ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Mount Media har lang erfaring som totalleverandør av mange ulike filmer og prosjekt. Vi kommer gjerne inn tidlig i prosessen og hjelper til med alt fra utvikling av idè, frem til ferdigstilling av film. Vi tilbyr alt fra enkle oppdragsfilmer for næringslivet, web-løsninger (streaming), TV produksjon, filmer til store Event samt reklamefilm. Mount Media har kontor i Trondheim og Oslo.

Mount Media AS A.I CyberSecurity Scoring

MM

Company Details

Linkedin ID:

mount-media-as

Employees number:

2

Number of followers:

0

NAICS:

None

Industry Type:

Movies, Videos, and Sound

Homepage:

mountmedia.no

IP Addresses:

0

Company ID:

MOU_1632279

Scan Status:

In-progress

AI scoreMM Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/mount-media-as.jpeg
MM Movies, Videos, and Sound
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreMM Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/mount-media-as.jpeg
MM Movies, Videos, and Sound
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

MM Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

MM Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for MM

Incidents vs Movies, Videos, and Sound Industry Average (This Year)

No incidents recorded for Mount Media AS in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Mount Media AS in 2025.

Incident Types MM vs Movies, Videos, and Sound Industry Avg (This Year)

No incidents recorded for Mount Media AS in 2025.

Incident History — MM (X = Date, Y = Severity)

MM cyber incidents detection timeline including parent company and subsidiaries

MM Company Subsidiaries

SubsidiaryImage

Mount Media har lang erfaring som totalleverandør av mange ulike filmer og prosjekt. Vi kommer gjerne inn tidlig i prosessen og hjelper til med alt fra utvikling av idè, frem til ferdigstilling av film. Vi tilbyr alt fra enkle oppdragsfilmer for næringslivet, web-løsninger (streaming), TV produksjon, filmer til store Event samt reklamefilm. Mount Media har kontor i Trondheim og Oslo.

Loading...
similarCompanies

MM Similar Companies

Asian Cinevision

Asian CineVision (ACV) is a nonprofit 501(c)3 media arts organization devoted to the development, promotion, preservation, and exhibition of Asian and Asian American film and video. Since 1978, ACV has produced the Asian American International Film Festival (AAIFF), the nation’s longest running fes

Molecule VFX

Founded in 2005 as a small VFX shop, The Molecule is a premiere creative facility specializing in Visual Effects, Motion Graphics, Virtual Reality, Experiential Design, and Production Services. Over 80 artists, producers, technical and administrative support collaborate at our New York City headqua

LDC Productions specializes in creating high-quality shorts. Whether you need a lasting memento of your special day, a skills tape complete with game footage and interviews, or promotion for a property on the market, we're here to help for very reasonable prices! Visit our galleries to learn about o

Sound Ark Studios

Purveyors of fine sound, inspired by the natural world. We offer tailor-made audio packages, inclusive of every aspect from location sound to final mix. Sound Ark is born from a passion for sound as an art-form and a drive to preserve disappearing natural and cultural events, through sound recordi

Mas Imageworks

Mas Imageworks is a company specializing in film’s special effects and CG animation. Our artists, from Korea, Hong Kong and main land China, are experienced and skillful in VFX making. We aim to create an Asian Film Center by combining art and technology, by telling Chinese stories with advanced fil

Big Sky Editorial

Big Sky Edit is an award winning full service post production boutique located in New York City, specializing in editing, sound design, graphics, VFX, and finishing for commercials, music videos, and films. Our commitment to craft and excellence ensures that every project receives meticulous attent

newsone

MM CyberSecurity News

November 24, 2025 08:00 AM
Three-year college degrees are on the rise. Will Wisconsin schools embrace the new model?

Three-year bachelor's degrees are gaining traction nationally, but only one Wisconsin university has joined. Advocates say the model saves...

November 18, 2025 08:00 AM
Mounting Chinese threat prompts CISA to ramp up hiring

Cybersecurity Dive reports that intensified hiring efforts will be implemented by the Cybersecurity and Infrastructure Security Agency next...

November 10, 2025 08:00 AM
CyberSentriq Named One of Europe’s Fastest-Rising Cybersecurity Companies

CyberSentriq recognised among Europe's most innovative cybersecurity companies, securing sixth place in TechRound's Cybersecurity40 list.

November 10, 2025 08:00 AM
Critical infrastructure IoT, Android devices face mounting cyberattacks

Android-targeted cyberattacks most significantly increased in the energy, healthcare, government, and transportation industries from June...

October 15, 2025 07:00 AM
China drives mounting cyberattacks, disinformation against Taiwan

Average daily cyber intrusions aimed at Taiwan were reported by its National Security Bureau to have reached 2.8 million this year,...

October 13, 2025 07:00 AM
Frustration mounts among Qantas customers over data breach

The airline's customers voice their concerns and disappointment after cybercriminals release their personal data on the dark web.

