Company Details
km-furniture
16
122
337
spaceforme.com
0
KM _2954835
In-progress

KM furniture Company CyberSecurity Posture
spaceforme.comSpaceforme have saved the very popular KM range and included it into the Spaceforme family. With the regrettable closure of KM Furniture, Spaceforme took the opportunity to buy the Intellectual Property Rights and moulds for all of the KM seating range. This ensures manufacturing in the UK by Spaceforme and the route to market for the KM chairs through Spaceforme’s network of loyal dealers. With continued growth Spaceforme has fast become the manufacturer of choice for great furniture combined with great service. It was therefore an obvious choice for Spaceforme to take on the KM chairs. KM have developed some outstanding products, with the P1 polypropylene school chair revolutionising the education furniture market in the 1970’s. Over the years, the range has been developed to meet current standards with an array of popular shell and frame options to meet the needs of the modern classroom environment. During the downturn of the KM business, service levels were of serious concern for many resellers in the trade. However, with Spaceforme’s commitment to great service and great furniture, the popular KM chairs are now readily available for schools to enjoy. Call Us Today 0333 123 2424
Company Details
km-furniture
16
122
337
spaceforme.com
0
KM _2954835
In-progress
Between 750 and 799

KM furniture Global Score (TPRM)XXXX



No incidents recorded for KM furniture in 2025.
No incidents recorded for KM furniture in 2025.
No incidents recorded for KM furniture in 2025.
KM furniture cyber incidents detection timeline including parent company and subsidiaries

Spaceforme have saved the very popular KM range and included it into the Spaceforme family. With the regrettable closure of KM Furniture, Spaceforme took the opportunity to buy the Intellectual Property Rights and moulds for all of the KM seating range. This ensures manufacturing in the UK by Spaceforme and the route to market for the KM chairs through Spaceforme’s network of loyal dealers. With continued growth Spaceforme has fast become the manufacturer of choice for great furniture combined with great service. It was therefore an obvious choice for Spaceforme to take on the KM chairs. KM have developed some outstanding products, with the P1 polypropylene school chair revolutionising the education furniture market in the 1970’s. Over the years, the range has been developed to meet current standards with an array of popular shell and frame options to meet the needs of the modern classroom environment. During the downturn of the KM business, service levels were of serious concern for many resellers in the trade. However, with Spaceforme’s commitment to great service and great furniture, the popular KM chairs are now readily available for schools to enjoy. Call Us Today 0333 123 2424

From more than 40 years Valcucine has been standing out for the design and production of high-end kitchens unique in their kind, revolutionising the paradigms of this sector to deliver excellence in terms of innovation, craftsmanship and sustainability. We have been guided by a special talent to fin

Lang Furniture is a nationally recognized manufacturer of American made bedroom and storage furniture for home, hospitality and senior living. Founded in 1966 by James Lang in the heart of Wisconsin, the company continues to be family owned and operated. Because all of our furniture is manufactured

Since 1993, Paul Brayton Designs has created an industry brand that designers trust to provide top quality textiles and furniture. -Lounge, guest seating, executive seating, collaborative and occasional tables. -Leather, faux leather and woven upholstery fabrics Each design is handcrafted for the

Naturepedic began when founder Barry Cik could not find a truly safe crib mattress for his first grandchild. He and his sons set out to create a safer product that parents could trust: the Naturepedic organic crib mattress. Since becoming a leader in the marketplace, Naturepedic has added kids and a

Được thành lập vào năm 1992, TTT Corporation là một trong những công ty hàng đầu Việt Nam trong lĩnh vực thiết kế, trang trí và thi công nội thất; sản xuất và cung cấp sản phẩm nội thất trên nhiều hạng mục công trình như khách sạn, khu nghỉ mát (resorts), căn hộ cao cấp và văn phòng. Tính đến na

Emmegi, one of the over 30 companies owned by the biggest italian group in the furnishing field DOIMO group, is manufacturing office,community chairs as well as seating systems for all kind of waiting areas, lounge situations and seating for auditoria, universities, colleges. The brand is synonymous
.png)
AI is transforming cybersecurity workflows, from threat modeling to vulnerability prioritization, said Bill Chen, CISO at Natera, underlining the need for...
An update from Cyviz AS ( ($DE:8P9) ) is now available. Cyviz AS has entered into a new partner contract with IBM to modernize and upgrade...
Dubai, UAE : RNTrust Group announces a high-level GCC Cybersecurity Summit taking place in Dubai on Wednesday, December 10, 2025.
A new Unit 42 report warns that underground AI models like WormGPT and KawaiiGPT are lowering the skill barrier for cybercrime,...
A recent Gartner survey found that more than half of government CIOs outside the US expect IT budgets to rise in 2026, with cybersecurity,...
AUTOCRYPT announced that in 2026 it would focus its efforts to establish a comprehensive cybersecurity framework in the MENA region,...
The report warns that poorly designed, misaligned, or overly prescriptive regulation can create unnecessary costs, divert resources from...
The Cybersecurity Risk Management Market: a comprehensive new analysis of global statistics and emerging trends, offering clear insights...
Cyberthreats aren't slowing down, and in this environment, by implementing cybersecurity programs, universities help their students resist...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of KM furniture is http://www.kmfurniture.com.
According to Rankiteo, KM furniture’s AI-generated cybersecurity score is 755, reflecting their Fair security posture.
According to Rankiteo, KM furniture currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, KM furniture is not certified under SOC 2 Type 1.
According to Rankiteo, KM furniture does not hold a SOC 2 Type 2 certification.
According to Rankiteo, KM furniture is not listed as GDPR compliant.
According to Rankiteo, KM furniture does not currently maintain PCI DSS compliance.
According to Rankiteo, KM furniture is not compliant with HIPAA regulations.
According to Rankiteo,KM furniture is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
KM furniture operates primarily in the Furniture and Home Furnishings Manufacturing industry.
KM furniture employs approximately 16 people worldwide.
KM furniture presently has no subsidiaries across any sectors.
KM furniture’s official LinkedIn profile has approximately 122 followers.
KM furniture is classified under the NAICS code 337, which corresponds to Furniture and Related Product Manufacturing.
No, KM furniture does not have a profile on Crunchbase.
Yes, KM furniture maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/km-furniture.
As of November 28, 2025, Rankiteo reports that KM furniture has not experienced any cybersecurity incidents.
KM furniture has an estimated 2,617 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, KM furniture has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.