Comparison Overview

Workers Lifestyle Group

VS

Marriott International

Workers Lifestyle Group

55 Campbell Street, Blacktown, NSW, 2148, AU
Last Update: 2025-03-08 (UTC)

Excellent

From humble beginnings to becoming a large and successful hospitality and lifestyle organisation in Western Sydney, the Workers Lifestyle Group (formerly the Blacktown Workers Club Group) possesses a strong philosophy on stability and progress while priding itself on maintaining a true sense of community. The Group proudly boasts over 50,000 members and three hospitality venues with the recent announcement of plans to build a 640-unit integrated independent living and registered aged care precinct - Parkside Lifestyle. WORKERS BLACKTOWN Featuring five floors of sporting areas, restaurants, bars, function rooms, a 200 seat Ballroom, 800 seat Showroom, a great selection of internal member clubs and a host of facilities for its Members and Visitors, Workers Blacktown is a premium entertainment and leisure destination. WORKERS SPORTS Workers Sports is a modern, contemporary, and functional venue featuring a Sports Bar & Lounge, The Grange Buffet, Sports Cafรฉ, and a popular outdoor entertainment & Kids area featuring Black Bear BBQ. The Club is located on 55 acres including a renowned sporting complex featuring two national grade stadiums with fields & Facilities for both Soccer and Rugby League, three bowling greens, five tennis courts and two baseball diamonds. The sporting complex is home to 7,000 Junior & Senior Sportspeople. WORKERS HUBERTUS Our foundation members have long been considered pioneers given their foresight to establish Workers Blacktown and make wise investments to ensure our long-term longevity. The most recent Board acquisition was the purchase of Hubertus Country Club at the end of 2014. Its 25 acres of land, rich in German history, has been brought to back to life and operates as Workers Hubertus Country Club at the centre of the Western Sydney Parkland City containing the Nancy-Bird Walton International Airport.

NAICS: 721
NAICS Definition:
Employees: 80
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Marriott International

10400 Fernwood Road, None, Bethesda, MD, US, 20817
Last Update: 2025-08-24 (UTC)

Strong

Between 800 and 900

Marriott International, Inc. is based in Bethesda, Maryland, USA, and encompasses a portfolio of approximately 9,000 properties across more than 30 leading brands in 141 countries and territories. Its heritage can be traced to a root beer stand opened in Washington, D.C., in 1927 by J. Willard and Alice S. Marriott. Marriott International is an equal opportunity employer committed to hiring a diverse workforce and sustaining an inclusive culture. Marriott International does not discriminate on the basis of disability, veteran status or any other basis protected under federal, state or local laws. Community Guidelines:ย We reserve the right to remove without any notice content that we determine in our sole discretion is offensive or illegal, contains personally identifiable information, trademarks or copyrights belonging to a third party, advertises a third partyโ€™s products or services, or is otherwise inappropriate. Application Tips:ย We encourage job seekers to protect themselves from email and recruiting scams. Please note: 1) We do not accept applications via email or fax; 2) We never ask for money as part of the application process; 3) We only contact job applicants from approved email domains. Please find more information about Marriott Internationalโ€™s job application process and approved email address domainsย here: http://www.careers.marriott.com/tips-for-applying/

NAICS: 7211
NAICS Definition: Traveler Accommodation
Employees: 207,097
Subsidiaries: 36
12-month incidents
1
Known data breaches
5
Attack type number
2

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/blacktown-workers-club-group-ltd.jpeg
Workers Lifestyle Group
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/marriott-international.jpeg
Marriott International
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
Workers Lifestyle Group
100%
Compliance Rate
0/4 Standards Verified
Marriott International
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Hospitality Industry Average (This Year)

No incidents recorded for Workers Lifestyle Group in 2025.

Incidents vs Hospitality Industry Average (This Year)

Marriott International has 72.41% more incidents than the average of same-industry companies with at least one recorded incident.

Incident History โ€” Workers Lifestyle Group (X = Date, Y = Severity)

Workers Lifestyle Group cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” Marriott International (X = Date, Y = Severity)

Marriott International cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/blacktown-workers-club-group-ltd.jpeg
Workers Lifestyle Group
Incidents

No Incident

https://images.rankiteo.com/companyimages/marriott-international.jpeg
Marriott International
Incidents

Date Detected: 10/2025
Type:Breach
Blog: Blog

Date Detected: 07/2022
Type:Breach
Motivation: Financial Gain
Blog: Blog

Date Detected: 06/2022
Type:Breach
Blog: Blog

FAQ

Workers Lifestyle Group company company demonstrates a stronger AI risk posture compared to Marriott International company company, reflecting its advanced AI governance and monitoring frameworks.

Marriott International company has historically faced a number of disclosed cyber incidents, whereas Workers Lifestyle Group company has not reported any.

In the current year, Marriott International company has reported more cyber incidents than Workers Lifestyle Group company.

Neither Marriott International company nor Workers Lifestyle Group company has reported experiencing a ransomware attack publicly.

Marriott International company has disclosed at least one data breach, while Workers Lifestyle Group company has not reported such incidents publicly.

Neither Marriott International company nor Workers Lifestyle Group company has reported experiencing targeted cyberattacks publicly.

Neither Workers Lifestyle Group company nor Marriott International company has reported experiencing or disclosing vulnerabilities publicly.

Marriott International company has more subsidiaries worldwide compared to Workers Lifestyle Group company.

Marriott International company employs more people globally than Workers Lifestyle Group company, reflecting its scale as a Hospitality.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in bftpd up to 6.2. Impacted is the function expand_groups of the file options.c of the component Configuration File Handler. Executing manipulation can lead to heap-based buffer overflow. It is possible to launch the attack on the local host. Attacks of this nature are highly complex. The exploitability is considered difficult. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 3.5
Severity: HIGH
AV:L/AC:H/Au:S/C:P/I:P/A:P
cvss3
Base: 4.5
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 2.0
Severity: HIGH
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in LogicalDOC Community Edition up to 9.2.1. This issue affects some unknown processing of the file /frontend.jsp of the component Add Contact Page. Performing manipulation of the argument First Name/Last Name/Company/Address/Phone/Mobile results in cross site scripting. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:N/I:P/A:N
cvss3
Base: 3.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in toeverything AFFiNE up to 0.24.1. This vulnerability affects unknown code of the component Avatar Upload Image Endpoint. Such manipulation leads to cross site scripting. The attack may be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:N/I:P/A:N
cvss3
Base: 3.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was determined in givanz Vvveb up to 1.0.7.3. This affects the function Import of the file admin/controller/tools/import.php of the component Raw SQL Handler. This manipulation causes sql injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. Patch name: 52204b4a106b2fb02d16eee06a88a1f2697f9b35. It is recommended to apply a patch to fix this issue.

Risk Information
cvss2
Base: 5.8
Severity: LOW
AV:N/AC:L/Au:M/C:P/I:P/A:P
cvss3
Base: 4.7
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability has been found in 70mai X200 up to 20251010. Affected by this vulnerability is an unknown functionality of the component HTTP Web Server. The manipulation leads to use of default credentials. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X