Comparison Overview

Just Eat Takeaway.com

VS

Bosch

Just Eat Takeaway.com

Piet Heinkade 61, Amsterdam, North Holland, 1019 GM, NL
Last Update: 2025-12-09

Just Eat Take​away​.com is a lead­ing glob­al online deliv­ery mar­ket­place, con­nect­ing con­sumers and restau­rants through our plat­form in 17 coun­tries. Like a dinner table, working at JET brings our office employees and couriers together. From coding to customer service to couriers, JET is a fun, fast-paced and supportive place where you can be yourself. No day is the same. Our days are filled with new experiences. We see every challenge that comes our way as a chance to grow, both the business, and ourselves. We’re connected to millions of food-lovers, hundreds of thousands of connected partners and some of the best-known brands of the planet. When you take your seat here, you’ll find that a simple scribble on a napkin can turn into something seen by millions. Together we transform, create, reinvent and empower every food moment. As a leading online food tech company, JET brings together the stability of a global business, with the agility of a start-up. We got here by always staying one step ahead of the competition. So load up your plate with ideas that get you excited, because at JET everything is on the table. https://careers.justeattakeaway.com

NAICS: 5112
NAICS Definition: Software Publishers
Employees: 12,476
Subsidiaries: 11
12-month incidents
0
Known data breaches
0
Attack type number
0

Bosch

Robert-Bosch-Platz 1, Gerlingen-Schillerhöhe, Baden-Wuerttemberg, 70839, DE
Last Update: 2025-12-09
Between 800 and 849

The Bosch Group is a leading global supplier of technology and services. It employs roughly 417,900 associates worldwide (as of December 31, 2024). According to preliminary figures, the company generated sales of 90.5 billion euros in 2024. Its operations are divided into four business sectors: Mobility, Industrial Technology, Consumer Goods, and Energy and Building Technology. With its business activities, the company aims to use technology to help shape universal trends such as automation, electrification, digitalization, connectivity, and an orientation to sustainability. In this context, Bosch’s broad diversification across regions and industries strengthens its innovativeness and robustness. Bosch uses its proven expertise in sensor technology, software, and services to offer customers cross-domain solutions from a single source. It also applies its expertise in connectivity and artificial intelligence in order to develop and manufacture user-friendly, sustainable products. With technology that is “Invented for life,” Bosch wants to help improve quality of life and conserve natural resources. The Bosch Group comprises Robert Bosch GmbH and its roughly 470 subsidiary and regional companies in over 60 countries. Including sales and service partners, Bosch’s global manufacturing, engineering, and sales network covers nearly every country in the world. Bosch’s innovative strength is key to the company’s further development. At 136 locations across the globe, Bosch employs some 86,900 associates in research and development, of which nearly 48,000 are software engineers. Instagram: https://www.instagram.com/boschglobal/ Facebook: https://www.facebook.com/BoschGlobal Glassdoor: https://bit.ly/3raTZnH Imprint: www.bosch.com/corporate-information Privacy statement: https://www.bosch.com/data-protection-notice-bosch-linkedin/

NAICS: 5112
NAICS Definition: Software Publishers
Employees: 165,763
Subsidiaries: 68
12-month incidents
0
Known data breaches
1
Attack type number
2

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/just-eat-group.jpeg
Just Eat Takeaway.com
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/bosch.jpeg
Bosch
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Just Eat Takeaway.com
100%
Compliance Rate
0/4 Standards Verified
Bosch
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Software Development Industry Average (This Year)

No incidents recorded for Just Eat Takeaway.com in 2025.

Incidents vs Software Development Industry Average (This Year)

No incidents recorded for Bosch in 2025.

Incident History — Just Eat Takeaway.com (X = Date, Y = Severity)

Just Eat Takeaway.com cyber incidents detection timeline including parent company and subsidiaries

Incident History — Bosch (X = Date, Y = Severity)

Bosch cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/just-eat-group.jpeg
Just Eat Takeaway.com
Incidents

No Incident

https://images.rankiteo.com/companyimages/bosch.jpeg
Bosch
Incidents

Date Detected: 12/2025
Type:Breach
Blog: Blog

Date Detected: 1/2024
Type:Vulnerability
Attack Vector: Unauthenticated Network Access, Custom Protocol Exploitation (Volkswagen, BMW, etc.), Web Application Vulnerabilities in Management Interface
Motivation: Potential Financial Gain (Ransomware), Industrial Sabotage, Extortion via Product Quality Manipulation
Blog: Blog

FAQ

Bosch company demonstrates a stronger AI Cybersecurity Score compared to Just Eat Takeaway.com company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Bosch company has historically faced a number of disclosed cyber incidents, whereas Just Eat Takeaway.com company has not reported any.

In the current year, Bosch company has reported more cyber incidents than Just Eat Takeaway.com company.

Neither Bosch company nor Just Eat Takeaway.com company has reported experiencing a ransomware attack publicly.

Bosch company has disclosed at least one data breach, while Just Eat Takeaway.com company has not reported such incidents publicly.

Neither Bosch company nor Just Eat Takeaway.com company has reported experiencing targeted cyberattacks publicly.

Bosch company has disclosed at least one vulnerability, while Just Eat Takeaway.com company has not reported such incidents publicly.

Neither Just Eat Takeaway.com nor Bosch holds any compliance certifications.

Neither company holds any compliance certifications.

Bosch company has more subsidiaries worldwide compared to Just Eat Takeaway.com company.

Bosch company employs more people globally than Just Eat Takeaway.com company, reflecting its scale as a Software Development.

Neither Just Eat Takeaway.com nor Bosch holds SOC 2 Type 1 certification.

Neither Just Eat Takeaway.com nor Bosch holds SOC 2 Type 2 certification.

Neither Just Eat Takeaway.com nor Bosch holds ISO 27001 certification.

Neither Just Eat Takeaway.com nor Bosch holds PCI DSS certification.

Neither Just Eat Takeaway.com nor Bosch holds HIPAA certification.

Neither Just Eat Takeaway.com nor Bosch holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 2.6
Severity: HIGH
AV:N/AC:H/Au:N/C:N/I:P/A:N
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 6.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X