Company Details
photoboothsupplyco
57
5,874
54192
photoboothsupplyco.com
0
PHO_9305855
In-progress


Photobooth Supply Co Vendor Cyber Rating & Cyber Score
photoboothsupplyco.comPhotobooth Supply Co. is reinventing the idea of photobooths with open spaces, marketing tools, and elegant aesthetics that allow you to thrive. You might be a business looking to expand your marketing through data collection and social outreach. You might be an individual looking for a chance to establish a brand and chase the American dream of entrepreneurship. Photobooth Supply Co. can help you do it all with hardware and solutions The iconic Salsa photobooth brings a suite of tools for existing businesses. If you’re looking to expand your marketing efforts, you’ll be able to deploy a booth at a trade show and gather the email addresses of hundreds of smiling guests. Rather than being stuck with a business email or attempting to cold email a list, you can deliver a personalized message into the inbox of every passerby. If you’ve got a retail location, you can design a permanently installed booth with easy followup emails that suggest a visit to clients, survey capture, real-time brand engagement and more. Salsa provides brand engagement and social content at the highest level. Salsa is a perfect fit for someone beginning their journey of business ownership. Unlike a franchise, you don’t owe Photobooth Supply Co. any of your profits or success. This means that when you’re advertising any of the Salsa exclusive features instant uploads to an online live gallery, you’re keeping the money that each booking generates.
Company Details
photoboothsupplyco
57
5,874
54192
photoboothsupplyco.com
0
PHO_9305855
In-progress
Between 650 and 699

PSC Global Score (TPRM)XXXX

Description: Photo Booth Vendor’s Security Flaw Exposed Thousands of Private Images and Videos A security researcher, known as Zeacer, uncovered a critical vulnerability in a photo booth vendor’s website that left thousands of images and videos including intimate moments and drunken party snapshots publicly accessible without authentication. The flaw stemmed from insecure direct object references, where media files were served via predictable URLs, allowing attackers to enumerate and download entire galleries using simple scripts. The company had recently reduced file retention from two to three weeks to just 24 hours, limiting the volume of exposed content at any given time. However, this change did not prevent attackers from scraping daily uploads. At one point, over 1,000 images from a Melbourne-based photo booth service were visible, highlighting the scale of the risk. The incident underscores the dangers of broken access control, ranked by OWASP as the top web application security risk. Event photo booths often capture highly personal moments weddings, corporate events, and private gatherings where sensitive details like home addresses, children’s faces, or organizational affiliations may be inadvertently exposed. Even with short retention periods, scraped data remains permanently accessible to attackers. The financial and reputational consequences of such breaches can be severe. IBM’s *Cost of a Data Breach Report* estimates global breach costs in the multi-millions, while consumer-facing brands built on "shareable moments" face lasting reputational harm. The flaw likely resulted from common shortcuts in event-tech development, such as public object storage, client-side-only checks, and predictable URL patterns issues that could have been mitigated with server-side protections like signed URLs, randomized IDs, and rate limiting. Regulatory risks also loom large. Under Australia’s privacy laws, businesses must proactively secure data and disclose breaches, while GDPR in the EU and UK imposes fines of up to 4% of global turnover for serious violations. The vendor’s role as either a data processor or controller determines specific compliance obligations, but minimizing retention and enforcing strict access controls are baseline requirements. Customers who used affected photo booths in the past month should assume potential exposure and request gallery deletions from vendors. Event organizers are advised to demand transparency from suppliers, including details on file retention, link security, and third-party audits like SOC 2 or ISO 27001. Contracts should explicitly address data processing terms and breach notification responsibilities. The incident reflects a broader trend in event tech, where rapid growth often outpaces security hardening. As web app vulnerabilities remain a leading cause of data breaches, basic safeguards such as private-by-default storage and continuous logging can prevent such exposures without requiring complex solutions. While the vendor’s retention reduction limits immediate risk, it does not replace proper authentication and authorization, leaving galleries vulnerable to persistent scraping.


