Comparison Overview

City of Port Phillip

VS

Queensland Government

City of Port Phillip

99a Carlisle Street, St Kilda, Victoria, 3182, AU
Last Update: 2026-01-21

The City of Port Phillip was formed in 1994 and is an amalgamation of the former cities of Port Melbourne, South Melbourne and St Kilda. We are an inner city council in Melbourne that includes the following neighbourhoods; St Kilda, Elwood, South Melbourne, Windsor, Ripponlea, Balaclava, St Kilda East, Port Melbourne, Albert Park, Middle Park. Council respectfully acknowledges the Traditional Owners of this land, the people of the Kulin Nations. We pay our respect to their Elders, past and present. We acknowledge and uphold their continuing relationship to this land.

NAICS: 92
NAICS Definition: Public Administration
Employees: 748
Subsidiaries: 24
12-month incidents
0
Known data breaches
1
Attack type number
2

Queensland Government

1 William Street, Brisbane, 4000, AU
Last Update: 2026-01-18
Between 750 and 799

ABOUT US We are the largest and most diverse organisation in our state. We have more than 90 government departments and organisations delivering for Queensland across 4000+ locations, from the Torres Strait to the Gold Coast; Mount Isa to Brisbane. This page is monitored by Queensland Government employees from 8am to 5pm, Monday to Friday. HOUSE RULES — all users must comply with LinkedIn policies and terms of use — please do not post content or comments that could be considered • abusive or obscene, name calling, harassment or personal attacks • defamatory towards a person or people • prejudicial, inflammatory or offensive • deceptive, misleading or false information about an individual, organisation, government or entity • personal or sensitive information about yourself or others • in violation of any intellectual property rights, or any other law or regulation • promotion of a product, business, company or organisation • off-topic or spam, including the same comment posted repeatedly. Any content or comments deemed to fit under these definitions will be deleted. Users found to repeatedly post these types of comments will be banned from this page. You should report any offensive material presented on LinkedIn. Complaints about defamatory digital matter or anything you consider to be offensive should be made to the attention of the Public Sector Commission via our website www.psc.qld.gov.au/contact/customer-compliments-and-complaints. A complaint about defamatory digital matter should contain your name, the matter and where it is located, and that you consider the matter to be defamatory. CURRENT CONDITIONS © The State of Queensland (Public Sector Commission) 2026 Subject to LinkedIn’s Statement of Rights and Responsibilities, all content released on this page is licensed under a Creative Commons Attribution (BY) 2.5 Australia Licence. Permissions may be available beyond the scope of this licence.

NAICS: 92
NAICS Definition: Public Administration
Employees: 84,670
Subsidiaries: 62
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/city-of-port-phillip.jpeg
City of Port Phillip
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/queensland-government.jpeg
Queensland Government
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
City of Port Phillip
100%
Compliance Rate
0/4 Standards Verified
Queensland Government
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Government Administration Industry Average (This Year)

No incidents recorded for City of Port Phillip in 2026.

Incidents vs Government Administration Industry Average (This Year)

No incidents recorded for Queensland Government in 2026.

Incident History — City of Port Phillip (X = Date, Y = Severity)

City of Port Phillip cyber incidents detection timeline including parent company and subsidiaries

Incident History — Queensland Government (X = Date, Y = Severity)

Queensland Government cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/city-of-port-phillip.jpeg
City of Port Phillip
Incidents

Date Detected: 12/2022
Type:Breach
Attack Vector: Unauthorized access
Blog: Blog

Date Detected: 02/2018
Type:Data Leak
Attack Vector: Unintentional Data Disclosure
Blog: Blog
https://images.rankiteo.com/companyimages/queensland-government.jpeg
Queensland Government
Incidents

No Incident

FAQ

Queensland Government company demonstrates a stronger AI Cybersecurity Score compared to City of Port Phillip company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

City of Port Phillip company has historically faced a number of disclosed cyber incidents, whereas Queensland Government company has not reported any.

In the current year, Queensland Government company and City of Port Phillip company have not reported any cyber incidents.

Neither Queensland Government company nor City of Port Phillip company has reported experiencing a ransomware attack publicly.

City of Port Phillip company has disclosed at least one data breach, while the other Queensland Government company has not reported such incidents publicly.

Neither Queensland Government company nor City of Port Phillip company has reported experiencing targeted cyberattacks publicly.

Neither City of Port Phillip company nor Queensland Government company has reported experiencing or disclosing vulnerabilities publicly.

Neither City of Port Phillip nor Queensland Government holds any compliance certifications.

Neither company holds any compliance certifications.

Queensland Government company has more subsidiaries worldwide compared to City of Port Phillip company.

Queensland Government company employs more people globally than City of Port Phillip company, reflecting its scale as a Government Administration.

Neither City of Port Phillip nor Queensland Government holds SOC 2 Type 1 certification.

Neither City of Port Phillip nor Queensland Government holds SOC 2 Type 2 certification.

Neither City of Port Phillip nor Queensland Government holds ISO 27001 certification.

Neither City of Port Phillip nor Queensland Government holds PCI DSS certification.

Neither City of Port Phillip nor Queensland Government holds HIPAA certification.

Neither City of Port Phillip nor Queensland Government holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g.,  execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).

Risk Information
cvss3
Base: 8.1
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H