Badge
11,371 badges added since 01 January 2025
ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Our mission at N S Development is to redefine excellence in the realms of Real Estate Development and General Contracting. We are dedicated to creating exceptional spaces that enhance communities and exceed expectations. Through innovation, meticulous planning, and unwavering commitment, we transform visions into reality. With a focus on quality, sustainability, and timely execution, we strive to leave a lasting legacy of excellence in every project we undertake.

N S DEVELOPMENT LLC A.I CyberSecurity Scoring

NDL

Company Details

Linkedin ID:

ns-development

Employees number:

6

Number of followers:

45

NAICS:

23

Industry Type:

Construction

Homepage:

ns-development.com

IP Addresses:

0

Company ID:

N S_1618581

Scan Status:

In-progress

AI scoreNDL Risk Score (AI oriented)

Between 700 and 749

https://images.rankiteo.com/companyimages/ns-development.jpeg
NDL Construction
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreNDL Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/ns-development.jpeg
NDL Construction
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

NDL Company CyberSecurity News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenBlog DetailsSupply Chain SourceIncident DetailsView
N S DEVELOPMENT LLCCyber Attack8545/2025NA
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Cyberattack on NS Support Exposes PHI of Nearly 93,000 Patients NS Support LLC, a Boise, Idaho-based healthcare provider specializing in neurosurgical treatment, reported a data breach to the HHS Office for Civil Rights (OCR) on November 21, 2025, affecting 92,845 individuals. The incident stemmed from unauthorized network access detected on May 29, 2025, prompting an investigation with third-party digital forensics experts. The breach involved the exfiltration of files containing protected health information (PHI), including patients’ first and last names and transcribed medical notes from physician appointments. Social Security numbers and financial data were not compromised, and no misuse of the exposed information has been identified. Following the discovery, NS Support took immediate action, wiping and rebuilding affected systems while implementing additional security measures. The organization is also reviewing and updating its data security policies and network software to prevent future incidents. Notification letters were mailed to impacted individuals on November 21, 2025. Due to the nature of the exposed data, credit monitoring services were not offered, though patients were advised on precautionary steps, such as placing fraud alerts on their credit files.

NS Support LLC: PHI of Almost 93,000 Patients Compromised in Cyberattack on NS Support
Cyber Attack
Severity: 85
Impact: 4
Seen: 5/2025
Blog:
Supply Chain Source: NA
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Cyberattack on NS Support Exposes PHI of Nearly 93,000 Patients NS Support LLC, a Boise, Idaho-based healthcare provider specializing in neurosurgical treatment, reported a data breach to the HHS Office for Civil Rights (OCR) on November 21, 2025, affecting 92,845 individuals. The incident stemmed from unauthorized network access detected on May 29, 2025, prompting an investigation with third-party digital forensics experts. The breach involved the exfiltration of files containing protected health information (PHI), including patients’ first and last names and transcribed medical notes from physician appointments. Social Security numbers and financial data were not compromised, and no misuse of the exposed information has been identified. Following the discovery, NS Support took immediate action, wiping and rebuilding affected systems while implementing additional security measures. The organization is also reviewing and updating its data security policies and network software to prevent future incidents. Notification letters were mailed to impacted individuals on November 21, 2025. Due to the nature of the exposed data, credit monitoring services were not offered, though patients were advised on precautionary steps, such as placing fraud alerts on their credit files.

Ailogo

NDL Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for NDL

Incidents vs Construction Industry Average (This Year)

No incidents recorded for N S DEVELOPMENT LLC in 2026.

Incidents vs All-Companies Average (This Year)

No incidents recorded for N S DEVELOPMENT LLC in 2026.

Incident Types NDL vs Construction Industry Avg (This Year)

No incidents recorded for N S DEVELOPMENT LLC in 2026.

Incident History — NDL (X = Date, Y = Severity)

NDL cyber incidents detection timeline including parent company and subsidiaries

NDL Company Subsidiaries

SubsidiaryImage

Our mission at N S Development is to redefine excellence in the realms of Real Estate Development and General Contracting. We are dedicated to creating exceptional spaces that enhance communities and exceed expectations. Through innovation, meticulous planning, and unwavering commitment, we transform visions into reality. With a focus on quality, sustainability, and timely execution, we strive to leave a lasting legacy of excellence in every project we undertake.

