Company Details
peak-season
14
143
337
peakseasoninc.net
0
PEA_1778639
In-progress

Peak Season, Inc. Company CyberSecurity Posture
peakseasoninc.netPeak Season strives to define and lead the market with growth into the future in the area of fine outdoor casual furnishings and items for the entire outdoor living marketplace. Designing with only the finest raw materials and using a quality-focused factory to provide you years of enjoyment, Peak Season collections are crafted with the intention of allowing you to make your outdoor living space your own backyard oasis. Long gone are the days when your outdoor furniture choices were limited to standard run of the mill “inexpensive” product. Peak Season gives you a focused variety of design and lifestyle options – comfortable “indoor” like deep-seating groups, outdoor fire pit conversation groups, and outdoor gathering sets to complement any décor. “In looks that redefine traditional and expected; to more clean transitional and elegantly styled collections; Peak Season has a look that will meet your needs and exceed your expectations.” All-weather wicker, hand-painted or powder-coated aluminum, genuine stone tops, and the exotic combination or mixing of these quality long-lasting materials, allow for design freedom to create collections that give you both an unequaled look the durability and beauty that lasts for year after year.
Company Details
peak-season
14
143
337
peakseasoninc.net
0
PEA_1778639
In-progress
Between 750 and 799

PSI Global Score (TPRM)XXXX



No incidents recorded for Peak Season, Inc. in 2025.
No incidents recorded for Peak Season, Inc. in 2025.
No incidents recorded for Peak Season, Inc. in 2025.
PSI cyber incidents detection timeline including parent company and subsidiaries

Peak Season strives to define and lead the market with growth into the future in the area of fine outdoor casual furnishings and items for the entire outdoor living marketplace. Designing with only the finest raw materials and using a quality-focused factory to provide you years of enjoyment, Peak Season collections are crafted with the intention of allowing you to make your outdoor living space your own backyard oasis. Long gone are the days when your outdoor furniture choices were limited to standard run of the mill “inexpensive” product. Peak Season gives you a focused variety of design and lifestyle options – comfortable “indoor” like deep-seating groups, outdoor fire pit conversation groups, and outdoor gathering sets to complement any décor. “In looks that redefine traditional and expected; to more clean transitional and elegantly styled collections; Peak Season has a look that will meet your needs and exceed your expectations.” All-weather wicker, hand-painted or powder-coated aluminum, genuine stone tops, and the exotic combination or mixing of these quality long-lasting materials, allow for design freedom to create collections that give you both an unequaled look the durability and beauty that lasts for year after year.

Established in 2012, we’re on a mission to make homes remarkable through distinctive design, beautiful craft and fair prices. Swoon is an advocate for people who believe that home is a sanctuary and has the power to physically affect our health and happiness. Our customers are stylish and savvy pro

Founded in 2002, Wholesale Interiors is a furniture company that owns the brand of Baxton Studio. Primarily serves as an e-commerce wholesaler with national distribution services, Wholesale Interiors aims to develop and provide stylish yet affordable furniture. We operate from two distribution facil

Huston and Company designs and builds fine furniture for residential, academic, and institutional customers. Working with clients through out the US, the emphasis is on custom designs that fit the unique and individual needs of each customer. The furniture is built with traditional joinery, to last

EGYPTIAN STATIONERS AND EGYPTIAN BUSINESS FURNITURE ARE NOW EGYPTIAN WORKSPACE PARTNERS. Retaining the same ownership and team, we are a turn-key solution for workspace environments supplying all interior needs from the design and installation of furniture, modular walls, integrated technology, c

Founded in 1994, The Golden Lion is a complete source to the trade for the finest residential and furniture hardware Europe has to offer. Our lines reflect centuries of experience and a desire to create environments that are appreciated deeply every day. Details make all the difference. Materials

Plan b Southwest LLC is an independent manufacturers rep group focusing on products and solutions that transform our customer workplace experience. We are deliberate and focused on working with manufacturers that are equally committed to the overall experience with products that continue to be at th
.png)
The holiday season marks an especially busy time of year for many companies, but experts warn that scammers and other cyber criminals are...
In 2023, 725 data breaches were reported to OCR and across those breaches, more than 133 million records were exposed or impermissibly disclosed.
Innovative Inc. hosts a free cybersecurity event Oct. 14 at The Maryland Theatre, featuring expert talks and networking.
ML-based AI use cases now span planning, sourcing, manufacturing, logistics, and inventory management.
Cybersecurity spending has soared since the COVID-19 pandemic. Organizations have faced new security challenges as cloud computing and...
Join cyber experts for the Cybersecurity Summit that will address the latest industry issues and changes related to FDA requirements.
Best Cyber Security Companies : 1. Checkpoint 2. Akamai 3. Palo Alto Networks 4. Kaspersky 5. Trellix 6. Perimeter 81 7. CrowdStrike.
Discover how KnowBe4 enhances AI-driven cybersecurity with Just-in-Time training to reduce human risk and improve real-time threat response.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Peak Season, Inc. is http://peakseasoninc.net.
According to Rankiteo, Peak Season, Inc.’s AI-generated cybersecurity score is 755, reflecting their Fair security posture.
According to Rankiteo, Peak Season, Inc. currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Peak Season, Inc. is not certified under SOC 2 Type 1.
According to Rankiteo, Peak Season, Inc. does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Peak Season, Inc. is not listed as GDPR compliant.
According to Rankiteo, Peak Season, Inc. does not currently maintain PCI DSS compliance.
According to Rankiteo, Peak Season, Inc. is not compliant with HIPAA regulations.
According to Rankiteo,Peak Season, Inc. is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Peak Season, Inc. operates primarily in the Furniture and Home Furnishings Manufacturing industry.
Peak Season, Inc. employs approximately 14 people worldwide.
Peak Season, Inc. presently has no subsidiaries across any sectors.
Peak Season, Inc.’s official LinkedIn profile has approximately 143 followers.
Peak Season, Inc. is classified under the NAICS code 337, which corresponds to Furniture and Related Product Manufacturing.
No, Peak Season, Inc. does not have a profile on Crunchbase.
Yes, Peak Season, Inc. maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/peak-season.
As of November 28, 2025, Rankiteo reports that Peak Season, Inc. has not experienced any cybersecurity incidents.
Peak Season, Inc. has an estimated 2,617 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Peak Season, Inc. has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.