ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Sleep Train was founded in 1985 and is ranked the #1 mattress retailer on the West Coast. Sleep Train has nearly locations that span the West Coast and more than 1,500 employees. Sleep Train offers its employees one of the most robust training programs in the industry, comprehensive benefits, performance incentives, and an emphasis on corporate philanthropy with paid time off for volunteering. Sleep Train is known for offering customers the best selection of high-quality mattress brands, superior customer service, and the lowest prices backed by the Sleep Train price guarantee. Sleep Train has been recognized with several regional awards including being named: **“Best Beds & Mattresses” in the Bay Area A-List **“Best Mattress Store” in the Sacramento-based KCRA A-List

Sleep Train A.I CyberSecurity Scoring

Sleep Train

Company Details

Linkedin ID:

sleep-train

Employees number:

245

Number of followers:

1,828

NAICS:

337

Industry Type:

Furniture and Home Furnishings Manufacturing

Homepage:

sleeptrain.com

IP Addresses:

0

Company ID:

SLE_2068746

Scan Status:

In-progress

AI scoreSleep Train Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/sleep-train.jpeg
Sleep Train Furniture and Home Furnishings Manufacturing
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreSleep Train Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/sleep-train.jpeg
Sleep Train Furniture and Home Furnishings Manufacturing
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Sleep Train Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

Sleep Train Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Sleep Train

Incidents vs Furniture and Home Furnishings Manufacturing Industry Average (This Year)

No incidents recorded for Sleep Train in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Sleep Train in 2025.

Incident Types Sleep Train vs Furniture and Home Furnishings Manufacturing Industry Avg (This Year)

No incidents recorded for Sleep Train in 2025.

Incident History — Sleep Train (X = Date, Y = Severity)

Sleep Train cyber incidents detection timeline including parent company and subsidiaries

Sleep Train Company Subsidiaries

SubsidiaryImage

Sleep Train was founded in 1985 and is ranked the #1 mattress retailer on the West Coast. Sleep Train has nearly locations that span the West Coast and more than 1,500 employees. Sleep Train offers its employees one of the most robust training programs in the industry, comprehensive benefits, performance incentives, and an emphasis on corporate philanthropy with paid time off for volunteering. Sleep Train is known for offering customers the best selection of high-quality mattress brands, superior customer service, and the lowest prices backed by the Sleep Train price guarantee. Sleep Train has been recognized with several regional awards including being named: **“Best Beds & Mattresses” in the Bay Area A-List **“Best Mattress Store” in the Sacramento-based KCRA A-List

Loading...
similarCompanies

Sleep Train Similar Companies

Caracole Home

Welcome to a new experience in high style, high-value furnishings! Caracole is a portfolio of unique items that work in harmony to furnish your entire house. With every day that passes, home seems to mean more and more. As we refine our views of what home is and what we want and need from our surr

Sunbell

Innovazione, design, qualità. Sono questi i pilastri valoriali sui quali il mondo Sunbell, da oltre quarant'anni, fonda solidamente la propria attività sviluppando soluzioni all’avanguardia, rigorosamente made in Italy, per la gestione della luce in ogni ambiente. Gli esclusivi sistemi di tende tec

Michi Designs

Michi has been building fashionable lighting and accent furniture for interiors for over 20 years. Our complete catalog features a variety of lighting and table styles with a broad array of finishes. In addition to our standard product line, we also specialize in custom manufacturing to your speci

L. & J.G. Stickley

With more than 125 years as a leading manufacturer and retailer of luxury hardwood furniture and fine upholstery, L. & J.G. Stickley is the original source for Mission furniture (American Arts and Crafts) and for popular, award-winning modern collections. We operate three manufacturing facilities, a

Ballingslöv AB

Ballingslöv AB är en av landets ledande tillverkare av inredningar för kök, badrum och förvaring. Företaget med knappt 360 anställda är beläget i Ballingslöv, ca en mil norr om Hässleholm, i Skåne. Ballingslöv AB ingår i koncernen Ballingslöv International AB. I nästan nittio år har vi i fabrike

Gotcha Covered Knoxville

Gotcha Covered helps add beauty and value to homes and businesses by providing custom window treatments for virtually any style or budget. -------------------------------------------------------------- Whether you are looking for light or heat control, privacy, aesthetics, or all of the above, Gotc

newsone

Sleep Train CyberSecurity News

September 16, 2025 07:00 AM
Best Online Bachelor’s Degrees In Cybersecurity Of 2025

Find the best U.S. schools with online cybersecurity bachelor's degrees, and learn how to succeed in an online cybersecurity bachelor's...

