Comparison Overview

LatCapital Solutions. Partner de SAP

VS

Groupon

LatCapital Solutions. Partner de SAP

45 SW 9th St, Miami, Florida, 33130, US
Last Update: 2025-03-06 (UTC)

Excellent

LatCapital is a world-class technology and industry business solutions consulting company. Our mission is to help our customers increase their performance by offering tangible technology solutions for the business challenges. LatCapital implementation strategy assures that projects are completed on time and within the budget surpassing our customersโ€™ expectations. LatCapital always uses SAPโ€™s Best Practices to set the basis for the development of pre-configured solutions that were tested and used by the big corporations that are currently operating with SAP applications. With headquarters in Florida USA and presence in more than 10 countries in Latin America and the Caribbean, LatCapital has committed all its efforts to the implementation of the SAP Portfolio Solution. LatCapital is part of GBM, the most important technology company of Central America an IBM alliance company for this region.

NAICS: 511
NAICS Definition:
Employees: 53
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Groupon

600 W Chicago, Chicago, IL, 60654, US
Last Update: 2025-05-06 (UTC)

Groupon is an experiences marketplace that brings people more ways to get the most out of their city or wherever they may be. By enabling real-time mobile commerce across local businesses, live events and travel destinations, Groupon helps people find and discover experiencesโ€“โ€“big and small, new and familiarโ€“โ€“that make for a full, fun and rewarding life. Groupon helps local businesses grow and strengthen customer relationshipsโ€“โ€“resulting in strong, vibrant communities. E-commerce never stands still, our transformation strategy, combined with our strong brand, customer base, and marketplace expertise, ensures we are constantly adapting to the evolving market landscape while delivering value for our customers and merchant partners. Groupon is on a radical journey to transform our business. To meet our aggressive goals we are in the process of building a culture that prioritises fast decisions, open communication, and relentless pursuit of results. In the spirit of transparency, things aren't perfect, there are still processes to change and bureaucracy to break so we need people who want to be on this journey with us. Check out our current opportunities with #TeamGroupon and join us on our exciting mission to become The Ultimate Destination For Local Experiences and Services.

NAICS: 5112
NAICS Definition: Software Publishers
Employees: 10,703
Subsidiaries: 2
12-month incidents
0
Known data breaches
1
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/latcapital-solutions.jpeg
LatCapital Solutions. Partner de SAP
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/groupon.jpeg
Groupon
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
LatCapital Solutions. Partner de SAP
100%
Compliance Rate
0/4 Standards Verified
Groupon
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Software Development Industry Average (This Year)

No incidents recorded for LatCapital Solutions. Partner de SAP in 2025.

Incidents vs Software Development Industry Average (This Year)

No incidents recorded for Groupon in 2025.

Incident History โ€” LatCapital Solutions. Partner de SAP (X = Date, Y = Severity)

LatCapital Solutions. Partner de SAP cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” Groupon (X = Date, Y = Severity)

Groupon cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/latcapital-solutions.jpeg
LatCapital Solutions. Partner de SAP
Incidents

No Incident

https://images.rankiteo.com/companyimages/groupon.jpeg
Groupon
Incidents

Date Detected: 12/2017
Type:Breach
Attack Vector: Third-Party Vendor Breach
Motivation: Financial Gain
Blog: Blog

FAQ

LatCapital Solutions. Partner de SAP company company demonstrates a stronger AI risk posture compared to Groupon company company, reflecting its advanced AI governance and monitoring frameworks.

Groupon company has historically faced a number of disclosed cyber incidents, whereas LatCapital Solutions. Partner de SAP company has not reported any.

In the current year, Groupon company and LatCapital Solutions. Partner de SAP company have not reported any cyber incidents.

Neither Groupon company nor LatCapital Solutions. Partner de SAP company has reported experiencing a ransomware attack publicly.

Groupon company has disclosed at least one data breach, while LatCapital Solutions. Partner de SAP company has not reported such incidents publicly.

Neither Groupon company nor LatCapital Solutions. Partner de SAP company has reported experiencing targeted cyberattacks publicly.

Neither LatCapital Solutions. Partner de SAP company nor Groupon company has reported experiencing or disclosing vulnerabilities publicly.

Groupon company has more subsidiaries worldwide compared to LatCapital Solutions. Partner de SAP company.

Groupon company employs more people globally than LatCapital Solutions. Partner de SAP company, reflecting its scale as a Software Development.

Latest Global CVEs (Not Company-Specific)

Description

Mastra is a Typescript framework for building AI agents and assistants. Versions 0.13.8 through 0.13.20-alpha.0 are vulnerable to a Directory Traversal attack that results in the disclosure of directory listings. The code contains a security check to prevent path traversal for reading file contents, but this check is effectively bypassed by subsequent logic that attempts to find directory suggestions. An attacker can leverage this flaw to list the contents of arbitrary directories on the user's filesystem, including the user's home directory, exposing sensitive information about the file system's structure. This issue is fixed in version 0.13.20.

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Description

KUNO CMS is a fully deployable full-stack blog application. Versions 1.3.13 and below contain validation flaws in its file upload functionality that can be exploited for stored XSS. The upload endpoint only validates file types based on Content-Type headers, lacks file content analysis and extension whitelist restrictions, allowing attackers to upload SVG files containing malicious scripts (disguised as images). When users access the uploaded resource pages, arbitrary JavaScript executes in their browsers. This issue is fixed in version 1.3.14.

Risk Information
cvss3
Base: 5.4
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Description

Minecraft RCON Terminal is a VS Code extension that streamlines Minecraft server management. Versions 0.1.0 through 2.0.6 stores passwords using VS Code's configuration API which writes to settings.json in plaintext. This issue is fixed in version 2.1.0.

Risk Information
cvss4
Base: 6.6
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Anyquery is an SQL query engine built on top of SQLite. Versions 0.4.3 and below allow attackers who have already gained access to localhost, even with low privileges, to use the http server through the port unauthenticated, and access private integration data like emails, without any warning of a foreign login from the provider. This issue is fixed in version 0.4.4.

Risk Information
cvss3
Base: 7.7
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Description

DataChain is a Python-based AI-data warehouse for transforming and analyzing unstructured data. Versions 0.34.1 and below allow for deseriaization of untrusted data because of the way the DataChain library reads serialized objects from environment variables (such as DATACHAIN__METASTORE and DATACHAIN__WAREHOUSE) in the loader.py module. An attacker with the ability to set these environment variables can trigger code execution when the application loads. This issue is fixed in version 0.34.2.

Risk Information
cvss3
Base: 2.5
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N