Company Details
underground-cafe
12
17
711
ugshows.com
0
UND_3340714
In-progress

Underground Cafe Company CyberSecurity Posture
ugshows.comAn all-ages, safe venue on the south side of South Bend, Indiana featuring local, regional and national bands. Started in 2002 in a renovated school storage basement to give local bands a place to play and students to hang out in a safe, welcoming environment. Shows grew to auditorium, gymnasium, and theater shows.
Company Details
underground-cafe
12
17
711
ugshows.com
0
UND_3340714
In-progress
Between 750 and 799

Underground Cafe Global Score (TPRM)XXXX



No incidents recorded for Underground Cafe in 2025.
No incidents recorded for Underground Cafe in 2025.
No incidents recorded for Underground Cafe in 2025.
Underground Cafe cyber incidents detection timeline including parent company and subsidiaries

An all-ages, safe venue on the south side of South Bend, Indiana featuring local, regional and national bands. Started in 2002 in a renovated school storage basement to give local bands a place to play and students to hang out in a safe, welcoming environment. Shows grew to auditorium, gymnasium, and theater shows.


Glenwood Dance Studio, located in the heart of the Glenwood Arts District in Rogers Park, is a nonprofit dance studio. Our goal is to provide a warm and welcoming community for dancers to teach, learn, rehearse and perform various styles of dance in a supportive environment that appreciates the beau

The home of quality dance instruction on Long Island. Specializing in all forms of partner dance as well as specialty dance and fitness classes. Whether you have always wanted to take Ballroom or Latin dance lessons, or are getting ready for that special day. We have something for everyone, from Mo

Located in Fort Myers, Broadway Palm is Southwest Premier Dinner Theatre providing quality entertainment at a great price. Broadway Palm is open year-round and includes the main stage with 450-seats, a 100-seat theatre called The Off Broadway Palm, a lobby bar, gift shop and art gallery. The theatr

The Bovine Metropolis Theater is a comedy organization, specializing in performance, artistic training, corporate training and corporate entertainment. We feature sketch comedy, long form and short form improvisation. The Bovine has up to 8 comedy shows a week. Shows range in price from only $10

Delaware Theatre Company (DTC) is the state's flagship and largest professional theatre. Recognized as a cornerstone in the Brandywine Valley's rich cultural landscape, DTC has produced more than 150 plays for over one million patrons. DTC has been a pioneer in the revitalization of the Christina Ri

Wildwood is one of the premier cultural institutions in Arkansas, situated in a lovely 105-acre woodland garden in West Little Rock's Chenal Valley. Dedicated to its mission of celebrating the arts and nature, Wildwood seeks to inspire, educate and entertain. Wildwood now features year round program
.png)
The Lake County Public Defender's office recently recognized two Lake County staffers with The Chief's Award during the office's quarterly...
Cybersecurity US Stocks Week Ahead (Dec. 15–19, 2025): Zscaler's Bounce Test, SailPoint's Post-Earnings Reset, and Fed-Cut Volatility...
Enterprise adoption of generative AI (GenAI) is accelerating at a pace far beyond previous technological advances, with organizations using...
[NEW YORK] ServiceNow is in advanced talks to buy the cybersecurity startup Armis in a deal that may be valued at as much as US$7 billion...
How can we describe the past year in cybersecurity? No doubt, AI was front and center in so many conversations, and now there's no going...
When it comes to virtual safety, Scouting America leaders in Dayton and beyond want young people to be prepared.
A study by researchers at Stanford University found that an AI agent was able to outpace human hackers at detecting security weaknesses in...
Industrial cybersecurity is entering a more exposed and strategic phase defined by hard lessons from 2025. Organizations spent the year...
ServiceNow Inc. is in advanced talks to purchase Israeli-founded cybersecurity startup Armis in a deal that could be worth up to $7 billion,...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Underground Cafe is http://ugshows.com.
According to Rankiteo, Underground Cafe’s AI-generated cybersecurity score is 767, reflecting their Fair security posture.
According to Rankiteo, Underground Cafe currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Underground Cafe is not certified under SOC 2 Type 1.
According to Rankiteo, Underground Cafe does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Underground Cafe is not listed as GDPR compliant.
According to Rankiteo, Underground Cafe does not currently maintain PCI DSS compliance.
According to Rankiteo, Underground Cafe is not compliant with HIPAA regulations.
According to Rankiteo,Underground Cafe is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Underground Cafe operates primarily in the Performing Arts industry.
Underground Cafe employs approximately 12 people worldwide.
Underground Cafe presently has no subsidiaries across any sectors.
Underground Cafe’s official LinkedIn profile has approximately 17 followers.
No, Underground Cafe does not have a profile on Crunchbase.
Yes, Underground Cafe maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/underground-cafe.
As of December 14, 2025, Rankiteo reports that Underground Cafe has not experienced any cybersecurity incidents.
Underground Cafe has an estimated 2,700 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Underground Cafe has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.
A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.
A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.
A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.