No incidents recorded for Photobooth Supply Co in 2026.
No incidents recorded for Photobooth Supply Co in 2026.
No incidents recorded for Photobooth Supply Co in 2026.
PSC cyber incidents detection timeline including parent company and subsidiaries

Photobooth Supply Co. is reinventing the idea of photobooths with open spaces, marketing tools, and elegant aesthetics that allow you to thrive. You might be a business looking to expand your marketing through data collection and social outreach. You might be an individual looking for a chance to establish a brand and chase the American dream of entrepreneurship. Photobooth Supply Co. can help you do it all with hardware and solutions The iconic Salsa photobooth brings a suite of tools for existing businesses. If you’re looking to expand your marketing efforts, you’ll be able to deploy a booth at a trade show and gather the email addresses of hundreds of smiling guests. Rather than being stuck with a business email or attempting to cold email a list, you can deliver a personalized message into the inbox of every passerby. If you’ve got a retail location, you can design a permanently installed booth with easy followup emails that suggest a visit to clients, survey capture, real-time brand engagement and more. Salsa provides brand engagement and social content at the highest level. Salsa is a perfect fit for someone beginning their journey of business ownership. Unlike a franchise, you don’t owe Photobooth Supply Co. any of your profits or success. This means that when you’re advertising any of the Salsa exclusive features instant uploads to an online live gallery, you’re keeping the money that each booking generates.


XRay Doll is a production company with a difference. We do everything from concept to execution. What we don’t do is play it safe. Your audience is saturated with safe. With over 23 years’ experience in the advertising and fashion worlds, we know how to create concepts and imagery will make y

We're Manchester's award winning Google Trusted Photographer, bringing the StreetView experience inside your business premises, allowing you to stand out amongst your competitors though search prominence, showcasing via Google+ and the ability to explore within Maps. We offer the most cost-effect

Camera Press is one of Britain's top independent picture agencies. Founded in 1947 we represent high profile photographers and agencies worldwide. We are known for our premium celebrity portraits and unparalleled Royal collections, but we also offer news, travel and features, as well as an impressiv

Photographers Direct is a photographic portal to help picture buyers and researchers find suitable stock photos for any media. With more than 2 million images and more than 5,000 photographers worldwide, Photographers Direct can help you find any image, or any photographer for assignment work, anywh

Picturesque is een agency opgericht met twee grote doelen voor ogen: Een bruisende groep jonge artists samenbrengen en deze talenten volop boosten in commerciële en artistieke projecten. Onze artists omvatten momenteel fotografen en illustratoren, maar we kijken al uit naar het verbreden van onze ho

Founded by Jack Glasser in 2005 with the taking of one senior graduation portrait, Glasser Images has grown and continues to grow into the future. This is driven by Jack’s passion for photography and entrepreneurship as well as his vision for the company. The goal of Glasser Images is to provide

Leonard's is a family-owned company located in Saint Augustine. A family of photographers since 1900, we have been photographing Elementary, Middle, and High Schools for 75 years. In addition to School Photography - we provide photographic services to several military bases in the United States. We

GREEN LENS STUDIOS is a photographic studio, project space, art gallery full of atmosphere and character. Located in North London, we are the first sustainable photographic studio in the UK. We recognise that as a business we cannot be 100% eco-friendly, however, we can (and do) seek to minimise

I have been infatuated with creating photographic images for over ten years. I fell in love with photography when I took my first photograph at the age of fifteen. I soon realized that this was the beginning of an obsession. My Personal Style: I am fascinated in the way that use of light helps
.png)
Harvard is monitoring an ongoing cybersecurity threat involving individuals impersonating University information technology staff to gain...
Intrigue IT Solutions, a Dallas-based technology services provider, has announced the expansion of its comprehensive IT, web, cloud,...
AI cybersecurity keynote speaker, IT defense and artificial intelligence thought leader, celebrity influencer and consulting expert Scott...
Recently approved legislation in West Virginia grants the state's chief information security officer greater authority to implement...
The fall of health tech company Theranos exposed how hype can outpace reality. In cybersecurity, similar pressures are emerging as vendors...
The national Small Business Development Center is taking a program that was started in Delaware and offering it through its full 1200-center...
City leaders ultimately rejected a National Guard cybersecurity partnership as concerns mounted over data access and federal involvement.
AI attack trends reshape cybersecurity as RSAC highlights autonomous threats, agentic defense and quantum risks as enterprises build new...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Photobooth Supply Co is http://www.photoboothsupplyco.com.
According to Rankiteo, Photobooth Supply Co’s AI-generated cybersecurity score is 678, reflecting their Weak security posture.
According to Rankiteo, Photobooth Supply Co currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Photobooth Supply Co has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Photobooth Supply Co is not certified under SOC 2 Type 1.
According to Rankiteo, Photobooth Supply Co does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Photobooth Supply Co is not listed as GDPR compliant.
According to Rankiteo, Photobooth Supply Co does not currently maintain PCI DSS compliance.
According to Rankiteo, Photobooth Supply Co is not compliant with HIPAA regulations.
According to Rankiteo,Photobooth Supply Co is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Photobooth Supply Co operates primarily in the Photography industry.
Photobooth Supply Co employs approximately 57 people worldwide.
Photobooth Supply Co presently has no subsidiaries across any sectors.
Photobooth Supply Co’s official LinkedIn profile has approximately 5,874 followers.
Photobooth Supply Co is classified under the NAICS code 54192, which corresponds to Photographic Services.
No, Photobooth Supply Co does not have a profile on Crunchbase.
Yes, Photobooth Supply Co maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/photoboothsupplyco.
As of April 04, 2026, Rankiteo reports that Photobooth Supply Co has experienced 1 cybersecurity incidents.
Photobooth Supply Co has an estimated 2,457 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with reduced file retention period from 2-3 weeks to ~24 hours..
Title: Photo Booth Maker's Website Exposes Thousands of Images and Videos Due to Insecure Access Control
Description: A photo booth maker’s website with insecure media storage left thousands of images and videos accessible to the internet, including snaps of drunken revellers and intimate moments. The security lapse allowed unauthorized downloads of entire galleries without authentication due to predictable URLs and broken access control.
Type: Data Exposure
Attack Vector: Insecure Direct Object Reference (IDOR)
Vulnerability Exploited: Broken Access Control (OWASP Top 10)
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Thousands of images and videos, including personal and sensitive moments
Systems Affected: Photo booth website media storage and serving endpoint
Brand Reputation Impact: Significant reputational damage, especially for a consumer-facing brand predicated on 'shareable moments'
Legal Liabilities: Potential regulatory fines under GDPR, Australian Privacy Act, and other privacy laws
Identity Theft Risk: Exposure of personally identifiable information (e.g., home addresses, affiliations)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Images, Videos and .

Entity Type: Photo Booth Vendor
Industry: Event Technology
Customers Affected: Thousands of individuals, including event attendees (e.g., weddings, office parties, product launches)

Containment Measures: Reduced file retention period from 2-3 weeks to ~24 hours

Type of Data Compromised: Images, Videos
Number of Records Exposed: Over 1,000 images at one stage (prior to retention change)
Sensitivity of Data: High (personal moments, identifiable individuals, potential PII)
Data Exfiltration: Possible via scraping scripts
File Types Exposed: ImagesVideos
Personally Identifiable Information: Yes (e.g., home addresses, affiliations, children)
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by reduced file retention period from 2-3 weeks to ~24 hours.

Regulations Violated: GDPR, Australian Privacy Act, Potential other regional privacy laws,

Lessons Learned: Broken access control and insecure direct object references are critical vulnerabilities that can lead to large-scale data exposure. Security measures like private-by-default storage, time-limited links, randomized IDs, and server-side permission gates are essential to prevent such incidents.

Recommendations: Implement private-by-default storage for media files., Use time-limited and audience-restricted links with signed URLs or rotating tokens., Adopt randomized, unguessable IDs for media files., Enforce rate limiting to prevent unusual download bursts., Conduct regular penetration testing and security reviews., Minimize data retention periods., Ensure compliance with privacy regulations (e.g., GDPR, Australian Privacy Act)., Educate customers and event hosts on secure usage practices.Implement private-by-default storage for media files., Use time-limited and audience-restricted links with signed URLs or rotating tokens., Adopt randomized, unguessable IDs for media files., Enforce rate limiting to prevent unusual download bursts., Conduct regular penetration testing and security reviews., Minimize data retention periods., Ensure compliance with privacy regulations (e.g., GDPR, Australian Privacy Act)., Educate customers and event hosts on secure usage practices.Implement private-by-default storage for media files., Use time-limited and audience-restricted links with signed URLs or rotating tokens., Adopt randomized, unguessable IDs for media files., Enforce rate limiting to prevent unusual download bursts., Conduct regular penetration testing and security reviews., Minimize data retention periods., Ensure compliance with privacy regulations (e.g., GDPR, Australian Privacy Act)., Educate customers and event hosts on secure usage practices.Implement private-by-default storage for media files., Use time-limited and audience-restricted links with signed URLs or rotating tokens., Adopt randomized, unguessable IDs for media files., Enforce rate limiting to prevent unusual download bursts., Conduct regular penetration testing and security reviews., Minimize data retention periods., Ensure compliance with privacy regulations (e.g., GDPR, Australian Privacy Act)., Educate customers and event hosts on secure usage practices.Implement private-by-default storage for media files., Use time-limited and audience-restricted links with signed URLs or rotating tokens., Adopt randomized, unguessable IDs for media files., Enforce rate limiting to prevent unusual download bursts., Conduct regular penetration testing and security reviews., Minimize data retention periods., Ensure compliance with privacy regulations (e.g., GDPR, Australian Privacy Act)., Educate customers and event hosts on secure usage practices.Implement private-by-default storage for media files., Use time-limited and audience-restricted links with signed URLs or rotating tokens., Adopt randomized, unguessable IDs for media files., Enforce rate limiting to prevent unusual download bursts., Conduct regular penetration testing and security reviews., Minimize data retention periods., Ensure compliance with privacy regulations (e.g., GDPR, Australian Privacy Act)., Educate customers and event hosts on secure usage practices.Implement private-by-default storage for media files., Use time-limited and audience-restricted links with signed URLs or rotating tokens., Adopt randomized, unguessable IDs for media files., Enforce rate limiting to prevent unusual download bursts., Conduct regular penetration testing and security reviews., Minimize data retention periods., Ensure compliance with privacy regulations (e.g., GDPR, Australian Privacy Act)., Educate customers and event hosts on secure usage practices.Implement private-by-default storage for media files., Use time-limited and audience-restricted links with signed URLs or rotating tokens., Adopt randomized, unguessable IDs for media files., Enforce rate limiting to prevent unusual download bursts., Conduct regular penetration testing and security reviews., Minimize data retention periods., Ensure compliance with privacy regulations (e.g., GDPR, Australian Privacy Act)., Educate customers and event hosts on secure usage practices.
Key Lessons Learned: The key lessons learned from past incidents are Broken access control and insecure direct object references are critical vulnerabilities that can lead to large-scale data exposure. Security measures like private-by-default storage, time-limited links, randomized IDs, and server-side permission gates are essential to prevent such incidents.

Source: Researcher Zeacer
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Researcher Zeacer.

Customer Advisories: Set galleries to private if possible.Turn off public sharing options.Request permanent deletion of galleries through vendor support.Avoid uploading sensitive information (e.g., IDs, addresses) to event galleries.
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Set Galleries To Private If Possible., Turn Off Public Sharing Options., Request Permanent Deletion Of Galleries Through Vendor Support., Avoid Uploading Sensitive Information (E.G., Ids, Addresses) To Event Galleries. and .

Root Causes: Predictable Media Urls Enabling Enumeration., Lack Of Server-Side Authentication And Authorization., Insecure Direct Object Reference (Idor) Vulnerability., Over-Reliance On Client-Side Checks For Access Control.,
Corrective Actions: Implement Server-Side Permission Gates (E.G., Signed Urls, Rotating Tokens)., Adopt Randomized, Unguessable Ids For Media Files., Enforce Private-By-Default Storage., Conduct Security Pre-Production Reviews And Regular Penetration Testing.,
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Implement Server-Side Permission Gates (E.G., Signed Urls, Rotating Tokens)., Adopt Randomized, Unguessable Ids For Media Files., Enforce Private-By-Default Storage., Conduct Security Pre-Production Reviews And Regular Penetration Testing., .
Most Significant Data Compromised: The most significant data compromised in an incident were Thousands of images and videos and including personal and sensitive moments.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Reduced file retention period from 2-3 weeks to ~24 hours.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Thousands of images and videos and including personal and sensitive moments.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 1.0K.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Broken access control and insecure direct object references are critical vulnerabilities that can lead to large-scale data exposure. Security measures like private-by-default storage, time-limited links, randomized IDs, and server-side permission gates are essential to prevent such incidents.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Educate customers and event hosts on secure usage practices., Implement private-by-default storage for media files., Minimize data retention periods., Adopt randomized, unguessable IDs for media files., Ensure compliance with privacy regulations (e.g., GDPR, Australian Privacy Act)., Conduct regular penetration testing and security reviews., Enforce rate limiting to prevent unusual download bursts. and Use time-limited and audience-restricted links with signed URLs or rotating tokens..
Most Recent Source: The most recent source of information about an incident is Researcher Zeacer.
Most Recent Customer Advisory: The most recent customer advisory issued were an Set galleries to private if possible.Turn off public sharing options.Request permanent deletion of galleries through vendor support.Avoid uploading sensitive information (e.g., IDs and addresses) to event galleries.
.png)
Hirschmann EagleSDV version 05.4.01 prior to 05.4.02 contains a denial-of-service vulnerability that causes the device to crash during session establishment when using TLS 1.0 or TLS 1.1. Attackers can trigger a crash by initiating TLS connections with these protocol versions to disrupt service availability.
The stored API keys in temporary browser client is not marked as protected allowing for JavScript console or other errors to allow for extraction of the encryption credentials.
XSS vulnerability in cveInterface.js allows for inject HTML to be passed to display, as cveInterface trusts input from CVE API services
Multiple reflected cross-site scripting (XSS) vulnerabilities in the login.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda and red_url parameters.
A reflected cross-site scripting (XSS) vulnerability in the login_newpwd.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda parameter.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.