Comparison Overview

Cicada Partners

VS

CoinDCX

Cicada Partners

None
Last Update: 2024-09-06 (UTC)
Between 650 and 699

The team provides industry-leading third-party underwriting and pool management on DeFi Protocols, risk structuring, and institutional risk advisory services.

NAICS: 52
NAICS Definition: Finance and Insurance
Employees: 4
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
1

CoinDCX

None, None, Mumbai, Maharashtra, IN, None
Last Update: 2025-07-20 (UTC)
Between 0 and 549

Established in 2018, CoinDCX is the preferred crypto exchange in India, but also an instrumental player in building the broader Web3 ecosystem. Trusted by over 1.4 crore registered users. Our mission is simple: to provide easy access to Web3 experiences and democratize investments in virtual digital assets. We prioritize user safety and security, strictly adhering to KYC and AML guidelines. In our commitment to quality, we employ a stringent 7M Framework for the listing of crypto projects, ensuring users access only the safest virtual digital assets. CoinDCX has partnered with Okto for India to launch a secure multi-chain DeFi app that offers a keyless, self-custody wallet . It aims to simplify the world of decentralized finance (DeFi) by providing a secure, user-friendly, and innovative solution for managing virtual digital assets. Through CoinDCX Ventures, we've invested in over 15 innovative Web3 projects, reinforcing our dedication to the Web3 ecosystem. Our flagship educational initiative, #NamasteWeb3, empowers Indians with web3 knowledge, preparing them for the future of virtual digital assets. CoinDCX's vision and potential have gained the confidence of global investors, including Pantera, Steadview Capital, Kingsway, Polychain Capital, B Capital Group, Bain Capital Ventures, Cadenza, Draper Dragon, Republic, Kindred, and Coinbase Ventures. At CoinDCX, we're leading India towards the decentralized future of Web3 with an unwavering commitment to safety, simplicity, and education.

NAICS: 52
NAICS Definition: Finance and Insurance
Employees: 825
Subsidiaries: 0
12-month incidents
2
Known data breaches
2
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/cicada-partners.jpeg
Cicada Partners
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/coindcx.jpeg
CoinDCX
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Cicada Partners
100%
Compliance Rate
0/4 Standards Verified
CoinDCX
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Financial Services Industry Average (This Year)

No incidents recorded for Cicada Partners in 2025.

Incidents vs Financial Services Industry Average (This Year)

CoinDCX has 156.41% more incidents than the average of same-industry companies with at least one recorded incident.

Incident History — Cicada Partners (X = Date, Y = Severity)

Cicada Partners cyber incidents detection timeline including parent company and subsidiaries

Incident History — CoinDCX (X = Date, Y = Severity)

CoinDCX cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/cicada-partners.jpeg
Cicada Partners
Incidents

Date Detected: 9/2024
Type:Ransomware
Attack Vector: Ransomware, VMware ESXi exploitation
Motivation: Financial gain, Data extortion
Blog: Blog
https://images.rankiteo.com/companyimages/coindcx.jpeg
CoinDCX
Incidents

Date Detected: 7/2025
Type:Breach
Attack Vector: Social Engineering, Malware
Motivation: Financial Gain
Blog: Blog

Date Detected: 7/2025
Type:Breach
Attack Vector: Sophisticated Server Breach
Motivation: Financial Gain
Blog: Blog

FAQ

Cicada Partners company demonstrates a stronger AI Cybersecurity Score compared to CoinDCX company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

CoinDCX company has faced a higher number of disclosed cyber incidents historically compared to Cicada Partners company.

In the current year, CoinDCX company has reported more cyber incidents than Cicada Partners company.

Cicada Partners company has confirmed experiencing a ransomware attack, while CoinDCX company has not reported such incidents publicly.

CoinDCX company has disclosed at least one data breach, while Cicada Partners company has not reported such incidents publicly.

Neither CoinDCX company nor Cicada Partners company has reported experiencing targeted cyberattacks publicly.

Neither Cicada Partners company nor CoinDCX company has reported experiencing or disclosing vulnerabilities publicly.

Neither Cicada Partners nor CoinDCX holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Cicada Partners company nor CoinDCX company has publicly disclosed detailed information about the number of their subsidiaries.

CoinDCX company employs more people globally than Cicada Partners company, reflecting its scale as a Financial Services.

Neither Cicada Partners nor CoinDCX holds SOC 2 Type 1 certification.

Neither Cicada Partners nor CoinDCX holds SOC 2 Type 2 certification.

Neither Cicada Partners nor CoinDCX holds ISO 27001 certification.

Neither Cicada Partners nor CoinDCX holds PCI DSS certification.

Neither Cicada Partners nor CoinDCX holds HIPAA certification.

Neither Cicada Partners nor CoinDCX holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Cursor is a code editor built for programming with AI. In versions 1.7.44 and below, various NTFS path quirks allow a prompt injection attacker to circumvent sensitive file protections and overwrite files which Cursor requires human approval to overwrite. Modification of some of the protected files can lead to RCE. Must be chained with a prompt injection or malicious model attach. Only affects systems supporting NTFS. This issue is fixed in version 2.0.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Description

Cursor is a code editor built for programming with AI. In versions 1.7.52 and below, manipulating internal settings may lead to RCE. Cursor detects path manipulation via forward slashes (./.cursor/./././././mcp.json etc.), and requires human approval to complete the operation. However, the same kind of manipulation using backslashes was not correctly detected, allowing an attacker who had already achieved prompt injection or some other level of control to overwrite sensitive editor files without approval on Windows machines. This issue is fixed in version 2.0.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Description

Cursor is a code editor built for programming with AI. In versions 1.7.28 and below, an input validation flaw in Cursor's MCP server installation enables specially crafted deep-links to bypass the standard security warnings and conceal executed commands from users if they choose to accept the server. If an attacker is able to convince a victim to navigate to a malicious deeplink, the victim will not see the correct speedbump modal, and if they choose to accept, will execute commands specified by the attackers deeplink.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Description

LinkAce is a self-hosted archive to collect website links. In versions 2.3.1 and below, the social media sharing functionality contains a Stored Cross-Site Scripting (XSS) vulnerability that allows any authenticated user to inject arbitrary JavaScript by creating a link with malicious HTML in the title field. When a user views the link details page and the shareable links are rendered, the malicious JavaScript executes in their browser. This vulnerability affects multiple sharing services and can be exploited to steal session cookies, perform actions on behalf of users, or deliver malware. This issue is fixed in version 2.4.0.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

CVE-2025-59596 is a denial-of-service vulnerability in Secure Access Windows client versions 12.0 to 14.10 that is addressed in version 14.12. If a local networking policy is active, attackers on an adjacent network may be able to send a crafted packet and cause the client system to crash.

Risk Information
cvss4
Base: 6.0
Severity: LOW
CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X