ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Icon Graphics is a full-service graphic design firm located in historic downtown Hagerstown. For over 20 years, we’ve built a reputation with our community for honesty, excellence, and superior customer service. Our goal is your success. We offer a wide variety of print and web design services. We can help with individual print or web projects or with comprehensive branding and marketing campaigns — and everything in between. We even offer custom illustration services for any project, and can help with your business planning. We have the privilege of serving clients both local and international, non-profit and corporate, start-ups and business veterans. We work closely with each one to create a successful visual solution with a personal touch. Our longevity and experience are valuable benefits for our clients, offering them an unforgettable experience.

Icon Graphics A.I CyberSecurity Scoring

Icon Graphics

Company Details

Linkedin ID:

icon-graphics

Employees number:

42

Number of followers:

65

NAICS:

54143

Industry Type:

Graphic Design

Homepage:

icongraphics.com

IP Addresses:

0

Company ID:

ICO_1227425

Scan Status:

In-progress

AI scoreIcon Graphics Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/icon-graphics.jpeg
Icon Graphics Graphic Design
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreIcon Graphics Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/icon-graphics.jpeg
Icon Graphics Graphic Design
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Icon Graphics Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

Icon Graphics Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Icon Graphics

Incidents vs Graphic Design Industry Average (This Year)

No incidents recorded for Icon Graphics in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Icon Graphics in 2025.

Incident Types Icon Graphics vs Graphic Design Industry Avg (This Year)

No incidents recorded for Icon Graphics in 2025.

Incident History — Icon Graphics (X = Date, Y = Severity)

Icon Graphics cyber incidents detection timeline including parent company and subsidiaries

Icon Graphics Company Subsidiaries

SubsidiaryImage

Icon Graphics is a full-service graphic design firm located in historic downtown Hagerstown. For over 20 years, we’ve built a reputation with our community for honesty, excellence, and superior customer service. Our goal is your success. We offer a wide variety of print and web design services. We can help with individual print or web projects or with comprehensive branding and marketing campaigns — and everything in between. We even offer custom illustration services for any project, and can help with your business planning. We have the privilege of serving clients both local and international, non-profit and corporate, start-ups and business veterans. We work closely with each one to create a successful visual solution with a personal touch. Our longevity and experience are valuable benefits for our clients, offering them an unforgettable experience.

Loading...
similarCompanies

Icon Graphics Similar Companies

dianepontesaia

Graphic design, web design, email marketing, web development and marketing materials for business. Graphic designer with 30 years of progressively responsible experience as a design professional. Strong conceptual, design, drawing/comping and pre-press/production skills. Extensive knowledge of t

Wonderworks

Wonderworks is een grafische studio gespecialiseerd in de vormgeving van tijdschriften, magazines en kranten. Hiernaast hebben wij ook ruime ervaring in het ontwerpen en vormgeven van huisstijlen, folders, advertenties, point of sale materiaal, boekomslagen, websites etc. Enkele van de bedrijven e

XYZ Type

Ben Kiel and Jesse Ragan make useful, quietly offbeat fonts at their independent digital foundry, XYZ Type, which operates in the interwebs between St. Louis and New York. After hiring each other back and forth and realizing they worked well together, the pair launched XYZ Type in 2017 to merge thei

PWIP Design

For over 9 years, we’ve been committed to create experience and innovative solutions that transform brands, grow businesses and make people’s lives better. Building brands and driving sales with powerful ideas. We believe that "Perception is Reality"​ and work hard to make sure your target audien

Laroja Creative

Graphic Design, Branding & Wedding Invitations by Laroja Creative – What We Do – Our Services • Wedding invitations • Engagement announcements and invitations • Save the dates • Custom designs • Foiling • Letterpress • White ink printing • Envelope printing • Hand made invitations • Logos • Corpo

Satzuma Creative

Whether you want to develop a new identity or revitalise an existing one, satzuma has a creative design studio with extensive experience across many sectors. Our approach to brand design combines intuitive creativity with an awareness of the marketing strategy. We will design all elements of prom

newsone

Icon Graphics CyberSecurity News

November 25, 2025 05:46 PM
Cybersecurity threats and data breaches

In an ever-evolving landscape of changing technological advances and increasingly sophisticated cybercrime practices, individuals and...

November 20, 2025 08:49 PM
Cybersecurity for Students

Are you a student looking for cybersecurity information and resources to help you succeed and advance in the cybersecurity workforce?

October 22, 2025 07:00 AM
Widespread Rust library forks exposed to remote code execution risk

CyberScoop reports that an abandoned Rust code library async-tar, which has been reused in several forks, contains a major security flaw,...

September 19, 2025 07:00 AM
Tripwires Trigger Change: How Detection Engineering Elevates Cybersecurity

Digital “tripwires” detect and respond to malicious activity, boosting cybersecurity maturity. Graphic representing cybersecurity.

August 29, 2025 07:00 AM
Best Cyber Security Colleges in India: Courses, Fees, Admission 2025, Entrance Exams, Placements

Find 764 Cyber Security Courses and Colleges in India. Compare Fees, Courses, Student Reviews and Admission process.

June 18, 2025 06:02 PM
Cybersecurity recent news | page 112 of 112

Enterprise Connect makes its boldest move yet—bringing two decades of industry leadership to vibrant Las Vegas, March 10-12, 2026.

