Comparison Overview

Evri

VS

A.P. Moller - Maersk

Evri

Evri, Morley, Leeds, LS27 0WH, GB
Last Update: 2025-12-03
Between 750 and 799

Need some help? Get in touch with our friendly team at https://bit.ly/evriwebsite3 Every parcel, every person, every place. Evri is the UK’s biggest dedicated parcel delivery company, leading the way in creating responsible delivery experiences for everyone, everywhere. And we’re doing that by offering the most convenient way to send, receive and return parcels without costing the earth. From our roots as a mail order company nearly 50 years ago, we’ve grown considerably over the decades – and we’ve had a few name changes along the way. Now, with our friendly team of 30,000+ couriers, thousands of local one-stop ParcelShops and a growing network of state-of-the-art hubs and depots, Evri provides delivery solutions for everyone. Whether it’s someone sending a birthday present to a friend, a marketplace trader shipping in bulk or a major brand such as John Lewis, ASOS or Next, we work closely with diverse communities and more than 80% of the UK’s top retailers to safely get parcels from A to everywhere. A lot of parcels, in fact. More than 650 million a year. And it’s not just customers and retailers who trust us. We’ve won loads of industry awards over the years celebrating our achievements in IT, innovation, and our environmentally friendly green fleet. Evri is more than just a name. It’s a statement of intent, reflecting our commitment to customers and clients. To see our social media terms and conditions please visit: https://www.evri.com/social-media-house-rules

NAICS: 47
NAICS Definition: Transportation and Warehousing
Employees: 10,763
Subsidiaries: 1
12-month incidents
0
Known data breaches
0
Attack type number
0

A.P. Moller - Maersk

Esplanaden 50, None, Copenhagen, None, DK, 1098
Last Update: 2025-12-01
Between 800 and 849

A.P. Moller - Maersk is an integrated transport and logistics company; going all the way, together, for our customers and society. ALL THE WAY is our commitment to connect the world so that everyone has both the possibility and the ability to trade, grow and thrive. The company employs roughly 110.000 employees across operations in 130 countries.

NAICS: 47
NAICS Definition: Transportation and Warehousing
Employees: 79,448
Subsidiaries: 17
12-month incidents
0
Known data breaches
0
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/evridelivery.jpeg
Evri
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/maersk-group.jpeg
A.P. Moller - Maersk
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Evri
100%
Compliance Rate
0/4 Standards Verified
A.P. Moller - Maersk
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Transportation, Logistics, Supply Chain and Storage Industry Average (This Year)

No incidents recorded for Evri in 2025.

Incidents vs Transportation, Logistics, Supply Chain and Storage Industry Average (This Year)

No incidents recorded for A.P. Moller - Maersk in 2025.

Incident History — Evri (X = Date, Y = Severity)

Evri cyber incidents detection timeline including parent company and subsidiaries

Incident History — A.P. Moller - Maersk (X = Date, Y = Severity)

A.P. Moller - Maersk cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/evridelivery.jpeg
Evri
Incidents

No Incident

https://images.rankiteo.com/companyimages/maersk-group.jpeg
A.P. Moller - Maersk
Incidents

Date Detected: 6/2017
Type:Cyber Attack
Attack Vector: Malware (NotPetya), Supply Chain Compromise (via Ukrainian accounting software M.E.Doc), Lateral Movement
Motivation: Geopolitical (targeting Ukraine), Collateral Damage (global spread), Disruption of Critical Infrastructure
Blog: Blog

Date Detected: 6/2017
Type:Cyber Attack
Attack Vector: Compromised Software Updates (NotPetya via Ukrainian accounting software), Phishing/Social Engineering, Outdated/Poorly Maintained Systems, Third-Party Vendor Vulnerabilities, GNSS Jamming/Spoofing (Russia, Iran, China), AI-Assisted Exploits (e.g., subverting AI assistants), Manual Override of Digital Systems (human error)
Motivation: Financial Gain (Ransomware), Geopolitical Disruption (State Actors), Espionage (Strategic Maritime Data), Hacktivism (e.g., Lab-Dookhtegan), Operational Sabotage (e.g., GNSS Interference)
Blog: Blog

Date Detected: 6/2017
Type:Cyber Attack
Attack Vector: Compromised Software Update, Backdoor in M.E.Doc
Motivation: Geopolitical Disruption, Targeting Ukraine (Maersk as collateral damage)
Blog: Blog

FAQ

A.P. Moller - Maersk company demonstrates a stronger AI Cybersecurity Score compared to Evri company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

A.P. Moller - Maersk company has historically faced a number of disclosed cyber incidents, whereas Evri company has not reported any.

