ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Core Print Solutions stands as the authority in book printing, combining over a century of expertise with cutting edge technology to empower publishers to print with confidence, speed, and scale. We are committed to building long-term partnerships, understanding individual needs, and delivering unparalleled performance through comprehensive, tailored services We’re ready to print the next chapter with you. To learn more about how Core Print Solutions can add exceptional value to your next print run, visit our website or email us at [email protected].

Core Print Solutions A.I CyberSecurity Scoring

CPS

Company Details

Linkedin ID:

tr-core-print-solutions

Employees number:

None employees

Number of followers:

192

NAICS:

323

Industry Type:

Printing Services

Homepage:

thomsonreuters.com

IP Addresses:

0

Company ID:

COR_2125966

Scan Status:

In-progress

AI scoreCPS Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/tr-core-print-solutions.jpeg
CPS Printing Services
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreCPS Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/tr-core-print-solutions.jpeg
CPS Printing Services
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

CPS Company CyberSecurity News & History

Past Incidents
2
Attack Types
2
EntityTypeSeverityImpactSeenBlog DetailsIncident DetailsView
Thomson ReutersBreach100410/2022
Rankiteo Explanation :
Attack with significant impact with customers data leaks

Description: Thomson Reuters provides customers with products such as the business-to-business media tool Reuters Connect, legal research service and database Westlaw, the tax automation system ONESOURCE, online research suite of editorial and source materials Checkpoint, and other tools. The size of the open database the team discovered corresponds with the company using ElasticSearch, a data storage favored by enterprises dealing with extensive, constantly updated volumes of data. Media giant with $6.35 billion in revenue left at least three of its databases open At least 3TB of sensitive data exposed including Thomson Reuters plaintext passwords to third-party servers The data company collects is a treasure trove for threat actors, likely worth millions of dollars on underground criminal forums The company has immediately fixed the issue, and started notifying their customers Thomson Reuters downplayed the issue, saying it affects only a “small subset of Thomson Reuters Global Trade customers” The dataset was open for several days – malicious bots are capable of discovering instances within mere hours Threat actors could use the leak for attacks, from social engineering attacks to ransomware

Thomson ReutersCyber Attack60301/2024
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: In retaliation for a cyber attack by Russia against the Ukrainian telecom giant Kyivstar, hackers associated with Ukraine's primary intelligence agency have infiltrated the computer systems of a Moscow-based internet provider, Reuters reports. The hackers, allegedly linked to Ukraine's spy agency, erased 20 terabytes of data from M9 Telecom, a relatively small Russian internet and TV provider, resulting in some Moscow residents experiencing internet service disruptions. Despite the hacking group's assertion that the company's website had been destroyed, the extent of the successful breach could not be independently verified by Reuters.

Thomson Reuters
Breach
Severity: 100
Impact: 4
Seen: 10/2022
Blog:
Rankiteo Explanation
Attack with significant impact with customers data leaks

Description: Thomson Reuters provides customers with products such as the business-to-business media tool Reuters Connect, legal research service and database Westlaw, the tax automation system ONESOURCE, online research suite of editorial and source materials Checkpoint, and other tools. The size of the open database the team discovered corresponds with the company using ElasticSearch, a data storage favored by enterprises dealing with extensive, constantly updated volumes of data. Media giant with $6.35 billion in revenue left at least three of its databases open At least 3TB of sensitive data exposed including Thomson Reuters plaintext passwords to third-party servers The data company collects is a treasure trove for threat actors, likely worth millions of dollars on underground criminal forums The company has immediately fixed the issue, and started notifying their customers Thomson Reuters downplayed the issue, saying it affects only a “small subset of Thomson Reuters Global Trade customers” The dataset was open for several days – malicious bots are capable of discovering instances within mere hours Threat actors could use the leak for attacks, from social engineering attacks to ransomware

Thomson Reuters
Cyber Attack
Severity: 60
Impact: 3
Seen: 01/2024
Blog:
Rankiteo Explanation
Attack with significant impact with internal employee data leaks

Description: In retaliation for a cyber attack by Russia against the Ukrainian telecom giant Kyivstar, hackers associated with Ukraine's primary intelligence agency have infiltrated the computer systems of a Moscow-based internet provider, Reuters reports. The hackers, allegedly linked to Ukraine's spy agency, erased 20 terabytes of data from M9 Telecom, a relatively small Russian internet and TV provider, resulting in some Moscow residents experiencing internet service disruptions. Despite the hacking group's assertion that the company's website had been destroyed, the extent of the successful breach could not be independently verified by Reuters.

