Company Details
global-peace-film-festival
9
410
None
globalpeace360.org
0
GLO_1461825
In-progress

Global Peace 360° Company CyberSecurity Posture
globalpeace360.orgGlobal Peace 360° offers a unique platform where the power of dialogue, education, and community engagement unite to inspire positive social change. Through immersive experiences, diverse perspectives, and strategic partnerships, we empower individuals and organizations to foster peace, promote understanding, and drive meaningful impact on a global scale. Global Peace 360° is a 501(c)3 nonprofit organization and is the producer of the Global Peace Film Festival.
Company Details
global-peace-film-festival
9
410
None
globalpeace360.org
0
GLO_1461825
In-progress
Between 750 and 799

GP Global Score (TPRM)XXXX



No incidents recorded for Global Peace 360° in 2025.
No incidents recorded for Global Peace 360° in 2025.
No incidents recorded for Global Peace 360° in 2025.
GP cyber incidents detection timeline including parent company and subsidiaries

Global Peace 360° offers a unique platform where the power of dialogue, education, and community engagement unite to inspire positive social change. Through immersive experiences, diverse perspectives, and strategic partnerships, we empower individuals and organizations to foster peace, promote understanding, and drive meaningful impact on a global scale. Global Peace 360° is a 501(c)3 nonprofit organization and is the producer of the Global Peace Film Festival.


Planetary Collective is a growing network of individuals and organizations devoted to exploring the big questions facing our planet at this point in time. Embracing a multidisciplinary, multi-media approach, we brings scientists, philosophers and researchers together with designers, coders and cr

Gener8 is a stereoscopic 3D conversion company. We are one of the few studios in the world capable of delivering stereo conversion for an entire feature-length film. When we opened our doors, we had a single vision: to make it easy for our clients to convert 2D films to 3D with unmatched levels of q

B Good Picture Company is the London based LGTBQ+ Film and Television production company behind the critically acclaimed drama “Chicken”, the feature documentary film on the life of Ian McKellen “McKellen: Playing the Part” the all-star TV series “In Love With” and the upcoming Hammer Studios featur

CJ CGV, an entertainment platform operator under CJ Group, is the largest film distributor and cinema operator in Vietnam and one of top 5 cinema chains in the world. Our mission is becoming a role model company for continuous development of the film industry in Vietnam. CJ CGV has created a uniqu

MadWerkz is a full service creative boutique specializing in high-end visual effects, Fluid Dynamics production, post production finishing (2k & HD Color Grading) and 3D animation production for television, motion picture and commercial producers. We also excel in rich media application development

Circle Cinema originally opened in 1928 and now operates as the only nonprofit cinema in the area. Circle Cinema educates, enlightens, and entertains guests 365 days a year through selected features and programs that expose and connect our community to global issues, environments, and cultures. Ci
.png)
Chinese cybersecurity company 360 Security Group unveiled its latest AI-powered security products on Wednesday, as it looks to improve...
Kroll merges elite security and data risk expertise with frontline intelligence from thousands of incident response, regulatory compliance, financial crime...
Careers360 brings you an interview with Hemant Sharma who is pursuing B.Sc Cybersecurity at MIT WPU Pune. He highlights the selection process, extracurricular...
In today's interconnected world, cybersecurity has become an essential pillar for ensuring peace and global stability.
Discover the top 10 cybersecurity software in India for 2025. Explore advanced tools for protecting data, devices, and networks from cyber...
Delhi-NCR, Ghaziabad, December 20, 2024 – Wipro Ltd-India (“Wipro”), a leading global information technology company, and KIET Group of...
Cysurance and 360 SOC partner to provide fintech firms with $500K cyber warranty protection, combining cybersecurity and insurance coverage.
As cybersecurity threats rise across Southeast Asia, new ASEAN initiatives target scam prevention, infrastructure security, and economic and social stability.
Herald Correspondent. Africa has become a fertile hunting ground for attacks looking to exploit weaknesses in organisations' cyber defences...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Global Peace 360° is http://globalpeace360.org.
According to Rankiteo, Global Peace 360°’s AI-generated cybersecurity score is 753, reflecting their Fair security posture.
According to Rankiteo, Global Peace 360° currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Global Peace 360° is not certified under SOC 2 Type 1.
According to Rankiteo, Global Peace 360° does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Global Peace 360° is not listed as GDPR compliant.
According to Rankiteo, Global Peace 360° does not currently maintain PCI DSS compliance.
According to Rankiteo, Global Peace 360° is not compliant with HIPAA regulations.
According to Rankiteo,Global Peace 360° is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Global Peace 360° operates primarily in the Movies, Videos, and Sound industry.
Global Peace 360° employs approximately 9 people worldwide.
Global Peace 360° presently has no subsidiaries across any sectors.
Global Peace 360°’s official LinkedIn profile has approximately 410 followers.
No, Global Peace 360° does not have a profile on Crunchbase.
Yes, Global Peace 360° maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/global-peace-film-festival.
As of December 21, 2025, Rankiteo reports that Global Peace 360° has not experienced any cybersecurity incidents.
Global Peace 360° has an estimated 1,804 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Global Peace 360° has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Versa SASE Client for Windows versions released between 7.8.7 and 7.9.4 contain a local privilege escalation vulnerability in the audit log export functionality. The client communicates user-controlled file paths to a privileged service, which performs file system operations without impersonating the requesting user. Due to improper privilege handling and a time-of-check time-of-use race condition combined with symbolic link and mount point manipulation, a local authenticated attacker can coerce the service into deleting arbitrary directories with SYSTEM privileges. This can be exploited to delete protected system folders such as C:\\Config.msi and subsequently achieve execution as NT AUTHORITY\\SYSTEM via MSI rollback techniques.
The WP JobHunt plugin for WordPress, used by the JobCareer theme, is vulnerable to unauthorized modification of data due to a missing capability check on the 'cs_update_application_status_callback' function in all versions up to, and including, 7.7. This makes it possible for authenticated attackers, with Candidate-level access and above, to inject cross-site scripting into the 'status' parameter of applied jobs for any user.
The WP JobHunt plugin for WordPress, used by the JobCareer theme, is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 7.7 via the 'cs_update_application_status_callback' due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Candidate-level access and above, to send a site-generated email with injected HTML to any user.
The FiboSearch – Ajax Search for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `thegem_te_search` shortcode in all versions up to, and including, 1.32.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This vulnerability requires TheGem theme (premium) to be installed with Header Builder mode enabled, and the FiboSearch "Replace search bars" option enabled for TheGem integration.
The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.11.0 via the ajax_get_members function. This is due to the use of a predictable low-entropy token (5 hex characters derived from md5 of post ID) to identify member directories and insufficient authorization checks on the unauthenticated AJAX endpoint. This makes it possible for unauthenticated attackers to extract sensitive data including usernames, display names, user roles (including administrator accounts), profile URLs, and user IDs by enumerating predictable directory_id values or brute-forcing the small 16^5 token space.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.