In the current year, A.P. Moller - Maersk company and Evri company have not reported any cyber incidents.

Neither A.P. Moller - Maersk company nor Evri company has reported experiencing a ransomware attack publicly.

Neither A.P. Moller - Maersk company nor Evri company has reported experiencing a data breach publicly.

A.P. Moller - Maersk company has reported targeted cyberattacks, while Evri company has not reported such incidents publicly.

Neither Evri company nor A.P. Moller - Maersk company has reported experiencing or disclosing vulnerabilities publicly.

Neither Evri nor A.P. Moller - Maersk holds any compliance certifications.

Neither company holds any compliance certifications.

A.P. Moller - Maersk company has more subsidiaries worldwide compared to Evri company.

A.P. Moller - Maersk company employs more people globally than Evri company, reflecting its scale as a Transportation, Logistics, Supply Chain and Storage.

Neither Evri nor A.P. Moller - Maersk holds SOC 2 Type 1 certification.

Neither Evri nor A.P. Moller - Maersk holds SOC 2 Type 2 certification.

Neither Evri nor A.P. Moller - Maersk holds ISO 27001 certification.

Neither Evri nor A.P. Moller - Maersk holds PCI DSS certification.

Neither Evri nor A.P. Moller - Maersk holds HIPAA certification.

Neither Evri nor A.P. Moller - Maersk holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Sigstore Timestamp Authority is a service for issuing RFC 3161 timestamps. Prior to 2.0.3, Function api.ParseJSONRequest currently splits (via a call to strings.Split) an optionally-provided OID (which is untrusted data) on periods. Similarly, function api.getContentType splits the Content-Type header (which is also untrusted data) on an application string. As a result, in the face of a malicious request with either an excessively long OID in the payload containing many period characters or a malformed Content-Type header, a call to api.ParseJSONRequest or api.getContentType incurs allocations of O(n) bytes (where n stands for the length of the function's argument). This vulnerability is fixed in 2.0.3.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Monkeytype is a minimalistic and customizable typing test. In 25.49.0 and earlier, there is improper handling of user input which allows an attacker to execute malicious javascript on anyone viewing a malicious quote submission. quote.text and quote.source are user input, and they're inserted straight into the DOM. If they contain HTML tags, they will be rendered (after some escaping using quotes and textarea tags).

Risk Information
cvss4
Base: 7.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

SysReptor is a fully customizable pentest reporting platform. Prior to 2025.102, there is a Stored Cross-Site Scripting (XSS) vulnerability allows authenticated users to execute malicious JavaScript in the context of other logged-in users by uploading malicious JavaScript files in the web UI. This vulnerability is fixed in 2025.102.

Risk Information
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
Description

Taiko Alethia is an Ethereum-equivalent, permissionless, based rollup designed to scale Ethereum without compromising its fundamental properties. In 2.3.1 and earlier, TaikoInbox._verifyBatches (packages/protocol/contracts/layer1/based/TaikoInbox.sol:627-678) advanced the local tid to whatever transition matched the current blockHash before knowing whether that batch would actually be verified. When the loop later broke (e.g., cooldown window not yet passed or transition invalidated), the function still wrote that newer tid into batches[lastVerifiedBatchId].verifiedTransitionId after decrementing batchId. Result: the last verified batch could end up pointing at a transition index from the next batch (often zeroed), corrupting the verified chain pointer.

Risk Information
cvss4
Base: 8.0
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A flaw has been found in youlaitech youlai-mall 1.0.0/2.0.0. Affected is the function getById/updateAddress/deleteAddress of the file /mall-ums/app-api/v1/addresses/. Executing manipulation can lead to improper control of dynamically-identified variables. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 6.5
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X