Ailogo

CPS Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for CPS

Incidents vs Printing Services Industry Average (This Year)

No incidents recorded for Core Print Solutions in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Core Print Solutions in 2025.

Incident Types CPS vs Printing Services Industry Avg (This Year)

No incidents recorded for Core Print Solutions in 2025.

Incident History — CPS (X = Date, Y = Severity)

CPS cyber incidents detection timeline including parent company and subsidiaries

CPS Company Subsidiaries

SubsidiaryImage

Core Print Solutions stands as the authority in book printing, combining over a century of expertise with cutting edge technology to empower publishers to print with confidence, speed, and scale. We are committed to building long-term partnerships, understanding individual needs, and delivering unparalleled performance through comprehensive, tailored services We’re ready to print the next chapter with you. To learn more about how Core Print Solutions can add exceptional value to your next print run, visit our website or email us at [email protected].

Loading...
similarCompanies

CPS Similar Companies

Exela Technologies

Exela is a business process automation (BPA) leader, leveraging a global footprint and proprietary technology to provide digital transformation solutions enhancing quality, productivity, and end-user experience. With decades of expertise operating mission-critical processes, Exela serves a growing

Fujitsu Portugal

A Fujitsu é a companhia líder japonesa de tecnologias de informação e comunicação (TIC) disponibilizando um leque completo de produtos tecnológicos, soluções e serviços. Cerca de 132.000 colaboradores da Fujitsu prestam suporte a clientes em mais de 100 países. Utilizamos a nossa experiência e o pod

SONDA

We are at the forefront of digital transformation in the Americas, positively impacting the lives of over 500 million people. As a key player in emerging industries, we drive innovation and change through ambitious modernization projects and cutting-edge solutions. By understanding the region's chal

Thoughtworks

Thoughtworks is a pioneering global technology consultancy, leading the charge in custom software development and technology innovation. We empower ambitious businesses to thrive in a constantly evolving world. We integrate the best of strategy, design, and software engineering to provide our client

VINCI Energies

In a world undergoing constant change, VINCI Energies contributes to the environmental transition by helping bring about major trends in the digital landscape and energy sector. VINCI Energies’ teams roll out technologies and integrate customised multi-technical solutions, from design to implement

Akka Technologies

AKKA is a European leader in engineering consulting and R&D services. Our comprehensive portfolio of digital solutions combined with our expertise in engineering, uniquely positions us to support our clients by leveraging the power of connected data to accelerate innovation and drive the future of s

newsone

CPS CyberSecurity News

December 10, 2025 04:55 AM
Our insurance software solutions

Streamline your insurance operations and leverage the power of AI with our comprehensive suite of modern, secure and scalable SaaS solutions.

December 09, 2025 02:01 AM
Fescaro sees rising demand for automotive cybersecurity solutions

South Korean mobility software solutions provider Fescaro said Monday that it was securing a series of new contracts for its Key Management...

August 11, 2025 07:00 AM
Xerox FreeFlow Vulnerabilities leads to SSRF and RCE Attacks

An urgent security update has been released for Xerox FreeFlow Core software, addressing two critical vulnerabilities that could allow...

May 19, 2025 07:00 AM
Ekco bolsters cyber testing with Predatech buy

The move for Manchester-based cyber security consultancy Predatech will extend Ekco's security prospects in the UK, as well as give the business a presence in...

May 14, 2025 07:00 AM
AI, Cloud, Cybersecurity Driving Channel M&A in April and May

The cybersecurity, enterprise software, and cloud services sectors continued their rapid pace of consolidation throughout April and May 2025...

March 31, 2025 07:00 AM
Stay ahead with Titanium X and OpenText Cybersecurity Cloud

OpenText Cybersecurity has delivered continuous innovation to help organizations detect threats accurately and proactively, respond immediately and...

January 29, 2025 08:00 AM
PrintNightmare Aftermath: Windows Print Spooler Is Better. What's Next?

The 2021 PrintNightmare vulnerability exposed multiple deep-rooted security flaws in Microsoft's Print Spooler service, a core Windows component.

October 30, 2024 04:36 AM
How could your security operations center (SOC) reach its true potential?

You may not have control over when security incidents occur, but an effective and mature SOC can stop threats before actual damage occurs.

May 20, 2024 07:00 AM
New Windows 11 features strengthen security to address evolving cyberthreat landscape

Read about the new class of Windows computers, alongside important new features and updates that make Windows 11 more secure.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

CPS CyberSecurity History Information

Official Website of Core Print Solutions

The official website of Core Print Solutions is http://coreprintsolutions.thomsonreuters.com.