October 01, 2025 07:00 AM
Researchers Mount Vishing Attacks With Real-Time Voice Cloning

Cybersecurity researchers revealed Tuesday how artificial intelligence can be used to clone a person's voice in real time to mount voice...

September 26, 2025 07:00 AM
News brief: AI cybersecurity worries mount

Read the latest on AI cybersecurity worries in this news roundup, from a serious ChatGPT vulnerability to the downsides of AI vulnerability...

September 24, 2025 07:00 AM
Mount Vernon moves to comply with state’s cybersecurity mandate

MOUNT VERNON — A state mandate passed in June requires political subdivisions to adopt a cybersecurity policy to safeguard their information...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

MM CyberSecurity History Information

Official Website of Mount Media AS

The official website of Mount Media AS is http://www.mountmedia.no.

Mount Media AS’s AI-Generated Cybersecurity Score

According to Rankiteo, Mount Media AS’s AI-generated cybersecurity score is 790, reflecting their Fair security posture.

How many security badges does Mount Media AS’ have ?

According to Rankiteo, Mount Media AS currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Mount Media AS have SOC 2 Type 1 certification ?

According to Rankiteo, Mount Media AS is not certified under SOC 2 Type 1.

Does Mount Media AS have SOC 2 Type 2 certification ?

According to Rankiteo, Mount Media AS does not hold a SOC 2 Type 2 certification.

Does Mount Media AS comply with GDPR ?

According to Rankiteo, Mount Media AS is not listed as GDPR compliant.

Does Mount Media AS have PCI DSS certification ?

According to Rankiteo, Mount Media AS does not currently maintain PCI DSS compliance.

Does Mount Media AS comply with HIPAA ?

According to Rankiteo, Mount Media AS is not compliant with HIPAA regulations.

Does Mount Media AS have ISO 27001 certification ?

According to Rankiteo,Mount Media AS is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Mount Media AS

Mount Media AS operates primarily in the Movies, Videos, and Sound industry.

Number of Employees at Mount Media AS

Mount Media AS employs approximately 2 people worldwide.

Subsidiaries Owned by Mount Media AS

Mount Media AS presently has no subsidiaries across any sectors.

Mount Media AS’s LinkedIn Followers

Mount Media AS’s official LinkedIn profile has approximately 0 followers.

NAICS Classification of Mount Media AS

Mount Media AS is classified under the NAICS code None, which corresponds to Others.

Mount Media AS’s Presence on Crunchbase

No, Mount Media AS does not have a profile on Crunchbase.

Mount Media AS’s Presence on LinkedIn

Yes, Mount Media AS maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/mount-media-as.

Cybersecurity Incidents Involving Mount Media AS

As of December 21, 2025, Rankiteo reports that Mount Media AS has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

Mount Media AS has an estimated 1,804 peer or competitor companies worldwide.

Mount Media AS CyberSecurity History Information

How many cyber incidents has Mount Media AS faced ?

Total Incidents: According to Rankiteo, Mount Media AS has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at Mount Media AS ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

Versa SASE Client for Windows versions released between 7.8.7 and 7.9.4 contain a local privilege escalation vulnerability in the audit log export functionality. The client communicates user-controlled file paths to a privileged service, which performs file system operations without impersonating the requesting user. Due to improper privilege handling and a time-of-check time-of-use race condition combined with symbolic link and mount point manipulation, a local authenticated attacker can coerce the service into deleting arbitrary directories with SYSTEM privileges. This can be exploited to delete protected system folders such as C:\\Config.msi and subsequently achieve execution as NT AUTHORITY\\SYSTEM via MSI rollback techniques.

Risk Information
cvss4
Base: 8.5
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

The WP JobHunt plugin for WordPress, used by the JobCareer theme, is vulnerable to unauthorized modification of data due to a missing capability check on the 'cs_update_application_status_callback' function in all versions up to, and including, 7.7. This makes it possible for authenticated attackers, with Candidate-level access and above, to inject cross-site scripting into the 'status' parameter of applied jobs for any user.

Risk Information
cvss3
Base: 7.6
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L
Description

The WP JobHunt plugin for WordPress, used by the JobCareer theme, is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 7.7 via the 'cs_update_application_status_callback' due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Candidate-level access and above, to send a site-generated email with injected HTML to any user.

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Description

The FiboSearch – Ajax Search for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's `thegem_te_search` shortcode in all versions up to, and including, 1.32.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This vulnerability requires TheGem theme (premium) to be installed with Header Builder mode enabled, and the FiboSearch "Replace search bars" option enabled for TheGem integration.

Risk Information
cvss3
Base: 5.4
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Description

The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.11.0 via the ajax_get_members function. This is due to the use of a predictable low-entropy token (5 hex characters derived from md5 of post ID) to identify member directories and insufficient authorization checks on the unauthenticated AJAX endpoint. This makes it possible for unauthenticated attackers to extract sensitive data including usernames, display names, user roles (including administrator accounts), profile URLs, and user IDs by enumerating predictable directory_id values or brute-forcing the small 16^5 token space.

Risk Information
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=mount-media-as' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge