Company Details
university-press-plc
198
687
511
universitypressplc.com
0
UNI_2846273
In-progress

University Press PLC Company CyberSecurity Posture
universitypressplc.comUniversity Press PLC was founded in 1949 under the name of Oxford University Press Nigeria, and has grown to become one of the oldest ,most experienced and the Nation's Foremost Publishers of materials for educational and for general reading. At incorporation as a public liability company in 1978,the Company's name was changed to University Press Limited with an authorized share capital of 8,000,000 Ordinary shares of 50k each. Quoted on the Nigerian Stock Exchange on 14th August 1978, UPPLC has, on two occasions, won the prestigious Stock Exchange Merit Award in the service sector of quoted companies. It has also won, for two consecutive years, 1984 and 1985, the Concord Prize for Excellence in Academic Publishing. The Company has an effective coverage of the country and the West Africa sub-region through the strategic location of its Area Offices, Depots, Showrooms and a number of Representatives in major cities and towns nationwide and in Accra, Ghana. The Head Office of the Company is at Three Crowns Building, Jericho, Ibadan. The main warehouse which is reputed to be one of the largest in tropical Africa is also located at Ibadan.
Company Details
university-press-plc
198
687
511
universitypressplc.com
0
UNI_2846273
In-progress
Between 750 and 799

UPP Global Score (TPRM)XXXX



No incidents recorded for University Press PLC in 2025.
No incidents recorded for University Press PLC in 2025.
No incidents recorded for University Press PLC in 2025.
UPP cyber incidents detection timeline including parent company and subsidiaries

University Press PLC was founded in 1949 under the name of Oxford University Press Nigeria, and has grown to become one of the oldest ,most experienced and the Nation's Foremost Publishers of materials for educational and for general reading. At incorporation as a public liability company in 1978,the Company's name was changed to University Press Limited with an authorized share capital of 8,000,000 Ordinary shares of 50k each. Quoted on the Nigerian Stock Exchange on 14th August 1978, UPPLC has, on two occasions, won the prestigious Stock Exchange Merit Award in the service sector of quoted companies. It has also won, for two consecutive years, 1984 and 1985, the Concord Prize for Excellence in Academic Publishing. The Company has an effective coverage of the country and the West Africa sub-region through the strategic location of its Area Offices, Depots, Showrooms and a number of Representatives in major cities and towns nationwide and in Accra, Ghana. The Head Office of the Company is at Three Crowns Building, Jericho, Ibadan. The main warehouse which is reputed to be one of the largest in tropical Africa is also located at Ibadan.


National WMU, auxiliary to the Southern Baptist Convention, challenges Christian believers to understand and be radically involved in the mission of God. Since its beginning in 1888, WMU has been true to its basic purpose: missions. As a nonprofit organization headquartered in Birmingham, Alabama

Vital VOICE got its start following the shuttering of the venerable Lesbian and Gay News Telegraph (founded in 1981) in January 2000. Recognizing the importance of continuity in the St. Louis LGBT community, St. Louis Network, LLC's Pam Schneider approached News Telegraph co-founder and editor Jim T

Welcome to Belfast’s best website for all the city’s must-read news, entertainment and what’s on coverage and sport. We’re a group of experienced local journalists who have covered the news in Northern Ireland for years. You can find www.belfastlive.co.uk on your desktop computer or tablet, and

The Anti-Corruption Report combines domain expertise with deep research and reporting to yield actionable insight. Each biweekly issue contains articles on the most pressing subtopics under the general topics of the Foreign Corrupt Practices Act and anti-bribery laws around the globe. Annual subscr

Rum Runner Publishing is not a subsidy publisher. We are a new type of publishing house looking for new nonfiction authors who are serious about their success. Rum Runner Publishing is young. We have a boatload of ideas on how to help authors earn real money and become famous. So, if you are an a

For 30 years, Blue Ridge Outdoors has been the leading free outdoor lifestyle magazine in the Southeast and Mid-Atlantic, and the authentic voice of the Blue Ridge. Our readers are devoted adventurers who spend their free time hiking, fishing, biking, paddling, going on road trips, checking out regi
.png)
Utah State University Eastern press release As part of USU Eastern's ongoing effort to introduce new faculty members to the campus community...
Sam Collins and Marius Muench of the University of Birmingham, UK, join the Black Hat USA 2025 News Desk to explain how anti-cheat systems...
Accenture expands APAC cybersecurity presence with CyberCX acquisition, adding 1400 professionals and AI-powered security platforms.
A statement has been issued following the 'cyber security incident'
London, UK-based education giant Pearson PLC has confirmed it suffered a data breach that potentially leaked corporate and customer information.
It's now been more than a week of chaos for Marks and Spencer (M&S), one of the UK's biggest brands, following what - it is now obvious - is a significant...
bp on behalf of its co-venturers in the Azeri-Chirag-Gunashli, Baku-Tbilisi-Ceyhan, Shah Deniz and South Caucasus Pipeline projects – SOCAR,...
Salt Typhoon's hacking spree has continued this year as the China-backed threat group recently compromised five more telecom providers across the globe.
A major incident declared at one of the region's busiest hospitals for cyber security reasons will continue into a third day.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of University Press PLC is http://www.universitypressplc.com.
According to Rankiteo, University Press PLC’s AI-generated cybersecurity score is 755, reflecting their Fair security posture.
According to Rankiteo, University Press PLC currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, University Press PLC is not certified under SOC 2 Type 1.
According to Rankiteo, University Press PLC does not hold a SOC 2 Type 2 certification.
According to Rankiteo, University Press PLC is not listed as GDPR compliant.
According to Rankiteo, University Press PLC does not currently maintain PCI DSS compliance.
According to Rankiteo, University Press PLC is not compliant with HIPAA regulations.
According to Rankiteo,University Press PLC is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
University Press PLC operates primarily in the Book and Periodical Publishing industry.
University Press PLC employs approximately 198 people worldwide.
University Press PLC presently has no subsidiaries across any sectors.
University Press PLC’s official LinkedIn profile has approximately 687 followers.
No, University Press PLC does not have a profile on Crunchbase.
Yes, University Press PLC maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/university-press-plc.
As of November 28, 2025, Rankiteo reports that University Press PLC has not experienced any cybersecurity incidents.
University Press PLC has an estimated 4,881 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, University Press PLC has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.