
Mirage Studio
Mirage Studio since 2005 provides Wedding and Product protography. We make fine arts photography also. .



Mirage Studio since 2005 provides Wedding and Product protography. We make fine arts photography also. .

DONE is a Portland and Bend, Oregon based architectural photography and marketing agency. I help builders, architects and designers separate themselves from their competition through a combination of photography, marketing and design. My experience includes several years as a professional photographer where I have focused on commercial and high end residential photography. I began shooting professionally in 2009 when I launched the branding and design agency, Studio Absolute–which I continue to partner with today for brand strategy and design. I later went on to accept a role as the Director of Marketing for one of our branding clients, Lenity Architecture and opened their Bend, Oregon branch office. As the firm's in-house photographer, I was able to expand my portfolio into more commercial and senior housing work. Working as an in-house photographer and marketer helped me to see each project through the architect's eyes. I began shooting with the project vision and rationale in mind which is how I continue to approach my work now. Marketing services include: - Content planning and development for websites and social media - Project rationale writing and website updating - Brand discoveries (Client interviews, testimonial gathering and reporting) - Mission & vision statements - Annual marketing plans - RFP/RFI responses - Design award project management - Brand strategy and design project management
Security & Compliance Standards Overview












No incidents recorded for Mirage Studio in 2025.
No incidents recorded for Cheryl McIntosh Photography in 2025.
Mirage Studio cyber incidents detection timeline including parent company and subsidiaries
Cheryl McIntosh Photography cyber incidents detection timeline including parent company and subsidiaries
Last 3 Security & Risk Events by Company
Nagios XI versions prior to 2026R1.1 are vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A user‑accessible maintenance script may be executed as root via sudo and includes an application file that is writable by a lower‑privileged user. A local attacker with access to the application account can modify this file to introduce malicious code, which is then executed with elevated privileges when the script is run. Successful exploitation results in arbitrary code execution as the root user.
Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
SIPGO is a library for writing SIP services in the GO language. Starting in version 0.3.0 and prior to version 1.0.0-alpha-1, a nil pointer dereference vulnerability is in the SIPGO library's `NewResponseFromRequest` function that affects all normal SIP operations. The vulnerability allows remote attackers to crash any SIP application by sending a single malformed SIP request without a To header. The vulnerability occurs when SIP message parsing succeeds for a request missing the To header, but the response creation code assumes the To header exists without proper nil checks. This affects routine operations like call setup, authentication, and message handling - not just error cases. This vulnerability affects all SIP applications using the sipgo library, not just specific configurations or edge cases, as long as they make use of the `NewResponseFromRequest` function. Version 1.0.0-alpha-1 contains a patch for the issue.
GLPI is a free asset and IT management software package. Starting in version 9.1.0 and prior to version 10.0.21, an unauthorized user with an API access can read all knowledge base entries. Users should upgrade to 10.0.21 to receive a patch.