Comparison Overview

Bimo

VS

Arca Continental

Bimo

Last Update: 2025-03-15 (UTC)
Between 900 and 1000

Excellent

Blvd. Chefchaouni, Rue E Rte. 110, Ain Sebaa, Casablanca, 20250, Morocco ()212 0522 34 53 00, 212 0522 35 45 80 fax,

NAICS: 722
NAICS Definition:
Employees: 1,001-5,000
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Arca Continental

Av. San Jerรณnimo 813 Pte, Monterrey, Nuevo Leรณn, 64640, MX
Last Update: 2025-05-06 (UTC)

Moderate

Between 600 and 700

Arca Continental produces, distributes and sells non-alcoholic beverages under The Coca-Cola Company brand, as well as snacks under the brands of Bokados in Mexico, Inalecsa in Ecuador and Wise in the US. With an outstanding history spanning more than 98 years, Arca Continental is the second-largest Coca-Cola botter in Latin America and one of the largest in the world. Within its Coca-Cola franchise territory, the company servers over 119 million consumers in northern and western Mexico, Ecuador, Peru, northern Argentina and southwestern region of the U.S. The Companyยดs shares trade on the Mexican Stock Exchange under the ticker symbol "AC"โ€‹. For more information on Arca Continental, please visit www.arcacontal.com

NAICS: 722
NAICS Definition: Food Services and Drinking Places
Employees: 14,022
Subsidiaries: 1
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/bimo.jpeg
Bimo
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/arca-continental.jpeg
Arca Continental
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
Bimo
100%
Compliance Rate
0/4 Standards Verified
Arca Continental
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Food and Beverage Services Industry Average (This Year)

No incidents recorded for Bimo in 2025.

Incidents vs Food and Beverage Services Industry Average (This Year)

No incidents recorded for Arca Continental in 2025.

Incident History โ€” Bimo (X = Date, Y = Severity)

Bimo cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” Arca Continental (X = Date, Y = Severity)

Arca Continental cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/bimo.jpeg
Bimo
Incidents

No Incident

https://images.rankiteo.com/companyimages/arca-continental.jpeg
Arca Continental
Incidents

No Incident

FAQ

Bimo company company demonstrates a stronger AI risk posture compared to Arca Continental company company, reflecting its advanced AI governance and monitoring frameworks.

Historically, Arca Continental company has disclosed a higher number of cyber incidents compared to Bimo company.

In the current year, Arca Continental company and Bimo company have not reported any cyber incidents.

Neither Arca Continental company nor Bimo company has reported experiencing a ransomware attack publicly.

Neither Arca Continental company nor Bimo company has reported experiencing a data breach publicly.

Neither Arca Continental company nor Bimo company has reported experiencing targeted cyberattacks publicly.

Neither Bimo company nor Arca Continental company has reported experiencing or disclosing vulnerabilities publicly.

Arca Continental company has more subsidiaries worldwide compared to Bimo company.

Arca Continental company employs more people globally than Bimo company, reflecting its scale as a Food and Beverage Services.

Latest Global CVEs (Not Company-Specific)

Description

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in The Wikimedia Foundation MediaWiki Cargo extension allows SQL Injection.This issue affects MediaWiki Cargo extension: 1.39, 1.43, 1.44.

Risk Information
cvss4
Base: 2.1
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:U/V:C/RE:M/U:Amber
Description

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in The Wikimedia Foundation MediaWiki QuizGame extension allows Stored XSS.This issue affects MediaWiki QuizGame extension: 1.39, 1.43, 1.44.

Risk Information
cvss4
Base: 2.0
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:U/V:C/RE:M/U:Amber
Description

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in The Wikimedia Foundation MediaWiki PollNY extension allows Stored XSS.This issue affects MediaWiki PollNY extension: 1.39, 1.43, 1.44.

Risk Information
cvss4
Base: 2.0
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:U/V:C/RE:M/U:Amber
Description

Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in The Wikimedia Foundation MediaWiki WebAuthn extension allows Stored XSS.This issue affects MediaWiki WebAuthn extension: 1.39, 1.43, 1.44.

Risk Information
cvss4
Base: 5.8
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:L/U:Amber
Description

pyquokka is a framework for making data lakes work for time series. In versions 0.3.1 and prior, the FlightServer class directly uses pickle.loads() to deserialize action bodies received from Flight clients without any sanitization or validation in the do_action() method. The vulnerable code is located in pyquokka/flight.py at line 283 where arbitrary data from Flight clients is directly passed to pickle.loads(). When FlightServer is configured to listen on 0.0.0.0, this allows attackers across the entire network to perform arbitrary remote code execution by sending malicious pickled payloads through the set_configs action. Additional vulnerability points exist in the cache_garbage_collect, do_put, and do_get functions where pickle.loads is used to deserialize untrusted remote data.

Risk Information
cvss3
Base: 9.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H