Comparison Overview

UIZ GmbH

VS

AMM Group

UIZ GmbH

LessingstraรŸe 79, Berlin, BE 13158, DE
Last Update: 2025-03-16 (UTC)
Between 900 and 1000

Excellent

UIZ GmbH is a technical research-based company with international access, approach and support with the highest level of creative strategic planning and service for new technology. We propose in providing high quality full-service along with support to clients on per-project and recurring basis. Proposed services include: 1) Environment and Information Technology Center 2) IT and Virtual Employee 3) Smart Technology Center

NAICS: None
NAICS Definition:
Employees: 0
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

AMM Group

Cuxhavener Strasse 36, Hamburg, Germany, 21149, DE
Last Update: 2025-03-07 (UTC)

Excellent

Between 900 and 1000

AMM Group is a multinational company Headquartered in Hamburg, Germany, with subsidiaries in India, the United Kingdom, Poland, and France. We specialize in IT and Engineering Services, Embedded Engineering, E-mobility, and Big Data solutions. Our diverse clientele spans across industries such as Aerospace, Automotive, Wind Energy, and Banking & Finance. AMM Group Companies: AMM Enterprise GmbH, Hamburg, Germany AMM Technologies GmbH, Frankfurt, Germany AMM India Private Limited, Bangalore, India AMM Enterprise UK Limited, Cardiff, United Kingdom AMM Poland Sp. z o.o., Warsaw, Poland AMM Enterprise SAS, Paris, France For inquiries, contact us at: Email: [email protected]

NAICS: None
NAICS Definition:
Employees: 147
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/defaultcompany.jpeg
UIZ GmbH
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/amm-enterprise-gmbh.jpeg
AMM Group
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
UIZ GmbH
100%
Compliance Rate
0/4 Standards Verified
AMM Group
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs IT-Dienstleistungen und IT-Beratung Industry Average (This Year)

No incidents recorded for UIZ GmbH in 2025.

Incidents vs IT-Dienstleistungen und IT-Beratung Industry Average (This Year)

No incidents recorded for AMM Group in 2025.

Incident History โ€” UIZ GmbH (X = Date, Y = Severity)

UIZ GmbH cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” AMM Group (X = Date, Y = Severity)

AMM Group cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/defaultcompany.jpeg
UIZ GmbH
Incidents

No Incident

https://images.rankiteo.com/companyimages/amm-enterprise-gmbh.jpeg
AMM Group
Incidents

No Incident

FAQ

Both UIZ GmbH company and AMM Group company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Historically, AMM Group company has disclosed a higher number of cyber incidents compared to UIZ GmbH company.

In the current year, AMM Group company and UIZ GmbH company have not reported any cyber incidents.

Neither AMM Group company nor UIZ GmbH company has reported experiencing a ransomware attack publicly.

Neither AMM Group company nor UIZ GmbH company has reported experiencing a data breach publicly.

Neither AMM Group company nor UIZ GmbH company has reported experiencing targeted cyberattacks publicly.

Neither UIZ GmbH company nor AMM Group company has reported experiencing or disclosing vulnerabilities publicly.

Neither UIZ GmbH company nor AMM Group company has publicly disclosed detailed information about the number of their subsidiaries.

AMM Group company employs more people globally than UIZ GmbH company, reflecting its scale as a IT-Dienstleistungen und IT-Beratung.

Latest Global CVEs (Not Company-Specific)

Description

Improper Protection Against Voltage and Clock Glitches in FPGA devices, could allow an attacker with physical access to undervolt the platform resulting in a loss of confidentiality.

Risk Information
cvss4
Base: 8.6
Severity: LOW
CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Malicious code was inserted into the Nx (build system) package and several related plugins. The tampered package was published to the npm software registry, via a supply-chain attack. Affected versions contain code that scans the file system, collects credentials, and posts them to GitHub as a repo under user's accounts.

Risk Information
cvss3
Base: 9.6
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Description

Flag Forge is a Capture The Flag (CTF) platform. In versions from 2.1.0 to before 2.3.0, the API endpoint GET /api/problems/:id returns challenge hints in plaintext within the question object, regardless of whether the user has unlocked them via point deduction. Users can view all hints for free, undermining the business logic of the platform and reducing the integrity of the challenge system. This issue has been patched in version 2.3.0.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Description

Flag Forge is a Capture The Flag (CTF) platform. In version 2.1.0, the /api/admin/assign-badge endpoint lacks proper access control, allowing any authenticated user to assign high-privilege badges (e.g., Staff) to themselves. This could lead to privilege escalation and impersonation of administrative roles. This issue has been patched in version 2.2.0.

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
Description

parse is a package designed to parse JavaScript SDK. A Prototype Pollution vulnerability in the SingleInstanceStateController.initializeState function of parse version 5.3.0 and before allows attackers to inject properties on Object.prototype via supplying a crafted payload, causing denial of service (DoS) as the minimum consequence.