Comparison Overview

FunnelKit -We are Hiring !

VS

Booking.com

FunnelKit -We are Hiring !

Block B,Janakpuri, Janakpuri, Delhi, Delhi, IN, 110058
Last Update: 2025-12-01
Between 650 and 699

Hi There! Thanks for dropping by to get to know us more. We are NOT a passionate team of coders, marketers, or designers - NADA. We are a passionate team of Problem-Solvers! Each member of our team is dedicated to solving problems in the WooCommerce space through innovation and design. We started this company back in 2011, as a web-consultancy, building custom solutions for our international clients. But as we progressed, we began to spot gaps in the market, and instead of sitting back, we decided to rise up and fill in those gaps. Our products are now serving more than 30,000 happy stores, across the globe today. As a team, we believe in an open-door policy and flexible timings. We host brainstorming & growth sessions, each month so that everyone can chime in and get equal opportunities. And while we have been able to develop a fun start-up culture at our space, we stand strong in terms of our ethics and values. Everyone's time and work are accounted for and every member's voice is heard. When you join our team, you will have a sturdy and strong ladder to climb. Wisetr, currently has two product lines - Funnelkit.com and XL Plugins. XL plugins creates conversion-boosting WooCommerce Plugins for time-strapped entrepreneurs and small business owners. And FunnelKit offers a new range of products focussed around bringing a Sales Funnel revolution in the WordPress/WooCommerce space. Both of these product lines are designed to get real-time ROI and massive conversions for store owners.

NAICS: 5112
NAICS Definition: Software Publishers
Employees: 22
Subsidiaries: 0
12-month incidents
1
Known data breaches
1
Attack type number
1

Booking.com

Oosterdokskade 163, None, Amsterdam, North Holland, NL, 1011 DL
Last Update: 2025-12-01
Between 750 and 799

A career at Booking.com is all about the journey, helping you explore new challenges in a place where you can be your best self. With plenty of exciting twists, turns and opportunities along the way. We’ve always been pioneers, on a mission to shape the future of travel through cutting edge technology, to make it easier for everyone to enjoy amazing experiences wherever they go. Under a desert sky, or in the heart of a bustling city. Discovering the perfect hideaway, or the perfect paella. When you join us, you’ll be part of a community where taking a different path and trying something new is celebrated and supported. And where making a difference counts. We’re determined to make the world of travel more sustainable, more accessible, and more inclusive, to create a positive impact on a global scale. That’s why we’re always looking for people who search for better solutions, the ones eager to stray off the beaten path to find new ways of doing things. Because at Booking.com it’s more than a job, it’s a journey we’re on together.

NAICS: 5112
NAICS Definition: Software Publishers
Employees: 15,885
Subsidiaries: 11
12-month incidents
3
Known data breaches
0
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/funnelkit-com.jpeg
FunnelKit -We are Hiring !
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/booking.com.jpeg
Booking.com
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
FunnelKit -We are Hiring !
100%
Compliance Rate
0/4 Standards Verified
Booking.com
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Software Development Industry Average (This Year)

FunnelKit -We are Hiring ! has 132.56% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs Software Development Industry Average (This Year)

Booking.com has 597.67% more incidents than the average of same-industry companies with at least one recorded incident.

Incident History — FunnelKit -We are Hiring ! (X = Date, Y = Severity)

FunnelKit -We are Hiring ! cyber incidents detection timeline including parent company and subsidiaries

Incident History — Booking.com (X = Date, Y = Severity)

Booking.com cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/funnelkit-com.jpeg
FunnelKit -We are Hiring !
Incidents

Date Detected: 4/2025
Type:Breach
Attack Vector: Third-party service
Motivation: Financial gain
Blog: Blog
https://images.rankiteo.com/companyimages/booking.com.jpeg
Booking.com
Incidents

Date Detected: 6/2025
Type:Cyber Attack
Attack Vector: Mass-phishing, Infostealer trojans
Motivation: Financial gain
Blog: Blog

Date Detected: 4/2025
Type:Cyber Attack
Attack Vector: compromised email accounts, phishing links, fake reCAPTCHA challenge, malware download (PureRAT), personalized WhatsApp messages, fake Booking/Expedia websites
Motivation: financial gain, data theft, fraudulent transactions
Blog: Blog

Date Detected: 2/2025
Type:Cyber Attack
Attack Vector: malicious domain registration, social engineering, phishing emails/websites
Motivation: financial gain, theft of payment details
Blog: Blog

FAQ

Booking.com company demonstrates a stronger AI Cybersecurity Score compared to FunnelKit -We are Hiring ! company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Booking.com company has faced a higher number of disclosed cyber incidents historically compared to FunnelKit -We are Hiring ! company.

In the current year, Booking.com company has reported more cyber incidents than FunnelKit -We are Hiring ! company.

Neither Booking.com company nor FunnelKit -We are Hiring ! company has reported experiencing a ransomware attack publicly.

FunnelKit -We are Hiring ! company has disclosed at least one data breach, while the other Booking.com company has not reported such incidents publicly.

Booking.com company has reported targeted cyberattacks, while FunnelKit -We are Hiring ! company has not reported such incidents publicly.

Neither FunnelKit -We are Hiring ! company nor Booking.com company has reported experiencing or disclosing vulnerabilities publicly.

Neither FunnelKit -We are Hiring ! nor Booking.com holds any compliance certifications.

Neither company holds any compliance certifications.

Booking.com company has more subsidiaries worldwide compared to FunnelKit -We are Hiring ! company.

Booking.com company employs more people globally than FunnelKit -We are Hiring ! company, reflecting its scale as a Software Development.

Neither FunnelKit -We are Hiring ! nor Booking.com holds SOC 2 Type 1 certification.

Neither FunnelKit -We are Hiring ! nor Booking.com holds SOC 2 Type 2 certification.

Neither FunnelKit -We are Hiring ! nor Booking.com holds ISO 27001 certification.

Neither FunnelKit -We are Hiring ! nor Booking.com holds PCI DSS certification.

Neither FunnelKit -We are Hiring ! nor Booking.com holds HIPAA certification.

Neither FunnelKit -We are Hiring ! nor Booking.com holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

MCP Server Kubernetes is an MCP Server that can connect to a Kubernetes cluster and manage it. Prior to 2.9.8, there is a security issue exists in the exec_in_pod tool of the mcp-server-kubernetes MCP Server. The tool accepts user-provided commands in both array and string formats. When a string format is provided, it is passed directly to shell interpretation (sh -c) without input validation, allowing shell metacharacters to be interpreted. This vulnerability can be exploited through direct command injection or indirect prompt injection attacks, where AI agents may execute commands without explicit user intent. This vulnerability is fixed in 2.9.8.

Risk Information
cvss3
Base: 6.4
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
Description

XML external entity (XXE) injection in eyoucms v1.7.1 allows remote attackers to cause a denial of service via crafted body of a POST request.

Description

An issue was discovered in Fanvil x210 V2 2.12.20 allowing unauthenticated attackers on the local network to access administrative functions of the device (e.g. file upload, firmware update, reboot...) via a crafted authentication bypass.

Description

Cal.com is open-source scheduling software. Prior to 5.9.8, A flaw in the login credentials provider allows an attacker to bypass password verification when a TOTP code is provided, potentially gaining unauthorized access to user accounts. This issue exists due to problematic conditional logic in the authentication flow. This vulnerability is fixed in 5.9.8.

Risk Information
cvss4
Base: 9.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo > DToA.JS_dtostr > DToA.JS_dtoa > DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.

Risk Information
cvss4
Base: 5.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X