Comparison Overview

loanDepot Wholesale/Correspondent

VS

Mizuho

loanDepot Wholesale/Correspondent

2600 Michelson Drive, Irvine, CA, 92612, US
Last Update: 2025-02-22 (UTC)
Between 800 and 900

Strong

loanDepot Wholesale is a third-party origination channel of loanDepot, America's lender. Serving mortgage brokers in 48 states and the District of Columbia, the division delivers an integrated and seamless technology-based lending experience for business partners and customers that is transparent and fast. loanDepot Wholesale offers a competitively priced suite of Conventional, FHA, VA, Jumbo and Renovation loan products. loanDepot LLC, NMLS #174457. Learn more at LDWholesale.com.

NAICS: 52
NAICS Definition: Finance and Insurance
Employees: 59
Subsidiaries: 1
12-month incidents
0
Known data breaches
2
Attack type number
2

Mizuho

1โ€“5โ€“5 Otemachi, Chiyodaโ€“ku, Tokyo, Japan, 100โ€“8176, JP
Last Update: 2025-03-04 (UTC)

Strong

Between 800 and 900

This is not your typical financial institution. Itโ€™s our people who make us a cut above. Here, every person is respected because of their differences, not in spite of them. We pride ourselves on a culture of purpose, passion and compassion. At Mizuho, we provide the stability of an international industry leader with the career trajectory of a growing business. Our steady, strategic growth gives our people at all levels rewarding degrees of responsibility and a richer work experience than a boutique firm or an established giant could offer alone. Working for Mizuho opens doors not just to a rewarding career with excellent prospects, but to lasting friendships with colleagues from diverse cultures. Itโ€™s the local expertise of our employees that makes our global network so powerful. By collaborating with colleagues and clients who have your same ambition, you can amplify your sphere of influence and base of knowledge as part of one of the largestโ€”and growingโ€”banks in the world. Weโ€™re all global citizens, and thatโ€™s why our company feels compelled to make an impact through more than just drawing up deals. We prove that itโ€™s possible to do well and do good. We do right by our clients, our community and each other.

NAICS: 52
NAICS Definition: Finance and Insurance
Employees: 12,500
Subsidiaries: 1
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/ldwholesale.jpeg
loanDepot Wholesale/Correspondent
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/mizuho.jpeg
Mizuho
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
loanDepot Wholesale/Correspondent
100%
Compliance Rate
0/4 Standards Verified
Mizuho
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Financial Services Industry Average (This Year)

No incidents recorded for loanDepot Wholesale/Correspondent in 2025.

Incidents vs Financial Services Industry Average (This Year)

No incidents recorded for Mizuho in 2025.

Incident History โ€” loanDepot Wholesale/Correspondent (X = Date, Y = Severity)

loanDepot Wholesale/Correspondent cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” Mizuho (X = Date, Y = Severity)

Mizuho cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/ldwholesale.jpeg
loanDepot Wholesale/Correspondent
Incidents

Date Detected: 1/2024
Type:Breach
Blog: Blog

Date Detected: 01/2024
Type:Cyber Attack
Blog: Blog

Date Detected: 8/2022
Type:Breach
Attack Vector: Unauthorized Access
Blog: Blog
https://images.rankiteo.com/companyimages/mizuho.jpeg
Mizuho
Incidents

No Incident

FAQ

Both loanDepot Wholesale/Correspondent company and Mizuho company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

loanDepot Wholesale/Correspondent company has historically faced a number of disclosed cyber incidents, whereas Mizuho company has not reported any.

In the current year, Mizuho company and loanDepot Wholesale/Correspondent company have not reported any cyber incidents.

Neither Mizuho company nor loanDepot Wholesale/Correspondent company has reported experiencing a ransomware attack publicly.

loanDepot Wholesale/Correspondent company has disclosed at least one data breach, while the other Mizuho company has not reported such incidents publicly.

loanDepot Wholesale/Correspondent company has reported targeted cyberattacks, while Mizuho company has not reported such incidents publicly.

Neither loanDepot Wholesale/Correspondent company nor Mizuho company has reported experiencing or disclosing vulnerabilities publicly.

Both Mizuho company and loanDepot Wholesale/Correspondent company have a similar number of subsidiaries worldwide.

Mizuho company employs more people globally than loanDepot Wholesale/Correspondent company, reflecting its scale as a Financial Services.

Latest Global CVEs (Not Company-Specific)

Description

Mbed TLS before 3.6.5 allows a local timing attack against certain RSA operations, and direct calls to mbedtls_mpi_mod_inv or mbedtls_mpi_gcd.

Description

Lack of application manifest sanitation could lead to potential stored XSS.This issue affects BLU-IC2: through 1.19.5; BLU-IC4: through 1.19.5.

Risk Information
cvss4
Base: 10.0
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

The Element Pack Addons for Elementor plugin for WordPress is vulnerable to Blind Server-Side Request Forgery in all versions up to, and including, 8.2.5 via the wp_ajax_import_elementor_template action. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

Risk Information
cvss3
Base: 5.0
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
Description

GeoVision embedded IP devices, confirmed onย GV-BX1500 andย GV-MFD1501, contain a remote command injection vulnerability viaย /PictureCatch.cgi that enables an attacker to execute arbitrary commands on the device. VulnCheck has observed this vulnerability being exploited in the wild as of 2025-10-19 08:55:13.141502 UTC.

Risk Information
cvss4
Base: 9.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in The Wikimedia Foundation MediaWiki WatchAnalytics extension allows SQL Injection.This issue affects MediaWiki WatchAnalytics extension: 1.43, 1.44.

Risk Information
cvss4
Base: 7.5
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:U/V:C/RE:M/U:Amber