Comparison Overview

Grupo Casas Bahia

VS

Zalando

Grupo Casas Bahia

Rua Flórida 1970, São Paulo, SP, BR, 04575-030
Last Update: 2025-12-24

Mais do que varejo, somos um ecossistema que conecta produtos, serviços, crédito e logística com dedicação total! Estamos presentes na mente, no coração e na casa de milhões de brasileiros, com um portfólio de marcas que há décadas faz parte da vida das pessoas: Casas Bahia, Ponto Frio, Extra.com.br, BanQi, Bartira e CB Full. Aqui, o cliente está no centro de tudo. E é por isso que inovamos todos os dias para oferecer a melhor experiência em produtos, serviços financeiros, tecnologia e logística. Estamos em todas as regiões do Brasil, com mais de 1.000 lojas físicas, dezenas de centros de distribuição e somos uma das maiores e mais digitais redes logísticas do país. Contamos com a maior fábrica de móveis da América Latina, um banco digital que leva crédito a quem mais precisa e a nossa mega plataforma logística que conecta marcas e clientes. Além disso, o Grupo Casas Bahia tem capital aberto na B3 desde 2013, com um compromisso sólido com o mercado e com a nossa história. Porque aqui, a dedicação é o que nos move. Acreditamos no poder da transformação, da inclusão e da inovação para fazer a diferença na vida de cada cliente, colaborador e parceiro. Somos feitos de dedicação total. Nós somos o Grupo Casas Bahia! 🚀💙❤️ Para falar conosco, entre em contato através de mensagem via perfil oficial no Instagram - Grupo Casas Bahia

NAICS: 43
NAICS Definition: Retail Trade
Employees: 22,971
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Zalando

Valeska-Gert-Straße 5, None, Berlin, Berlin, DE, 10243
Last Update: 2025-12-26
Between 750 and 799

Welcome to Zalando. Here’s some key info about us: Our position and vision: - We’re Europe’s leading online platform for fashion and lifestyle. - Founded in Berlin in 2008, we bring head-to-toe fashion to more than 50 million active customers in 25 markets; offering clothes, footwear, accessories, and beauty. - We're building the ecosystem for fashion and lifestyle ecommerce. Our offering: - Our assortment of international brands ranges from world-famous names to local labels - Our platform is a one-stop fashion destination for inspiration, innovation, and interaction - As Europe’s most fashionable tech company, we work hard to find digital solutions for every aspect of the fashion journey: for our customers, partners, and friends of our brand. - Our logistics network with 12 centrally located fulfillment centers allows us to efficiently serve our customers throughout Europe, supported by warehouses in Italy, France, Poland, and Sweden with a focus on local customer needs. Our beliefs: - Our ambition is to combine our passion for self-expression through fashion with our unwavering commitments to sustainability and D&I - We promote an inclusive corporate culture that welcomes different perspectives and brings together people from diverse backgrounds. We want to ensure a non-discriminatory and supportive working environment for each of our employees to thrive. It’s a journey that all teams are on together, centered around the values we uphold. - We believe that our integration of fashion, operations, and online technology gives us the capability to deliver a compelling value proposition to both our customers and fashion brand partners.

NAICS: 43
NAICS Definition: Retail Trade
Employees: 11,863
Subsidiaries: 2
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/grupocasasbahia.jpeg
Grupo Casas Bahia
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/zalando.jpeg
Zalando
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Grupo Casas Bahia
100%
Compliance Rate
0/4 Standards Verified
Zalando
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Retail Industry Average (This Year)

No incidents recorded for Grupo Casas Bahia in 2025.

Incidents vs Retail Industry Average (This Year)

No incidents recorded for Zalando in 2025.

Incident History — Grupo Casas Bahia (X = Date, Y = Severity)

Grupo Casas Bahia cyber incidents detection timeline including parent company and subsidiaries

Incident History — Zalando (X = Date, Y = Severity)

Zalando cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/grupocasasbahia.jpeg
Grupo Casas Bahia
Incidents

No Incident

https://images.rankiteo.com/companyimages/zalando.jpeg
Zalando
Incidents

No Incident

FAQ

Grupo Casas Bahia company demonstrates a stronger AI Cybersecurity Score compared to Zalando company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Zalando company has disclosed a higher number of cyber incidents compared to Grupo Casas Bahia company.

In the current year, Zalando company and Grupo Casas Bahia company have not reported any cyber incidents.

Neither Zalando company nor Grupo Casas Bahia company has reported experiencing a ransomware attack publicly.

Neither Zalando company nor Grupo Casas Bahia company has reported experiencing a data breach publicly.

Neither Zalando company nor Grupo Casas Bahia company has reported experiencing targeted cyberattacks publicly.

Neither Grupo Casas Bahia company nor Zalando company has reported experiencing or disclosing vulnerabilities publicly.

Neither Grupo Casas Bahia nor Zalando holds any compliance certifications.

Neither company holds any compliance certifications.

Zalando company has more subsidiaries worldwide compared to Grupo Casas Bahia company.

Grupo Casas Bahia company employs more people globally than Zalando company, reflecting its scale as a Retail.

Neither Grupo Casas Bahia nor Zalando holds SOC 2 Type 1 certification.

Neither Grupo Casas Bahia nor Zalando holds SOC 2 Type 2 certification.

Neither Grupo Casas Bahia nor Zalando holds ISO 27001 certification.

Neither Grupo Casas Bahia nor Zalando holds PCI DSS certification.

Neither Grupo Casas Bahia nor Zalando holds HIPAA certification.

Neither Grupo Casas Bahia nor Zalando holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability was found in UTT 进取 512W up to 1.7.7-171114. This vulnerability affects the function strcpy of the file /goform/formConfigNoticeConfig. The manipulation of the argument timestart results in buffer overflow. The attack may be performed from remote. The exploit has been made public and could be used.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability has been found in UTT 进取 512W up to 1.7.7-171114. This affects the function strcpy of the file /goform/APSecurity. The manipulation of the argument wepkey1 leads to buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was detected in ketr JEPaaS up to 7.2.8. Affected by this vulnerability is the function postilService.loadPostils of the file /je/postil/postil/loadPostil. Performing manipulation of the argument keyWord results in sql injection. Remote exploitation of the attack is possible. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 6.5
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security vulnerability has been detected in youlaitech youlai-mall 1.0.0/2.0.0. Affected is the function submitOrderPayment of the file mall-oms/oms-boot/src/main/java/com/youlai/mall/oms/controller/app/OrderController.java. Such manipulation of the argument orderSn leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. The real existence of this vulnerability is still doubted at the moment. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:N/I:P/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in youlaitech youlai-mall 1.0.0/2.0.0. This impacts the function getMemberByMobile of the file mall-ums/ums-boot/src/main/java/com/youlai/mall/ums/controller/app/MemberController.java. This manipulation causes improper access controls. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X