Comparison Overview

TDS®

VS

SK Telecom

TDS®

8401 Greenway Boulevard, Suite 230, Middleton, WI, US, 53562
Last Update: 2026-01-12
Between 750 and 799

Telephone and Data Systems (TDS) provides wireless products and services; cable and wireline broadband, TV and voice services to approximately 5.5 million customers nationwide. The TDS companies share a strong commitment to customer satisfaction by offering the highest-quality services and products and excellent customer support. UScellular® UScellular, headquartered in Chicago, IL, provides a comprehensive range of wireless services and products, excellent customer support, and a high-quality network to 5 million customers nationwide. UScellular is traded on the New York Stock Exchange under USM. TDS Telecommunications Corp.® TDS Telecommunications Corp., headquartered in Madison, WI, provides high-speed Internet, phone and TV entertainment services, as well as VoIP business solutions, to customers in rural, suburban and metropolitan communities nationwide. Suttle-Straus® Suttle-Straus provides comprehensive marketing solutions including creative design, mailing, fulfillment, distribution, displays, signage, promotional products, conventional and digital printing.

NAICS: 517
NAICS Definition: Telecommunications
Employees: 3,529
Subsidiaries: 0
12-month incidents
0
Known data breaches
1
Attack type number
1

SK Telecom

SK T-Tower, 11, Jung-Gu, 100-999, KR
Last Update: 2026-01-13

SK Telecom has been leading the growth of the mobile industry since 1984. Now, we are taking customer experience to new heights by extending beyond connectivity. By placing AI at the core of its business, we are rapidly transforming into an AI company. We are focusing on driving innovations in areas of telecommunications, media, AI, metaverse, cloud and connected intelligence to deliver greater value for both individuals and enterprises. Our News: https://www.sktelecom.com/en/press/press.do e-Brochure: www.sktelecom.com/en/brochure

NAICS: 517
NAICS Definition: Telecommunications
Employees: 7,129
Subsidiaries: 0
12-month incidents
0
Known data breaches
5
Attack type number
2

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/-tds-.jpeg
TDS®
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/sk-telecom.jpeg
SK Telecom
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
TDS®
100%
Compliance Rate
0/4 Standards Verified
SK Telecom
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Telecommunications Industry Average (This Year)

No incidents recorded for TDS® in 2026.

Incidents vs Telecommunications Industry Average (This Year)

No incidents recorded for SK Telecom in 2026.

Incident History — TDS® (X = Date, Y = Severity)

TDS® cyber incidents detection timeline including parent company and subsidiaries

Incident History — SK Telecom (X = Date, Y = Severity)

SK Telecom cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/-tds-.jpeg
TDS®
Incidents

Date Detected: 1/2021
Type:Breach
Attack Vector: External System Breach (Hacking)
Blog: Blog
https://images.rankiteo.com/companyimages/sk-telecom.jpeg
SK Telecom
Incidents

Date Detected: 12/2025
Type:Breach
Blog: Blog

Date Detected: 11/2025
Type:Breach
Blog: Blog

Date Detected: 10/2025
Type:Breach
Attack Vector: Negligence in safety measures (SK Telecom), Illegal base stations intercepting verification codes (KT), Delay in notifying users (SK Telecom)
Motivation: Financial Gain, Fraud
Blog: Blog

FAQ

TDS® company demonstrates a stronger AI Cybersecurity Score compared to SK Telecom company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

SK Telecom company has faced a higher number of disclosed cyber incidents historically compared to TDS® company.

In the current year, SK Telecom company and TDS® company have not reported any cyber incidents.

Neither SK Telecom company nor TDS® company has reported experiencing a ransomware attack publicly.

Both SK Telecom company and TDS® company have disclosed experiencing at least one data breach.

SK Telecom company has reported targeted cyberattacks, while TDS® company has not reported such incidents publicly.

Neither TDS® company nor SK Telecom company has reported experiencing or disclosing vulnerabilities publicly.

Neither TDS® nor SK Telecom holds any compliance certifications.

Neither company holds any compliance certifications.

Neither TDS® company nor SK Telecom company has publicly disclosed detailed information about the number of their subsidiaries.

SK Telecom company employs more people globally than TDS® company, reflecting its scale as a Telecommunications.

Neither TDS® nor SK Telecom holds SOC 2 Type 1 certification.

Neither TDS® nor SK Telecom holds SOC 2 Type 2 certification.

Neither TDS® nor SK Telecom holds ISO 27001 certification.

Neither TDS® nor SK Telecom holds PCI DSS certification.

Neither TDS® nor SK Telecom holds HIPAA certification.

Neither TDS® nor SK Telecom holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Gradle is a build automation tool, and its native-platform tool provides Java bindings for native APIs. When resolving dependencies in versions before 9.3.0, some exceptions were not treated as fatal errors and would not cause a repository to be disabled. If a build encountered one of these exceptions, Gradle would continue to the next repository in the list and potentially resolve dependencies from a different repository. An exception like NoHttpResponseException can indicate transient errors. If the errors persist after a maximum number of retries, Gradle would continue to the next repository. This behavior could allow an attacker to disrupt the service of a repository and leverage another repository to serve malicious artifacts. This attack requires the attacker to have control over a repository after the disrupted repository. Gradle has introduced a change in behavior in Gradle 9.3.0 to stop searching other repositories when encountering these errors.

Risk Information
cvss4
Base: 8.6
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Gradle is a build automation tool, and its native-platform tool provides Java bindings for native APIs. When resolving dependencies in versions before 9.3.0, some exceptions were not treated as fatal errors and would not cause a repository to be disabled. If a build encountered one of these exceptions, Gradle would continue to the next repository in the list and potentially resolve dependencies from a different repository. If a Gradle build used an unresolvable host name, Gradle would continue to work as long as all dependencies could be resolved from another repository. An unresolvable host name could be caused by allowing a repository's domain name registration to lapse or typo-ing the real domain name. This behavior could allow an attacker to register a service under the host name used by the build and serve malicious artifacts. The attack requires the repository to be listed before others in the build configuration. Gradle has introduced a change in behavior in Gradle 9.3.0 to stop searching other repositories when encountering these errors.

Risk Information
cvss4
Base: 8.6
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

node-tar is a Tar for Node.js. The node-tar library (<= 7.5.2) fails to sanitize the linkpath of Link (hardlink) and SymbolicLink entries when preservePaths is false (the default secure behavior). This allows malicious archives to bypass the extraction root restriction, leading to Arbitrary File Overwrite via hardlinks and Symlink Poisoning via absolute symlink targets. This vulnerability is fixed in 7.5.3.

Risk Information
cvss4
Base: 8.2
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:L/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Microsoft Edge Elevation Service exposes a privileged COM interface that inadequately validates the privileges of the calling process. A standard (non‑administrator) local user can invoke the IElevatorEdge interface method LaunchUpdateCmdElevatedAndWait, causing the service to execute privileged update commands as LocalSystem. This allows a non‑administrator to enable or disable Windows Virtualization‑Based Security (VBS) by modifying protected system registry keys under HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard. Disabling VBS weakens critical platform protections such as Credential Guard, Hypervisor‑protected Code Integrity (HVCI), and the Secure Kernel, resulting in a security feature bypass.

Risk Information
cvss3
Base: 5.1
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Description

Improper authorization in Microsoft Power Apps allows an authorized attacker to execute code over a network.

Risk Information
cvss3
Base: 8.0
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H