Comparison Overview

CoreWeave

VS

Myntra

CoreWeave

None, None, New York, NY, US, None
Last Update: 2025-12-09
Between 800 and 849

CoreWeave is the AI Hyperscaler™

NAICS: 513
NAICS Definition: Others
Employees: 1,046
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Myntra

Devarabeesanahalli Main Road, Bengaluru, Karnataka, IN, 560103
Last Update: 2025-12-09
Between 800 and 849

At Myntra, we don’t just follow fashion - we define it. As India's leading fashion, lifestyle, and beauty destination, we bring together the best of style, technology, and innovation to create a seamless shopping experience for our customers. With a commitment to empowering self-expression, we curate over 13,000+ brands and labels, blending global trends with India’s unique fashion pulse. Our people are at the heart of everything we do. We thrive on innovation and impact, where data-driven insights and cutting-edge technology shape the future of fashion. We encourage out-of-the-box thinking, collaboration with leaders and experts, and driving meaningful change. Myntraites have a passion for fashion - we take pride in being India's voice in fashion and in the brand we stand for. Our non-hierarchical, inclusive culture values ownership, meritocracy, and self-driven individuals who challenge the status quo and grow with every opportunity. We believe in empowering every Myntraite by providing the freedom to shape their career, fostering an environment where creativity thrives, and ensuring well-being and self-expression for all. If you thrive in a fast-paced, result-driven environment and share our passion for fashion, Myntra is the place for you. Explore opportunities: https://jobs.myntra.com/home Be The Trend. Be Myntra.

NAICS: 513
NAICS Definition: Others
Employees: 16,866
Subsidiaries: 2
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/coreweave.jpeg
CoreWeave
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/myntra.jpeg
Myntra
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
CoreWeave
100%
Compliance Rate
0/4 Standards Verified
Myntra
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Technology, Information and Internet Industry Average (This Year)

No incidents recorded for CoreWeave in 2025.

Incidents vs Technology, Information and Internet Industry Average (This Year)

No incidents recorded for Myntra in 2025.

Incident History — CoreWeave (X = Date, Y = Severity)

CoreWeave cyber incidents detection timeline including parent company and subsidiaries

Incident History — Myntra (X = Date, Y = Severity)

Myntra cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/coreweave.jpeg
CoreWeave
Incidents

No Incident

https://images.rankiteo.com/companyimages/myntra.jpeg
Myntra
Incidents

No Incident

FAQ

CoreWeave company demonstrates a stronger AI Cybersecurity Score compared to Myntra company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Myntra company has disclosed a higher number of cyber incidents compared to CoreWeave company.

In the current year, Myntra company and CoreWeave company have not reported any cyber incidents.

Neither Myntra company nor CoreWeave company has reported experiencing a ransomware attack publicly.

Neither Myntra company nor CoreWeave company has reported experiencing a data breach publicly.

Neither Myntra company nor CoreWeave company has reported experiencing targeted cyberattacks publicly.

Neither CoreWeave company nor Myntra company has reported experiencing or disclosing vulnerabilities publicly.

Neither CoreWeave nor Myntra holds any compliance certifications.

Neither company holds any compliance certifications.

Myntra company has more subsidiaries worldwide compared to CoreWeave company.

Myntra company employs more people globally than CoreWeave company, reflecting its scale as a Technology, Information and Internet.

Neither CoreWeave nor Myntra holds SOC 2 Type 1 certification.

Neither CoreWeave nor Myntra holds SOC 2 Type 2 certification.

Neither CoreWeave nor Myntra holds ISO 27001 certification.

Neither CoreWeave nor Myntra holds PCI DSS certification.

Neither CoreWeave nor Myntra holds HIPAA certification.

Neither CoreWeave nor Myntra holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 2.6
Severity: HIGH
AV:N/AC:H/Au:N/C:N/I:P/A:N
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 6.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X