Comparison Overview

KUNAN S.A.

VS

Digiclowd

KUNAN S.A.

Av. La Voz del Interior 8501 - Parque Empresarial Aeropuerto - Córdoba, Córdoba, Córdoba, AR
Last Update: 2025-03-20 (UTC)
Between 900 and 1000

Excellent

Somos una destacada empresa tecnológica con sede en Córdoba desde 2004, especializándonos como expertos en respaldar a las organizaciones en la adopción e implementación de tecnologías vanguardistas. Nos destacamos por proporcionar respuestas ágiles e innovadoras que satisfacen la creciente y dinámica demanda del mercado, operando con alcance global desde nuestra sede central en Córdoba. Guiados por nuestro lema, "Facilitamos la vida de las personas con tecnología", ofrecemos un amplio abanico de soluciones tecnológicas de última generación: Asistentes Virtuales de IA para Empresas Whapp (Plataforma Comercial Omnicanal) Metabase o Business Intelligence CRM para Empresas Kuning Tech – Staff Augmentation (gestión y administración de equipos IT) Remote DBA (Administración Remota de Bases de Datos) Estas soluciones están meticulosamente desarrolladas utilizando tecnologías avanzadas como Big Data y análisis, inteligencia artificial, aprendizaje automático, lenguaje natural, ingeniería de software, entre otras. Nos enorgullece ser impulsores de la transformación digital, aportando soluciones innovadoras para satisfacer las necesidades tecnológicas de las empresas en todo el mundo. .... We are a prominent technology company based in Córdoba since 2004, specializing as experts in supporting organizations in the adoption and implementation of cutting-edge technologies. Renowned for providing agile and innovative responses to meet the growing and dynamic market demand, we operate globally from our central headquarters in Córdoba. Guided by our motto, "We make life easier for people with technology," we offer a comprehensive range of state-of-the-art technological solutions: Conversational Virtual Assistants for Enterprises Whapp (Omnichannel Commercial Platform) Metabase or Business Intelligence CRM for Enterprises Kuning Tech – Staff Augmentation (management and administration of IT teams) Remote DBA (Remote Database Administration) These solutions are metic

NAICS: 541511
NAICS Definition: Custom Computer Programming Services
Employees: 0
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Digiclowd

Via Appia,11, Valinhos, São Paulo 13278900, BR
Last Update: 2025-03-18 (UTC)

Excellent

Between 900 and 1000

A Digiclowd é especialista em eventos digitais e híbridos, oferecendo uma plataforma customizável para eventos de qualquer tipo e tamanho, incluindo presenciais. Auxiliamos empresas e instituições a transmitirem conteúdo de forma segura, eficiente e inovadora. Nossa plataforma viabiliza eventos de todos os formatos, como seminários, workshops, convenções e muito mais, desde a concepção até o pós-venda. Com uma equipe composta por especialistas em eventos, marketing, mídia e tecnologia, oferecemos soluções completas que englobam desde a criação até a monetização. Utilizando nossa plataforma, é possível realizar eventos corporativos e educacionais, garantir a segurança e qualidade de transmissão, aumentar o engajamento e a interatividade, criar portais customizáveis, promover live-commerce, vender ingressos e facilitar o networking e a gestão de eventos. Leve criatividade e tecnologia ao seu evento com a Digiclowd. Estamos aqui para transformar sua visão em realidade.

NAICS: 541511
NAICS Definition: Custom Computer Programming Services
Employees: 0
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/defaultcompany.jpeg
KUNAN S.A.
ISO 27001
Not verified
SOC 2
Not verified
GDPR
No public badge
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/defaultcompany.jpeg
Digiclowd
ISO 27001
Not verified
SOC 2
Not verified
GDPR
No public badge
PCI DSS
No public badge
Compliance Summary
KUNAN S.A.
100%
Compliance Rate
0/4 Standards Verified
Digiclowd
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs IT System Custom Software Development Industry Average (This Year)

No incidents recorded for KUNAN S.A. in 2025.

Incidents vs IT System Custom Software Development Industry Average (This Year)

No incidents recorded for Digiclowd in 2025.

Incident History — KUNAN S.A. (X = Date, Y = Severity)

KUNAN S.A. cyber incidents detection timeline including parent company and subsidiaries

Incident History — Digiclowd (X = Date, Y = Severity)

Digiclowd cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/defaultcompany.jpeg
KUNAN S.A.
Incidents

No Incident

https://images.rankiteo.com/companyimages/defaultcompany.jpeg
Digiclowd
Incidents

No Incident

FAQ

Both KUNAN S.A. company and Digiclowd company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Historically, Digiclowd company has disclosed a higher number of cyber incidents compared to KUNAN S.A. company.

In the current year, Digiclowd company and KUNAN S.A. company have not reported any cyber incidents.

Neither Digiclowd company nor KUNAN S.A. company has reported experiencing a ransomware attack publicly.

Neither Digiclowd company nor KUNAN S.A. company has reported experiencing a data breach publicly.

Neither Digiclowd company nor KUNAN S.A. company has reported experiencing targeted cyberattacks publicly.

Neither KUNAN S.A. company nor Digiclowd company has reported experiencing or disclosing vulnerabilities publicly.

Neither KUNAN S.A. company nor Digiclowd company has publicly disclosed detailed information about the number of their subsidiaries.

Neither KUNAN S.A. company nor Digiclowd company has publicly disclosed the exact number of their employees.

Latest Global CVEs (Not Company-Specific)

Description

An issue was discovered in chinabugotech hutool before 5.8.4 allowing attackers to execute arbitrary expressions that lead to arbitrary method invocation and potentially remote code execution (RCE) via the QLExpressEngine class.

Description

A weakness has been identified in JeecgBoot up to 3.8.2. The impacted element is an unknown function of the file /sys/role/exportXls. This manipulation causes improper authorization. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in JeecgBoot up to 3.8.2. The affected element is an unknown function of the file /sys/user/exportXls of the component Filter Handler. The manipulation results in improper authorization. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in JeecgBoot up to 3.8.2. Impacted is an unknown function of the file /sys/tenant/deleteBatch. The manipulation of the argument ids leads to improper authorization. The attack is possible to be carried out remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 2.1
Severity: HIGH
AV:N/AC:H/Au:S/C:P/I:N/A:N
cvss3
Base: 3.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 2.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was determined in JeecgBoot up to 3.8.2. This issue affects some unknown processing of the file /api/getDepartUserList. Executing manipulation of the argument departId can lead to improper authorization. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 2.1
Severity: HIGH
AV:N/AC:H/Au:S/C:P/I:N/A:N
cvss3
Base: 3.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 2.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X