Company Details
profile-books-ltd
75
2,868
511
profilebooks.com
0
PRO_2779722
In-progress

Profile Books Company CyberSecurity Posture
profilebooks.comProfile Books was founded in 1996 to publish stimulating non-fiction in a wide range of fields, including history and current affairs, business and economics, science and biography, with a sprinkling of humour. Our authors include Robert Greene, Ryan Holiday, Mary Beard, Shoshana Zuboff, Oliver Bullough and Kwame Anthony Appiah. We are the proud publishing partner of The Economist Books and the Wellcome Collection books. In January 2007 Profile acquired Serpent’s Tail, a company that publishes highly distinctive award-winning international fiction such as We Need to Talk About Kevin by Lionel Shriver, Sarah Perry's The Essex Serpent and Esi Edugyan's Washington Black as well as cutting-edge non fiction. In 2018, Profile took over Souvenir Press, which has a backlist of 500 active titles and is especially strong in psychology, personal development, health and wellness. The company has been Small Publisher of the Year on three occasions. It prides itself on its commitment to its books and its authors, its professionalism and business rigour, its open management style and its nimbleness in responding to market opportunities.
Company Details
profile-books-ltd
75
2,868
511
profilebooks.com
0
PRO_2779722
In-progress
Between 750 and 799

Profile Books Global Score (TPRM)XXXX



No incidents recorded for Profile Books in 2025.
No incidents recorded for Profile Books in 2025.
No incidents recorded for Profile Books in 2025.
Profile Books cyber incidents detection timeline including parent company and subsidiaries

Profile Books was founded in 1996 to publish stimulating non-fiction in a wide range of fields, including history and current affairs, business and economics, science and biography, with a sprinkling of humour. Our authors include Robert Greene, Ryan Holiday, Mary Beard, Shoshana Zuboff, Oliver Bullough and Kwame Anthony Appiah. We are the proud publishing partner of The Economist Books and the Wellcome Collection books. In January 2007 Profile acquired Serpent’s Tail, a company that publishes highly distinctive award-winning international fiction such as We Need to Talk About Kevin by Lionel Shriver, Sarah Perry's The Essex Serpent and Esi Edugyan's Washington Black as well as cutting-edge non fiction. In 2018, Profile took over Souvenir Press, which has a backlist of 500 active titles and is especially strong in psychology, personal development, health and wellness. The company has been Small Publisher of the Year on three occasions. It prides itself on its commitment to its books and its authors, its professionalism and business rigour, its open management style and its nimbleness in responding to market opportunities.


When women support women, big things happen. Austin Woman magazine is the leading magazine for women in Austin and the ONLY women-centric publication of its kind! With a mission of inspiring and supporting our community, Austin Woman and our digital platform, ATXWoman.com, is for the movers and shak

With over 37 years in the greeting card business we have built up a reputation for beautiful, high quality designs at a great price, with the whole buying experience supported by excellent customer service. Offering a dazzling array of over 1500 amazing cards to choose from there is sure to be somet

Jobson Healthcare Information (JHI) is a premier healthcare information and marketing services provider, with leading positions in a variety of growing healthcare markets such as pharmacy, eye care, clinician (physicians, nurse practitioners and physician assistants) and the managed markets (managed

For more than 50 years, GQ has been the premier men’s magazine, providing definitive coverage of style and culture. With its unique and powerful design, work from the finest photographers, and a stable of award-winning writers, GQ reaches millions of leading men each month. The only publication that

The UK's leading provider of music resources for primary schools and nurseries. The official LinkedIn page of Out of the Ark Music. After 25 years and over 300 songs Mark and Helen Johnson are still enthusiastic about writing and are keen to develop the potential that music has in the context
NEJM Group brings together the people and products that have made the New England Journal of Medicine, NEJM AI, NEJM Evidence, NEJM Catalyst, NEJM Journal Watch, and NEJM CareerCenter leaders in providing the medical knowledge health care professionals need to deliver the best patient care. The goal
.png)
It is tough to overestimate Big Tech's influence on the modern world, but how did we get here? The best tech books unravel the rise and,...
Are this year's major attacks the "cumulative effect of a kind of inaction on cyber security" from the government and big business?
Cybercriminals are taking greater risks by hitting high-profile targets to get bigger payoffs and boost their online reputational clout,...
These are our favorite cybersecurity books, both by fiction authors, as well as journalists and researchers.
Data breaches affecting millions of users are far too common. Here are some of the biggest, baddest breaches in recent memory.
They are the latest in a string of high-profile companies publicly reporting being hacked.
High-profile ransomware attacks dominated 2022's headlines. Patrick O'Connor explores 2023's biggest cyber attacks and lessons we can all...
Nikkei Data Breach: The Japanese publishing giant confirmed it suffered a data breach that put the personal information of over 17,000...
From the real story of a virus that took out Iran's urianium centrifuges to a surprisingly good Dan Brown novel, these are some of the best stories of our new...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Profile Books is http://www.profilebooks.com.
According to Rankiteo, Profile Books’s AI-generated cybersecurity score is 752, reflecting their Fair security posture.
According to Rankiteo, Profile Books currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Profile Books is not certified under SOC 2 Type 1.
According to Rankiteo, Profile Books does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Profile Books is not listed as GDPR compliant.
According to Rankiteo, Profile Books does not currently maintain PCI DSS compliance.
According to Rankiteo, Profile Books is not compliant with HIPAA regulations.
According to Rankiteo,Profile Books is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Profile Books operates primarily in the Book and Periodical Publishing industry.
Profile Books employs approximately 75 people worldwide.
Profile Books presently has no subsidiaries across any sectors.
Profile Books’s official LinkedIn profile has approximately 2,868 followers.
No, Profile Books does not have a profile on Crunchbase.
Yes, Profile Books maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/profile-books-ltd.
As of November 28, 2025, Rankiteo reports that Profile Books has not experienced any cybersecurity incidents.
Profile Books has an estimated 4,881 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Profile Books has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.