Company Details
sourcebooks
394
31,727
511
sourcebooks.com
0
SOU_2434613
In-progress

Sourcebooks Company CyberSecurity Posture
sourcebooks.com💡Fast Company Most Innovative Companies 2024 (#6 Media) 🧡Best Practice Institute Certified Most Loved Workplace 2024 (#2 in Newsweek) 🚀INC Female Founders 2024 💡Fast Company Best Workplaces for Innovators 2023 (#31 of the Top 100) We’re an entrepreneurial book publisher bound together by the idea that books change lives. We work with a diverse group of authors, illustrators, booksellers, librarians, industry partners, educators, and others to create a vibrant future for books. Thanks for being part of our story.
Company Details
sourcebooks
394
31,727
511
sourcebooks.com
0
SOU_2434613
In-progress
Between 750 and 799

Sourcebooks Global Score (TPRM)XXXX

Description: The California Office of the Attorney General reported a data breach involving Sourcebooks, Inc. on October 17, 2014. The breach occurred between April 16, 2014, and June 19, 2014, affecting customer credit card information and certain personal details, although the exact number of individuals affected is unknown.


No incidents recorded for Sourcebooks in 2025.
No incidents recorded for Sourcebooks in 2025.
No incidents recorded for Sourcebooks in 2025.
Sourcebooks cyber incidents detection timeline including parent company and subsidiaries

💡Fast Company Most Innovative Companies 2024 (#6 Media) 🧡Best Practice Institute Certified Most Loved Workplace 2024 (#2 in Newsweek) 🚀INC Female Founders 2024 💡Fast Company Best Workplaces for Innovators 2023 (#31 of the Top 100) We’re an entrepreneurial book publisher bound together by the idea that books change lives. We work with a diverse group of authors, illustrators, booksellers, librarians, industry partners, educators, and others to create a vibrant future for books. Thanks for being part of our story.


It's time to spend wisely. It's time to shop smarter. It's time to call in the experts. By helping you... •Edit your wish list, •Sift through the trends, •Complement what's in your closet, •And buy pieces that last, The Harper's Bazaar Personal Stylist will make sure that every minute of

Codice Edizioni si costituisce a Torino nel settembre 2003, come naturale prosecuzione del progetto elaborato attraverso la costituzione della società Codice. Idee per la Cultura, con l’intento di rinnovare una tradizione editoriale orientata alla riflessione saggistica, al dibattito sulla contempor
Introducing a new model for publishing that puts authors first. Our technology and data-driven publishing platform empowers every author in the world to create, distribute and promote beautiful digital books, own and control their work and their rights, and get some of the best royalties in the indu

Cold Link and Cold Chain Africa have joined forces to form a new publication called Cold Link Africa (incorporating Cold Chain). The publication focuses on all aspects of refrigeration, following the cold chain from producer to consumer, and includes content ranging from regular features, products,

Časopis za hotelijere, ugostitelje i poduzetnike u turizmu. U svijetu turizma koji se stalno mijenja, čitajte časopis pripremljen baš za vas. U svakom broju časopisa Turizam info donosimo niz odgovora na pitanja što se, kako i zašto mijenja u svijetu turizma i ugostiteljstva. Članci o kvalitetnim p

Great Southern Publishers is one of the leading publishers of Destination Marketing Magazines in the Southeast. We take pride in managing our clients' projects from concept to completion. Our professional team brings communities and businesses to life in stunning, four-color publications and project
.png)
Download this year's Cybersecurity Sourcebook to learn about the pitfalls to avoid and the key approaches and best practices to embrace.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Sourcebooks is https://www.sourcebooks.com/.
According to Rankiteo, Sourcebooks’s AI-generated cybersecurity score is 751, reflecting their Fair security posture.
According to Rankiteo, Sourcebooks currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Sourcebooks is not certified under SOC 2 Type 1.
According to Rankiteo, Sourcebooks does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Sourcebooks is not listed as GDPR compliant.
According to Rankiteo, Sourcebooks does not currently maintain PCI DSS compliance.
According to Rankiteo, Sourcebooks is not compliant with HIPAA regulations.
According to Rankiteo,Sourcebooks is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Sourcebooks operates primarily in the Book and Periodical Publishing industry.
Sourcebooks employs approximately 394 people worldwide.
Sourcebooks presently has no subsidiaries across any sectors.
Sourcebooks’s official LinkedIn profile has approximately 31,727 followers.
Sourcebooks is classified under the NAICS code 511, which corresponds to Publishing Industries (except Internet).
No, Sourcebooks does not have a profile on Crunchbase.
Yes, Sourcebooks maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/sourcebooks.
As of November 28, 2025, Rankiteo reports that Sourcebooks has experienced 1 cybersecurity incidents.
Sourcebooks has an estimated 4,881 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Title: Data Breach at Sourcebooks, Inc.
Description: The California Office of the Attorney General reported a data breach involving Sourcebooks, Inc. on October 17, 2014. The breach occurred between April 16, 2014, and June 19, 2014, affecting customer credit card information and certain personal details, although the exact number of individuals affected is unknown.
Date Detected: 2014-10-17
Date Publicly Disclosed: 2014-10-17
Type: Data Breach
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Customer credit card information, Certain personal details
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Customer Credit Card Information, Certain Personal Details and .

Entity Name: Sourcebooks, Inc.
Entity Type: Company
Industry: Publishing

Type of Data Compromised: Customer credit card information, Certain personal details

Source: California Office of the Attorney General
Date Accessed: 2014-10-17
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney GeneralDate Accessed: 2014-10-17.
Most Recent Incident Detected: The most recent incident detected was on 2014-10-17.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2014-10-17.
Most Significant Data Compromised: The most significant data compromised in an incident were customer credit card information, certain personal details and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were certain personal details and customer credit card information.
Most Recent Source: The most recent source of information about an incident is California Office of the Attorney General.
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.