Company Details
preprints
None employees
3,278
511
preprints.org
0
PRE_2080901
In-progress

Preprints.org Company CyberSecurity Posture
preprints.orgPreprints.org is a multidiscipline platform providing preprint service that is dedicated to making early versions of research outputs permanently available and citable. We post original research articles and comprehensive reviews, and papers can be updated by authors as long as the updated content has not been published online. Content on Preprints is not peer-reviewed and can receive feedback from readers. For any inquiries related to Preprints, please contact [email protected]
Company Details
preprints
None employees
3,278
511
preprints.org
0
PRE_2080901
In-progress
Between 750 and 799

Preprints.org Global Score (TPRM)XXXX



No incidents recorded for Preprints.org in 2025.
No incidents recorded for Preprints.org in 2025.
No incidents recorded for Preprints.org in 2025.
Preprints.org cyber incidents detection timeline including parent company and subsidiaries

Preprints.org is a multidiscipline platform providing preprint service that is dedicated to making early versions of research outputs permanently available and citable. We post original research articles and comprehensive reviews, and papers can be updated by authors as long as the updated content has not been published online. Content on Preprints is not peer-reviewed and can receive feedback from readers. For any inquiries related to Preprints, please contact [email protected]


At Mentoring Minds, we pride ourselves on being the authority on critical thinking. Not just by helping educators understand it, but by empowering them to teach it. With decades of experience as practitioners and former teachers, principals and administrators, our staff creates every product with ed
You know that feeling you get when a good true-life tale grabs you right from the start? You can’t stop turning the page — because you realize incredible things happen to real people — and it's hard to believe that what you’re reading is non-fiction. That is the kind of story we like to tell. Epi

Whitmar Publications is a leading specialist publisher in the commercial and packaging printing markets. Through its magazines, websites and popular events, the company is renowned for its high quality and industry focused content. It now boasts three of the leading trade titles within the industr

Founded in 1987, Legalease is a leader in the provision of legal market information. As a quality-driven publisher, we offer authoritative and in-depth analysis and commentary across a broad portfolio of publications, spanning directories, magazines, journals, textbooks and online. We aim to be at t

As an independent card publishing house, we are able to bring you an exclusive range of original greeting cards and related products at sane prices. Our enthusiastic team of Phoenix Traders and prodigiously talented artists deliver a first class service, and a high quality, innovative product, a

Art Practical, founded in 2009, is a visual arts publishing organization based in San Francisco that is people-forward and equitable. We publish with passion, rigor, and integrity through initiatives that include online arts discourse, podcasts, books, educational programs, and public events. As a p
.png)
A Danish biologist was shocked to find that his name was referenced several times in a scientific paper about millipedes — referring to papers...
Most preprint servers permit researchers to upload draft versions of a work before submitting it to a more conventional peer-reviewed...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Preprints.org is https://www.preprints.org/.
According to Rankiteo, Preprints.org’s AI-generated cybersecurity score is 754, reflecting their Fair security posture.
According to Rankiteo, Preprints.org currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Preprints.org is not certified under SOC 2 Type 1.
According to Rankiteo, Preprints.org does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Preprints.org is not listed as GDPR compliant.
According to Rankiteo, Preprints.org does not currently maintain PCI DSS compliance.
According to Rankiteo, Preprints.org is not compliant with HIPAA regulations.
According to Rankiteo,Preprints.org is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Preprints.org operates primarily in the Book and Periodical Publishing industry.
Preprints.org employs approximately None employees people worldwide.
Preprints.org presently has no subsidiaries across any sectors.
Preprints.org’s official LinkedIn profile has approximately 3,278 followers.
Preprints.org is classified under the NAICS code 511, which corresponds to Publishing Industries (except Internet).
No, Preprints.org does not have a profile on Crunchbase.
Yes, Preprints.org maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/preprints.
As of November 28, 2025, Rankiteo reports that Preprints.org has not experienced any cybersecurity incidents.
Preprints.org has an estimated 4,880 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Preprints.org has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.