Company Details
iron-circus-comics
26
988
511
ironcircus.com
0
IRO_1639584
In-progress

Iron Circus Comics Company CyberSecurity Posture
ironcircus.comIron Circus Comics is Chicago’s largest alternative comics publisher. Owned and operated by C. Spike Trotman, it was founded in the spring of 2007 to publish the print edition of Spike’s webcomic, the eccentric and acclaimed "Templar, Arizona." It has since gone on to revitalize the small press world with trailblazing collaborative anthologies like the "Smut Peddler" collections, "The Sleep of Reason," and "New World," as well as exceptional creator-owned works like "EK Weaver’s The Less Than Epic Adventures of TJ and Amal" and Sophie Campbell's "Shadoweyes." Iron Circus is a growing company, dedicated to publishing strange and amazing comics, amplifying unheard and unique voices, and giving creators a fair deal.
Company Details
iron-circus-comics
26
988
511
ironcircus.com
0
IRO_1639584
In-progress
Between 750 and 799

ICC Global Score (TPRM)XXXX



No incidents recorded for Iron Circus Comics in 2025.
No incidents recorded for Iron Circus Comics in 2025.
No incidents recorded for Iron Circus Comics in 2025.
ICC cyber incidents detection timeline including parent company and subsidiaries

Iron Circus Comics is Chicago’s largest alternative comics publisher. Owned and operated by C. Spike Trotman, it was founded in the spring of 2007 to publish the print edition of Spike’s webcomic, the eccentric and acclaimed "Templar, Arizona." It has since gone on to revitalize the small press world with trailblazing collaborative anthologies like the "Smut Peddler" collections, "The Sleep of Reason," and "New World," as well as exceptional creator-owned works like "EK Weaver’s The Less Than Epic Adventures of TJ and Amal" and Sophie Campbell's "Shadoweyes." Iron Circus is a growing company, dedicated to publishing strange and amazing comics, amplifying unheard and unique voices, and giving creators a fair deal.


Target Publishing is the UK's leading publisher and conference organiser, leading the way in the natural health and integrative medicine - sectors in-print, online and in-person. Our market-leading brands deliver high-end content, written by industry experts with years of knowledge and experience

Welcome to JAMS, the Journal & Article Management System designed to empower small and independent publishers worldwide. Backed by MDPI’s decades of expertise in open-access publishing, JAMS offers a comprehensive solution that simplifies journal management and helps publishers thrive. Our platform

Vs. is an international fashion and lifestyle magazine published bi-annually. Known for its sleek design, luxury fashion stories, editorial edge and large format, glossy, print size. Vs. was founded by Jakob F.S. and Vibe Dabelsteen in 2005. Vs.'s offices are based in New York, United States.

Fondata a Torino nel 1791, UTET da oltre 200 anni offre sul mercato italiano opere e progetti editoriali che hanno contribuito alla formazione e alla crescita culturale di intere generazioni. Negli anni recenti ha reso più ricca la propria offerta, che si compone di un catalogo di oltre 800 titol

For more than 30 years, August Home Publishing Company has provided woodworkers, gardeners, cooks and anyone devoted to enhancing their homes with the tools, inspiration and practical how-to information they need to be successful. August Home Publishing Company publishes four national, award w

HIGH CAPACITY. HIGH VALUE. Get ahead. Bookbright Media’s subject matter experts and advanced technology solutions help production teams get more produced, better. Bookbright Media helps you manage details, meet specs, and beat deadlines sooner. Rise to your challenge. Be a publishing hero. Be
.png)
With nearly 30 projects and $2 million dollars funded through Kickstarter, the indy trailblazer is skeptical of new "creator friendly"...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Iron Circus Comics is http://ironcircus.com/.
According to Rankiteo, Iron Circus Comics’s AI-generated cybersecurity score is 751, reflecting their Fair security posture.
According to Rankiteo, Iron Circus Comics currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Iron Circus Comics is not certified under SOC 2 Type 1.
According to Rankiteo, Iron Circus Comics does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Iron Circus Comics is not listed as GDPR compliant.
According to Rankiteo, Iron Circus Comics does not currently maintain PCI DSS compliance.
According to Rankiteo, Iron Circus Comics is not compliant with HIPAA regulations.
According to Rankiteo,Iron Circus Comics is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Iron Circus Comics operates primarily in the Book and Periodical Publishing industry.
Iron Circus Comics employs approximately 26 people worldwide.
Iron Circus Comics presently has no subsidiaries across any sectors.
Iron Circus Comics’s official LinkedIn profile has approximately 988 followers.
Iron Circus Comics is classified under the NAICS code 511, which corresponds to Publishing Industries (except Internet).
No, Iron Circus Comics does not have a profile on Crunchbase.
Yes, Iron Circus Comics maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/iron-circus-comics.
As of November 28, 2025, Rankiteo reports that Iron Circus Comics has not experienced any cybersecurity incidents.
Iron Circus Comics has an estimated 4,881 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Iron Circus Comics has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.