Comparison Overview

BEAUTYDIRECTORY AU & NZ

VS

Poetry Daily

BEAUTYDIRECTORY AU & NZ

54 Park St, Sydney, New South Wales, 2000, AU
Last Update: 2025-11-25

An essential online resource for the Australian beauty industry, beautydirectory.com.au is the go-to for the inside information on everything beauty. First with industry news and new product information, beautydirectory speaks to thousands of beauty industry opinion-formers every day including leading beauty editors, cosmetics buyers, brand management, PR professionals and salon owners. Updated several times per day with local and international industry news, beautydirectory provides members with a snapshot of trends and industry developments. A daily blog and reports from launch events keeps members in touch with industry experts and insiders. The site also offers a vast database of more than 18,000 beauty products with ingredients listings, high-res images and media releases for download. Directories encompassing media, PR, salons, experts and PR resources are also provided to all members. As well as the opportunity to list brands on the site, beautydirectory offers clients a range of services to introduce the concept of successful publicity and help facilitate media coverage. beautydirectory is owned by Are Media Australia. Websites: http://www.beautydirectory.com.au

NAICS: 511
NAICS Definition:
Employees: 2
Subsidiaries: 1
12-month incidents
0
Known data breaches
0
Attack type number
0

Poetry Daily

MS 3E4, Fairfax, 22030, US
Last Update: 2025-11-21
Between 750 and 799

Poetry Daily is an anthology of contemporary poetry. Each day, we bring you a new poem from new books, magazines, and journals. Our purpose is to provide readers with a window on a very broad range of poetry offered annually by publishers large and small—to make it easier for people to find poets and poetry they like—and to help publishers bring news of their books, magazines, and journals to more people.

NAICS: 511
NAICS Definition: Publishing Industries (except Internet)
Employees: 6
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/directories-group-pty-ltd---beautydirectory.jpeg
BEAUTYDIRECTORY AU & NZ
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/poetry-daily.jpeg
Poetry Daily
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
BEAUTYDIRECTORY AU & NZ
100%
Compliance Rate
0/4 Standards Verified
Poetry Daily
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Book and Periodical Publishing Industry Average (This Year)

No incidents recorded for BEAUTYDIRECTORY AU & NZ in 2025.

Incidents vs Book and Periodical Publishing Industry Average (This Year)

No incidents recorded for Poetry Daily in 2025.

Incident History — BEAUTYDIRECTORY AU & NZ (X = Date, Y = Severity)

BEAUTYDIRECTORY AU & NZ cyber incidents detection timeline including parent company and subsidiaries

Incident History — Poetry Daily (X = Date, Y = Severity)

Poetry Daily cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/directories-group-pty-ltd---beautydirectory.jpeg
BEAUTYDIRECTORY AU & NZ
Incidents

No Incident

https://images.rankiteo.com/companyimages/poetry-daily.jpeg
Poetry Daily
Incidents

No Incident

FAQ

Poetry Daily company demonstrates a stronger AI Cybersecurity Score compared to BEAUTYDIRECTORY AU & NZ company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Poetry Daily company has disclosed a higher number of cyber incidents compared to BEAUTYDIRECTORY AU & NZ company.

In the current year, Poetry Daily company and BEAUTYDIRECTORY AU & NZ company have not reported any cyber incidents.

Neither Poetry Daily company nor BEAUTYDIRECTORY AU & NZ company has reported experiencing a ransomware attack publicly.

Neither Poetry Daily company nor BEAUTYDIRECTORY AU & NZ company has reported experiencing a data breach publicly.

Neither Poetry Daily company nor BEAUTYDIRECTORY AU & NZ company has reported experiencing targeted cyberattacks publicly.

Neither BEAUTYDIRECTORY AU & NZ company nor Poetry Daily company has reported experiencing or disclosing vulnerabilities publicly.

Neither BEAUTYDIRECTORY AU & NZ nor Poetry Daily holds any compliance certifications.

Neither company holds any compliance certifications.

BEAUTYDIRECTORY AU & NZ company has more subsidiaries worldwide compared to Poetry Daily company.

Poetry Daily company employs more people globally than BEAUTYDIRECTORY AU & NZ company, reflecting its scale as a Book and Periodical Publishing.

Neither BEAUTYDIRECTORY AU & NZ nor Poetry Daily holds SOC 2 Type 1 certification.

Neither BEAUTYDIRECTORY AU & NZ nor Poetry Daily holds SOC 2 Type 2 certification.

Neither BEAUTYDIRECTORY AU & NZ nor Poetry Daily holds ISO 27001 certification.

Neither BEAUTYDIRECTORY AU & NZ nor Poetry Daily holds PCI DSS certification.

Neither BEAUTYDIRECTORY AU & NZ nor Poetry Daily holds HIPAA certification.

Neither BEAUTYDIRECTORY AU & NZ nor Poetry Daily holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

ThingsBoard in versions prior to v4.2.1 allows an authenticated user to upload malicious SVG images via the "Image Gallery", leading to a Stored Cross-Site Scripting (XSS) vulnerability. The exploit can be triggered when any user accesses the public API endpoint of the malicious SVG images, or if the malicious images are embedded in an `iframe` element, during a widget creation, deployed to any page of the platform (e.g., dashboards), and accessed during normal operations. The vulnerability resides in the `ImageController`, which fails to restrict the execution of JavaScript code when an image is loaded by the user's browser. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and allowing unauthorized actions.

Risk Information
cvss4
Base: 6.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to to verify that the token used during the code exchange originates from the same authentication flow, which allows an authenticated user to perform account takeover via a specially crafted email address used when switching authentication methods and sending a request to the /users/login/sso/code-exchange endpoint. The vulnerability requires ExperimentalEnableAuthenticationTransfer to be enabled (default: enabled) and RequireEmailVerification to be disabled (default: disabled).

Risk Information
cvss3
Base: 9.9
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Description

Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to sanitize team email addresses to be visible only to Team Admins, which allows any authenticated user to view team email addresses via the GET /api/v4/channels/{channel_id}/common_teams endpoint

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Description

Exposure of email service credentials to users without administrative rights in Devolutions Server.This issue affects Devolutions Server: before 2025.2.21, before 2025.3.9.

Description

Exposure of credentials in unintended requests in Devolutions Server.This issue affects Server: through 2025.2.20, through 2025.3.8.