Company Details
ingram-content-group
1,983
30,614
511
ingramcontent.com
0
ING_2548667
In-progress

Ingram Content Group Company CyberSecurity Posture
ingramcontent.comThe world is reading. Ingram helps connect our world with the books they want—print and digital—when they need them, in the simplest ways. To better serve an increasingly connected global community of readers we are transforming the book industry for the better: through smart leadership, cutting-edge technology, and revolutionary innovations in the manufacture and distribution of books. Providing comprehensive services for publishers, retailers, libraries and educators, Ingram makes these services seamless and accessible through technology, innovation and creativity. With an expansive global network of offices and facilities, Ingram’s services include digital and physical book distribution, print on demand, and digital learning. Ingram Content Group is a part of Ingram Industries Inc. and includes Ingram Book Group LLC, Ingram Publisher Services LLC, Lightning Source LLC, Ingram Library Services LLC, and Tennessee Book Company LLC.
Company Details
ingram-content-group
1,983
30,614
511
ingramcontent.com
0
ING_2548667
In-progress
Between 750 and 799

ICG Global Score (TPRM)XXXX



No incidents recorded for Ingram Content Group in 2025.
No incidents recorded for Ingram Content Group in 2025.
No incidents recorded for Ingram Content Group in 2025.
ICG cyber incidents detection timeline including parent company and subsidiaries

The world is reading. Ingram helps connect our world with the books they want—print and digital—when they need them, in the simplest ways. To better serve an increasingly connected global community of readers we are transforming the book industry for the better: through smart leadership, cutting-edge technology, and revolutionary innovations in the manufacture and distribution of books. Providing comprehensive services for publishers, retailers, libraries and educators, Ingram makes these services seamless and accessible through technology, innovation and creativity. With an expansive global network of offices and facilities, Ingram’s services include digital and physical book distribution, print on demand, and digital learning. Ingram Content Group is a part of Ingram Industries Inc. and includes Ingram Book Group LLC, Ingram Publisher Services LLC, Lightning Source LLC, Ingram Library Services LLC, and Tennessee Book Company LLC.


*Authentic Islamic Books and ebooks, *Online Islamic Bookstore, *Islamic Book Publisher, Islamic Books on Aqeedah, Fiqh, Hadith, Quran, Seerah, Tafseer, Tajweed. International Islamic Publishing House (IIPH) is a company with a well-established worldwide reputation. It was founded in the 1980s by

EMC Publishing, LLC is a premier publisher of educational textbooks, supplements, technology, and assessments for the K-12, post-secondary, and adult education market. The company was founded in 1954 in St. Paul, Minnesota and quickly established itself as a leader in World Language education in cla

SAE Media Group reports the latest technology breakthroughs, design innovations, and industry trends to a global audience of over 1,000,000 engineers, researchers, and business managers, providing the critical information these professionals need to develop new and improved products and services. SA

Acquired by USAToday ::: On Thanksgiving.com, you’ll find everything you need to plan the ultimate Thanksgiving celebration, from setting the table to serving the table. Our recipes are table-tested by America’s hometown food bloggers, chefs, recipe developers and home cooks just like you. Whether y

Chain Store Age is the nation’s leading provider of retail news and analysis for retail headquarters executives across all sectors of the industry, both in print and online. CSA reports on and analyzes trends and strategies in all areas of store operations and store development, including technology

We are an independent publisher with an international outlook, producing inspiring books by innovative authors. Sign up to our newsletter to keep up with events information, author news and interviews, and offers on our books: http://eepurl.com/duXMIj We have high editorial standards and seek to bu
.png)
Growth in PC and notebook sales, plus gains in cloud and advanced solutions, have analysts forecasting Ingram Micro will edge past expectations this...
Hackers claim to have stolen 3.5 terabytes of data during an attack confirmed by the US IT giant, and the data is to be published within...
One of the United States' largest technology providers, Ingram Micro, has suffered a system outage that began on July 3, 2025, as a result...
The company is still assessing the full impact of the ransomware attack, which has been linked to the SafePay hacker group.
On 3 July 2025, global IT distributor Ingram Micro suffered a ransomware attack that disrupted core systems and customer platforms across...
An attack linked to the ransomware gang SafePay has disrupted certain fulfillment capabilities.
Ingram Micro, one of the world's largest IT distributors, has confirmed it suffered a ransomware attack that sparked a worldwide outage of its services over...
Ingram Micro appears to be the latest victim of SafePay, a fast-rising ransomware group that surfaced in 2024 and has been highly active in the months since.
Ingram Micro suffers ransomware attack, Hacker leaks Telefónica data allegedly from new breach, ChatGPT creates a new phishing opportunity.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Ingram Content Group is http://www.ingramcontent.com.
According to Rankiteo, Ingram Content Group’s AI-generated cybersecurity score is 760, reflecting their Fair security posture.
According to Rankiteo, Ingram Content Group currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Ingram Content Group is not certified under SOC 2 Type 1.
According to Rankiteo, Ingram Content Group does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Ingram Content Group is not listed as GDPR compliant.
According to Rankiteo, Ingram Content Group does not currently maintain PCI DSS compliance.
According to Rankiteo, Ingram Content Group is not compliant with HIPAA regulations.
According to Rankiteo,Ingram Content Group is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Ingram Content Group operates primarily in the Book and Periodical Publishing industry.
Ingram Content Group employs approximately 1,983 people worldwide.
Ingram Content Group presently has no subsidiaries across any sectors.
Ingram Content Group’s official LinkedIn profile has approximately 30,614 followers.
Ingram Content Group is classified under the NAICS code 511, which corresponds to Publishing Industries (except Internet).
No, Ingram Content Group does not have a profile on Crunchbase.
Yes, Ingram Content Group maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/ingram-content-group.
As of November 28, 2025, Rankiteo reports that Ingram Content Group has not experienced any cybersecurity incidents.
Ingram Content Group has an estimated 4,881 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Ingram Content Group has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.