February 05, 2025 08:00 AM
CMMC and Beyond: The Latest in Cybersecurity and What’s to Come Under the Trump Administration

Government Contracts attorneys Eric Crusius and Christian Nagel led an in-depth webinar exploring the current state of cybersecurity with a...

January 10, 2025 08:00 AM
Cybersecurity Stocks: 10 Biggest Companies in 2025

We profile the 10 largest publicly traded cybersecurity companies by market cap, including Microsoft, Broadcom, Cisco Systems and IBM.

September 16, 2024 07:00 AM
Toyota and Mazda are teaming up to protect their cars from cyber attacks

Toyota, Mazda and Hitachi are among the companies to have signed up to safer software standards in connected cars.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Icon Graphics CyberSecurity History Information

Official Website of Icon Graphics

The official website of Icon Graphics is http://www.icongraphics.com.

Icon Graphics’s AI-Generated Cybersecurity Score

According to Rankiteo, Icon Graphics’s AI-generated cybersecurity score is 756, reflecting their Fair security posture.

How many security badges does Icon Graphics’ have ?

According to Rankiteo, Icon Graphics currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Icon Graphics have SOC 2 Type 1 certification ?

According to Rankiteo, Icon Graphics is not certified under SOC 2 Type 1.

Does Icon Graphics have SOC 2 Type 2 certification ?

According to Rankiteo, Icon Graphics does not hold a SOC 2 Type 2 certification.

Does Icon Graphics comply with GDPR ?

According to Rankiteo, Icon Graphics is not listed as GDPR compliant.

Does Icon Graphics have PCI DSS certification ?

According to Rankiteo, Icon Graphics does not currently maintain PCI DSS compliance.

Does Icon Graphics comply with HIPAA ?

According to Rankiteo, Icon Graphics is not compliant with HIPAA regulations.

Does Icon Graphics have ISO 27001 certification ?

According to Rankiteo,Icon Graphics is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Icon Graphics

Icon Graphics operates primarily in the Graphic Design industry.

Number of Employees at Icon Graphics

Icon Graphics employs approximately 42 people worldwide.

Subsidiaries Owned by Icon Graphics

Icon Graphics presently has no subsidiaries across any sectors.

Icon Graphics’s LinkedIn Followers

Icon Graphics’s official LinkedIn profile has approximately 65 followers.

NAICS Classification of Icon Graphics

Icon Graphics is classified under the NAICS code 54143, which corresponds to Graphic Design Services.

Icon Graphics’s Presence on Crunchbase

No, Icon Graphics does not have a profile on Crunchbase.

Icon Graphics’s Presence on LinkedIn

Yes, Icon Graphics maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/icon-graphics.

Cybersecurity Incidents Involving Icon Graphics

As of December 03, 2025, Rankiteo reports that Icon Graphics has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

Icon Graphics has an estimated 2,656 peer or competitor companies worldwide.

Icon Graphics CyberSecurity History Information

How many cyber incidents has Icon Graphics faced ?

Total Incidents: According to Rankiteo, Icon Graphics has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at Icon Graphics ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

vLLM is an inference and serving engine for large language models (LLMs). Prior to 0.11.1, vllm has a critical remote code execution vector in a config class named Nemotron_Nano_VL_Config. When vllm loads a model config that contains an auto_map entry, the config class resolves that mapping with get_class_from_dynamic_module(...) and immediately instantiates the returned class. This fetches and executes Python from the remote repository referenced in the auto_map string. Crucially, this happens even when the caller explicitly sets trust_remote_code=False in vllm.transformers_utils.config.get_config. In practice, an attacker can publish a benign-looking frontend repo whose config.json points via auto_map to a separate malicious backend repo; loading the frontend will silently run the backend’s code on the victim host. This vulnerability is fixed in 0.11.1.

Risk Information
cvss3
Base: 7.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Description

fastify-reply-from is a Fastify plugin to forward the current HTTP request to another server. Prior to 12.5.0, by crafting a malicious URL, an attacker could access routes that are not allowed, even though the reply.from is defined for specific routes in @fastify/reply-from. This vulnerability is fixed in 12.5.0.

Risk Information
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to 21.0.2, 20.3.15, and 19.2.17, A Stored Cross-Site Scripting (XSS) vulnerability has been identified in the Angular Template Compiler. It occurs because the compiler's internal security schema is incomplete, allowing attackers to bypass Angular's built-in security sanitization. Specifically, the schema fails to classify certain URL-holding attributes (e.g., those that could contain javascript: URLs) as requiring strict URL security, enabling the injection of malicious scripts. This vulnerability is fixed in 21.0.2, 20.3.15, and 19.2.17.

Risk Information
cvss4
Base: 8.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Gin-vue-admin is a backstage management system based on vue and gin. In 2.8.6 and earlier, attackers can delete any file on the server at will, causing damage or unavailability of server resources. Attackers can control the 'FileMd5' parameter to delete any file and folder.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Portkey.ai Gateway is a blazing fast AI Gateway with integrated guardrails. Prior to 1.14.0, the gateway determined the destination baseURL by prioritizing the value in the x-portkey-custom-host request header. The proxy route then appends the client-specified path to perform an external fetch. This can be maliciously used by users for SSRF attacks. This vulnerability is fixed in 1.14.0.

Risk Information
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=icon-graphics' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge