Comparison Overview

KUNAN S.A.

VS

Griffiths Waite

KUNAN S.A.

Av. La Voz del Interior 8501 - Parque Empresarial Aeropuerto - Córdoba, Córdoba, Córdoba, AR
Last Update: 2025-03-20 (UTC)
Between 900 and 1000

Excellent

Somos una destacada empresa tecnológica con sede en Córdoba desde 2004, especializándonos como expertos en respaldar a las organizaciones en la adopción e implementación de tecnologías vanguardistas. Nos destacamos por proporcionar respuestas ágiles e innovadoras que satisfacen la creciente y dinámica demanda del mercado, operando con alcance global desde nuestra sede central en Córdoba. Guiados por nuestro lema, "Facilitamos la vida de las personas con tecnología", ofrecemos un amplio abanico de soluciones tecnológicas de última generación: Asistentes Virtuales de IA para Empresas Whapp (Plataforma Comercial Omnicanal) Metabase o Business Intelligence CRM para Empresas Kuning Tech – Staff Augmentation (gestión y administración de equipos IT) Remote DBA (Administración Remota de Bases de Datos) Estas soluciones están meticulosamente desarrolladas utilizando tecnologías avanzadas como Big Data y análisis, inteligencia artificial, aprendizaje automático, lenguaje natural, ingeniería de software, entre otras. Nos enorgullece ser impulsores de la transformación digital, aportando soluciones innovadoras para satisfacer las necesidades tecnológicas de las empresas en todo el mundo. .... We are a prominent technology company based in Córdoba since 2004, specializing as experts in supporting organizations in the adoption and implementation of cutting-edge technologies. Renowned for providing agile and innovative responses to meet the growing and dynamic market demand, we operate globally from our central headquarters in Córdoba. Guided by our motto, "We make life easier for people with technology," we offer a comprehensive range of state-of-the-art technological solutions: Conversational Virtual Assistants for Enterprises Whapp (Omnichannel Commercial Platform) Metabase or Business Intelligence CRM for Enterprises Kuning Tech – Staff Augmentation (management and administration of IT teams) Remote DBA (Remote Database Administration) These solutions are metic

NAICS: 541511
NAICS Definition: Custom Computer Programming Services
Employees: 0
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Griffiths Waite

5-7 Hill Street, Birmingham, England, B5 4UA, GB
Last Update: 2025-05-05 (UTC)

Excellent

We are GW, we help clients create digital products that customers love. For over a quarter of a century, we have been a leading innovator in the design and development of user experiences that have been proven to increase customer loyalty, lower operating costs and position our clients as market leaders. We believe that custom software development is broken, it shouldn't be painful, expensive, or late. From our headquarters in Birmingham UK, we service National and International clients in Financial Services, Professional Services and Public Sector. We build Global customer portals using dedicated product teams, achieved with Lean UX, Enterprise JavaScript Development and Rapid Delivery.

NAICS: 541511
NAICS Definition: Custom Computer Programming Services
Employees: 53
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/defaultcompany.jpeg
KUNAN S.A.
ISO 27001
Not verified
SOC 2
Not verified
GDPR
No public badge
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/griffiths-waite.jpeg
Griffiths Waite
ISO 27001
Not verified
SOC 2
Not verified
GDPR
No public badge
PCI DSS
No public badge
Compliance Summary
KUNAN S.A.
100%
Compliance Rate
0/4 Standards Verified
Griffiths Waite
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs IT System Custom Software Development Industry Average (This Year)

No incidents recorded for KUNAN S.A. in 2025.

Incidents vs IT System Custom Software Development Industry Average (This Year)

No incidents recorded for Griffiths Waite in 2025.

Incident History — KUNAN S.A. (X = Date, Y = Severity)

KUNAN S.A. cyber incidents detection timeline including parent company and subsidiaries

Incident History — Griffiths Waite (X = Date, Y = Severity)

Griffiths Waite cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/defaultcompany.jpeg
KUNAN S.A.
Incidents

No Incident

https://images.rankiteo.com/companyimages/griffiths-waite.jpeg
Griffiths Waite
Incidents

No Incident

FAQ

Both KUNAN S.A. company and Griffiths Waite company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Historically, Griffiths Waite company has disclosed a higher number of cyber incidents compared to KUNAN S.A. company.

In the current year, Griffiths Waite company and KUNAN S.A. company have not reported any cyber incidents.

Neither Griffiths Waite company nor KUNAN S.A. company has reported experiencing a ransomware attack publicly.

Neither Griffiths Waite company nor KUNAN S.A. company has reported experiencing a data breach publicly.

Neither Griffiths Waite company nor KUNAN S.A. company has reported experiencing targeted cyberattacks publicly.

Neither KUNAN S.A. company nor Griffiths Waite company has reported experiencing or disclosing vulnerabilities publicly.

Neither KUNAN S.A. company nor Griffiths Waite company has publicly disclosed detailed information about the number of their subsidiaries.

Griffiths Waite company employs more people globally than KUNAN S.A. company, reflecting its scale as a IT System Custom Software Development.

Latest Global CVEs (Not Company-Specific)

Description

An issue was discovered in chinabugotech hutool before 5.8.4 allowing attackers to execute arbitrary expressions that lead to arbitrary method invocation and potentially remote code execution (RCE) via the QLExpressEngine class.

Description

A weakness has been identified in JeecgBoot up to 3.8.2. The impacted element is an unknown function of the file /sys/role/exportXls. This manipulation causes improper authorization. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in JeecgBoot up to 3.8.2. The affected element is an unknown function of the file /sys/user/exportXls of the component Filter Handler. The manipulation results in improper authorization. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in JeecgBoot up to 3.8.2. Impacted is an unknown function of the file /sys/tenant/deleteBatch. The manipulation of the argument ids leads to improper authorization. The attack is possible to be carried out remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 2.1
Severity: HIGH
AV:N/AC:H/Au:S/C:P/I:N/A:N
cvss3
Base: 3.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 2.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was determined in JeecgBoot up to 3.8.2. This issue affects some unknown processing of the file /api/getDepartUserList. Executing manipulation of the argument departId can lead to improper authorization. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 2.1
Severity: HIGH
AV:N/AC:H/Au:S/C:P/I:N/A:N
cvss3
Base: 3.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 2.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X