Comparison Overview

DSV - Global Transport and Logistics

VS

A.P. Moller - Maersk

DSV - Global Transport and Logistics

Hovedgaden 630, Hedehusene, DK, 2640
Last Update: 2025-12-01
Between 800 and 849

At DSV, we keep supply chains flowing in a world of change. We provide and manage supply chain solutions for thousands of companies every day – from small family-run businesses to large global corporations. Our reach is global, yet our presence is local and close to our customers. Approx. 160,000 employees in over 90 countries work passionately to deliver great customer experiences and high-quality services. We aspire to lead the way towards a more sustainable future for our industry and are committed to trading on nature’s terms. DSV is a dynamic organisation that fosters inclusivity and diversity. We conduct our business with integrity, respecting different cultures and the dignity and rights of individuals. Read more at www.dsv.com.

NAICS: 47
NAICS Definition: Transportation and Warehousing
Employees: 44,731
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

A.P. Moller - Maersk

Esplanaden 50, None, Copenhagen, None, DK, 1098
Last Update: 2025-12-01
Between 800 and 849

A.P. Moller - Maersk is an integrated transport and logistics company; going all the way, together, for our customers and society. ALL THE WAY is our commitment to connect the world so that everyone has both the possibility and the ability to trade, grow and thrive. The company employs roughly 110.000 employees across operations in 130 countries.

NAICS: 47
NAICS Definition: Transportation and Warehousing
Employees: 79,448
Subsidiaries: 17
12-month incidents
0
Known data breaches
0
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/dsv.jpeg
DSV - Global Transport and Logistics
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/maersk-group.jpeg
A.P. Moller - Maersk
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
DSV - Global Transport and Logistics
100%
Compliance Rate
0/4 Standards Verified
A.P. Moller - Maersk
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Transportation, Logistics, Supply Chain and Storage Industry Average (This Year)

No incidents recorded for DSV - Global Transport and Logistics in 2025.

Incidents vs Transportation, Logistics, Supply Chain and Storage Industry Average (This Year)

No incidents recorded for A.P. Moller - Maersk in 2025.

Incident History — DSV - Global Transport and Logistics (X = Date, Y = Severity)

DSV - Global Transport and Logistics cyber incidents detection timeline including parent company and subsidiaries

Incident History — A.P. Moller - Maersk (X = Date, Y = Severity)

A.P. Moller - Maersk cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/dsv.jpeg
DSV - Global Transport and Logistics
Incidents

No Incident

https://images.rankiteo.com/companyimages/maersk-group.jpeg
A.P. Moller - Maersk
Incidents

Date Detected: 6/2017
Type:Cyber Attack
Attack Vector: Malware (NotPetya), Supply Chain Compromise (via Ukrainian accounting software M.E.Doc), Lateral Movement
Motivation: Geopolitical (targeting Ukraine), Collateral Damage (global spread), Disruption of Critical Infrastructure
Blog: Blog

Date Detected: 6/2017
Type:Cyber Attack
Attack Vector: Compromised Software Updates (NotPetya via Ukrainian accounting software), Phishing/Social Engineering, Outdated/Poorly Maintained Systems, Third-Party Vendor Vulnerabilities, GNSS Jamming/Spoofing (Russia, Iran, China), AI-Assisted Exploits (e.g., subverting AI assistants), Manual Override of Digital Systems (human error)
Motivation: Financial Gain (Ransomware), Geopolitical Disruption (State Actors), Espionage (Strategic Maritime Data), Hacktivism (e.g., Lab-Dookhtegan), Operational Sabotage (e.g., GNSS Interference)
Blog: Blog

Date Detected: 6/2017
Type:Cyber Attack
Attack Vector: Compromised Software Update, Backdoor in M.E.Doc
Motivation: Geopolitical Disruption, Targeting Ukraine (Maersk as collateral damage)
Blog: Blog

FAQ

DSV - Global Transport and Logistics company demonstrates a stronger AI Cybersecurity Score compared to A.P. Moller - Maersk company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

A.P. Moller - Maersk company has historically faced a number of disclosed cyber incidents, whereas DSV - Global Transport and Logistics company has not reported any.

In the current year, A.P. Moller - Maersk company and DSV - Global Transport and Logistics company have not reported any cyber incidents.

Neither A.P. Moller - Maersk company nor DSV - Global Transport and Logistics company has reported experiencing a ransomware attack publicly.

Neither A.P. Moller - Maersk company nor DSV - Global Transport and Logistics company has reported experiencing a data breach publicly.

A.P. Moller - Maersk company has reported targeted cyberattacks, while DSV - Global Transport and Logistics company has not reported such incidents publicly.

Neither DSV - Global Transport and Logistics company nor A.P. Moller - Maersk company has reported experiencing or disclosing vulnerabilities publicly.

Neither DSV - Global Transport and Logistics nor A.P. Moller - Maersk holds any compliance certifications.

Neither company holds any compliance certifications.

A.P. Moller - Maersk company has more subsidiaries worldwide compared to DSV - Global Transport and Logistics company.

A.P. Moller - Maersk company employs more people globally than DSV - Global Transport and Logistics company, reflecting its scale as a Transportation, Logistics, Supply Chain and Storage.

Neither DSV - Global Transport and Logistics nor A.P. Moller - Maersk holds SOC 2 Type 1 certification.

Neither DSV - Global Transport and Logistics nor A.P. Moller - Maersk holds SOC 2 Type 2 certification.

Neither DSV - Global Transport and Logistics nor A.P. Moller - Maersk holds ISO 27001 certification.

Neither DSV - Global Transport and Logistics nor A.P. Moller - Maersk holds PCI DSS certification.

Neither DSV - Global Transport and Logistics nor A.P. Moller - Maersk holds HIPAA certification.

Neither DSV - Global Transport and Logistics nor A.P. Moller - Maersk holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Sigstore Timestamp Authority is a service for issuing RFC 3161 timestamps. Prior to 2.0.3, Function api.ParseJSONRequest currently splits (via a call to strings.Split) an optionally-provided OID (which is untrusted data) on periods. Similarly, function api.getContentType splits the Content-Type header (which is also untrusted data) on an application string. As a result, in the face of a malicious request with either an excessively long OID in the payload containing many period characters or a malformed Content-Type header, a call to api.ParseJSONRequest or api.getContentType incurs allocations of O(n) bytes (where n stands for the length of the function's argument). This vulnerability is fixed in 2.0.3.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Monkeytype is a minimalistic and customizable typing test. In 25.49.0 and earlier, there is improper handling of user input which allows an attacker to execute malicious javascript on anyone viewing a malicious quote submission. quote.text and quote.source are user input, and they're inserted straight into the DOM. If they contain HTML tags, they will be rendered (after some escaping using quotes and textarea tags).

Risk Information
cvss4
Base: 7.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

SysReptor is a fully customizable pentest reporting platform. Prior to 2025.102, there is a Stored Cross-Site Scripting (XSS) vulnerability allows authenticated users to execute malicious JavaScript in the context of other logged-in users by uploading malicious JavaScript files in the web UI. This vulnerability is fixed in 2025.102.

Risk Information
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
Description

Taiko Alethia is an Ethereum-equivalent, permissionless, based rollup designed to scale Ethereum without compromising its fundamental properties. In 2.3.1 and earlier, TaikoInbox._verifyBatches (packages/protocol/contracts/layer1/based/TaikoInbox.sol:627-678) advanced the local tid to whatever transition matched the current blockHash before knowing whether that batch would actually be verified. When the loop later broke (e.g., cooldown window not yet passed or transition invalidated), the function still wrote that newer tid into batches[lastVerifiedBatchId].verifiedTransitionId after decrementing batchId. Result: the last verified batch could end up pointing at a transition index from the next batch (often zeroed), corrupting the verified chain pointer.

Risk Information
cvss4
Base: 8.0
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A flaw has been found in youlaitech youlai-mall 1.0.0/2.0.0. Affected is the function getById/updateAddress/deleteAddress of the file /mall-ums/app-api/v1/addresses/. Executing manipulation can lead to improper control of dynamically-identified variables. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 6.5
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X