ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Third.space specializes in creating comfortable, welcoming brand spaces away from home and outside work. We deliver everything from interior design to art direction, furniture, lighting and decoration. We create interior solutions for hotels, holiday resorts, hostels, student accommodations and many others. Third.space is proud to be part of the Lars Larsen Group, which gives us access to an impressive worldwide supplier network and to outstanding logistics and manufacturing resources. This is what allows us to offer unique, customized solutions at the price of standard products.

Third.space A.I CyberSecurity Scoring

Third.space

Company Details

Linkedin ID:

thirdspaceinterior

Employees number:

25

Number of followers:

1,348

NAICS:

337

Industry Type:

Furniture and Home Furnishings Manufacturing

Homepage:

thirdspace.dk

IP Addresses:

0

Company ID:

THI_2070270

Scan Status:

In-progress

AI scoreThird.space Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/thirdspaceinterior.jpeg
Third.space Furniture and Home Furnishings Manufacturing
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreThird.space Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/thirdspaceinterior.jpeg
Third.space Furniture and Home Furnishings Manufacturing
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Third.space Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

Third.space Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Third.space

Incidents vs Furniture and Home Furnishings Manufacturing Industry Average (This Year)

No incidents recorded for Third.space in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Third.space in 2025.

Incident Types Third.space vs Furniture and Home Furnishings Manufacturing Industry Avg (This Year)

No incidents recorded for Third.space in 2025.

Incident History — Third.space (X = Date, Y = Severity)

Third.space cyber incidents detection timeline including parent company and subsidiaries

Third.space Company Subsidiaries

SubsidiaryImage

Third.space specializes in creating comfortable, welcoming brand spaces away from home and outside work. We deliver everything from interior design to art direction, furniture, lighting and decoration. We create interior solutions for hotels, holiday resorts, hostels, student accommodations and many others. Third.space is proud to be part of the Lars Larsen Group, which gives us access to an impressive worldwide supplier network and to outstanding logistics and manufacturing resources. This is what allows us to offer unique, customized solutions at the price of standard products.

Loading...
similarCompanies

Third.space Similar Companies

Spazio T70, situated in the heart of Makati, stands for contemporary lifestyle. We offer our community a unique assortment of Italy’s finest furniture produced by highly specialized manufacturers. Our philosophy is to create harmonic living space where one finds tranquility and revival from stressfu

Linon Home Decor/Powell

Linon Home Decor/Powell Company designs, imports and distributes youth, occasional, dining and accent furniture across all style categories for retailers around the world. The company has 50 years of experience in offshore sourcing focused on quality control, craftsmanship, finishing and timely deli

Roberts Office Furniture Concepts, Inc.

Roberts Office Furniture Concepts (ROFC) is an environmentally responsible office furniture and office systems manufacturer providing the quality, style and value in workspace solutions that today’s office environment consumers demand. Also, Roberts Office Furniture Concepts is one of only two certi

b + c Office Interiors

We are passionate about creating a healthy workplace environment that fuels employee productivity. We provide comprehensive resources to increase client satisfaction that results in long lasting relationships. We measure our accomplishments by exceeding your expectations. We take pride not only in t

Eurofar International B.V.

Eurofar International B.V. behoort tot één van de meest toonaangevende producenten en exporteurs van tuinmeubelen met een uitgebreid klantenbestand in zowel binnen- als buitenland. Met haar eigen productiefaciliteiten in Vietnam en Indonesië is Eurofar International B.V. in staat om aan iedere vraag

ScanDesigns Home Furnishings

ScanDesigns was founded in Vancouver, B.C. in 1976 primarily serving as a Scandinavian teak and rosewood furniture store. Over the years, ScanDesigns has moved with the changing markets and adopted new ideas in its successful attempt to satisfy its customers. Today it is a leader in the contemporary

newsone

Third.space CyberSecurity News

November 13, 2025 04:33 AM
Daytona State’s FalconSec Cybersecurity Team Takes Second Place in 3rd Annual Statewide Competition

DAYTONA BEACH, FLA. (November 12, 2025) – Daytona State's FalconSec cybersecurity team captured second place in the third annual Florida College System...

