Company Details
oddity-prodigy-productions-llc
5
14
511
oddityprodigy.com
0
ODD_2155034
In-progress

Oddity Prodigy Productions, LLC Company CyberSecurity Posture
oddityprodigy.comOddity Prodigy Productions began six years ago during a lunch break at a Chili’s restaurant. A few of us worked at the same office at the time and would often get lunch together. One particularly lousy day at work we got to talking about the idea of creative fulfillment, something you don’t generally find doing office work in the IT industry. All of us that were at lunch that day are creative people. We write, sing, dance, draw, and a find a dozen other different ways to express ourselves. Over the years we have all had different outlets for our energies, but always individually. The idea we arrived at on that dull work day in that dull chain restaurant was forming a group with a few other folks to help mutually support each other as we grew and developed as artists. I can’t swear by it, but I’m pretty sure we even decided on the name Oddity Prodigy Productions that afternoon.
Company Details
oddity-prodigy-productions-llc
5
14
511
oddityprodigy.com
0
ODD_2155034
In-progress
Between 750 and 799

OPPL Global Score (TPRM)XXXX



No incidents recorded for Oddity Prodigy Productions, LLC in 2025.
No incidents recorded for Oddity Prodigy Productions, LLC in 2025.
No incidents recorded for Oddity Prodigy Productions, LLC in 2025.
OPPL cyber incidents detection timeline including parent company and subsidiaries

Oddity Prodigy Productions began six years ago during a lunch break at a Chili’s restaurant. A few of us worked at the same office at the time and would often get lunch together. One particularly lousy day at work we got to talking about the idea of creative fulfillment, something you don’t generally find doing office work in the IT industry. All of us that were at lunch that day are creative people. We write, sing, dance, draw, and a find a dozen other different ways to express ourselves. Over the years we have all had different outlets for our energies, but always individually. The idea we arrived at on that dull work day in that dull chain restaurant was forming a group with a few other folks to help mutually support each other as we grew and developed as artists. I can’t swear by it, but I’m pretty sure we even decided on the name Oddity Prodigy Productions that afternoon.


Stable Media, is a division of Stable Publishing Ltd, an independent publisher of market leading business to business magazines. Launched in 1990 by Managing Director Toby Filby, the company has now grown to a multiplatform media provider involved in the built environment across leisure, educatio

The YGS Group of companies is made up of expert teams bringing together deep experience and knowledge in the industries and companies it serves, including, Association Solutions, Publisher Solutions, Print Solutions, Caskey, and now GAVIN™, all focused on being leaders in cutting-edge, custom soluti

LIVING - criar ♦ morar ♦ viver A Revista Living chega ao mercado editorial com a proposta de ser uma publicação contemporânea com conteúdo dinâmico e personalizado. Focada em três grandes universos: arquitetura, moda e bem-estar, a revista propõe um olhar diferente sobre o design do cotidian
National Braille Press (NBP) is a Boston-based non-profit printer and publisher of braille materials and tactile graphics that supports literacy for blind children and adults. NBP provides accessible materials for blind and low vision students, consumers, and adults in the workplace. Our services

Pharmanews Limited was established in 1979 as publishers of health periodicals with Pharmanews as the leading journal. From 1993, the training arm of the company commenced and has since become reputable trainers of health personnel and institutions nationwide. We also engage in consultancy and book

With more than 35 years of experience, Oakstone is one of the foremost providers of unbiased multimedia continuing medical education and certification solutions for physicians, dentists and allied healthcare professionals, in addition to wellness content for corporations interested in healthy lifest
.png)
GOLF MANOR, Ohio (WKRC) - The Village of Golf Manor is dealing with ransomware from a cybersecurity breach. At the Nov.
In recent years, cyber-attacks have largely centered on state-sponsored hacking groups and independent cyber-criminals breaching private companies,...
By Apoorva Chhabra. CIOs often struggle to convey the true value of cybersecurity to their organizations and secure buy-in from C-suite...
"API is a huge threat landscape at this point. There's no avoiding it with the connected vehicle," said Joshua Poster,...
Press release - Getnews - Fortem Cybersecurity, the New Global Cybersecurity Brand from Maguen Group, Officially Launches - published on...
Before machines take the lead, Mexican companies must get their processes, their data, and their cybersecurity in order, writes Carolina...
Malaysian businesses embrace AI, but lag in cybersecurity. Latest Articles. Sri Lanka deploys troops as floodwaters rise, death toll hits 56.
Manufacturers looking to enter the European Union market must understand and are required to implement Cyber Resilience Act requirements.
During this month's earnings call with investors, Palo Alto Networks CEO Nikesh Arora made the bold claim that businesses will soon begin...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Oddity Prodigy Productions, LLC is https://www.oddityprodigy.com/.
According to Rankiteo, Oddity Prodigy Productions, LLC’s AI-generated cybersecurity score is 758, reflecting their Fair security posture.
According to Rankiteo, Oddity Prodigy Productions, LLC currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Oddity Prodigy Productions, LLC is not certified under SOC 2 Type 1.
According to Rankiteo, Oddity Prodigy Productions, LLC does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Oddity Prodigy Productions, LLC is not listed as GDPR compliant.
According to Rankiteo, Oddity Prodigy Productions, LLC does not currently maintain PCI DSS compliance.
According to Rankiteo, Oddity Prodigy Productions, LLC is not compliant with HIPAA regulations.
According to Rankiteo,Oddity Prodigy Productions, LLC is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Oddity Prodigy Productions, LLC operates primarily in the Book and Periodical Publishing industry.
Oddity Prodigy Productions, LLC employs approximately 5 people worldwide.
Oddity Prodigy Productions, LLC presently has no subsidiaries across any sectors.
Oddity Prodigy Productions, LLC’s official LinkedIn profile has approximately 14 followers.
Oddity Prodigy Productions, LLC is classified under the NAICS code 511, which corresponds to Publishing Industries (except Internet).
No, Oddity Prodigy Productions, LLC does not have a profile on Crunchbase.
Yes, Oddity Prodigy Productions, LLC maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/oddity-prodigy-productions-llc.
As of November 28, 2025, Rankiteo reports that Oddity Prodigy Productions, LLC has not experienced any cybersecurity incidents.
Oddity Prodigy Productions, LLC has an estimated 4,881 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Oddity Prodigy Productions, LLC has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.