Comparison Overview

Heroes and Horses

VS

U.S. Coast Guard

Heroes and Horses

1445 Weaver Rd, Belgrade, Montana, 59714, US
Last Update: 2025-03-15 (UTC)
Between 900 and 1000

Excellent

Heroes and Horses is an innovative nonprofit based out of the Gallatin Valley. Our mission at Heroes and Horses is to offer combat veterans an alternative solution for defining and approaching their physical and mental scarsโ€”a solution that does not include prescription medications, or traditional psychotherapy, but rather the opportunity to use tools to redefine their purpose, rediscover their inner strength, and maximize their potential by taking ownership of their lives for the first time since leaving service.

NAICS: 928
NAICS Definition:
Employees: 11
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

U.S. Coast Guard

Last Update: 2024-08-13 (UTC)

Strong

Between 800 and 900

The mission of the U.S. Coast Guard is to protect the public, the environment, and U.S. economic interests โ€” in the nation's ports and waterways, along the coast, on international waters, or in any maritime region as required to support national security. As one of the five branches of the Armed Forces, the U.S. Coast Guard is vital to our nation's safety and security. U.S. Coast Guard personnel are the backbone of Americaโ€™s maritime security. They represent the diverse makeup of our nation and support not only those on active duty but also families, veterans, and retirees through education, training and benefit programs. The U.S. Coast Guard also employs a topnotch civilian workforce, with more than 7,000 positions in nearly 100 locations nationwide. Search for Jobs and Internships at USAJobs.gov. Learn more about our service: Coast Guard Compass: http://coastguard.dodlive.mil Coast Guard All Hands: http://allhands.coastguard.dodlive.mil Coast Guard Maritime Commons: http://mariners.coastguard.dodlive.mil

NAICS: 92811
NAICS Definition: National Security
Employees: 30,331
Subsidiaries: 28
12-month incidents
0
Known data breaches
7
Attack type number
5

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/heroes-and-horses..jpeg
Heroes and Horses
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/uscoastguard.jpeg
U.S. Coast Guard
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
Heroes and Horses
100%
Compliance Rate
0/4 Standards Verified
U.S. Coast Guard
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Armed Forces Industry Average (This Year)

No incidents recorded for Heroes and Horses in 2025.

Incidents vs Armed Forces Industry Average (This Year)

No incidents recorded for U.S. Coast Guard in 2025.

Incident History โ€” Heroes and Horses (X = Date, Y = Severity)

Heroes and Horses cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” U.S. Coast Guard (X = Date, Y = Severity)

U.S. Coast Guard cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/heroes-and-horses..jpeg
Heroes and Horses
Incidents

No Incident

https://images.rankiteo.com/companyimages/uscoastguard.jpeg
U.S. Coast Guard
Incidents

Date Detected: 9/2025
Type:Breach
Attack Vector: Misconfigured Platform (Programming Error)
Motivation: Opportunistic Access, Espionage (Potential), Information Gathering
Blog: Blog

Date Detected: 9/2025
Type:Breach
Attack Vector: misconfigured access controls (platform set to 'everyone' instead of restricted HSIN-Intel users)
Blog: Blog

Date Detected: 7/2025
Type:Ransomware
Attack Vector: Ransomware Negotiation
Motivation: Financial Gain
Blog: Blog

FAQ

Heroes and Horses company company demonstrates a stronger AI risk posture compared to U.S. Coast Guard company company, reflecting its advanced AI governance and monitoring frameworks.

U.S. Coast Guard company has historically faced a number of disclosed cyber incidents, whereas Heroes and Horses company has not reported any.

In the current year, U.S. Coast Guard company has reported more cyber incidents than Heroes and Horses company.

U.S. Coast Guard company has confirmed experiencing a ransomware attack, while Heroes and Horses company has not reported such incidents publicly.

U.S. Coast Guard company has disclosed at least one data breach, while Heroes and Horses company has not reported such incidents publicly.

U.S. Coast Guard company has reported targeted cyberattacks, while Heroes and Horses company has not reported such incidents publicly.

U.S. Coast Guard company has disclosed at least one vulnerability, while Heroes and Horses company has not reported such incidents publicly.

U.S. Coast Guard company has more subsidiaries worldwide compared to Heroes and Horses company.

U.S. Coast Guard company employs more people globally than Heroes and Horses company, reflecting its scale as a Armed Forces.

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability has been found in code-projects Project Monitoring System 1.0. Affected is an unknown function of the file /onlineJobSearchEngine/postjob.php. Such manipulation of the argument txtapplyto leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:N/I:P/A:N
cvss3
Base: 3.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A flaw has been found in Tenda AC18 15.03.05.19. This impacts an unknown function of the file /goform/saveAutoQos. This manipulation of the argument enable causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been published and may be used.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was detected in Tenda AC18 15.03.05.19. This affects an unknown function of the file /goform/WizardHandle. The manipulation of the argument WANT/mtuvalue results in stack-based buffer overflow. The attack can be launched remotely. The exploit is now public and may be used.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security vulnerability has been detected in Tenda AC18 15.03.05.19. The impacted element is an unknown function of the file /goform/AdvSetLanip. The manipulation of the argument lanIp leads to command injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used.

Risk Information
cvss2
Base: 6.5
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in Tenda AC8 16.03.34.06. The affected element is the function formSetServerConfig of the file /goform/SetServerConfig. Executing manipulation can lead to buffer overflow. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 9.0
Severity: LOW
AV:N/AC:L/Au:S/C:C/I:C/A:C
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 7.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X