Company Details
icesa
107
0
337
icesasl.net
0
ICE_2219592
In-progress

ICESA Company CyberSecurity Posture
icesasl.netICESA (1985) se dedica a la fabricación de todo tipo de mobiliario a medida, abarcando cualquier singularidad que pueda tener un proyecto, tanto en cuestión constructiva como en acabados de todo tipo de materiales. Disponer de operarios cualificados y tecnología avanzada hace posible adaptarnos a las necesidades de cada trabajo, en diseño, acabados y plazos de entrega. Solemos enfocar nuestro mercado en locales comerciales o particulares pero nuestra versatilidad nos permite hacer tambien desde maquetas o estructuras hasta pequeñas cadenas.
Company Details
icesa
107
0
337
icesasl.net
0
ICE_2219592
In-progress
Between 800 and 849

ICESA Global Score (TPRM)XXXX



No incidents recorded for ICESA in 2025.
No incidents recorded for ICESA in 2025.
No incidents recorded for ICESA in 2025.
ICESA cyber incidents detection timeline including parent company and subsidiaries

ICESA (1985) se dedica a la fabricación de todo tipo de mobiliario a medida, abarcando cualquier singularidad que pueda tener un proyecto, tanto en cuestión constructiva como en acabados de todo tipo de materiales. Disponer de operarios cualificados y tecnología avanzada hace posible adaptarnos a las necesidades de cada trabajo, en diseño, acabados y plazos de entrega. Solemos enfocar nuestro mercado en locales comerciales o particulares pero nuestra versatilidad nos permite hacer tambien desde maquetas o estructuras hasta pequeñas cadenas.


TRIWIN Inc. is committed to providing value-added services to each and every one of our clients. Regardless of the size of your organization, our team greatly reduces traditional barriers to entry in Low Cost Country manufacturing bases. Managed by a group of professionals with over fifteen years o

Headquartered in Fairborn, OH, Morris Furniture Co., Inc. is one of the oldest and largest furniture stores in Ohio with more than 450 employees operating Morris Home, Ashley, and Better Sleep Shop showrooms in the Dayton, Columbus, Cincinnati, and Northern Kentucky markets. Since our first store

Eurofar International B.V. behoort tot één van de meest toonaangevende producenten en exporteurs van tuinmeubelen met een uitgebreid klantenbestand in zowel binnen- als buitenland. Met haar eigen productiefaciliteiten in Vietnam en Indonesië is Eurofar International B.V. in staat om aan iedere vraag

Tangram Interiors collaborates with clients as a creative partner to create and manage interior environments that enhance the client’s brand and culture through the expert integration of technology, furniture, flooring, and service solutions. Our team is dedicated to developing unique solutions t

Da una storia di passione per il design nascono le cucine in acciaio Lgtek®, un vero capolavoro del design e dell’artigianato italiano: saldature a mano, dettagli curati, interni in legno pregiato. Lgtek® è la Cucina in Acciaio Inox e Legno La cucina in acciaio si reinventa e si fonde con altri m

Founded in 2015 and located in Dallas, TX, Callum East Design has been serving clients all over the United States in both residential and commercial settings. We work closely with builders, architects and designers to make sure our clients get exactly what they want the first time around. We’re pas
.png)
By Apoorva Chhabra. CIOs often struggle to convey the true value of cybersecurity to their organizations and secure buy-in from C-suite...
Microsoft to block unauthorized scripts in Entra ID logins, new legislation targets scammers that use AI, ASUS patches AiCloud...
Mobile operators are so overwhelmed by fragmented cybersecurity rules that they are actually at greater risk of being hacked.
White Pearl Technology Group AB announced the successful integration of recent acquisitions in smart infrastructure, the establishment of a...
The programme will be delivered across India through a hybrid model, combining direct engagement with universities and collaboration with...
~Reaffirms Its Leadership as a CERT-In Empanelled Cybersecurity Partner for India's Digital Future~. New Delhi, India – November 28,...
AI is transforming cybersecurity workflows, from threat modeling to vulnerability prioritization, said Bill Chen, CISO at Natera, underlining the need for...
An update from Cyviz AS ( ($DE:8P9) ) is now available. Cyviz AS has entered into a new partner contract with IBM to modernize and upgrade...
Dubai, UAE : RNTrust Group announces a high-level GCC Cybersecurity Summit taking place in Dubai on Wednesday, December 10, 2025.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of ICESA is http://www.icesasl.net.
According to Rankiteo, ICESA’s AI-generated cybersecurity score is 823, reflecting their Good security posture.
According to Rankiteo, ICESA currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, ICESA is not certified under SOC 2 Type 1.
According to Rankiteo, ICESA does not hold a SOC 2 Type 2 certification.
According to Rankiteo, ICESA is not listed as GDPR compliant.
According to Rankiteo, ICESA does not currently maintain PCI DSS compliance.
According to Rankiteo, ICESA is not compliant with HIPAA regulations.
According to Rankiteo,ICESA is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
ICESA operates primarily in the Furniture and Home Furnishings Manufacturing industry.
ICESA employs approximately 107 people worldwide.
ICESA presently has no subsidiaries across any sectors.
ICESA’s official LinkedIn profile has approximately 0 followers.
ICESA is classified under the NAICS code 337, which corresponds to Furniture and Related Product Manufacturing.
No, ICESA does not have a profile on Crunchbase.
Yes, ICESA maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/icesa.
As of November 28, 2025, Rankiteo reports that ICESA has not experienced any cybersecurity incidents.
ICESA has an estimated 2,617 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, ICESA has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.