Company Details
words-without-borders
15
4,823
511
wordswithoutborders.org
0
WOR_2428312
In-progress

Words Without Borders Company CyberSecurity Posture
wordswithoutborders.orgWords Without Borders is the premier destination for a global literary conversation. Founded in 2003, our mission is to cultivate global awareness by expanding access to international writing and creating a bridge between readers, writers, and translators. Our digital magazine offers unparalleled access to the world’s literary voices. These include writers like Elena Ferrante, Olga Tokarczuk, and Han Kang, all published on WWB before they became international sensations, as well as hundreds of new and rising talents. We are committed to centering writers in indigenous, endangered, and other world languages that are too often marginalized. Our education program, WWB Campus, brings global literature into hundreds of classrooms, offering free access to stories from around the world; multimedia curricular resources that bring literature to life; and professional support for educators. Each year, WWB organizes free virtual and in-person events with international authors, translators, and critics, providing a space for readers to engage directly with the perspectives we publish.
Company Details
words-without-borders
15
4,823
511
wordswithoutborders.org
0
WOR_2428312
In-progress
Between 750 and 799

WWB Global Score (TPRM)XXXX



No incidents recorded for Words Without Borders in 2025.
No incidents recorded for Words Without Borders in 2025.
No incidents recorded for Words Without Borders in 2025.
WWB cyber incidents detection timeline including parent company and subsidiaries

Words Without Borders is the premier destination for a global literary conversation. Founded in 2003, our mission is to cultivate global awareness by expanding access to international writing and creating a bridge between readers, writers, and translators. Our digital magazine offers unparalleled access to the world’s literary voices. These include writers like Elena Ferrante, Olga Tokarczuk, and Han Kang, all published on WWB before they became international sensations, as well as hundreds of new and rising talents. We are committed to centering writers in indigenous, endangered, and other world languages that are too often marginalized. Our education program, WWB Campus, brings global literature into hundreds of classrooms, offering free access to stories from around the world; multimedia curricular resources that bring literature to life; and professional support for educators. Each year, WWB organizes free virtual and in-person events with international authors, translators, and critics, providing a space for readers to engage directly with the perspectives we publish.


Founded in Portugal in 2001, PM Media has earned a place among the most prestigious media groups nationally and internationally. Having achieved recognition in the Portuguese market, PM Media broadened its horizons to Angola, a move that has enjoyed great success and which has led to the company’s r

COPYLANDIA OFFICE SYSTEMS CORPORATION is one of the biggest companies supplying office and printing equipment in the country. It is the distributor of world leading brands such as DEVELOP Multifunction Copiers (Black & White or Full Color, Digital), RISO Digital Duplicators, KONICA-MINOLTA laser pri

Empresa Transnacional con presencia en Inglaterra, España, Estados Unidos, Argentina, Chile y Perú, dedicada a la publicación de Directorios Comerciales impresos y electrónicos. Con 50 años en el Perú, actualmente formamos parte del grupo Yell, líder mundial en el mercado de directorios independien

Even before the launch of issue 1, FSM created a stir in the world of fashion, art and design. WAD, Jalouse, We Love Magazines, The Wall Street Journal, Elle Italia and others have written about us, waiting in anticipation for the magazine. Described as “cheeky”, “ingenious” and “unusual” we

THE PLAN Journal (TPJ) intends to disseminate and promote innovative, thought-provoking and relevant research, studies and criticism in architecture and urbanism. The criteria for selecting contributions will be innovation, clarity of purpose and method, and potential transformational impact on disc

PM Publishers Pvt. Ltd. established in 2009, envisions to providing the best quality school books for children with an endeavour to make significant contributions in the field of education in the country. Blessed with a team of experts who have rich experience in the field of education and are commi
.png)
Company to file interim financial report next week; business-update earnings call date to be announced.
Exploring why securing applications — not just networks — is essential to staying resilient in a multicloud, app-centric environment.
Threat actors are mastering the development of AI with no limitations to identify vulnerabilities faster and launch more effective attacks.
Cross-border data transfers enable global business but face challenges from varying cybersecurity laws, increasing risks of cyberattacks.
On the afternoon of October 16, President Lai Ching-te met with a delegation led by Thibaut Bruttin, director general of Reporters Without...
Escalating cyber threats and attacks have necessitated heightened international collaboration in OT and ICS cybersecurity environments to address the evolving...
How Insecurity Insight became a case study to standardize cyber resilience in the humanitarian sector.
One of the key cybersecurity challenges in Europe is reducing reliance on threat intelligence from non-EU countries.
Cybercrime has expanded for the same reasons that drove the mega growth of legal online businesses. The internet allows criminals to operate seamlessly across...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Words Without Borders is http://wordswithoutborders.org.
According to Rankiteo, Words Without Borders’s AI-generated cybersecurity score is 750, reflecting their Fair security posture.
According to Rankiteo, Words Without Borders currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Words Without Borders is not certified under SOC 2 Type 1.
According to Rankiteo, Words Without Borders does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Words Without Borders is not listed as GDPR compliant.
According to Rankiteo, Words Without Borders does not currently maintain PCI DSS compliance.
According to Rankiteo, Words Without Borders is not compliant with HIPAA regulations.
According to Rankiteo,Words Without Borders is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Words Without Borders operates primarily in the Book and Periodical Publishing industry.
Words Without Borders employs approximately 15 people worldwide.
Words Without Borders presently has no subsidiaries across any sectors.
Words Without Borders’s official LinkedIn profile has approximately 4,823 followers.
Words Without Borders is classified under the NAICS code 511, which corresponds to Publishing Industries (except Internet).
Yes, Words Without Borders has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/words-without-borders.
Yes, Words Without Borders maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/words-without-borders.
As of November 28, 2025, Rankiteo reports that Words Without Borders has not experienced any cybersecurity incidents.
Words Without Borders has an estimated 4,881 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Words Without Borders has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).
Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint
Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.
Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.