Comparison Overview

Arcosa Inc.

VS

YTL Corporation Bhd

Arcosa Inc.

500 N Akard St, Dallas, Texas, 75201, US
Last Update: 2025-03-06 (UTC)
Between 900 and 1000

Excellent

Arcosa, Inc. is a provider of infrastructure-related products and solutions with leading brands serving construction, engineered structures, and transportation markets. Our individual businesses have built reputations for quality, service, and operational excellence over decades. Arcosa serves a broad spectrum of infrastructure-related markets and is strategically focused on driving organic and disciplined acquisition growth to capitalize on the fragmented nature of many of the industries in which we operate. With Arcosaโ€™s current platform of businesses and additional growth opportunities, we are well- aligned with key market trends, such as the replacement and growth of aging transportation infrastructure, the continued shift to renewable power generation, and the expansion of new transmission, distribution, and telecommunications infrastructure. Our common stock is traded on the New York Stock Exchange under the symbol ACA.

NAICS: 23
NAICS Definition:
Employees: 1,507
Subsidiaries: 12
12-month incidents
0
Known data breaches
0
Attack type number
0

YTL Corporation Bhd

205 Jalan Bukit Bintang Kuala Lumpur, 55100, MY
Last Update: 2025-05-02 (UTC)

Excellent

Between 900 and 1000

YTL Corporation Berhad [198201012898 (92647-H)] is an integrated infrastructure developer with extensive operations in countries including Malaysia, the United Kingdom, Singapore, Indonesia, Australia, Japan, Jordan and China and total assets of RM89.9 billion (USD20.3 billion) (as at 31 December 2024). The core businesses of the YTL Group comprise utilities, construction contracting, cement manufacturing, property development and investment, hotel development and management, e-commerce initiatives and internet-based education solutions and services. YTL Corp is amongst the largest companies listed on Bursa Malaysia Securities Berhad (the Kuala Lumpur stock exchange) and is a component of the FTSE Bursa Malaysia Mid 70 Index. YTL Corp has also had a secondary listing on the Tokyo Stock Exchange since 1996 and was the first non-Japanese Asian company to list on the Tokyo exchange. YTL Corp, together with its listed entities in Malaysia (YTL Power International Berhad, YTL Hospitality REIT and Malayan Cement Berhad (formerly known as Lafarge Malaysia Berhad)), has a combined market capitalisation of approximately RM48.5 billion (US10.5 billion) as at 31 December 2023. YTL Corp also has a stake in Singapore-listed Starhill Global REIT, which owns prime retail assets in Singapore, Malaysia, Japan, China and Australia. The YTL Group is committed to producing world class products and services at competitive prices. This corporate philosophy has enabled the YTL group to build up a growing customer base of more than 12 million customers globally over the last 60 years.

NAICS: 23
NAICS Definition: Construction
Employees: 10,001+
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/arcosa-inc.jpeg
Arcosa Inc.
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/ytl-corporation-bhd.jpeg
YTL Corporation Bhd
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
Arcosa Inc.
100%
Compliance Rate
0/4 Standards Verified
YTL Corporation Bhd
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Construction Industry Average (This Year)

No incidents recorded for Arcosa Inc. in 2025.

Incidents vs Construction Industry Average (This Year)

No incidents recorded for YTL Corporation Bhd in 2025.

Incident History โ€” Arcosa Inc. (X = Date, Y = Severity)

Arcosa Inc. cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” YTL Corporation Bhd (X = Date, Y = Severity)

YTL Corporation Bhd cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/arcosa-inc.jpeg
Arcosa Inc.
Incidents

No Incident

https://images.rankiteo.com/companyimages/ytl-corporation-bhd.jpeg
YTL Corporation Bhd
Incidents

No Incident

FAQ

Both Arcosa Inc. company and YTL Corporation Bhd company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Historically, YTL Corporation Bhd company has disclosed a higher number of cyber incidents compared to Arcosa Inc. company.

In the current year, YTL Corporation Bhd company and Arcosa Inc. company have not reported any cyber incidents.

Neither YTL Corporation Bhd company nor Arcosa Inc. company has reported experiencing a ransomware attack publicly.

Neither YTL Corporation Bhd company nor Arcosa Inc. company has reported experiencing a data breach publicly.

Neither YTL Corporation Bhd company nor Arcosa Inc. company has reported experiencing targeted cyberattacks publicly.

Neither Arcosa Inc. company nor YTL Corporation Bhd company has reported experiencing or disclosing vulnerabilities publicly.

Arcosa Inc. company has more subsidiaries worldwide compared to YTL Corporation Bhd company.

Arcosa Inc. company employs more people globally than YTL Corporation Bhd company, reflecting its scale as a Construction.

Latest Global CVEs (Not Company-Specific)

Description

A security flaw has been discovered in Tipray ๅŽฆ้—จๅคฉ้”็ง‘ๆŠ€่‚กไปฝๆœ‰้™ๅ…ฌๅธ Data Leakage Prevention System ๅคฉ้”ๆ•ฐๆฎๆณ„้œฒ้˜ฒๆŠค็ณป็ปŸ 1.0. Impacted is the function doFilter of the file findDeptPage.do. Performing manipulation of the argument sort results in sql injection. It is possible to initiate the attack remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in Vanderlande Baggage 360 7.0.0. This issue affects some unknown processing of the file /api-addons/v1/messages. Such manipulation of the argument Message leads to cross site scripting. The attack may be performed from remote. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:N/I:P/A:N
cvss3
Base: 3.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was found in qianfox FoxCMS up to 1.2. This affects an unknown part of the file /index.php/Search of the component Search Page. The manipulation of the argument keyword results in cross site scripting. The attack can be executed remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:P/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability has been found in UTT HiPER 840G up to 3.1.1-190328. Affected by this issue is the function strcpy of the file /goform/formTaskEdit. The manipulation of the argument txtMin2 leads to buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A flaw has been found in CodeCanyon/ui-lib Mentor LMS up to 1.1.1. Affected by this vulnerability is an unknown functionality of the component API. Executing manipulation can lead to permissive cross-domain policy with untrusted domains. The attack may be launched remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X