Comparison Overview

KABOOST Corp.

VS

Famsa

KABOOST Corp.

None
Last Update: 2025-03-12 (UTC)
Between 900 and 1000

Excellent

KABOOST portable chair booster - Goes under and raises the chair! The Kaboost portable chair booster instantly turns kitchen and dining chairs into highchairs so little kids can sit at the table like big kids. Kaboost snaps on to the bottom of the chair in seconds and raises the chair. A child's transition from baby-hood to toddlerhood poses many challenges for parents. Growing children reach a point where they no longer want to sit in a high chair or booster seat for "babies" anymore. They want to be just like mom and dad, and their older brothers and sisters. In fact, many children would rather sit on their knees and eat rather than use a booster seat. With Kaboost, a child can sit and reach the table just like everyone else. Weighing just 3.5 lbs, Kaboost is extremely sturdy, holding up to 300 lbs. and is engineered to improve chair stability. In fact, a chair with Kaboost is more stable than the same chair without Kaboost. With Kaboost, the entire dining experience is enhanced for both child and family. KABOOST • Fits 4 legged chairs (round or square legs) • Snaps on chair in seconds and stays attached even when chair is moved • Engineered to improve chair stability, weighs only 3.5 lbs and holds up to 300 pounds • Rubberized feet are non-slip and won't scratch floors • Compact and lightweight, easily folds and has 2 height positions - grows with your child

NAICS: None
NAICS Definition:
Employees: 1
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Famsa

Corporativo México Monterrey, Nuevo León 64800, MX
Last Update: 2025-05-06 (UTC)

Excellent

Between 900 and 1000

Desde nuestra fundación en 1970, en Grupo Famsa hemos venido consolidándonos como una empresa pública líder en el sector minorista; enfocada en la venta de productos y servicios a crédito. Siguiendo un proyecto disciplinado de crecimiento, hemos fundamentado nuestra estrategia en el desarrollo de un portafolio sólido de negocios complementarios basados en el crédito al consumo y el ahorro. A través de nuestras tres unidades de negocio, brindamos una oferta de valor integral dirigida a mejorar la calidad de vida de un segmento poblacional que demanda servicios personalizados y opciones de crédito que no le son brindadas por la banca tradicional. Un comprometido equipo de trabajo con más de 18,000 empleados y una amplia red de 421 tiendas con cobertura en 78 ciudades de México y 37 de las ciudades con mayor población hispana de Estados Unidos, están dedicados a superar las expectativas de más de 9 millones de clientes de Grupo Famsa. En enero de 2007 inició operaciones Banco Ahorro Famsa, S.A., Institución de Banca Múltiple, que constituye un ambicioso proyecto para instituir el brazo financiero de Grupo Famsa y complementar nuestra propuesta de valor con servicios bancarios. Los avances en la implementación de nuestro banco ya comienzan a convertirse en valiosas sinergias con el área comercial que impulsan el desempeño operativo y financiero del Grupo.

NAICS: None
NAICS Definition: Others
Employees: 10,001+
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/kaboost-corp-.jpeg
KABOOST Corp.
ISO 27001
Not verified
SOC 2
Not verified
GDPR
No public badge
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/famsa.jpeg
Famsa
ISO 27001
Not verified
SOC 2
Not verified
GDPR
No public badge
PCI DSS
No public badge
Compliance Summary
KABOOST Corp.
100%
Compliance Rate
0/4 Standards Verified
Famsa
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Consumer Goods Industry Average (This Year)

No incidents recorded for KABOOST Corp. in 2025.

Incidents vs Consumer Goods Industry Average (This Year)

No incidents recorded for Famsa in 2025.

Incident History — KABOOST Corp. (X = Date, Y = Severity)

KABOOST Corp. cyber incidents detection timeline including parent company and subsidiaries

Incident History — Famsa (X = Date, Y = Severity)

Famsa cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/kaboost-corp-.jpeg
KABOOST Corp.
Incidents

No Incident

https://images.rankiteo.com/companyimages/famsa.jpeg
Famsa
Incidents

No Incident

FAQ

Both KABOOST Corp. company and Famsa company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Historically, Famsa company has disclosed a higher number of cyber incidents compared to KABOOST Corp. company.

In the current year, Famsa company and KABOOST Corp. company have not reported any cyber incidents.

Neither Famsa company nor KABOOST Corp. company has reported experiencing a ransomware attack publicly.

Neither Famsa company nor KABOOST Corp. company has reported experiencing a data breach publicly.

Neither Famsa company nor KABOOST Corp. company has reported experiencing targeted cyberattacks publicly.

Neither KABOOST Corp. company nor Famsa company has reported experiencing or disclosing vulnerabilities publicly.

Neither KABOOST Corp. company nor Famsa company has publicly disclosed detailed information about the number of their subsidiaries.

KABOOST Corp. company employs more people globally than Famsa company, reflecting its scale as a Consumer Goods.

Latest Global CVEs (Not Company-Specific)

Description

Mastra is a Typescript framework for building AI agents and assistants. Versions 0.13.8 through 0.13.20-alpha.0 are vulnerable to a Directory Traversal attack that results in the disclosure of directory listings. The code contains a security check to prevent path traversal for reading file contents, but this check is effectively bypassed by subsequent logic that attempts to find directory suggestions. An attacker can leverage this flaw to list the contents of arbitrary directories on the user's filesystem, including the user's home directory, exposing sensitive information about the file system's structure. This issue is fixed in version 0.13.20.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Description

KUNO CMS is a fully deployable full-stack blog application. Versions 1.3.13 and below contain validation flaws in its file upload functionality that can be exploited for stored XSS. The upload endpoint only validates file types based on Content-Type headers, lacks file content analysis and extension whitelist restrictions, allowing attackers to upload SVG files containing malicious scripts (disguised as images). When users access the uploaded resource pages, arbitrary JavaScript executes in their browsers. This issue is fixed in version 1.3.14.

Risk Information
cvss3
Base: 5.4
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Description

Minecraft RCON Terminal is a VS Code extension that streamlines Minecraft server management. Versions 0.1.0 through 2.0.6 stores passwords using VS Code's configuration API which writes to settings.json in plaintext. This issue is fixed in version 2.1.0.

Risk Information
cvss4
Base: 6.6
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Anyquery is an SQL query engine built on top of SQLite. Versions 0.4.3 and below allow attackers who have already gained access to localhost, even with low privileges, to use the http server through the port unauthenticated, and access private integration data like emails, without any warning of a foreign login from the provider. This issue is fixed in version 0.4.4.

Risk Information
cvss3
Base: 7.7
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Description

DataChain is a Python-based AI-data warehouse for transforming and analyzing unstructured data. Versions 0.34.1 and below allow for deseriaization of untrusted data because of the way the DataChain library reads serialized objects from environment variables (such as DATACHAIN__METASTORE and DATACHAIN__WAREHOUSE) in the loader.py module. An attacker with the ability to set these environment variables can trigger code execution when the application loads. This issue is fixed in version 0.34.2.

Risk Information
cvss3
Base: 2.5
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N