Company Details
smugmug
114
7,703
54192
smugmug.com
0
SMU_8476970
In-progress

SmugMug Company CyberSecurity Posture
smugmug.comWe're building a better world through the power of photography. And shaping the future of photography online by powering the business of photography. SmugMug, an Awesome company, is a leading global photography platform, helping passionate photographers protect, share, and sell their photos. We provide the essential tools that photographers need to grow their skillset, their following, and their profits. Join us and see where we go next: https://www.smugmug.com/careers. Follow us for product announcements and photography tips and tricks from expert photographers.
Company Details
smugmug
114
7,703
54192
smugmug.com
0
SMU_8476970
In-progress
Between 750 and 799

SmugMug Global Score (TPRM)XXXX



No incidents recorded for SmugMug in 2025.
No incidents recorded for SmugMug in 2025.
No incidents recorded for SmugMug in 2025.
SmugMug cyber incidents detection timeline including parent company and subsidiaries

We're building a better world through the power of photography. And shaping the future of photography online by powering the business of photography. SmugMug, an Awesome company, is a leading global photography platform, helping passionate photographers protect, share, and sell their photos. We provide the essential tools that photographers need to grow their skillset, their following, and their profits. Join us and see where we go next: https://www.smugmug.com/careers. Follow us for product announcements and photography tips and tricks from expert photographers.


CELEBRATE YOUR STORY We all have unique stories to tell: events that shaped us, special times that define who we are. Our memories give our life meaning – and yet they fade over time. Queensberry makes your special memories unforgettable by crafting them into beautiful books, albums, boxes and wal

Biz Jet Photos, Inc. was founded in 1999 under the premise that high quality, publication ready photography used for the marketing of private jets did not have to be prohibitively expensive. Our Cover Shot mentality drives the philosophy that every aircraft is photographed as if it were to be n

We are specialized in Commercial natural light photography, cultural landscape photography, construction and architectural photography, fine art photography and compelling images of around the house natural world. Next to a variety of still image solutions Fotomatiz offers workshops for amateur ph

DE is a Creative Production Studio that specializes in producing print and motion for advertising campaigns. We work with direct brands, ad agencies and photographers offering Retouching, CGI, Animation, Photography, Color Grading and VFX services. We creatively collaborate from concept to fina

Bold As Love Studios \\ Romantic & Vibrant Photography for the Genuinely Joyful and Courageously in Love I am a photographer for those who don't take themselves too seriously. It's not just my passion, but my life's work to be able to capture authentic & heartfelt memories for awesome couples in

AdoramaPix is a photography lab based in Brooklyn, New York offering the highest quality photo products to professionals, hobbyists, and consumers. We offer photo prints, metal prints, photo books, wood prints, canvas prints, framed prints, greeting cards, premium flush mount albums, fine art print
.png)
SmugMug is a platform fully focused on photography. It can help you make a website, sell online, and store images with features suitable for both complete...
EFF has been awarded a new $200000 grant from Craig Newmark Philanthropies to strengthen our cybersecurity work in 2024.
Flickr is making some big changes, following its acquisition by SmugMug earlier this year. The company announced this week it's addressing a...
There was a point when all the professional photographers and visual artists were jamming on Flickr. The monopoly that Flickr once enjoyed...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of SmugMug is http://www.smugmug.com/.
According to Rankiteo, SmugMug’s AI-generated cybersecurity score is 751, reflecting their Fair security posture.
According to Rankiteo, SmugMug currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, SmugMug is not certified under SOC 2 Type 1.
According to Rankiteo, SmugMug does not hold a SOC 2 Type 2 certification.
According to Rankiteo, SmugMug is not listed as GDPR compliant.
According to Rankiteo, SmugMug does not currently maintain PCI DSS compliance.
According to Rankiteo, SmugMug is not compliant with HIPAA regulations.
According to Rankiteo,SmugMug is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
SmugMug operates primarily in the Photography industry.
SmugMug employs approximately 114 people worldwide.
SmugMug presently has no subsidiaries across any sectors.
SmugMug’s official LinkedIn profile has approximately 7,703 followers.
SmugMug is classified under the NAICS code 54192, which corresponds to Photographic Services.
No, SmugMug does not have a profile on Crunchbase.
Yes, SmugMug maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/smugmug.
As of December 17, 2025, Rankiteo reports that SmugMug has not experienced any cybersecurity incidents.
SmugMug has an estimated 2,458 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, SmugMug has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Nagios XI versions prior to 2026R1.1 are vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A user‑accessible maintenance script may be executed as root via sudo and includes an application file that is writable by a lower‑privileged user. A local attacker with access to the application account can modify this file to introduce malicious code, which is then executed with elevated privileges when the script is run. Successful exploitation results in arbitrary code execution as the root user.
Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
SIPGO is a library for writing SIP services in the GO language. Starting in version 0.3.0 and prior to version 1.0.0-alpha-1, a nil pointer dereference vulnerability is in the SIPGO library's `NewResponseFromRequest` function that affects all normal SIP operations. The vulnerability allows remote attackers to crash any SIP application by sending a single malformed SIP request without a To header. The vulnerability occurs when SIP message parsing succeeds for a request missing the To header, but the response creation code assumes the To header exists without proper nil checks. This affects routine operations like call setup, authentication, and message handling - not just error cases. This vulnerability affects all SIP applications using the sipgo library, not just specific configurations or edge cases, as long as they make use of the `NewResponseFromRequest` function. Version 1.0.0-alpha-1 contains a patch for the issue.
GLPI is a free asset and IT management software package. Starting in version 9.1.0 and prior to version 10.0.21, an unauthorized user with an API access can read all knowledge base entries. Users should upgrade to 10.0.21 to receive a patch.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.