Company Details
feralgiant
1
114
54143
feralgiant.com
0
FER_2132824
In-progress

Feral Giant Company CyberSecurity Posture
feralgiant.comWe are a full service design, illustration, and social media firm based in Knoxville, TN. There are a multitude of disciplines we follow, mainly focusing on graphic design, specialized illustration, and social media consultation. Although our focus is on those big three, we also offer photography, videography, marketing, and writing services. Pretty much if you want to get the word out, we’re your huckleberry. No foolin' about.
Company Details
feralgiant
1
114
54143
feralgiant.com
0
FER_2132824
In-progress
Between 700 and 749

Feral Giant Global Score (TPRM)XXXX



No incidents recorded for Feral Giant in 2025.
No incidents recorded for Feral Giant in 2025.
No incidents recorded for Feral Giant in 2025.
Feral Giant cyber incidents detection timeline including parent company and subsidiaries

We are a full service design, illustration, and social media firm based in Knoxville, TN. There are a multitude of disciplines we follow, mainly focusing on graphic design, specialized illustration, and social media consultation. Although our focus is on those big three, we also offer photography, videography, marketing, and writing services. Pretty much if you want to get the word out, we’re your huckleberry. No foolin' about.


We are an innovation-led communication and design agency that enables companies to boost their brand positioning and achieve success by using TV, video, web, print and any other media worthwhile. We are equally comfortable behind a camera, in front of a computer, or over a sketchbook. Our strengt

Paige Design, LLC – Smart, Inspired Visual Communications Paige Design is, well, Paige designing, but also much more. Paige is an art director, graphic designer, and project manager specializing in business-to business, commercial, non-profit and industrial communications. Paige is SMART because

At Your Design (ATYD) is a freelance graphic design firm offering custom and unique designs for clients. Clients work directly with the designer. ATYD incorporates branding and printing knowledge to each design. At Your Design reaches local businesses in the Greenville, South Carolina area and a

Since Flintriver was founded in 2001, our goal has always been simple - to deliver creative and effective solutions on time and on budget. We're experienced in defining and communicating brands, managing brand assets and implementing high impact marketing campaigns. We're proud our down to earth a

Started in 2017 as a new venture, DB Document Solutions Ltd. is an independent creative partner that provides dynamic design solutions for businesses around the UK, including creative design, bid layout, and document formatting. Other services offered include graphics, logo design, brand implementa

Graphic Design is your company's face to the world. It is the heart of effective marketing communication. The best message and writing can be easily lost without a complementary and effective graphic strategy. Whatever you need to communicate to customers, clients, or peers, Hamilton Creations can h
.png)
The latest weather-related conspiracy theory to take hold in the United States claims that the fog blanketing large parts of the country contains chemicals and...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Feral Giant is http://www.feralgiant.com.
According to Rankiteo, Feral Giant’s AI-generated cybersecurity score is 748, reflecting their Moderate security posture.
According to Rankiteo, Feral Giant currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Feral Giant is not certified under SOC 2 Type 1.
According to Rankiteo, Feral Giant does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Feral Giant is not listed as GDPR compliant.
According to Rankiteo, Feral Giant does not currently maintain PCI DSS compliance.
According to Rankiteo, Feral Giant is not compliant with HIPAA regulations.
According to Rankiteo,Feral Giant is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Feral Giant operates primarily in the Graphic Design industry.
Feral Giant employs approximately 1 people worldwide.
Feral Giant presently has no subsidiaries across any sectors.
Feral Giant’s official LinkedIn profile has approximately 114 followers.
Feral Giant is classified under the NAICS code 54143, which corresponds to Graphic Design Services.
No, Feral Giant does not have a profile on Crunchbase.
Yes, Feral Giant maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/feralgiant.
As of December 03, 2025, Rankiteo reports that Feral Giant has not experienced any cybersecurity incidents.
Feral Giant has an estimated 2,657 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Feral Giant has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
vLLM is an inference and serving engine for large language models (LLMs). Prior to 0.11.1, vllm has a critical remote code execution vector in a config class named Nemotron_Nano_VL_Config. When vllm loads a model config that contains an auto_map entry, the config class resolves that mapping with get_class_from_dynamic_module(...) and immediately instantiates the returned class. This fetches and executes Python from the remote repository referenced in the auto_map string. Crucially, this happens even when the caller explicitly sets trust_remote_code=False in vllm.transformers_utils.config.get_config. In practice, an attacker can publish a benign-looking frontend repo whose config.json points via auto_map to a separate malicious backend repo; loading the frontend will silently run the backend’s code on the victim host. This vulnerability is fixed in 0.11.1.
fastify-reply-from is a Fastify plugin to forward the current HTTP request to another server. Prior to 12.5.0, by crafting a malicious URL, an attacker could access routes that are not allowed, even though the reply.from is defined for specific routes in @fastify/reply-from. This vulnerability is fixed in 12.5.0.
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to 21.0.2, 20.3.15, and 19.2.17, A Stored Cross-Site Scripting (XSS) vulnerability has been identified in the Angular Template Compiler. It occurs because the compiler's internal security schema is incomplete, allowing attackers to bypass Angular's built-in security sanitization. Specifically, the schema fails to classify certain URL-holding attributes (e.g., those that could contain javascript: URLs) as requiring strict URL security, enabling the injection of malicious scripts. This vulnerability is fixed in 21.0.2, 20.3.15, and 19.2.17.
Gin-vue-admin is a backstage management system based on vue and gin. In 2.8.6 and earlier, attackers can delete any file on the server at will, causing damage or unavailability of server resources. Attackers can control the 'FileMd5' parameter to delete any file and folder.
Portkey.ai Gateway is a blazing fast AI Gateway with integrated guardrails. Prior to 1.14.0, the gateway determined the destination baseURL by prioritizing the value in the x-portkey-custom-host request header. The proxy route then appends the client-specified path to perform an external fetch. This can be maliciously used by users for SSRF attacks. This vulnerability is fixed in 1.14.0.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.