Comparison Overview

EDAG Group

VS

UGL

EDAG Group

EDAG Engineering Group AG, Wiesbaden, 65205, DE
Last Update: 2025-12-01
Between 750 and 799

About the EDAG Group The EDAG Group is a globally leading, independent engineering service provider to the mobility industry which, with experts in mobility, industry and public solutions, combines excellent engineering with the latest technology trends. With an interdisciplinary team of some 9,000 experts, the EDAG Group, in its global network spanning approximately 80 sites, realizes projects for the automotive industry and other industrial sectors including semiconductors, chemicals, defence and medical devices. With over 55 years of engineering experience and its own 360-degree development approach, the EDAG Group covers the entire spectrum of modern mobility, combining innovative technologies and future-oriented concepts. Working across all industries, the EDAG Group develops products and production plants and facilities that take all manufacturing-relevant processes into full account and integrate them into a holistic network. Innovative strategies, data networking and a digital infrastructure are also at the center of the company's cross-industry engineering solutions, for the public sector, for example. The interdisciplinary approach and a strong partner network provide an optimal customer experience for a customer base of global market leaders. The company has been listed on the stock exchange since 2015 and generated sales of € 822 million in 2024. For more information, see the EDAG Group website: http://www.edag.com

NAICS: 54139
NAICS Definition: Engineering Services
Employees: 6,124
Subsidiaries: 2
12-month incidents
0
Known data breaches
0
Attack type number
1

UGL

Level 8, 40 Miller Street, North Sydney, NSW, 2060, AU
Last Update: 2025-12-01
Between 750 and 799

UGL is CIMIC Group's specialist end-to-end engineering, services and operations provider. We have a rich history dating back to 1899 and since then we have grown to be a market leader in many of the sectors in which we operate. Working with some of the most important companies and governments in Australia and globally, we help to play a role in people’s lives every day. We keep Australia moving through our transport manufacturing, maintenance and operations offering, and we support the energy sector through our renewables, power generation, resources and transmission operations. We are helping to shape the country through our major infrastructure projects across Australia and we’re preparing for the future with our new energy, Defence, telecommunications and technology expertise. We are passionate about our 9000+ people and keeping them safe. We’re experts in what we do, and our in-house engineering team ensures we can provide a true end-to-end outcome for our customers. With projects, operations and offices throughout the country, our footprint means we are involved in communities across Australia, providing expertise for our customers and employment and career opportunities for all Australians. ugllimited.com @UGLPtyLimited

NAICS: 54139
NAICS Definition: Engineering Services
Employees: 11,687
Subsidiaries: 9
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/edaggroup.jpeg
EDAG Group
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/ugl-limited.jpeg
UGL
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
EDAG Group
100%
Compliance Rate
0/4 Standards Verified
UGL
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Engineering Services Industry Average (This Year)

No incidents recorded for EDAG Group in 2025.

Incidents vs Engineering Services Industry Average (This Year)

No incidents recorded for UGL in 2025.

Incident History — EDAG Group (X = Date, Y = Severity)

EDAG Group cyber incidents detection timeline including parent company and subsidiaries

Incident History — UGL (X = Date, Y = Severity)

UGL cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/edaggroup.jpeg
EDAG Group
Incidents

Date Detected: 3/2021
Type:Cyber Attack
Blog: Blog
https://images.rankiteo.com/companyimages/ugl-limited.jpeg
UGL
Incidents

No Incident

FAQ

UGL company demonstrates a stronger AI Cybersecurity Score compared to EDAG Group company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

EDAG Group company has historically faced a number of disclosed cyber incidents, whereas UGL company has not reported any.

In the current year, UGL company and EDAG Group company have not reported any cyber incidents.

Neither UGL company nor EDAG Group company has reported experiencing a ransomware attack publicly.

Neither UGL company nor EDAG Group company has reported experiencing a data breach publicly.

EDAG Group company has reported targeted cyberattacks, while UGL company has not reported such incidents publicly.

Neither EDAG Group company nor UGL company has reported experiencing or disclosing vulnerabilities publicly.

Neither EDAG Group nor UGL holds any compliance certifications.

Neither company holds any compliance certifications.

UGL company has more subsidiaries worldwide compared to EDAG Group company.

UGL company employs more people globally than EDAG Group company, reflecting its scale as a Engineering Services.

Neither EDAG Group nor UGL holds SOC 2 Type 1 certification.

Neither EDAG Group nor UGL holds SOC 2 Type 2 certification.

Neither EDAG Group nor UGL holds ISO 27001 certification.

Neither EDAG Group nor UGL holds PCI DSS certification.

Neither EDAG Group nor UGL holds HIPAA certification.

Neither EDAG Group nor UGL holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

MCP Server Kubernetes is an MCP Server that can connect to a Kubernetes cluster and manage it. Prior to 2.9.8, there is a security issue exists in the exec_in_pod tool of the mcp-server-kubernetes MCP Server. The tool accepts user-provided commands in both array and string formats. When a string format is provided, it is passed directly to shell interpretation (sh -c) without input validation, allowing shell metacharacters to be interpreted. This vulnerability can be exploited through direct command injection or indirect prompt injection attacks, where AI agents may execute commands without explicit user intent. This vulnerability is fixed in 2.9.8.

Risk Information
cvss3
Base: 6.4
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
Description

XML external entity (XXE) injection in eyoucms v1.7.1 allows remote attackers to cause a denial of service via crafted body of a POST request.

Description

An issue was discovered in Fanvil x210 V2 2.12.20 allowing unauthenticated attackers on the local network to access administrative functions of the device (e.g. file upload, firmware update, reboot...) via a crafted authentication bypass.

Description

Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.

Risk Information
cvss4
Base: 9.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.

Risk Information
cvss4
Base: 5.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X