Company Details
trunkarchive
23
5,177
54192
trunkarchive.com
0
TRU_1508757
In-progress

TRUNK ARCHIVE Company CyberSecurity Posture
trunkarchive.comTrunk Archive is a full service image licensing agency representing the most engaging and sought after contemporary photographers. Providing a unique, intelligent and forward-thinking alternative to the traditional resources for existing imagery, the agency also serves as a creative partner by offering complimentary image research and visual strategy consultation. With an extensive network and formalized partnerships in the entertainment, publishing and fashion industries, Trunk Archive is uniquely positioned to offer clients unprecedented, comprehensive support. The archive contains approximately 1M images covering fashion, celebrity, beauty, lifestyle, still life, design, architecture and travel. Hundreds of new images are added to the archive each week as the agency continues its mission to make extraordinary and in many cases previously unseen art available to clients. Trunk Archive is part of Great Bowery. They have reimagined the traditional agency approach by uniting a diverse range of globally recognized luxury image-makers with creative strategists to offer clients end to end service from project inception to full scale execution. Across the entire collective, their services include creative, artist representation, image licensing, and distribution strategy. Founded in 2015 with headquarters in New York City and London, their clients are comprised of the world’s most iconic companies spanning fashion, beauty, Web3, technology, and more. Brands that are part of Great Bowery are B&A, Bowie, CLM, Gallery Stock, Granted, GB3 (innovation), GBI, Lookbooks, M.A.P, Streeters, and Trunk Archive.
Company Details
trunkarchive
23
5,177
54192
trunkarchive.com
0
TRU_1508757
In-progress
Between 700 and 749

TRUNK ARCHIVE Global Score (TPRM)XXXX



No incidents recorded for TRUNK ARCHIVE in 2025.
No incidents recorded for TRUNK ARCHIVE in 2025.
No incidents recorded for TRUNK ARCHIVE in 2025.
TRUNK ARCHIVE cyber incidents detection timeline including parent company and subsidiaries

Trunk Archive is a full service image licensing agency representing the most engaging and sought after contemporary photographers. Providing a unique, intelligent and forward-thinking alternative to the traditional resources for existing imagery, the agency also serves as a creative partner by offering complimentary image research and visual strategy consultation. With an extensive network and formalized partnerships in the entertainment, publishing and fashion industries, Trunk Archive is uniquely positioned to offer clients unprecedented, comprehensive support. The archive contains approximately 1M images covering fashion, celebrity, beauty, lifestyle, still life, design, architecture and travel. Hundreds of new images are added to the archive each week as the agency continues its mission to make extraordinary and in many cases previously unseen art available to clients. Trunk Archive is part of Great Bowery. They have reimagined the traditional agency approach by uniting a diverse range of globally recognized luxury image-makers with creative strategists to offer clients end to end service from project inception to full scale execution. Across the entire collective, their services include creative, artist representation, image licensing, and distribution strategy. Founded in 2015 with headquarters in New York City and London, their clients are comprised of the world’s most iconic companies spanning fashion, beauty, Web3, technology, and more. Brands that are part of Great Bowery are B&A, Bowie, CLM, Gallery Stock, Granted, GB3 (innovation), GBI, Lookbooks, M.A.P, Streeters, and Trunk Archive.


TBWA is The Disruption Company®. We are a Collective of creative minds with an unlimited creative canvas. We create brand platforms that defy convention and compete with culture. Thanks to our trademarked Disruption® methodology, we build the world’s strongest brands. Brands that own an unfair share

Interpublic (NYSE: IPG) is a values-based, data-fueled, and creatively-driven provider of marketing solutions. Home to some of the world’s best-known and most innovative communications specialists, IPG global brands include Acxiom, Craft, FCB, FutureBrand, Golin, Initiative, IPG Health, IPG Mediabra