Loading...
similarCompanies

NDL Similar Companies

Bechtel Corporation

Bechtel is a trusted engineering, construction and project management partner to industry and government. Differentiated by the quality of our people and our relentless drive to deliver the most successful outcomes, we align our capabilities to our customers’ objectives to create a lasting positive

Royal BAM Group

🏗️ Building a sustainable tomorrow at BAM! As leaders in the construction industry, we are committed to pioneering sustainable practices that not only enhance our projects but also contribute to a better future for generations to come. Our strategy revolves around focusing to protect profitabilit

ALEC Holdings

ALEC Holdings, part of the Investment Corporate of Dubai (ICD), is a leading construction and related businesses group operating in the UAE and KSA. The company builds and provides construction solutions that set industry benchmarks for quality, safety, functionality, and aesthetics. ALEC Holdings

Andrade Gutierrez S.A.

Fundada em Belo Horizonte, Minas Gerais, a Andrade Gutierrez tem reconhecida expertise no segmento de construção pesada. Na década de 1990 iniciou a diversificação dos negócios com investimentos nas áreas de Concessões e Telecomunicações. Hoje o Grupo Andrade Gutierrez é um dos maiores conglomer

STRABAG

At STRABAG around 86,000 people working on progress at more than 2,400 locations worldwide. Uniqueness and individual strengths characterise both our projects and each of us as individuals. Whether its building construction, civil engineering, road construction, underground engineering, bridge build

Colas, a subsidiary of the Bouygues Group, is a major player in the construction and maintenance of transportation infrastructure and urban development. Colas covers the entire value chain: from industrial production to service offerings, including construction work. Thanks to its local presence

NCC is one of the leading construction companies in the Nordics. Based on its expertise in managing complex construction processes, NCC contributes to a positive impact of construction for its customers and society. NCC is one of the largest players in the Nordic construction market, and operates

Bouygues Group

Founded in 1952 by Francis Bouygues, Bouygues is a diversified services group operating in over 80 countries with 200,000 employees all working to make life better every day. Its business activities in construction (Bouygues Construction, Bouygues Immobilier, Colas); energies & services (Equans); me

Kier Group

Our purpose is to sustainably deliver infrastructure which is vital to the UK. As a leading provider of infrastructure services, construction and property developments, we are committed to delivering for communities and leaving lasting legacies through our work. We are committed to attracting, reta

newsone

NDL CyberSecurity News

January 25, 2026 12:06 AM
Government anti-scam efforts bearing fruit - Cybersecurity expert

Samuel Kwame Adomako, a prominent cybersecurity and data expert, has expressed optimism about the government's anti-scam efforts,...

January 24, 2026 09:51 PM
Kataria calls for team to boost cybersecurity

Punjab Governor and UT Administrator Gulab Chand Kataria on Saturday stressed the need to create a dedicated and trained team to strengthen...

January 24, 2026 07:00 PM
🔒 What is a VPN Portal- Learn why VPN portals are important for online security #VPNPortal #VPNSecurity #FreeVPNRisks #ssl #vpn #VPNSafety #VPNDisadvantages #VPNAndroid #CyberSecurity #OnlineSafety

January 24, 2026 02:35 PM
Germany news: Berlin vows aggressive cybersecurity stance

Berlin promises to take down bad cyber actors and a new report prompts questions of whether police should carry Tasers to keep them from...

January 24, 2026 11:30 AM
AgweekTV Full Show: Disappearing topsoil, bull genetics, virtual fencing, cybersecurity in ag

Disappearing topsoil is a big problem for land and bottom line. Expert advice for picking the best bull genetics. Keeping cattle right where...

January 24, 2026 10:46 AM
2026 CISO AI Risk Report

Introduction. Many security leaders didn't authorize AI expansion. It happened around them. Someone plugged in a copilot in a SaaS tool or...

January 24, 2026 10:00 AM
National Cyber Security Summit: Cybersecurity a strategic business risk

It's been a busy time for New Zealand's National Cyber Security Centre as it takes an unprecedentedly proactive posture to cyber threats.

January 24, 2026 09:48 AM
Data Deletion: Why Erasing Your Information Matters More Than Ever

Data deletion is a great way to reduce your digital footprint and lower the risk of cybercrime – here's a guide to deleting your data...

January 24, 2026 08:32 AM
Why AI is exposing the limits of automated security decision-making

When cybercriminals are designing ways to deliver malware, hiding payloads within files remains one of the most common and, for them,...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

NDL CyberSecurity History Information

Official Website of N S DEVELOPMENT LLC

The official website of N S DEVELOPMENT LLC is https://ns-development.com/.

N S DEVELOPMENT LLC’s AI-Generated Cybersecurity Score

According to Rankiteo, N S DEVELOPMENT LLC’s AI-generated cybersecurity score is 734, reflecting their Moderate security posture.

How many security badges does N S DEVELOPMENT LLC’ have ?

According to Rankiteo, N S DEVELOPMENT LLC currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has N S DEVELOPMENT LLC been affected by any supply chain cyber incidents ?

According to Rankiteo, N S DEVELOPMENT LLC has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.

Does N S DEVELOPMENT LLC have SOC 2 Type 1 certification ?

According to Rankiteo, N S DEVELOPMENT LLC is not certified under SOC 2 Type 1.

Does N S DEVELOPMENT LLC have SOC 2 Type 2 certification ?

According to Rankiteo, N S DEVELOPMENT LLC does not hold a SOC 2 Type 2 certification.

Does N S DEVELOPMENT LLC comply with GDPR ?

According to Rankiteo, N S DEVELOPMENT LLC is not listed as GDPR compliant.

Does N S DEVELOPMENT LLC have PCI DSS certification ?

According to Rankiteo, N S DEVELOPMENT LLC does not currently maintain PCI DSS compliance.

Does N S DEVELOPMENT LLC comply with HIPAA ?

According to Rankiteo, N S DEVELOPMENT LLC is not compliant with HIPAA regulations.

Does N S DEVELOPMENT LLC have ISO 27001 certification ?

According to Rankiteo,N S DEVELOPMENT LLC is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of N S DEVELOPMENT LLC

N S DEVELOPMENT LLC operates primarily in the Construction industry.

Number of Employees at N S DEVELOPMENT LLC

N S DEVELOPMENT LLC employs approximately 6 people worldwide.

Subsidiaries Owned by N S DEVELOPMENT LLC

N S DEVELOPMENT LLC presently has no subsidiaries across any sectors.

N S DEVELOPMENT LLC’s LinkedIn Followers

N S DEVELOPMENT LLC’s official LinkedIn profile has approximately 45 followers.

NAICS Classification of N S DEVELOPMENT LLC

N S DEVELOPMENT LLC is classified under the NAICS code 23, which corresponds to Construction.

N S DEVELOPMENT LLC’s Presence on Crunchbase

No, N S DEVELOPMENT LLC does not have a profile on Crunchbase.

N S DEVELOPMENT LLC’s Presence on LinkedIn

Yes, N S DEVELOPMENT LLC maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/ns-development.

Cybersecurity Incidents Involving N S DEVELOPMENT LLC

As of January 25, 2026, Rankiteo reports that N S DEVELOPMENT LLC has experienced 1 cybersecurity incidents.

Number of Peer and Competitor Companies

N S DEVELOPMENT LLC has an estimated 39,315 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at N S DEVELOPMENT LLC ?

Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.

How does N S DEVELOPMENT LLC detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with digital forensics specialists, and containment measures with affected systems were wiped and rebuilt, and remediation measures with additional security measures implemented; data security policies and procedures under review; network security software being assessed, and communication strategy with notification letters mailed to affected individuals..

Incident Details

Can you provide details on each incident ?

Incident : Data Breach

Title: PHI of Almost 93,000 Patients Compromised in Cyberattack on NS Support

Description: NS Support LLC, a Boise, Idaho-based healthcare provider specializing in neurosurgical treatment, reported a hacking-related data breach affecting up to 92,845 individuals. Unauthorized access to its computer network was detected on or around May 29, 2025, with files exfiltrated containing protected health information.

Date Detected: 2025-05-29

Date Publicly Disclosed: 2025-11-21

Type: Data Breach

Attack Vector: Hacking

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Breach NS-1765987062

Data Compromised: Protected Health Information (PHI)

Systems Affected: Computer network

Identity Theft Risk: Potential

Payment Information Risk: None

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Protected Health Information (PHI).

Which entities were affected by each incident ?

Incident : Data Breach NS-1765987062

Entity Name: NS Support LLC

Entity Type: Healthcare Provider

Industry: Healthcare

Location: Boise, Idaho, USA

Customers Affected: 92,845

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Data Breach NS-1765987062

Third Party Assistance: Digital forensics specialists

Containment Measures: Affected systems were wiped and rebuilt

Remediation Measures: Additional security measures implemented; data security policies and procedures under review; network security software being assessed

Communication Strategy: Notification letters mailed to affected individuals

How does the company involve third-party assistance in incident response ?

Third-Party Assistance: The company involves third-party assistance in incident response through Digital forensics specialists.

