Comparison Overview

Covington & Burling LLP

VS

Noll Law Office, LLC

Covington & Burling LLP

One CityCenter, 850 10th St. NW, Washington, D.C., US, 20001
Last Update: 2025-07-29 (UTC)
Between 700 and 749

From our offices in Beijing, Boston, Brussels, Dubai, Frankfurt, Johannesburg, London, Los Angeles, New York, Palo Alto, San Francisco, Seoul, Shanghai, and Washington, we practice as one firm, holding closely to core values that start with a deep commitment to our clients and the quality of our work on their behalf, and that include an emphasis on teamwork among our lawyers and other professionals and a belief in the obligation of lawyers to make legal services available to all who need them. Our lawyers are recognized nationally and internationally for their legal skills and the depth of their expertise. Many have served in senior government positions. Virtually all of them provide public service through pro bono representation. We are cultivating a diverse, equitable, and inclusive firm that harnesses the abilities of every colleague and the power of diverse perspectives to help clients navigate their most complex business challenges. And because every client is a client of the firm, not of any specific lawyer, every client has the ability to call on any of our lawyers as needed.

NAICS: 54111
NAICS Definition: Offices of Lawyers
Employees: 2,701
Subsidiaries: 1
12-month incidents
0
Known data breaches
1
Attack type number
1

Noll Law Office, LLC

930 E Monroe St, None, Springfield, Illinois, US, 62701
Last Update: 2025-07-27 (UTC)
Between 700 and 749

Noll Law Office is a law firm located in Springfield, Illinois. Our family owned business has been representing clients in auto accidents, workers' compensation claims, criminal defense, and DUI defense in Central Illinois for almost 70 years.

NAICS: 54111
NAICS Definition: Offices of Lawyers
Employees: 7
Subsidiaries: 0
12-month incidents
0
Known data breaches
1
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/covington-&-burling.jpeg
Covington & Burling LLP
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/noll-law-office.jpeg
Noll Law Office, LLC
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Covington & Burling LLP
100%
Compliance Rate
0/4 Standards Verified
Noll Law Office, LLC
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Law Practice Industry Average (This Year)

No incidents recorded for Covington & Burling LLP in 2025.

Incidents vs Law Practice Industry Average (This Year)

No incidents recorded for Noll Law Office, LLC in 2025.

Incident History — Covington & Burling LLP (X = Date, Y = Severity)

Covington & Burling LLP cyber incidents detection timeline including parent company and subsidiaries

Incident History — Noll Law Office, LLC (X = Date, Y = Severity)

Noll Law Office, LLC cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/covington-&-burling.jpeg
Covington & Burling LLP
Incidents

Date Detected: 2/2024
Type:Breach
Attack Vector: Spear Phishing
Blog: Blog
https://images.rankiteo.com/companyimages/noll-law-office.jpeg
Noll Law Office, LLC
Incidents

Date Detected: 4/2022
Type:Breach
Attack Vector: External System Breach (Hacking)
Blog: Blog

FAQ

Noll Law Office, LLC company demonstrates a stronger AI Cybersecurity Score compared to Covington & Burling LLP company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Covington & Burling LLP and Noll Law Office, LLC have experienced a similar number of publicly disclosed cyber incidents.

In the current year, Noll Law Office, LLC company and Covington & Burling LLP company have not reported any cyber incidents.

Neither Noll Law Office, LLC company nor Covington & Burling LLP company has reported experiencing a ransomware attack publicly.

Both Noll Law Office, LLC company and Covington & Burling LLP company have disclosed experiencing at least one data breach.

Neither Noll Law Office, LLC company nor Covington & Burling LLP company has reported experiencing targeted cyberattacks publicly.

Neither Covington & Burling LLP company nor Noll Law Office, LLC company has reported experiencing or disclosing vulnerabilities publicly.

Neither Covington & Burling LLP nor Noll Law Office, LLC holds any compliance certifications.

Neither company holds any compliance certifications.

Covington & Burling LLP company has more subsidiaries worldwide compared to Noll Law Office, LLC company.

Covington & Burling LLP company employs more people globally than Noll Law Office, LLC company, reflecting its scale as a Law Practice.

Neither Covington & Burling LLP nor Noll Law Office, LLC holds SOC 2 Type 1 certification.

Neither Covington & Burling LLP nor Noll Law Office, LLC holds SOC 2 Type 2 certification.

Neither Covington & Burling LLP nor Noll Law Office, LLC holds ISO 27001 certification.

Neither Covington & Burling LLP nor Noll Law Office, LLC holds PCI DSS certification.

Neither Covington & Burling LLP nor Noll Law Office, LLC holds HIPAA certification.

Neither Covington & Burling LLP nor Noll Law Office, LLC holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Cursor is a code editor built for programming with AI. In versions 1.7.44 and below, various NTFS path quirks allow a prompt injection attacker to circumvent sensitive file protections and overwrite files which Cursor requires human approval to overwrite. Modification of some of the protected files can lead to RCE. Must be chained with a prompt injection or malicious model attach. Only affects systems supporting NTFS. This issue is fixed in version 2.0.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Description

Cursor is a code editor built for programming with AI. In versions 1.7.52 and below, manipulating internal settings may lead to RCE. Cursor detects path manipulation via forward slashes (./.cursor/./././././mcp.json etc.), and requires human approval to complete the operation. However, the same kind of manipulation using backslashes was not correctly detected, allowing an attacker who had already achieved prompt injection or some other level of control to overwrite sensitive editor files without approval on Windows machines. This issue is fixed in version 2.0.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Description

Cursor is a code editor built for programming with AI. In versions 1.7.28 and below, an input validation flaw in Cursor's MCP server installation enables specially crafted deep-links to bypass the standard security warnings and conceal executed commands from users if they choose to accept the server. If an attacker is able to convince a victim to navigate to a malicious deeplink, the victim will not see the correct speedbump modal, and if they choose to accept, will execute commands specified by the attackers deeplink.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Description

LinkAce is a self-hosted archive to collect website links. In versions 2.3.1 and below, the social media sharing functionality contains a Stored Cross-Site Scripting (XSS) vulnerability that allows any authenticated user to inject arbitrary JavaScript by creating a link with malicious HTML in the title field. When a user views the link details page and the shareable links are rendered, the malicious JavaScript executes in their browser. This vulnerability affects multiple sharing services and can be exploited to steal session cookies, perform actions on behalf of users, or deliver malware. This issue is fixed in version 2.4.0.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

CVE-2025-59596 is a denial-of-service vulnerability in Secure Access Windows client versions 12.0 to 14.10 that is addressed in version 14.12. If a local networking policy is active, attackers on an adjacent network may be able to send a crafted packet and cause the client system to crash.

Risk Information
cvss4
Base: 6.0
Severity: LOW
CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X