Company Details
interstuhl
245
8,167
337
interstuhl.com
0
INT_2138196
In-progress

Interstuhl Company CyberSecurity Posture
interstuhl.comWe solve the challenges of the modern working world. Together! For us at Interstuhl creating human centered work experiences means to observe and analyse the requirements of the modern working world and offering solutions that help to make the everyday work life of every individual easier. Our company’s history started over 60 years ago, by adapting to the requirements of a changing work environment and the transformation from a smithy to a chair producer. More than 30 Million chairs later and with many new innovations regarding ergonomic perfection the working world underwent another big change, asking for new solutions. With the further development of our concept we combine insights from architecture, science, and user needs with our long experience in the office environment. With new products, services and knowledge we actually follow the goal Interstuhl always had: recognizing and understanding the challenges that exist in the modern working world, in order to find the best possible solutions – which can sometimes still be a classical desk situation, an additional home office or even an entire concept for a new working world.
Company Details
interstuhl
245
8,167
337
interstuhl.com
0
INT_2138196
In-progress
Between 750 and 799

Interstuhl Global Score (TPRM)XXXX



No incidents recorded for Interstuhl in 2025.
No incidents recorded for Interstuhl in 2025.
No incidents recorded for Interstuhl in 2025.
Interstuhl cyber incidents detection timeline including parent company and subsidiaries

We solve the challenges of the modern working world. Together! For us at Interstuhl creating human centered work experiences means to observe and analyse the requirements of the modern working world and offering solutions that help to make the everyday work life of every individual easier. Our company’s history started over 60 years ago, by adapting to the requirements of a changing work environment and the transformation from a smithy to a chair producer. More than 30 Million chairs later and with many new innovations regarding ergonomic perfection the working world underwent another big change, asking for new solutions. With the further development of our concept we combine insights from architecture, science, and user needs with our long experience in the office environment. With new products, services and knowledge we actually follow the goal Interstuhl always had: recognizing and understanding the challenges that exist in the modern working world, in order to find the best possible solutions – which can sometimes still be a classical desk situation, an additional home office or even an entire concept for a new working world.


Bower is a New York City–based studio with a multidisciplinary approach to contemporary furniture and product design. With a focus on mirrors, they explore perceptions of depth, light and self. The company also offers unique collections of furniture, lighting and accessories, as well as artist colla

Infinity home Co. is one of Mimary group Co., Established in 2012, with a future vision for positive shopping experience based on Elegance, Comfort and Extra values, Targeting customer’s satisfaction and offering unique Home Furniture, Office Furniture and Accessories, as well as Interior designs.

JLF collections is a family of imaginative manufacturing companies focused solely on the hospitality industry. The go-to for inspired designers, our brands offer innovative seating, brilliant lighting, and unique outdoor pieces completely customized to designer specifications. Known for US-based man

A Home Design atua há 26 anos como uma das principais empresas de mobiliário brasileiro. Com lojas em Salvador-BA e Aracaju-SE , apresenta uma gama de produtos que transmitem o real conceito do “viver bem” aos consumidores em busca de design, sem abrir mão do conforto. Atenta às novidades em decoraç
En Alameda, nuestro propósito es crear la mejor experiencia de compra para productos de hogar en Latinoamérica. Para esto, estamos construyendo la plataforma donde nuestros clientes encuentran todo para su hogar, en un solo lugar. Nos enfocamos en facilitar todo el proceso de compra de muebles y art

About BoConcept BoConcept is the brand name of Denmark's most global retail furniture chain with more than 340 sales units in more than 50 countries around the world. We offer customised, coordinated and affordable design furniture and accessories. Customised because our products can be fitte
.png)
By Apoorva Chhabra. CIOs often struggle to convey the true value of cybersecurity to their organizations and secure buy-in from C-suite...
Microsoft to block unauthorized scripts in Entra ID logins, new legislation targets scammers that use AI, ASUS patches AiCloud...
Mobile operators are so overwhelmed by fragmented cybersecurity rules that they are actually at greater risk of being hacked.
White Pearl Technology Group AB announced the successful integration of recent acquisitions in smart infrastructure, the establishment of a...
The programme will be delivered across India through a hybrid model, combining direct engagement with universities and collaboration with...
~Reaffirms Its Leadership as a CERT-In Empanelled Cybersecurity Partner for India's Digital Future~. New Delhi, India – November 28,...
AI is transforming cybersecurity workflows, from threat modeling to vulnerability prioritization, said Bill Chen, CISO at Natera, underlining the need for...
An update from Cyviz AS ( ($DE:8P9) ) is now available. Cyviz AS has entered into a new partner contract with IBM to modernize and upgrade...
Dubai, UAE : RNTrust Group announces a high-level GCC Cybersecurity Summit taking place in Dubai on Wednesday, December 10, 2025.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Interstuhl is https://www.interstuhl.com/imprint-data-privacy-social-media.
According to Rankiteo, Interstuhl’s AI-generated cybersecurity score is 756, reflecting their Fair security posture.
According to Rankiteo, Interstuhl currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Interstuhl is not certified under SOC 2 Type 1.
According to Rankiteo, Interstuhl does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Interstuhl is not listed as GDPR compliant.
According to Rankiteo, Interstuhl does not currently maintain PCI DSS compliance.
According to Rankiteo, Interstuhl is not compliant with HIPAA regulations.
According to Rankiteo,Interstuhl is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Interstuhl operates primarily in the Furniture and Home Furnishings Manufacturing industry.
Interstuhl employs approximately 245 people worldwide.
Interstuhl presently has no subsidiaries across any sectors.
Interstuhl’s official LinkedIn profile has approximately 8,167 followers.
Interstuhl is classified under the NAICS code 337, which corresponds to Furniture and Related Product Manufacturing.
No, Interstuhl does not have a profile on Crunchbase.
Yes, Interstuhl maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/interstuhl.
As of November 28, 2025, Rankiteo reports that Interstuhl has not experienced any cybersecurity incidents.
Interstuhl has an estimated 2,617 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Interstuhl has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.