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Breach NS-1765987062

Type of Data Compromised: Protected Health Information (PHI)

Number of Records Exposed: 92,845

Sensitivity of Data: High

Data Exfiltration: Yes

Personally Identifiable Information: First and last names, medical notes from physician appointments

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Additional security measures implemented; data security policies and procedures under review; network security software being assessed.

How does the company handle incidents involving personally identifiable information (PII) ?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by affected systems were wiped and rebuilt.

Ransomware Information

Was ransomware involved in any of the incidents ?

Incident : Data Breach NS-1765987062

Data Exfiltration: Yes

Regulatory Compliance

Were there any regulatory violations and fines imposed for each incident ?

Incident : Data Breach NS-1765987062

Regulations Violated: HIPAA

Regulatory Notifications: Reported to HHS Office for Civil Rights (OCR)

Lessons Learned and Recommendations

What recommendations were made to prevent future incidents ?

Incident : Data Breach NS-1765987062

Recommendations: Review and strengthen data security policies and procedures; assess network security software; provide guidance to patients on fraud alerts

What recommendations has the company implemented to improve cybersecurity ?

Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Review and strengthen data security policies and procedures; assess network security software; provide guidance to patients on fraud alerts.

References

Where can I find more information about each incident ?

Incident : Data Breach NS-1765987062

Source: HIPAA Journal

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: HIPAA Journal.

Investigation Status

What is the current status of the investigation for each incident ?

Incident : Data Breach NS-1765987062

Investigation Status: Completed

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notification letters mailed to affected individuals.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Data Breach NS-1765987062

Customer Advisories: Patients advised on steps to take if concerned about potential misuse of personal information, such as placing a fraud alert on their credit file

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Patients advised on steps to take if concerned about potential misuse of personal information and such as placing a fraud alert on their credit file.

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Data Breach NS-1765987062

Corrective Actions: Systems wiped and rebuilt; additional security measures implemented; data security policies under review

What is the company's process for conducting post-incident analysis ?

Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Digital forensics specialists.

What corrective actions has the company taken based on post-incident analysis ?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Systems wiped and rebuilt; additional security measures implemented; data security policies under review.

Additional Questions

Incident Details

What was the most recent incident detected ?

Most Recent Incident Detected: The most recent incident detected was on 2025-05-29.

What was the most recent incident publicly disclosed ?

Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-11-21.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident was Protected Health Information (PHI).

Response to the Incidents

What third-party assistance was involved in the most recent incident ?

Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Digital forensics specialists.

What containment measures were taken in the most recent incident ?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Affected systems were wiped and rebuilt.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Protected Health Information (PHI).

What was the number of records exposed in the most significant breach ?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 92.8K.

Lessons Learned and Recommendations

What was the most significant recommendation implemented to improve cybersecurity ?

Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Review and strengthen data security policies and procedures; assess network security software; provide guidance to patients on fraud alerts.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is HIPAA Journal.

Investigation Status

What is the current status of the most recent investigation ?

Current Status of Most Recent Investigation: The current status of the most recent investigation is Completed.

Stakeholder and Customer Advisories

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued were an Patients advised on steps to take if concerned about potential misuse of personal information and such as placing a fraud alert on their credit file.

cve

Latest Global CVEs (Not Company-Specific)

Description

The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the processBackgroundAction() function in all versions up to, and including, 10.0.04. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify global map engine settings.

Risk Information
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Description

The Save as PDF Plugin by PDFCrowd plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘options’ parameter in all versions up to, and including, 4.5.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. NOTE: Successful exploitation of this vulnerability requires that the PDFCrowd API key is blank (also known as "demo mode", which is the default configuration when the plugin is installed) or known.

Risk Information
cvss3
Base: 6.1
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Description

The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the action_import_module() function in all versions up to, and including, 7.8.9.2. This makes it possible for authenticated attackers, with a lower-privileged role (e.g., Subscriber-level access and above), to upload arbitrary files on the affected site's server which may make remote code execution possible. Successful exploitation requires an admin to grant Hustle module permissions (or module edit access) to the low-privileged user so they can access the Hustle admin page and obtain the required nonce.

Risk Information
cvss3
Base: 7.5
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Description

The WP Directory Kit plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.9 via the wdk_public_action AJAX handler. This makes it possible for unauthenticated attackers to extract email addresses for users with Directory Kit-specific user roles.

Risk Information
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Description

The Meta-box GalleryMeta plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 3.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with editor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

Risk Information
cvss3
Base: 4.4
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=ns-development' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge