Company Details
trajectory-inc
None employees
0
511
trajectoryseries.com
0
TRA_2259628
In-progress

Trajectory Inc Company CyberSecurity Posture
trajectoryseries.comIntroducing the Trajectory Book Series. The first book of the series, Ash & Snow, by author Cassie Rhodes, now available on Amazon Kindle. "The decisions of today have made this world of tomorrow. Into a world ravaged by war, eight individuals from around the world must find a way to restore Balance, bringing peace to a planet as diverse as they. A German terrorist and a Syrian iconoclast; a Canadian doctor and an Alaskan sailor; an Icelandic politician and an American spy; a Chinese clone and a Japanese insurrectionist. Amid the complexities and intricacies of a world on the brink of implosion, eight lives, like points on the compass, must find a path before all the world plunges into oblivion. The world is as we forge it. The sins of today are the penance of tomorrow. The Future is still ours to make. But for now, this is our Trajectory."
Company Details
trajectory-inc
None employees
0
511
trajectoryseries.com
0
TRA_2259628
In-progress
Between 750 and 799

Trajectory Inc Global Score (TPRM)XXXX



No incidents recorded for Trajectory Inc in 2025.
No incidents recorded for Trajectory Inc in 2025.
No incidents recorded for Trajectory Inc in 2025.
Trajectory Inc cyber incidents detection timeline including parent company and subsidiaries

Introducing the Trajectory Book Series. The first book of the series, Ash & Snow, by author Cassie Rhodes, now available on Amazon Kindle. "The decisions of today have made this world of tomorrow. Into a world ravaged by war, eight individuals from around the world must find a way to restore Balance, bringing peace to a planet as diverse as they. A German terrorist and a Syrian iconoclast; a Canadian doctor and an Alaskan sailor; an Icelandic politician and an American spy; a Chinese clone and a Japanese insurrectionist. Amid the complexities and intricacies of a world on the brink of implosion, eight lives, like points on the compass, must find a path before all the world plunges into oblivion. The world is as we forge it. The sins of today are the penance of tomorrow. The Future is still ours to make. But for now, this is our Trajectory."


La CSA Editrice è una società che opera nel mondo dell'editoria e pubblica autori italiani e stranieri. Ci occupiamo, oltre che di pubblicazioni, anche di formazione, consulenze letterarie, concorsi e altre attività annnesse al mondo del libro. CSA PublishingHouse works in the book world since 200

The Archive of Our Own (AO3) is a noncommercial host for fanfiction/fanworks using open-source software. As of 2023 it hosts over 11 million works & nearly 6 million registered users from around the world. In 2019 it received a Hugo Award for Best Related Work. AO3 is a project of non-profit The O

Gale partners with librarians and educators to create positive change and outcomes for researchers and learners. The company empowers libraries to be active collaborators in the success of their institutions and communities by providing essential content that leads to discovery and knowledge, and us

The Cruise & Ferry suite of magazines includes Cruise & Ferry Review, Cruise & Ferry Itinerary Planning and Cruise & Ferry Interiors, available for subscription in both printed and digital formats. Via our website, magazines and social networks, we aim to be the world's best supplier of news and in

Al-Iktissad Wal-Aamal is the leading business communication group in the Arab world, combining among its activities publishing, conferencing, event management & investment & trade promotion exhibitions. Thanks to more than three decades of insight into Arab economies and a vast network of field

Since 2000, PAPER MART is a widely-acknowledged commercial publication in India with an abiding aim to disseminate the news, views, and reviews happening worldwide in pulp and paper manufacturing and converting sector. The magazine’s ascending popularity by virtue of the authenticity of material pre
.png)
HUB Cyber Security completes debt restructuring to enhance financial flexibility and support infrastructure-scale growth.
Investing.com - Cantor Fitzgerald lowered its price target on SentinelOne Inc (NYSE:S) to $22.00 from $24.00 on Monday, while maintaining an...
Cybersecurity company Axonius Inc. has found its first general counsel in a veteran legal leader who has worked at software and technology...
Palo Alto leads the pack in AI-powered security, but steep valuations and big acquisitions mean investors should weigh risk against reward.
The global cybersecurity market size is projected to grow from $218.98 billion in 2025 to $562.77 billion by 2032, at a CAGR of 14.4% during...
IQSTEL Inc. (NASDAQ: IQST) expects double-digit organic revenue growth in 2026, projecting a 26% increase to $430 million from the $340...
WatchGuard® Technologies has appointed Joe Smolarski as the new Chief Executive Officer. Previously, Vats Srivatsan served as interim CEO...
Demand for Fortinet's integrated security solutions lifted earnings, but Wall Street remains cautious on the stock's next move.
Cybersecurity has become essential to every company's sustainability, security, and growth strategy in today's digital world.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Trajectory Inc is http://www.trajectoryseries.com.
According to Rankiteo, Trajectory Inc’s AI-generated cybersecurity score is 769, reflecting their Fair security posture.
According to Rankiteo, Trajectory Inc currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Trajectory Inc is not certified under SOC 2 Type 1.
According to Rankiteo, Trajectory Inc does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Trajectory Inc is not listed as GDPR compliant.
According to Rankiteo, Trajectory Inc does not currently maintain PCI DSS compliance.
According to Rankiteo, Trajectory Inc is not compliant with HIPAA regulations.
According to Rankiteo,Trajectory Inc is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Trajectory Inc operates primarily in the Book and Periodical Publishing industry.
Trajectory Inc employs approximately None employees people worldwide.
Trajectory Inc presently has no subsidiaries across any sectors.
Trajectory Inc’s official LinkedIn profile has approximately 0 followers.
Trajectory Inc is classified under the NAICS code 511, which corresponds to Publishing Industries (except Internet).
No, Trajectory Inc does not have a profile on Crunchbase.
Yes, Trajectory Inc maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/trajectory-inc.
As of November 28, 2025, Rankiteo reports that Trajectory Inc has not experienced any cybersecurity incidents.
Trajectory Inc has an estimated 4,880 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Trajectory Inc has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.