We are dentsu. We team together to help brands predict and plan for disruptive future opportunities and create new paths to growth in the sustainable economy. We know people better than anyone else and we use those insights to connect brand, content, commerce and experience, underpinned by modern cr
Founded in 1926 by Marcel Bleustein-Blanchet, today Publicis Groupe is the largest communications group in the world and a leader in marketing, communication, and digital business transformation, led by Arthur Sadoun, the third CEO in its history. Publicis Groupe is positioned at every step of the

We are dentsu. We team together to help brands predict and plan for disruptive future opportunities and create new paths to growth in the sustainable economy. We know people better than anyone else and we use those insights to connect brand, content, commerce and experience, underpinned by modern cr

Ogilvy has been creating impact for brands through iconic, culture-changing, value-driving ideas since the company was founded by David Ogilvy 75 years ago. We build on that rich legacy through Borderless Creativity – innovating at the intersections of its advertising, public relations, relationship
.png)
A groundbreaking new partnership between Trunk Archive and Art Partner offers an exceptional collection of imagery featuring some of the most recognizable...
Ramy's acclaimed work in stand-up, acting, writing, and directing all speak to that. His penchants for mischief and deep love for humanity live side by side.
Find out why Michelle Yeoh is one of the 100 most influential people of 2022.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of TRUNK ARCHIVE is http://www.trunkarchive.com.
According to Rankiteo, TRUNK ARCHIVE’s AI-generated cybersecurity score is 749, reflecting their Moderate security posture.
According to Rankiteo, TRUNK ARCHIVE currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, TRUNK ARCHIVE is not certified under SOC 2 Type 1.
According to Rankiteo, TRUNK ARCHIVE does not hold a SOC 2 Type 2 certification.
According to Rankiteo, TRUNK ARCHIVE is not listed as GDPR compliant.
According to Rankiteo, TRUNK ARCHIVE does not currently maintain PCI DSS compliance.
According to Rankiteo, TRUNK ARCHIVE is not compliant with HIPAA regulations.
According to Rankiteo,TRUNK ARCHIVE is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
TRUNK ARCHIVE operates primarily in the Photography industry.
TRUNK ARCHIVE employs approximately 23 people worldwide.
TRUNK ARCHIVE presently has no subsidiaries across any sectors.
TRUNK ARCHIVE’s official LinkedIn profile has approximately 5,177 followers.
TRUNK ARCHIVE is classified under the NAICS code 54192, which corresponds to Photographic Services.
No, TRUNK ARCHIVE does not have a profile on Crunchbase.
Yes, TRUNK ARCHIVE maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/trunkarchive.
As of December 17, 2025, Rankiteo reports that TRUNK ARCHIVE has not experienced any cybersecurity incidents.
TRUNK ARCHIVE has an estimated 2,458 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, TRUNK ARCHIVE has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Nagios XI versions prior to 2026R1.1 are vulnerable to local privilege escalation due to an unsafe interaction between sudo permissions and application file permissions. A user‑accessible maintenance script may be executed as root via sudo and includes an application file that is writable by a lower‑privileged user. A local attacker with access to the application account can modify this file to introduce malicious code, which is then executed with elevated privileges when the script is run. Successful exploitation results in arbitrary code execution as the root user.
Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
SIPGO is a library for writing SIP services in the GO language. Starting in version 0.3.0 and prior to version 1.0.0-alpha-1, a nil pointer dereference vulnerability is in the SIPGO library's `NewResponseFromRequest` function that affects all normal SIP operations. The vulnerability allows remote attackers to crash any SIP application by sending a single malformed SIP request without a To header. The vulnerability occurs when SIP message parsing succeeds for a request missing the To header, but the response creation code assumes the To header exists without proper nil checks. This affects routine operations like call setup, authentication, and message handling - not just error cases. This vulnerability affects all SIP applications using the sipgo library, not just specific configurations or edge cases, as long as they make use of the `NewResponseFromRequest` function. Version 1.0.0-alpha-1 contains a patch for the issue.
GLPI is a free asset and IT management software package. Starting in version 9.1.0 and prior to version 10.0.21, an unauthorized user with an API access can read all knowledge base entries. Users should upgrade to 10.0.21 to receive a patch.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.