Company Details
keen-communications
17
101
511
keencommunication.com
0
KEE_9151556
In-progress

Keen Communications Company CyberSecurity Posture
keencommunication.comKeen Communications is the parent company of a number of publishing imprints and publishing services. Keen publishes a number of non-fiction titles every year under direction of Menasha Ridge Press, Wilderness Press, Clerisy Press, the Unofficial Guide™, Coconut Press and the Nature Study Guide imprints. These books cover a range of categories about the outdoors, sports, regional interests, general travel, hiking, camping, paddling, biking, ghosthunting, maps, GPS, sports, business and so much more.
Company Details
keen-communications
17
101
511
keencommunication.com
0
KEE_9151556
In-progress
Between 750 and 799

Keen Communications Global Score (TPRM)XXXX



No incidents recorded for Keen Communications in 2025.
No incidents recorded for Keen Communications in 2025.
No incidents recorded for Keen Communications in 2025.
Keen Communications cyber incidents detection timeline including parent company and subsidiaries

Keen Communications is the parent company of a number of publishing imprints and publishing services. Keen publishes a number of non-fiction titles every year under direction of Menasha Ridge Press, Wilderness Press, Clerisy Press, the Unofficial Guide™, Coconut Press and the Nature Study Guide imprints. These books cover a range of categories about the outdoors, sports, regional interests, general travel, hiking, camping, paddling, biking, ghosthunting, maps, GPS, sports, business and so much more.


Leadstart is a leading publishing house from India with creative and progressive foci. We feature distinguished authors and writing from across the globe. Our authors, editorial teams and books have won accolades and critical praise for their work at both national and international levels. Several L

Capitol Information Group (CIG) is an online and print publisher of actionable advice in various markets. Our Purpose is to give our customers the competitive edge they need to maximize their potential and improve their quality of life. At Business Management Daily, our customers look to us fo

Part of the University of Oxford. Established in the earliest days of printing, we’ve been home to the inquisitive, the passionate, and the ambitious for the last 500 years. Our mission is clear – to create the highest quality research and education resources and make them available worldwide. Fro

The Local Answer is the largest publisher in Gloucestershire producing a free A5 Glossy magazine and delivering it to over 180,000 homes and businesses around the county. Our unrivaled distribution helps businesses successfully advertise their services and products directly to homes, families and co

Every process industry uses water in some capacity, and the safe movement, containment, treatment, recycling and reuse of this water is a critical cog in operations. Water Technology provides professionals charged with managing industrial water and wastewater with news, regulation updates, technolog

The media company Talentum publishes media and professional literature and produces events, training and digital content for professionals in different fields: economists, engineers, lawyers, doctors, and ICT and marketing experts. Talentum's contents are geared to the needs of the target groups wit
.png)
LONDON: Kuwait is giving high priority to accelerating the adoption of modern technologies and expanding international partnerships to...
Deputy Ministers of Defence of Ukraine, Lieutenant General Yevhen Moisiuk and Kateryna Chernohorenko, met with a delegation from Lithuania's...
WASHINGTON (AP) — Defense Secretary Pete Hegseth had an internet connection that bypassed the Pentagon's security protocols set up in his...
SAN DIEGO — Rear Adm. Guido Valdes, commander of Naval Medical Forces Pacific, honored Expeditionary Medical Facility (EMF) 150-Bravo...
These days, almost all employees have some kind of sensitive or privileged access; they need it, in fact, just to get the job done.
At least 19 Australian companies have expressed an interest in investing in Indonesia's technology sector, Communication and Digital Affairs...
WASHINGTON, Oct 19: Kuwait's Minister of State for Communications Affairs, Omar Al-Omar, reaffirmed the country's commitment to adopting...
Russian cybersecurity company Kaspersky is eyeing vast opportunities in China's industrial sector, driven by the country's strong manufacturing base and fast-...
Atlanta — June 14, 2024. Portrait thumbnail. The Board of Regents of the University System of Georgia (USG) today named Dr. Russell T. Keen president of...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Keen Communications is http://www.keencommunication.com.
According to Rankiteo, Keen Communications’s AI-generated cybersecurity score is 753, reflecting their Fair security posture.
According to Rankiteo, Keen Communications currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Keen Communications is not certified under SOC 2 Type 1.
According to Rankiteo, Keen Communications does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Keen Communications is not listed as GDPR compliant.
According to Rankiteo, Keen Communications does not currently maintain PCI DSS compliance.
According to Rankiteo, Keen Communications is not compliant with HIPAA regulations.
According to Rankiteo,Keen Communications is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Keen Communications operates primarily in the Book and Periodical Publishing industry.
Keen Communications employs approximately 17 people worldwide.
Keen Communications presently has no subsidiaries across any sectors.
Keen Communications’s official LinkedIn profile has approximately 101 followers.
No, Keen Communications does not have a profile on Crunchbase.
Yes, Keen Communications maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/keen-communications.
As of November 28, 2025, Rankiteo reports that Keen Communications has not experienced any cybersecurity incidents.
Keen Communications has an estimated 4,881 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Keen Communications has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.