Company Details
xandra-design
1
26
541
xandradesign.com
0
XAN_3073952
In-progress

XANDRA DESIGN Company CyberSecurity Posture
xandradesign.comXANDRA DESIGN, LLC founder Lesley Alexandra Jump Baumann has over a decade of experience in providing graphic design solutions. She graduated from the University of Cincinnati’s College of Design, Architecture, Art and Planning with a BS in Graphic Design and is a member of the AIGA. Now based in Dayton, Ohio, she is currently involved with design projects around the world. Lesley has rich experience working with a wide range of clients and employers, from sole proprietors starting their first businesses to international corporations, and from non-profit organizations to publicly held companies. She uses her strengths in creative problem solving, aesthetics and knowledge of reproduction techniques to help clients develop strategies, refine their messages, tell their stories, distinguish themselves and inspire their audiences. Her work results in complete visual communications systems or individual components that help clients achieve their goals. These items may include, but are not limited to, logos, business cards, branding strategies, websites, brochures, newsletters, flyers and trade show exhibits.
Company Details
xandra-design
1
26
541
xandradesign.com
0
XAN_3073952
In-progress
Between 750 and 799

XANDRA DESIGN Global Score (TPRM)XXXX



No incidents recorded for XANDRA DESIGN in 2025.
No incidents recorded for XANDRA DESIGN in 2025.
No incidents recorded for XANDRA DESIGN in 2025.
XANDRA DESIGN cyber incidents detection timeline including parent company and subsidiaries

XANDRA DESIGN, LLC founder Lesley Alexandra Jump Baumann has over a decade of experience in providing graphic design solutions. She graduated from the University of Cincinnati’s College of Design, Architecture, Art and Planning with a BS in Graphic Design and is a member of the AIGA. Now based in Dayton, Ohio, she is currently involved with design projects around the world. Lesley has rich experience working with a wide range of clients and employers, from sole proprietors starting their first businesses to international corporations, and from non-profit organizations to publicly held companies. She uses her strengths in creative problem solving, aesthetics and knowledge of reproduction techniques to help clients develop strategies, refine their messages, tell their stories, distinguish themselves and inspire their audiences. Her work results in complete visual communications systems or individual components that help clients achieve their goals. These items may include, but are not limited to, logos, business cards, branding strategies, websites, brochures, newsletters, flyers and trade show exhibits.


Percolate is a woman-owned, DBE-certified graphic design and photography studio based in Berkeley, California. With over 15 years of experience, we have a proven track record of successfully collaborating with clients on projects of all sizes in both public and private sectors. Our services i

At Impel Creative, quality design lives alongside business realities. Our Cleveland-based full service design firm specializes in brand development and both print and web-based marketing materials for national clients, non-profit agencies and small businesses. How we do it is what truly sets us apar

Over the last 13 years, Exit Design has created value for large corporate clients such as 3M, Decathlon and India Infoline (IIFL) to exciting entrepreneur driven enterprises like Alma Mater, Uniqreate (Oxford University) and The PRactice. Services are focussed in the areas of Graphic Design and Dig

Rio Design launches companies and their brands, products or services by creating targeted advertising, design and communication materials for print and web. We take a "client-aligned" approach to our work, and provide clients with a design team that becomes part of their company. We’re like an in-h

Independently owned, free-lance graphic design firm, in business since 2002. Owner/Designer Julie Favreau Schwartz of Wyndjammr Design has provided graphic solutions to clients in both the private and not-for-profit sectors since 2002. Projects have included conference and event collaterals, poster

Das Konzept geht auf, wenn das Licht aus geht. Events, Dauerinstallationen, Filme und Shows. Klares Design und technische perfektion sind inklusive, sowie Blut, Schweiß und Nachtschichten. Design und Technik für Ihre mediale Inszenierung. Egal ob Sie Spezialisten für Teilbereiche oder eine komplette
.png)
In the past, I have designed posters, and other promotional materials to help advertise the department's resources and better prepare...
Automated system outperforms competing machines in high-stakes final event aimed at revolutionizing software vulnerability detection and patching.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of XANDRA DESIGN is http://www.xandradesign.com.
According to Rankiteo, XANDRA DESIGN’s AI-generated cybersecurity score is 751, reflecting their Fair security posture.
According to Rankiteo, XANDRA DESIGN currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, XANDRA DESIGN is not certified under SOC 2 Type 1.
According to Rankiteo, XANDRA DESIGN does not hold a SOC 2 Type 2 certification.
According to Rankiteo, XANDRA DESIGN is not listed as GDPR compliant.
According to Rankiteo, XANDRA DESIGN does not currently maintain PCI DSS compliance.
According to Rankiteo, XANDRA DESIGN is not compliant with HIPAA regulations.
According to Rankiteo,XANDRA DESIGN is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
XANDRA DESIGN operates primarily in the Graphic Design industry.
XANDRA DESIGN employs approximately 1 people worldwide.
XANDRA DESIGN presently has no subsidiaries across any sectors.
XANDRA DESIGN’s official LinkedIn profile has approximately 26 followers.
No, XANDRA DESIGN does not have a profile on Crunchbase.
Yes, XANDRA DESIGN maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/xandra-design.
As of December 03, 2025, Rankiteo reports that XANDRA DESIGN has not experienced any cybersecurity incidents.
XANDRA DESIGN has an estimated 2,657 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, XANDRA DESIGN has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-9 and 6.9.13-34, there is a vulnerability in ImageMagick’s Magick++ layer that manifests when Options::fontFamily is invoked with an empty string. Clearing a font family calls RelinquishMagickMemory on _drawInfo->font, freeing the font string but leaving _drawInfo->font pointing to freed memory while _drawInfo->family is set to that (now-invalid) pointer. Any later cleanup or reuse of _drawInfo->font re-frees or dereferences dangling memory. DestroyDrawInfo and other setters (Options::font, Image::font) assume _drawInfo->font remains valid, so destruction or subsequent updates trigger crashes or heap corruption. This vulnerability is fixed in 7.1.2-9 and 6.9.13-34.
FeehiCMS version 2.1.1 has a Remote Code Execution via Unrestricted File Upload in Ad Management. FeehiCMS version 2.1.1 allows authenticated remote attackers to upload files that the server later executes (or stores in an executable location) without sufficient validation, sanitization, or execution restrictions. An authenticated remote attacker can upload a crafted PHP file and cause the application or web server to execute it, resulting in remote code execution (RCE).
PHPGurukul Billing System 1.0 is vulnerable to SQL Injection in the admin/index.php endpoint. Specifically, the username parameter accepts unvalidated user input, which is then concatenated directly into a backend SQL query.
NMIS/BioDose software V22.02 and previous versions contain executable binaries with plain text hard-coded passwords. These hard-coded passwords could allow unauthorized access to both the application and database.
NMIS/BioDose V22.02 and previous versions' installation directory paths by default have insecure file permissions, which in certain deployment scenarios can enable users on client workstations to modify the program executables and libraries.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.