Comparison Overview

A1 Hrvatska d.o.o.

VS

WNET

A1 Hrvatska d.o.o.

Last Update: 2026-01-17
Between 700 and 749

At A1 Croatia we take care that among the thousands existing options we can help you to find the best smart solutions that will simplify the complicated, save time and enjoy more. We do our best to improve digital customer experience with constant innovations and solutions. We are proud to say that our 2.000 employees take care of the needs of 2 million customers on everyday basis. WE ARE PART OF A1 TELEKOM AUSTRIA GROUP A1 Hrvatska is a part of A1 Telekom Austria Group, leading provider of digital services and communications solutions in Central and Eastern Europe. Together we are offering a state-of-the art network infrastructure and strive to empower digital life of more than 24 million users in areas of communications, payment, entertainment services and integrated business solutions. In Europe, the Group operates also in Austria, Bulgaria, Croatia, Slovenia, Belarus, Republic of Serbia and Republic of Macedonia. Headquartered in Vienna, the Group is an European unit of América Móvil, one of the world´s largest wireless services providers. You can find more info about A1 Telekom Austria Group here: https://www.linkedin.com/company/a1-telekom-austria-group/

NAICS: 517
NAICS Definition: Telecommunications
Employees: 1,274
Subsidiaries: 10
12-month incidents
0
Known data breaches
2
Attack type number
1

WNET

Богдана Хмельницкого 48А, None, Киев, None, UA, None
Last Update: 2026-01-12
Between 700 and 749

WNET is a telecom company that provides telecommunication and IT services in 100+ cities in 13 counties based on its own fiber network and fully integrated own CRM/ERP/OSS/BSS system. The company constantly invests in staff, and infrastructure and maximizes the automation of all processes. This helps WNET to grow faster than the market.

NAICS: 517
NAICS Definition: Telecommunications
Employees: 172
Subsidiaries: 1
12-month incidents
0
Known data breaches
1
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/a1hrvatska.jpeg
A1 Hrvatska d.o.o.
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/wnet.jpeg
WNET
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
A1 Hrvatska d.o.o.
100%
Compliance Rate
0/4 Standards Verified
WNET
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Telecommunications Industry Average (This Year)

No incidents recorded for A1 Hrvatska d.o.o. in 2026.

Incidents vs Telecommunications Industry Average (This Year)

No incidents recorded for WNET in 2026.

Incident History — A1 Hrvatska d.o.o. (X = Date, Y = Severity)

A1 Hrvatska d.o.o. cyber incidents detection timeline including parent company and subsidiaries

Incident History — WNET (X = Date, Y = Severity)

WNET cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/a1hrvatska.jpeg
A1 Hrvatska d.o.o.
Incidents

Date Detected: 02/2022
Type:Breach
Blog: Blog

Date Detected: 11/2019
Type:Breach
Blog: Blog
https://images.rankiteo.com/companyimages/wnet.jpeg
WNET
Incidents

Date Detected: 6/2017
Type:Breach
Attack Vector: Unauthorized Access
Blog: Blog

FAQ

WNET company demonstrates a stronger AI Cybersecurity Score compared to A1 Hrvatska d.o.o. company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

A1 Hrvatska d.o.o. company has faced a higher number of disclosed cyber incidents historically compared to WNET company.

In the current year, WNET company and A1 Hrvatska d.o.o. company have not reported any cyber incidents.

Neither WNET company nor A1 Hrvatska d.o.o. company has reported experiencing a ransomware attack publicly.

Both WNET company and A1 Hrvatska d.o.o. company have disclosed experiencing at least one data breach.

Neither WNET company nor A1 Hrvatska d.o.o. company has reported experiencing targeted cyberattacks publicly.

Neither A1 Hrvatska d.o.o. company nor WNET company has reported experiencing or disclosing vulnerabilities publicly.

Neither A1 Hrvatska d.o.o. nor WNET holds any compliance certifications.

Neither company holds any compliance certifications.

A1 Hrvatska d.o.o. company has more subsidiaries worldwide compared to WNET company.

A1 Hrvatska d.o.o. company employs more people globally than WNET company, reflecting its scale as a Telecommunications.

Neither A1 Hrvatska d.o.o. nor WNET holds SOC 2 Type 1 certification.

Neither A1 Hrvatska d.o.o. nor WNET holds SOC 2 Type 2 certification.

Neither A1 Hrvatska d.o.o. nor WNET holds ISO 27001 certification.

Neither A1 Hrvatska d.o.o. nor WNET holds PCI DSS certification.

Neither A1 Hrvatska d.o.o. nor WNET holds HIPAA certification.

Neither A1 Hrvatska d.o.o. nor WNET holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Gradle is a build automation tool, and its native-platform tool provides Java bindings for native APIs. When resolving dependencies in versions before 9.3.0, some exceptions were not treated as fatal errors and would not cause a repository to be disabled. If a build encountered one of these exceptions, Gradle would continue to the next repository in the list and potentially resolve dependencies from a different repository. An exception like NoHttpResponseException can indicate transient errors. If the errors persist after a maximum number of retries, Gradle would continue to the next repository. This behavior could allow an attacker to disrupt the service of a repository and leverage another repository to serve malicious artifacts. This attack requires the attacker to have control over a repository after the disrupted repository. Gradle has introduced a change in behavior in Gradle 9.3.0 to stop searching other repositories when encountering these errors.

Risk Information
cvss4
Base: 8.6
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Gradle is a build automation tool, and its native-platform tool provides Java bindings for native APIs. When resolving dependencies in versions before 9.3.0, some exceptions were not treated as fatal errors and would not cause a repository to be disabled. If a build encountered one of these exceptions, Gradle would continue to the next repository in the list and potentially resolve dependencies from a different repository. If a Gradle build used an unresolvable host name, Gradle would continue to work as long as all dependencies could be resolved from another repository. An unresolvable host name could be caused by allowing a repository's domain name registration to lapse or typo-ing the real domain name. This behavior could allow an attacker to register a service under the host name used by the build and serve malicious artifacts. The attack requires the repository to be listed before others in the build configuration. Gradle has introduced a change in behavior in Gradle 9.3.0 to stop searching other repositories when encountering these errors.

Risk Information
cvss4
Base: 8.6
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

node-tar is a Tar for Node.js. The node-tar library (<= 7.5.2) fails to sanitize the linkpath of Link (hardlink) and SymbolicLink entries when preservePaths is false (the default secure behavior). This allows malicious archives to bypass the extraction root restriction, leading to Arbitrary File Overwrite via hardlinks and Symlink Poisoning via absolute symlink targets. This vulnerability is fixed in 7.5.3.

Risk Information
cvss4
Base: 8.2
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:L/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Microsoft Edge Elevation Service exposes a privileged COM interface that inadequately validates the privileges of the calling process. A standard (non‑administrator) local user can invoke the IElevatorEdge interface method LaunchUpdateCmdElevatedAndWait, causing the service to execute privileged update commands as LocalSystem. This allows a non‑administrator to enable or disable Windows Virtualization‑Based Security (VBS) by modifying protected system registry keys under HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard. Disabling VBS weakens critical platform protections such as Credential Guard, Hypervisor‑protected Code Integrity (HVCI), and the Secure Kernel, resulting in a security feature bypass.

Risk Information
cvss3
Base: 5.1
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Description

Improper authorization in Microsoft Power Apps allows an authorized attacker to execute code over a network.

Risk Information
cvss3
Base: 8.0
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H