is not compliant with HIPAA regulations.
According to Rankiteo,F/LIST is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
F/LIST operates primarily in the Furniture and Home Furnishings Manufacturing industry.
F/LIST employs approximately 294 people worldwide.
F/LIST presently has no subsidiaries across any sectors.
F/LIST’s official LinkedIn profile has approximately 11,073 followers.
F/LIST is classified under the NAICS code 337, which corresponds to Furniture and Related Product Manufacturing.
No, F/LIST does not have a profile on Crunchbase.
Yes, F/LIST maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/f-list.
As of November 28, 2025, Rankiteo reports that F/LIST has not experienced any cybersecurity incidents.
F/LIST has an estimated 2,617 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, F/LIST has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.