October 09, 2025 01:32 PM
Let's Cheer for ITALY Winner of the 2025 European Cybersecurity Challenge

Italy gets onto the highest step of the podium of this 2025 edition of the ECSC, followed by Denmark second and Germany in third place.

October 04, 2025 07:00 AM
Grand Chess Tour Finals 2025: Fabiano Caruana clinches title, bags USD 150k; R Praggnanandhaa loses third

Chess News: Fabiano Caruana secured his second Grand Chess Tour Finals victory, earning $150000 after a remarkable comeback.

September 29, 2025 07:00 AM
Is space the next frontier for digital infrastructure?

When engineers think about where to place the next generation of data centers, space seems almost tailor-made for the challenge.

September 25, 2025 07:00 AM
Starbucks chases Gen Z nostalgia, betting $1 billion on plan to bring back the ‘third place’

The Starbucks workers' union is not happy with the plan, which also includes store closures and hundreds of layoffs.

September 08, 2025 07:00 AM
Starbucks Cafe Of The Future Central To Second Coming Of Third Space

Starbucks is pressing ahead with a back to the future reimagining of its coffeehouses as it focuses growth plan on physical stores and reins...

August 31, 2025 07:00 AM
A sacred (third) space: Houston churches pivot to attract new members

Churches across the city are exploring new ways to grow their congregations amid a changing religious landscape.

July 28, 2025 07:00 AM
4 Reasons Why Every Couple Needs A ‘Third Place’ — By A Psychologist

If you've been feeling more like business partners or roommates than lovers or teammates, maybe you don't need a couples' retreat.

June 27, 2025 07:00 AM
Third place in Joseph Fourier Prize goes to Anton Firc from FIT BUT

Third place in the competition, along with a special award, went to Anton Firc from the Department of Intelligent Systems and the Security@FIT research group.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Third.space CyberSecurity History Information

Official Website of Third.space

The official website of Third.space is https://thirdspace.dk/.

Third.space’s AI-Generated Cybersecurity Score

According to Rankiteo, Third.space’s AI-generated cybersecurity score is 753, reflecting their Fair security posture.

How many security badges does Third.space’ have ?

According to Rankiteo, Third.space currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Third.space have SOC 2 Type 1 certification ?

According to Rankiteo, Third.space is not certified under SOC 2 Type 1.

Does Third.space have SOC 2 Type 2 certification ?

According to Rankiteo, Third.space does not hold a SOC 2 Type 2 certification.

Does Third.space comply with GDPR ?

According to Rankiteo, Third.space is not listed as GDPR compliant.

Does Third.space have PCI DSS certification ?

According to Rankiteo, Third.space does not currently maintain PCI DSS compliance.

Does Third.space comply with HIPAA ?

According to Rankiteo, Third.space is not compliant with HIPAA regulations.

Does Third.space have ISO 27001 certification ?

According to Rankiteo,Third.space is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Third.space

Third.space operates primarily in the Furniture and Home Furnishings Manufacturing industry.

Number of Employees at Third.space

Third.space employs approximately 25 people worldwide.

Subsidiaries Owned by Third.space

Third.space presently has no subsidiaries across any sectors.

Third.space’s LinkedIn Followers

Third.space’s official LinkedIn profile has approximately 1,348 followers.

NAICS Classification of Third.space

Third.space is classified under the NAICS code 337, which corresponds to Furniture and Related Product Manufacturing.

Third.space’s Presence on Crunchbase

No, Third.space does not have a profile on Crunchbase.

Third.space’s Presence on LinkedIn

Yes, Third.space maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/thirdspaceinterior.

Cybersecurity Incidents Involving Third.space

As of November 28, 2025, Rankiteo reports that Third.space has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

Third.space has an estimated 2,615 peer or competitor companies worldwide.

Third.space CyberSecurity History Information

How many cyber incidents has Third.space faced ?

Total Incidents: According to Rankiteo, Third.space has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at Third.space ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.

Risk Information
cvss4
Base: 6.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=thirdspaceinterior' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge