Comparison Overview

Eliivate

VS

Arçelik Türkiye

Eliivate

680 Lynn Street, Danville, Virginia, 24541, US
Last Update: 2025-03-08 (UTC)
Between 900 and 1000

Excellent

Introducing the all new lifestyle brand — Eliivate. // Our goal is to create products that push you to new limits. The time is now. All products are hand-made & packaged in Virginia.

NAICS: 339
NAICS Definition:
Employees: 1
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Arçelik Türkiye

Karaağaç Caddesi, İstanbul, Sütlüce/Beyoğlu, 34445, TR
Last Update: 2025-03-07 (UTC)

Excellent

Between 900 and 1000

Arçelik Türkiye olarak, "Dünyaya Saygılı Dünyada Saygın" misyonuyla yola çıkıyoruz ve teknoloji, insan kaynağı ve üretim gücümüzü sürdürülebilir bir gelecek için kullanıyoruz. 1955 yılında başlayan yolculuğumuz bugün, 22 marka, 46 üretim tesisi, 55.000 çalışan ve 58 ülkedeki 125 iştirak ile global bir varlık olarak devam ediyor. Arçelik markaları arasında Arçelik, Beko, Whirlpool*, Grundig, Hotpoint, Arctic, Ariston*, Leisure, Indesit, Blomberg, Defy, Dawlance, Hitachi*, Voltas Beko, Singer, ElektraBregenz, Flavel, Bauknecht, Privileg, Altus, Ignis ve Polar bulunmaktadır. Vizyonumuz, kendimizi sürekli yenileyerek ve sektörümüzde liderliği sürdürerek, dijitalleşen hanelerin ve şirketlerin güvenilir çözüm ortağı olmaktır. 31 Ar-Ge ve Tasarım Merkezi ile inovasyon ve sürdürülebilirlik konularında öncü rol oynamaktayız. *Limitli marka kullanım hakkına sahiptir.

NAICS: 339
NAICS Definition:
Employees: 11,197
Subsidiaries: 52
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/eliivate.jpeg
Eliivate
ISO 27001
Not verified
SOC 2
Not verified
GDPR
No public badge
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/arcelikturkiye.jpeg
Arçelik Türkiye
ISO 27001
Not verified
SOC 2
Not verified
GDPR
No public badge
PCI DSS
No public badge
Compliance Summary
Eliivate
100%
Compliance Rate
0/4 Standards Verified
Arçelik Türkiye
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Manufacturing Industry Average (This Year)

No incidents recorded for Eliivate in 2025.

Incidents vs Manufacturing Industry Average (This Year)

No incidents recorded for Arçelik Türkiye in 2025.

Incident History — Eliivate (X = Date, Y = Severity)

Eliivate cyber incidents detection timeline including parent company and subsidiaries

Incident History — Arçelik Türkiye (X = Date, Y = Severity)

Arçelik Türkiye cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/eliivate.jpeg
Eliivate
Incidents

No Incident

https://images.rankiteo.com/companyimages/arcelikturkiye.jpeg
Arçelik Türkiye
Incidents

No Incident

FAQ

Both Eliivate company and Arçelik Türkiye company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Historically, Arçelik Türkiye company has disclosed a higher number of cyber incidents compared to Eliivate company.

In the current year, Arçelik Türkiye company and Eliivate company have not reported any cyber incidents.

Neither Arçelik Türkiye company nor Eliivate company has reported experiencing a ransomware attack publicly.

Neither Arçelik Türkiye company nor Eliivate company has reported experiencing a data breach publicly.

Neither Arçelik Türkiye company nor Eliivate company has reported experiencing targeted cyberattacks publicly.

Neither Eliivate company nor Arçelik Türkiye company has reported experiencing or disclosing vulnerabilities publicly.

Arçelik Türkiye company has more subsidiaries worldwide compared to Eliivate company.

Arçelik Türkiye company employs more people globally than Eliivate company, reflecting its scale as a Manufacturing.

Latest Global CVEs (Not Company-Specific)

Description

PyVista provides 3D plotting and mesh analysis through an interface for the Visualization Toolkit (VTK). Version 0.46.3 of the PyVista Project is vulnerable to remote code execution via dependency confusion. Two pieces of code use`--extra-index-url`. But when `--extra-index-url` is used, pip always checks for the PyPI index first, and then the external index. One package listed in the code is not published in PyPI. If an attacker publishes a package with higher version in PyPI, the malicious code from the attacker controlled package may be pulled, leading to remote code execution and a supply chain attack. As of time of publication, a patched version is unavailable.

Risk Information
cvss4
Base: 9.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

KUNO CMS is a fully deployable full-stack blog application. In versions prior to 1.3.15, an SSRF (Server-Side Request Forgery) vulnerability exists in the Media module of the Kuno CMS administrative panel. A logged-in administrator can upload a specially crafted SVG file containing an external image reference, causing the server to initiate an outgoing connection to an arbitrary external URL. This can lead to information disclosure or internal network probing. Version 1.3.15 contains a fix for the issue.

Risk Information
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:L/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

The Profile widget in Liferay Portal 7.4.0 through 7.4.3.111, and older unsupported versions, and Liferay DXP 2023.Q4.0 through 2023.Q4.5, 2023.Q3.1 through 2023.Q3.8, 7.4 GA through update 92, and older unsupported versions uses a user’s name in the “Content-Disposition” header, which allows remote authenticated users to change the file extension when a vCard file is downloaded.

Risk Information
cvss4
Base: 4.8
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

The YoSmart YoLink API through 2025-10-02 uses an endpoint URL that is derived from a device's MAC address along with an MD5 hash of non-secret information, such as a key that begins with cf50.

Risk Information
cvss3
Base: 5.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
Description

The YoSmart YoLink application through 2025-10-02 has session tokens with unexpectedly long lifetimes.

Risk Information
cvss3
Base: 3.5
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N