September 12, 2025 07:00 AM
Cybersecurity Certifications For Beginners: Everything You Need To Know

Are you looking for cybersecurity certifications for beginners? Explore the three we've highlighted here and learn about how to get a job in...

July 23, 2025 07:00 AM
Check Out The 15 Best Cybersecurity Certifications

In this article, we highlight 15 of the top certifications for cybersecurity pros, including options for all career stages and several major industry...

July 17, 2025 07:00 AM
Cloud CISO Perspectives : Our Big Sleep agent makes a big leap, and other AI news

Google Threat Intelligence's Sandra Joyce details a remarkable achievement from our Big Sleep AI agent in this newsletter.

June 12, 2025 07:00 AM
This new night train is promising travel to 100 European cities for less than the price of a flight

Sleeper trains are enjoying a booming renaissance in Europe at the moment, but some travellers are still put off by the idea of sharing a...

April 02, 2025 07:00 AM
OpenAI CEO Sam Altman to users making Ghibli style images using ChatGPT: Let my team sleep please ...

Tech News News: OpenAI CEO Sam Altman asks users to moderate their use of ChatGPT's Ghibli-style photo generation feature due to team...

February 22, 2025 08:00 AM
Health Expert’s Tips Will Help You Sleep Better On A Night Train

If you're considering taking a night train this year, here are top sleep tips from health expert Jessica Sepel, founder of JSHealth...

September 16, 2024 07:00 AM
Nightsleeper Ending Explained: Who Was the Driver?

Warning: contains major finale spoilers for Nightsleeper. Did Abby (Alexandra Roach) make it to Marrakesh? Let's hope so.

September 14, 2024 07:00 AM
Nightsleeper: Could a cyber hack derail a train in real life?

Nick Leather's high-octane six-part series follows a runaway sleeper train full of passengers which has been hack-jacked in a cyber attack.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Sleep Train CyberSecurity History Information

Official Website of Sleep Train

The official website of Sleep Train is http://www.sleeptrain.com.

Sleep Train’s AI-Generated Cybersecurity Score

According to Rankiteo, Sleep Train’s AI-generated cybersecurity score is 756, reflecting their Fair security posture.

How many security badges does Sleep Train’ have ?

According to Rankiteo, Sleep Train currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Sleep Train have SOC 2 Type 1 certification ?

According to Rankiteo, Sleep Train is not certified under SOC 2 Type 1.

Does Sleep Train have SOC 2 Type 2 certification ?

According to Rankiteo, Sleep Train does not hold a SOC 2 Type 2 certification.

Does Sleep Train comply with GDPR ?

According to Rankiteo, Sleep Train is not listed as GDPR compliant.

Does Sleep Train have PCI DSS certification ?

According to Rankiteo, Sleep Train does not currently maintain PCI DSS compliance.

Does Sleep Train comply with HIPAA ?

According to Rankiteo, Sleep Train is not compliant with HIPAA regulations.

Does Sleep Train have ISO 27001 certification ?

According to Rankiteo,Sleep Train is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Sleep Train

Sleep Train operates primarily in the Furniture and Home Furnishings Manufacturing industry.

Number of Employees at Sleep Train

Sleep Train employs approximately 245 people worldwide.

Subsidiaries Owned by Sleep Train

Sleep Train presently has no subsidiaries across any sectors.

Sleep Train’s LinkedIn Followers

Sleep Train’s official LinkedIn profile has approximately 1,828 followers.

NAICS Classification of Sleep Train

Sleep Train is classified under the NAICS code 337, which corresponds to Furniture and Related Product Manufacturing.

Sleep Train’s Presence on Crunchbase

No, Sleep Train does not have a profile on Crunchbase.

Sleep Train’s Presence on LinkedIn

Yes, Sleep Train maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/sleep-train.

Cybersecurity Incidents Involving Sleep Train

As of November 28, 2025, Rankiteo reports that Sleep Train has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

Sleep Train has an estimated 2,617 peer or competitor companies worldwide.

Sleep Train CyberSecurity History Information

How many cyber incidents has Sleep Train faced ?

Total Incidents: According to Rankiteo, Sleep Train has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at Sleep Train ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.

Risk Information
cvss4
Base: 6.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=sleep-train' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge