ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Specialist Creative Design + Web + Social The Hunting House was founded for those on the hunt for quality, timeless and beautiful design. We believe that graphic design can be a powerful force of success for any company. Our extensive network of the finest talent, allows us to build the perfect team to respond to a client's brief. Our close knit team offer expertise in the following to help our clients achieve success in their respective industries; Branding & Identity, Graphic Design, Stationary Design, Print Management, Website Design, Social Media and Media, TV & Training.

The Hunting House A.I CyberSecurity Scoring

HH

Company Details

Linkedin ID:

the-hunting-house

Employees number:

5

Number of followers:

37

NAICS:

541

Industry Type:

Graphic Design

Homepage:

thehuntinghouse.com.au

IP Addresses:

0

Company ID:

THE_2381949

Scan Status:

In-progress

AI scoreHH Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/the-hunting-house.jpeg
HH Graphic Design
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreHH Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/the-hunting-house.jpeg
HH Graphic Design
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

HH Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

HH Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for HH

Incidents vs Graphic Design Industry Average (This Year)

No incidents recorded for The Hunting House in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for The Hunting House in 2025.

Incident Types HH vs Graphic Design Industry Avg (This Year)

No incidents recorded for The Hunting House in 2025.

Incident History — HH (X = Date, Y = Severity)

HH cyber incidents detection timeline including parent company and subsidiaries

HH Company Subsidiaries

SubsidiaryImage

Specialist Creative Design + Web + Social The Hunting House was founded for those on the hunt for quality, timeless and beautiful design. We believe that graphic design can be a powerful force of success for any company. Our extensive network of the finest talent, allows us to build the perfect team to respond to a client's brief. Our close knit team offer expertise in the following to help our clients achieve success in their respective industries; Branding & Identity, Graphic Design, Stationary Design, Print Management, Website Design, Social Media and Media, TV & Training.

Loading...
similarCompanies

HH Similar Companies

Zonamista Comunicazione

Dal 2001 aiutiamo le aziende a trovare un'identità e a raccontare i propri prodotti. Abbiamo molta esperienza nell'editoria, nella corporate identity, nella produzione di contenuti di qualità. Ci siamo fatti le ossa negli anni 90 e abbiamo approcciato il web già da tanti anni. Sviluppiamo siti ba

OTT DESIGN

I am an experienced creative with an award-winning history in publication/catalog design and digital illustration/compositing in both print and web environments. Offering solid art direction/design and management skills in print production, and project management, I have a solid-range of skills in t

Hingston Studio

Hingston Studio is a renowned independent creative agency, specialising in design and art direction. Founded in 1997 by Tom Hingston, the studio creates brand identities, print, packaging, advertising campaigns, films, spatial and digital experiences. This diverse approach is underpinned by 20 ye

March Design Studio

We are March Design Studio. A multi-disciplinary design agency specialising in Branding, Print Design, Web Design and Art Direction. We are March Design Studio. A multi-disciplinary design agency specialising in Branding, Print Design, Web Design and Art Direction. We are March Design Studio.

My name is Jason Reale, design explorer with a passion for the creation of brand worlds. Throughout my career I’ve had the pleasure of working at some of the most notable branding agencies in the world and building relationships with clients that see design as more than just pretty pictures. This

XANDRA DESIGN

XANDRA DESIGN, LLC founder Lesley Alexandra Jump Baumann has over a decade of experience in providing graphic design solutions. She graduated from the University of Cincinnati’s College of Design, Architecture, Art and Planning with a BS in Graphic Design and is a member of the AIGA. Now based in Da

newsone

HH CyberSecurity News

November 28, 2025 02:16 AM
Ensign InfoSecurity crowned best MNC Vendor at The Cybersecurity Awards 2025

Third Win After 2022 and 2023 RecognitionSINGAPORE, Nov. 28, 2025 /PRNewswire/ -- Ensign InfoSecurity, Asia Pacific's largest pure-play,...

November 18, 2025 08:00 AM
The Complete List of Hacker And Cybersecurity Movies

Hacker's Movie Guide” with Foreword by Steve Wozniak, co-founder of Apple.

October 23, 2025 07:00 AM
House Democrats Push Back at Reassignments, Firings of CISA Employees

Democrats in Congress continue to try to pressure Trump Administration officials to stop cutting or reassigning the workforce of the...

October 22, 2025 07:00 AM
Trump Empowers Election Deniers, Still Fixated on 2020 Grievances

The president has placed proponents of his false claims into government jobs while dismantling systems built to secure voting, raising fears...

October 14, 2025 07:00 AM
China-backed hackers targeting WFH Aussies

Australians who work from home have become the latest target for Chinese state-backed hackers, a disturbing new report has revealed.

September 29, 2025 07:00 AM
Two-thirds of CISA personnel could be sent home under shutdown

The Department of Homeland Security estimated over the weekend that it would send home about two-thirds of employees at the Cybersecurity...

August 13, 2025 07:00 AM
The overlooked changes that two Trump executive orders could bring to cybersecurity

Two executive orders President Donald Trump has signed in recent months could prove to have a more dramatic impact on cybersecurity than...

July 23, 2025 07:00 AM
Lapsed CISA contract impedes national lab’s threat-hunting operations

The CyberSentry program remains operational, according to CISA, with analysts outside the lab continuing to review sensor data.

July 22, 2025 07:00 AM
Dwindling federal cyber support for critical infrastructure raises alarms

A plan to transfer cybersecurity and resilience responsibilities to states could have major unintended consequences.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

HH CyberSecurity History Information

Official Website of The Hunting House

The official website of The Hunting House is http://thehuntinghouse.com.au.

The Hunting House’s AI-Generated Cybersecurity Score

According to Rankiteo, The Hunting House’s AI-generated cybersecurity score is 753, reflecting their Fair security posture.

How many security badges does The Hunting House’ have ?

According to Rankiteo, The Hunting House currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does The Hunting House have SOC 2 Type 1 certification ?

According to Rankiteo, The Hunting House is not certified under SOC 2 Type 1.

Does The Hunting House have SOC 2 Type 2 certification ?

According to Rankiteo, The Hunting House does not hold a SOC 2 Type 2 certification.

Does The Hunting House comply with GDPR ?

According to Rankiteo, The Hunting House is not listed as GDPR compliant.

Does The Hunting House have PCI DSS certification ?

According to Rankiteo, The Hunting House does not currently maintain PCI DSS compliance.

Does The Hunting House comply with HIPAA ?

According to Rankiteo, The Hunting House is not compliant with HIPAA regulations.

Does The Hunting House have ISO 27001 certification ?

According to Rankiteo,The Hunting House is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of The Hunting House

The Hunting House operates primarily in the Graphic Design industry.

Number of Employees at The Hunting House

The Hunting House employs approximately 5 people worldwide.

Subsidiaries Owned by The Hunting House

The Hunting House presently has no subsidiaries across any sectors.

The Hunting House’s LinkedIn Followers

The Hunting House’s official LinkedIn profile has approximately 37 followers.

The Hunting House’s Presence on Crunchbase

No, The Hunting House does not have a profile on Crunchbase.

The Hunting House’s Presence on LinkedIn

Yes, The Hunting House maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/the-hunting-house.

Cybersecurity Incidents Involving The Hunting House

As of December 03, 2025, Rankiteo reports that The Hunting House has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

The Hunting House has an estimated 2,657 peer or competitor companies worldwide.

The Hunting House CyberSecurity History Information

How many cyber incidents has The Hunting House faced ?

Total Incidents: According to Rankiteo, The Hunting House has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at The Hunting House ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

vLLM is an inference and serving engine for large language models (LLMs). Prior to 0.11.1, vllm has a critical remote code execution vector in a config class named Nemotron_Nano_VL_Config. When vllm loads a model config that contains an auto_map entry, the config class resolves that mapping with get_class_from_dynamic_module(...) and immediately instantiates the returned class. This fetches and executes Python from the remote repository referenced in the auto_map string. Crucially, this happens even when the caller explicitly sets trust_remote_code=False in vllm.transformers_utils.config.get_config. In practice, an attacker can publish a benign-looking frontend repo whose config.json points via auto_map to a separate malicious backend repo; loading the frontend will silently run the backend’s code on the victim host. This vulnerability is fixed in 0.11.1.

Risk Information
cvss3
Base: 7.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
Description

fastify-reply-from is a Fastify plugin to forward the current HTTP request to another server. Prior to 12.5.0, by crafting a malicious URL, an attacker could access routes that are not allowed, even though the reply.from is defined for specific routes in @fastify/reply-from. This vulnerability is fixed in 12.5.0.

Risk Information
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to 21.0.2, 20.3.15, and 19.2.17, A Stored Cross-Site Scripting (XSS) vulnerability has been identified in the Angular Template Compiler. It occurs because the compiler's internal security schema is incomplete, allowing attackers to bypass Angular's built-in security sanitization. Specifically, the schema fails to classify certain URL-holding attributes (e.g., those that could contain javascript: URLs) as requiring strict URL security, enabling the injection of malicious scripts. This vulnerability is fixed in 21.0.2, 20.3.15, and 19.2.17.

Risk Information
cvss4
Base: 8.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Gin-vue-admin is a backstage management system based on vue and gin. In 2.8.6 and earlier, attackers can delete any file on the server at will, causing damage or unavailability of server resources. Attackers can control the 'FileMd5' parameter to delete any file and folder.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Portkey.ai Gateway is a blazing fast AI Gateway with integrated guardrails. Prior to 1.14.0, the gateway determined the destination baseURL by prioritizing the value in the x-portkey-custom-host request header. The proxy route then appends the client-specified path to perform an external fetch. This can be maliciously used by users for SSRF attacks. This vulnerability is fixed in 1.14.0.

Risk Information
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=the-hunting-house' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge