ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

At HAT Collective, we’re empowering individualization in the workplace. We believe the power to choose improves satisfaction, health, and productivity. Our products showcase craftsmanship and design innovation, enabling you to create your ideal workspace. Whether in the office or at home, sitting or standing, together or at a distance, our sophisticated range of workplace solutions lets you work your way. Our brand is committed to quality and affordability, with an emphasis on customer service and exceptional levels of support for our network of dealers. It’s easy to do business with HAT Collective.

HAT Collective A.I CyberSecurity Scoring

HAT Collective

Company Details

Linkedin ID:

hat-contract

Employees number:

34

Number of followers:

2,251

NAICS:

337

Industry Type:

Furniture and Home Furnishings Manufacturing

Homepage:

hatcollective.com

IP Addresses:

0

Company ID:

HAT_3083228

Scan Status:

In-progress

AI scoreHAT Collective Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/hat-contract.jpeg
HAT Collective Furniture and Home Furnishings Manufacturing
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreHAT Collective Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/hat-contract.jpeg
HAT Collective Furniture and Home Furnishings Manufacturing
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

HAT Collective Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

HAT Collective Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for HAT Collective

Incidents vs Furniture and Home Furnishings Manufacturing Industry Average (This Year)

No incidents recorded for HAT Collective in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for HAT Collective in 2025.

Incident Types HAT Collective vs Furniture and Home Furnishings Manufacturing Industry Avg (This Year)

No incidents recorded for HAT Collective in 2025.

Incident History — HAT Collective (X = Date, Y = Severity)

HAT Collective cyber incidents detection timeline including parent company and subsidiaries

HAT Collective Company Subsidiaries

SubsidiaryImage

At HAT Collective, we’re empowering individualization in the workplace. We believe the power to choose improves satisfaction, health, and productivity. Our products showcase craftsmanship and design innovation, enabling you to create your ideal workspace. Whether in the office or at home, sitting or standing, together or at a distance, our sophisticated range of workplace solutions lets you work your way. Our brand is committed to quality and affordability, with an emphasis on customer service and exceptional levels of support for our network of dealers. It’s easy to do business with HAT Collective.

Loading...
similarCompanies

HAT Collective Similar Companies

Midwest Commercial Millwork

Custom cabinetry and casework for 25 years. Midwest Commercial Millwork is a custom cabinetry and casework manufacturer. We offer our customers a competitive price with superior service. We’re a group of highly skilled and experienced craftspeople, who work hard to make every piece both practical

Shoto Corporation

Shoto Corporation, based in Shoto, Wisconsin is a family-owned business that was founded in 1954. Situated on the beautiful West Twin River dam, the main manufacturing facility was the former Neshoto Saw and Flour Mill, which was destroyed by fire in 1949. Portions of the existing structure were sal

Sauder Woodworking Co.

Headquartered in Archbold, Ohio, Sauder Woodworking Co. is North America’s leading producer of ready to assemble (RTA) furniture and one of the top five residential furniture manufacturers in the United States. An authentic American original, 90 percent of Sauder furniture is manufactured in Archbol

Ekornes

Ekornes is the largest furniture manufacturer in the Nordic region and owns such brand names as Ekornes®, Stressless® and Svane®. Stressless® is one of the world’s most famous furniture brands, while Ekornes® and Svane® are the best known brands in the Norwegian furniture market. Products are manufa

Furniture Clinic

At Furniture Clinic we offer market leading products and services for the cleaning and restoration of all items of leather, fabric, wood, and flooring. Headquartered in the UK, we are a global business that manufactures, distributes and retails our products for use in the home and garden. Our exte

2010 Office Furniture Inc.

At 2010 Office Furniture, not only are we passionate about sourcing the highest quality office furniture, but we make sure our clients receive exceptional services that are exemplary and first rate. We have worked hard to build close relationships with all the leading furniture manufacturers, allowi

newsone

HAT Collective CyberSecurity News

October 12, 2025 07:00 AM
Cybersecurity Newsletter Weekly - Discord, Red Hat Data Breach, 7-Zip Vulnerabilities and Sonicwall Firewall...

Welcome to this week's edition of the Cybersecurity Newsletter Weekly, where we dive into the most pressing threats and vulnerabilities...

October 11, 2025 07:00 AM
Nintendo allegedly hacked by Crimson Collective hacking group — screenshot shows leaked folders, production assets, developer files, and backups

The Crimson Collective hacking group claims to have breached Nintendo's security and stolen files from the gaming company.

October 08, 2025 07:00 AM
ShinyHunters joins Crimson Collective in coordinated extortion effort against Red Hat

The fallout from Red Hat's recent cybersecurity breach has intensified as the notorious ShinyHunters gang joins forces with the Crimson...

October 08, 2025 07:00 AM
Crimson Collective Leverages AWS Services to Exfiltrate Sensitive Data

Crimson Collective targets AWS with data theft and extortion, claiming Red Hat breach via stolen keys and IAM privilege abuse.

October 07, 2025 07:00 AM
Red Hat breach escalates as Crimson Collective recruits help

Red Hat's breach nightmare just got worse, as the Crimson Collective crew that claims to have ransacked its GitLab repos has joined forces...

October 07, 2025 07:00 AM
Red Hat Breach Impacts 5,000+ High-Value Enterprise Customers, Data at Risk

An extortion group calling itself Crimson Collective claimed responsibility for a major breach at Red Hat Consulting.

October 07, 2025 07:00 AM
Data Breach at Red Hat Exposes Thousands of High-Profile Clients

Open-source giant Red Hat confirmed that a previously unknown extortion group calling itself “Crimson Collective” had stolen sensitive...

October 07, 2025 07:00 AM
Red Hat Breach Exposes 5000+ High Profile Enterprise Customers at Risk

A sophisticated cyberattack has compromised Red Hat Consulting's infrastructure, potentially exposing sensitive data from over 5000...

October 06, 2025 07:00 AM
Hackers steal sensitive Red Hat customer data after breaching GitLab repository

A hacker group claims to have breached leading enterprise open source software vendor Red Hat and is threatening to release hundreds of...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

HAT Collective CyberSecurity History Information

Official Website of HAT Collective

The official website of HAT Collective is https://www.hatcollective.com/.

HAT Collective’s AI-Generated Cybersecurity Score

According to Rankiteo, HAT Collective’s AI-generated cybersecurity score is 753, reflecting their Fair security posture.

How many security badges does HAT Collective’ have ?

According to Rankiteo, HAT Collective currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does HAT Collective have SOC 2 Type 1 certification ?

According to Rankiteo, HAT Collective is not certified under SOC 2 Type 1.

Does HAT Collective have SOC 2 Type 2 certification ?

According to Rankiteo, HAT Collective does not hold a SOC 2 Type 2 certification.

Does HAT Collective comply with GDPR ?

According to Rankiteo, HAT Collective is not listed as GDPR compliant.

Does HAT Collective have PCI DSS certification ?

According to Rankiteo, HAT Collective does not currently maintain PCI DSS compliance.

Does HAT Collective comply with HIPAA ?

According to Rankiteo, HAT Collective is not compliant with HIPAA regulations.

Does HAT Collective have ISO 27001 certification ?

According to Rankiteo,HAT Collective is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of HAT Collective

HAT Collective operates primarily in the Furniture and Home Furnishings Manufacturing industry.

Number of Employees at HAT Collective

HAT Collective employs approximately 34 people worldwide.

Subsidiaries Owned by HAT Collective

HAT Collective presently has no subsidiaries across any sectors.

HAT Collective’s LinkedIn Followers

HAT Collective’s official LinkedIn profile has approximately 2,251 followers.

HAT Collective’s Presence on Crunchbase

No, HAT Collective does not have a profile on Crunchbase.

HAT Collective’s Presence on LinkedIn

Yes, HAT Collective maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/hat-contract.

Cybersecurity Incidents Involving HAT Collective

As of November 28, 2025, Rankiteo reports that HAT Collective has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

HAT Collective has an estimated 2,617 peer or competitor companies worldwide.

HAT Collective CyberSecurity History Information

How many cyber incidents has HAT Collective faced ?

Total Incidents: According to Rankiteo, HAT Collective has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at HAT Collective ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.

Risk Information
cvss4
Base: 6.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=hat-contract' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge