Comparison Overview

Dublin Port Company

VS

Hapag-Lloyd AG

Dublin Port Company

Last Update: 2025-12-02
Between 700 and 749

Dublin Port is the largest freight and passenger port in Ireland with all cargo handling activities being carried out by private sector companies operating in intensely competitive markets within the Port. Dublin Port is one of five major ports classified as Tier 1 / Tier 2 ports in National Port Policy and categorised as core / comprehensive ports in the EU’s TEN-T network. Dublin Port’s large share of national port volumes, particularly in the Ro-Ro and Lo-Lo modes, arises due to a combination of two factors, location and depth of water. Dublin Port is a key part of the national port system and Dublin Port Company seeks to ensure that it plays its role in providing national port capacity. Dublin Port handles almost 50% of all trade in the Republic of Ireland. Located in the heart of Dublin City and at the hub of the national road and rail network, Dublin Port is a key strategic access point for Ireland and in particular the Dublin area.

NAICS: 483
NAICS Definition: Water Transportation
Employees: 147
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
1

Hapag-Lloyd AG

Ballindamm 25, Hamburg, DE, 20095
Last Update: 2025-12-01
Between 750 and 799

About Hapag-Lloyd With a fleet of 313 modern container ships and a total transport capacity of 2.5 million TEU, Hapag-Lloyd is one of the world’s leading liner shipping companies. In the Liner Shipping segment, the Company has around 14,000 employees and 400 offices in 140 countries. Hapag-Lloyd has a container capacity of 3.7 million TEU – including one of the largest and most modern fleets of reefer containers. A total of 133 liner services worldwide ensure fast and reliable connections between more than 600 ports on all the continents. In the Terminal & Infrastructure segment, Hapag-Lloyd has equity stakes in 21 terminals in Europe, Latin America, the United States, India and North Africa. Around 3,000 employees are assigned to the Terminal & Infrastructure segment and provide complementary logistics services at selected locations in addition to the terminal activities. Disclaimer This press release contains forward-looking statements that involve a number of risks and uncertainties. Such statements are based on a number of assumptions, estimates, projections or plans that are inherently subject to significant risks, uncertainties and contingencies. Actual results can differ materially from those anticipated in the Company’s forward-looking statements.

NAICS: 483
NAICS Definition: Water Transportation
Employees: 14,724
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/dublin-port-company.jpeg
Dublin Port Company
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/hapag-lloyd-ag.jpeg
Hapag-Lloyd AG
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Dublin Port Company
100%
Compliance Rate
0/4 Standards Verified
Hapag-Lloyd AG
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Maritime Transportation Industry Average (This Year)

No incidents recorded for Dublin Port Company in 2025.

Incidents vs Maritime Transportation Industry Average (This Year)

No incidents recorded for Hapag-Lloyd AG in 2025.

Incident History — Dublin Port Company (X = Date, Y = Severity)

Dublin Port Company cyber incidents detection timeline including parent company and subsidiaries

Incident History — Hapag-Lloyd AG (X = Date, Y = Severity)

Hapag-Lloyd AG cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/dublin-port-company.jpeg
Dublin Port Company
Incidents

Date Detected: 6/2019
Type:Data Leak
Blog: Blog
https://images.rankiteo.com/companyimages/hapag-lloyd-ag.jpeg
Hapag-Lloyd AG
Incidents

Date Detected: 3/2022
Type:Cyber Attack
Attack Vector: email (malicious hyperlinks)
Motivation: data theft (personal data)
Blog: Blog

FAQ

Hapag-Lloyd AG company demonstrates a stronger AI Cybersecurity Score compared to Dublin Port Company company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Dublin Port Company and Hapag-Lloyd AG have experienced a similar number of publicly disclosed cyber incidents.

In the current year, Hapag-Lloyd AG company and Dublin Port Company company have not reported any cyber incidents.

Neither Hapag-Lloyd AG company nor Dublin Port Company company has reported experiencing a ransomware attack publicly.

Neither Hapag-Lloyd AG company nor Dublin Port Company company has reported experiencing a data breach publicly.

Hapag-Lloyd AG company has reported targeted cyberattacks, while Dublin Port Company company has not reported such incidents publicly.

Neither Dublin Port Company company nor Hapag-Lloyd AG company has reported experiencing or disclosing vulnerabilities publicly.

Neither Dublin Port Company nor Hapag-Lloyd AG holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Dublin Port Company company nor Hapag-Lloyd AG company has publicly disclosed detailed information about the number of their subsidiaries.

Hapag-Lloyd AG company employs more people globally than Dublin Port Company company, reflecting its scale as a Maritime Transportation.

Neither Dublin Port Company nor Hapag-Lloyd AG holds SOC 2 Type 1 certification.

Neither Dublin Port Company nor Hapag-Lloyd AG holds SOC 2 Type 2 certification.

Neither Dublin Port Company nor Hapag-Lloyd AG holds ISO 27001 certification.

Neither Dublin Port Company nor Hapag-Lloyd AG holds PCI DSS certification.

Neither Dublin Port Company nor Hapag-Lloyd AG holds HIPAA certification.

Neither Dublin Port Company nor Hapag-Lloyd AG holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

MCP Server Kubernetes is an MCP Server that can connect to a Kubernetes cluster and manage it. Prior to 2.9.8, there is a security issue exists in the exec_in_pod tool of the mcp-server-kubernetes MCP Server. The tool accepts user-provided commands in both array and string formats. When a string format is provided, it is passed directly to shell interpretation (sh -c) without input validation, allowing shell metacharacters to be interpreted. This vulnerability can be exploited through direct command injection or indirect prompt injection attacks, where AI agents may execute commands without explicit user intent. This vulnerability is fixed in 2.9.8.

Risk Information
cvss3
Base: 6.4
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
Description

XML external entity (XXE) injection in eyoucms v1.7.1 allows remote attackers to cause a denial of service via crafted body of a POST request.

Description

An issue was discovered in Fanvil x210 V2 2.12.20 allowing unauthenticated attackers on the local network to access administrative functions of the device (e.g. file upload, firmware update, reboot...) via a crafted authentication bypass.

Description

Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.

Risk Information
cvss4
Base: 9.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.

Risk Information
cvss4
Base: 5.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X