Core Print Solutions’s AI-Generated Cybersecurity Score

According to Rankiteo, Core Print Solutions’s AI-generated cybersecurity score is 754, reflecting their Fair security posture.

How many security badges does Core Print Solutions’ have ?

According to Rankiteo, Core Print Solutions currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Core Print Solutions have SOC 2 Type 1 certification ?

According to Rankiteo, Core Print Solutions is not certified under SOC 2 Type 1.

Does Core Print Solutions have SOC 2 Type 2 certification ?

According to Rankiteo, Core Print Solutions does not hold a SOC 2 Type 2 certification.

Does Core Print Solutions comply with GDPR ?

According to Rankiteo, Core Print Solutions is not listed as GDPR compliant.

Does Core Print Solutions have PCI DSS certification ?

According to Rankiteo, Core Print Solutions does not currently maintain PCI DSS compliance.

Does Core Print Solutions comply with HIPAA ?

According to Rankiteo, Core Print Solutions is not compliant with HIPAA regulations.

Does Core Print Solutions have ISO 27001 certification ?

According to Rankiteo,Core Print Solutions is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Core Print Solutions

Core Print Solutions operates primarily in the Printing Services industry.

Number of Employees at Core Print Solutions

Core Print Solutions employs approximately None employees people worldwide.

Subsidiaries Owned by Core Print Solutions

Core Print Solutions presently has no subsidiaries across any sectors.

Core Print Solutions’s LinkedIn Followers

Core Print Solutions’s official LinkedIn profile has approximately 192 followers.

NAICS Classification of Core Print Solutions

Core Print Solutions is classified under the NAICS code 323, which corresponds to Printing and Related Support Activities.

Core Print Solutions’s Presence on Crunchbase

No, Core Print Solutions does not have a profile on Crunchbase.

Core Print Solutions’s Presence on LinkedIn

Yes, Core Print Solutions maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/tr-core-print-solutions.

Cybersecurity Incidents Involving Core Print Solutions

As of December 17, 2025, Rankiteo reports that Core Print Solutions has experienced 2 cybersecurity incidents.

Number of Peer and Competitor Companies

Core Print Solutions has an estimated 5,159 peer or competitor companies worldwide.

What types of cybersecurity incidents have occurred at Core Print Solutions ?

Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack and Breach.

How does Core Print Solutions detect and respond to cybersecurity incidents ?

Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with the company has immediately fixed the issue, and remediation measures with started notifying their customers, and communication strategy with downplayed the issue..

Incident Details

Can you provide details on each incident ?

Incident : Data Exposure

Title: Thomson Reuters Data Exposure

Description: Thomson Reuters left at least three of its databases open, exposing at least 3TB of sensitive data including plaintext passwords to third-party servers.

Type: Data Exposure

Attack Vector: Unsecured Database

Vulnerability Exploited: Unsecured ElasticSearch Database

Incident : Data Breach

Title: Cyber Attack on Moscow-based M9 Telecom by Ukrainian Hackers

Description: Hackers associated with Ukraine's primary intelligence agency infiltrated the computer systems of M9 Telecom, a Moscow-based internet provider, in retaliation for a cyber attack by Russia against the Ukrainian telecom giant Kyivstar. The hackers erased 20 terabytes of data, resulting in internet service disruptions for some Moscow residents.

Type: Data Breach

Attack Vector: Unspecified Infiltration

Threat Actor: Hackers associated with Ukraine's primary intelligence agency

Motivation: Retaliation for a cyber attack by Russia against Kyivstar

What are the most common types of attacks the company has faced ?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident ?

Incident : Data Exposure THO1335281022

Data Compromised: Sensitive data, Plaintext passwords

Systems Affected: ElasticSearch databases

Incident : Data Breach THO185521124

Data Compromised: 20 terabytes of data erased

Systems Affected: Internet and TV services

Downtime: Internet service disruptions for some Moscow residents

What types of data are most commonly compromised in incidents ?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Sensitive Data, Plaintext Passwords and .

Which entities were affected by each incident ?

Incident : Data Exposure THO1335281022

Entity Name: Thomson Reuters

Entity Type: Corporation

Industry: Media and Information Services

Size: $6.35 billion in revenue

Customers Affected: small subset of Thomson Reuters Global Trade customers

Incident : Data Breach THO185521124

Entity Name: M9 Telecom

Entity Type: Internet and TV Provider

Industry: Telecommunications

Location: Moscow, Russia

Size: Small

Response to the Incidents

What measures were taken in response to each incident ?

Incident : Data Exposure THO1335281022

Containment Measures: The company has immediately fixed the issue

Remediation Measures: Started notifying their customers

Communication Strategy: Downplayed the issue

Data Breach Information

What type of data was compromised in each breach ?

Incident : Data Exposure THO1335281022

Type of Data Compromised: Sensitive data, Plaintext passwords

Sensitivity of Data: High

What measures does the company take to prevent data exfiltration ?

Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Started notifying their customers, .

How does the company handle incidents involving personally identifiable information (PII) ?

Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by the company has immediately fixed the issue and .

References

Where can I find more information about each incident ?

Incident : Data Breach THO185521124

Source: Reuters

Where can stakeholders find additional resources on cybersecurity best practices ?

Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Reuters.

Investigation Status

How does the company communicate the status of incident investigations to stakeholders ?

Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Downplayed The Issue.

Stakeholder and Customer Advisories

Were there any advisories issued to stakeholders or customers for each incident ?

Incident : Data Exposure THO1335281022

Customer Advisories: Started notifying their customers

What advisories does the company provide to stakeholders and customers following an incident ?

Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Started notifying their customers.

Initial Access Broker

How did the initial access broker gain entry for each incident ?

Incident : Data Exposure THO1335281022

Reconnaissance Period: several days

Post-Incident Analysis

What were the root causes and corrective actions taken for each incident ?

Incident : Data Exposure THO1335281022

Root Causes: Unsecured ElasticSearch Database

Corrective Actions: The company has immediately fixed the issue

What corrective actions has the company taken based on post-incident analysis ?

Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: The company has immediately fixed the issue.

Additional Questions

General Information

Who was the attacking group in the last incident ?

Last Attacking Group: The attacking group in the last incident was an Hackers associated with Ukraine's primary intelligence agency.

Impact of the Incidents

What was the most significant data compromised in an incident ?

Most Significant Data Compromised: The most significant data compromised in an incident were Sensitive data, Plaintext passwords, and 20 terabytes of data erased.

What was the most significant system affected in an incident ?

Most Significant System Affected: The most significant system affected in an incident was ElasticSearch databases and .

Response to the Incidents

What containment measures were taken in the most recent incident ?

Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was The company has immediately fixed the issue.

Data Breach Information

What was the most sensitive data compromised in a breach ?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Plaintext passwords, 20 terabytes of data erased and Sensitive data.

References

What is the most recent source of information about an incident ?

Most Recent Source: The most recent source of information about an incident is Reuters.

Stakeholder and Customer Advisories

What was the most recent customer advisory issued ?

Most Recent Customer Advisory: The most recent customer advisory issued was an Started notifying their customers.

Initial Access Broker

What was the most recent reconnaissance period for an incident ?

Most Recent Reconnaissance Period: The most recent reconnaissance period for an incident was several days.

cve

Latest Global CVEs (Not Company-Specific)

Description

Nagios XI versions prior to 2026R1.1 are vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A user‑accessible maintenance script may be executed as root via sudo and includes an application file that is writable by a lower‑privileged user. A local attacker with access to the application account can modify this file to introduce malicious code, which is then executed with elevated privileges when the script is run. Successful exploitation results in arbitrary code execution as the root user.

Risk Information
cvss4
Base: 8.6
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Description

Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

Description

SIPGO is a library for writing SIP services in the GO language. Starting in version 0.3.0 and prior to version 1.0.0-alpha-1, a nil pointer dereference vulnerability is in the SIPGO library's `NewResponseFromRequest` function that affects all normal SIP operations. The vulnerability allows remote attackers to crash any SIP application by sending a single malformed SIP request without a To header. The vulnerability occurs when SIP message parsing succeeds for a request missing the To header, but the response creation code assumes the To header exists without proper nil checks. This affects routine operations like call setup, authentication, and message handling - not just error cases. This vulnerability affects all SIP applications using the sipgo library, not just specific configurations or edge cases, as long as they make use of the `NewResponseFromRequest` function. Version 1.0.0-alpha-1 contains a patch for the issue.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

GLPI is a free asset and IT management software package. Starting in version 9.1.0 and prior to version 10.0.21, an unauthorized user with an API access can read all knowledge base entries. Users should upgrade to 10.0.21 to receive a patch.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=tr-core-print-solutions' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge