Company Details
longpré
45
876
337
longpre.co.uk
0
LON_7916347
In-progress

Longpré Company CyberSecurity Posture
longpre.co.ukFounded in 1990 by master cabinet maker, Paul Longpré, and designer, Helen Moyers, Longpré is based in the historic Somerset town of Bruton in South West England. Our team of highly skilled bespoke cabinet makers create exceptional handcrafted furniture to individual specification on behalf of an extensive portfolio of international clients. Each piece displays an unmistakable clarity of detail and accuracy of line that remain the distinctive hallmarks of only the very finest cabinet makers.
Company Details
longpré
45
876
337
longpre.co.uk
0
LON_7916347
In-progress
Between 750 and 799

Longpré Global Score (TPRM)XXXX



No incidents recorded for Longpré in 2025.
No incidents recorded for Longpré in 2025.
No incidents recorded for Longpré in 2025.
Longpré cyber incidents detection timeline including parent company and subsidiaries

Founded in 1990 by master cabinet maker, Paul Longpré, and designer, Helen Moyers, Longpré is based in the historic Somerset town of Bruton in South West England. Our team of highly skilled bespoke cabinet makers create exceptional handcrafted furniture to individual specification on behalf of an extensive portfolio of international clients. Each piece displays an unmistakable clarity of detail and accuracy of line that remain the distinctive hallmarks of only the very finest cabinet makers.


D.O.T Furniture is a Canadian owned and operated retailer of home furnishings that started with a small store in Oakville but has since expanded into 19 locations across southern Ontario and now services customers from Whitby to London and St. Catharines to Orillia. Though the first store only carr

Corporate Source clients appreciate the unique breadth of services we provide, allowing us to deliver office solutions that are truly greater than the sum of their parts. We offer not only a vast selection of furnishings to suit a variety of end goals, but also provide the human expertise required t

Fondée en 2005, OVE Decors est une entreprise de distribution de plomberie de mode, avec plusieurs bureaux à travers le monde : au Canada, aux États-Unis et en Chine. Nous proposons une large collection de produits de notre propre design, à la pointe de la technologie, du design et des tendances. No

Our purpose is to enable people to do great work We do this by providing a tailored set of stocked products and services delivered at speed creating successful work environments, nationwide. We work with Decision makers of SME businesses, government and educational Dept’s who value high-quality fi

Landscape Forms is the industry’s premier global brand of outdoor furniture, LED lighting and accessories. Since its founding in 1969 Landscape Forms has earned a reputation for excellent design, high quality products and exceptional service. The Landscape Forms U.S. headquarters and manufacturing f

Houston’s Yuma Furniture Co., Inc. is family-owned and family-operated and has served Yuma, Arizona for more than 40 years. Our store buyers continue to always search for the best buys and values in the furniture market. We shop during two shows each year.We have built our company by providing beau
.png)
Pointing to "white-hat" hacking, AI policy experts recommend a new system of third-party reporting and tracking of AI's flaws.
An argument for legal and technical safe harbors for AI safety and trustworthiness research. By Shayne Longpre, Sayash Kapoor, Kevin Klyman, Ashwin Ramaswami.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Longpré is https://longpre.co.uk/.
According to Rankiteo, Longpré’s AI-generated cybersecurity score is 754, reflecting their Fair security posture.
According to Rankiteo, Longpré currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Longpré is not certified under SOC 2 Type 1.
According to Rankiteo, Longpré does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Longpré is not listed as GDPR compliant.
According to Rankiteo, Longpré does not currently maintain PCI DSS compliance.
According to Rankiteo, Longpré is not compliant with HIPAA regulations.
According to Rankiteo,Longpré is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Longpré operates primarily in the Furniture and Home Furnishings Manufacturing industry.
Longpré employs approximately 45 people worldwide.
Longpré presently has no subsidiaries across any sectors.
Longpré’s official LinkedIn profile has approximately 876 followers.
Longpré is classified under the NAICS code 337, which corresponds to Furniture and Related Product Manufacturing.
No, Longpré does not have a profile on Crunchbase.
Yes, Longpré maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/longpré.
As of November 28, 2025, Rankiteo reports that Longpré has not experienced any cybersecurity incidents.
Longpré has an estimated 2,617 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Longpré has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.