Comparison Overview

MoneyGram

VS

Scalable Capital

MoneyGram

2828 N. Harwood,15th Floor, Dallas, TX, 75201, US
Last Update: 2025-05-06 (UTC)
Between 700 and 749

MoneyGram is a global leader in cross-border P2P payments and money transfers. Its consumer-centric capabilities enable family and friends to quickly and affordably send money in more than 200 countries and territories, with more than 75 countries now digitally enabled. MoneyGram leverages its modern, mobile, and API-driven platform and collaborates with the world's leading brands to serve millions of people each year through both its walk-in business and its direct-to-consumer digital business. With a strong culture of innovation and a relentless focus on utilizing technology to deliver the world's best customer experience, MoneyGram is leading the evolution of digital P2P payments. For more information, please visit moneygram.com and follow @MoneyGram. MoneyGram and the Globe are marks of MoneyGram. All other marks are the property of their respective owners. ©2023 MoneyGram. State Licensing: Licensed in all 50 states. Licensed as a Money Transmitter by the Banking Department of the State of New York Licensed by the Georgia Department of Banking and Finance; NMLS #898432 Massachusetts Check Seller License # CS0025, Foreign Transmittal License # FT89432, NMLS # 898432. The Commissioner of Financial Regulation for the State of Maryland will accept all questions or complaints from Maryland residents regarding MoneyGram Payment Systems, Inc. (NMLS #898432) at: 1100 North Eutaw Street, Suite 611, Baltimore, Maryland 21201. Phone number: 888-784-0136. MoneyGram’s license status information can be viewed on the NMLS Consumer Access website at https://nmlsconsumeraccess.org/

NAICS: 52
NAICS Definition: Finance and Insurance
Employees: 3,356
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
1

Scalable Capital

Seitzstraße 8e, München, Bayern, 80538, DE
Last Update: 2024-08-16 (UTC)
Between 700 and 749

Scalable Capital is a leading FinTech in Europe, bringing people and technology-based investment together. The company was founded in 2014 and has offices in Munich, Berlin and London. For private individuals, Scalable Capital offers a broker with a trading flat rate and interest and a digital wealth management. In digital wealth management, the company creates and manages globally diversified ETF portfolios for its clients with sustainable investment strategies when desired. The broker enables private individuals to trade stocks, ETFs, crypto, funds and more with as little as €1 and to set up ETF and stock savings plans with as little as €1. As a fast-growing FinTech, we are constantly looking for new employees and also welcome unsolicited applications: https://careers.scalable.capital/ For further information please visit our website: www.scalable.capital. Scalable Capital refers to Scalable GmbH and the affiliated companies. If this online presence contains information regarding capital markets, financial instruments and/or other topics relevant for investments of assets, the exclusive purpose of this information is to give general guidance on the investment services provided by Scalable Capital Limited and Scalable Capital GmbH. Our Privacy Policy can be found here: www.scalable.capital/privacy-policy

NAICS: 52
NAICS Definition: Finance and Insurance
Employees: 581
Subsidiaries: 0
12-month incidents
0
Known data breaches
1
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/moneygram-international.jpeg
MoneyGram
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/scalable-capital.jpeg
Scalable Capital
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
MoneyGram
100%
Compliance Rate
0/4 Standards Verified
Scalable Capital
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Financial Services Industry Average (This Year)

No incidents recorded for MoneyGram in 2025.

Incidents vs Financial Services Industry Average (This Year)

No incidents recorded for Scalable Capital in 2025.

Incident History — MoneyGram (X = Date, Y = Severity)

MoneyGram cyber incidents detection timeline including parent company and subsidiaries

Incident History — Scalable Capital (X = Date, Y = Severity)

Scalable Capital cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/moneygram-international.jpeg
MoneyGram
Incidents

Date Detected: 02/2018
Type:Data Leak
Attack Vector: Data-mining viruses
Motivation: Financial Gain
Blog: Blog
https://images.rankiteo.com/companyimages/scalable-capital.jpeg
Scalable Capital
Incidents

Date Detected: 10/2020
Type:Breach
Attack Vector: Insider Threat
Blog: Blog

FAQ

MoneyGram company demonstrates a stronger AI Cybersecurity Score compared to Scalable Capital company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

MoneyGram and Scalable Capital have experienced a similar number of publicly disclosed cyber incidents.

In the current year, Scalable Capital company and MoneyGram company have not reported any cyber incidents.

Neither Scalable Capital company nor MoneyGram company has reported experiencing a ransomware attack publicly.

Scalable Capital company has disclosed at least one data breach, while MoneyGram company has not reported such incidents publicly.

Neither Scalable Capital company nor MoneyGram company has reported experiencing targeted cyberattacks publicly.

Neither MoneyGram company nor Scalable Capital company has reported experiencing or disclosing vulnerabilities publicly.

Neither MoneyGram nor Scalable Capital holds any compliance certifications.

Neither company holds any compliance certifications.

Neither MoneyGram company nor Scalable Capital company has publicly disclosed detailed information about the number of their subsidiaries.

MoneyGram company employs more people globally than Scalable Capital company, reflecting its scale as a Financial Services.

Neither MoneyGram nor Scalable Capital holds SOC 2 Type 1 certification.

Neither MoneyGram nor Scalable Capital holds SOC 2 Type 2 certification.

Neither MoneyGram nor Scalable Capital holds ISO 27001 certification.

Neither MoneyGram nor Scalable Capital holds PCI DSS certification.

Neither MoneyGram nor Scalable Capital holds HIPAA certification.

Neither MoneyGram nor Scalable Capital holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

IBM Cloud Pak for Business Automation 25.0.0 through 25.0.0 Interim Fix 001, 24.0.1 through 24.0.1 Interim Fix 004, 24.0.0 through 24.0.0 Interim Fix 006, and earlier unsupported releases IBM Business Automation Workflow is vulnerable to stored cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.

Risk Information
cvss3
Base: 6.4
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
Description

Deck Mate 2 is distributed with static, hard-coded credentials for the root shell and web user interface, while multiple management services (SSH, HTTP, Telnet, SMB, X11) are enabled by default. If an attacker can reach these interfaces - most often through local or near-local access such as connecting to the USB or Ethernet ports beneath the table - the built-in credentials permit administrative login and full control of the system. Once authenticated, an attacker can access firmware utilities, modify controller software, and establish persistent compromise. Remote attack paths via network, cellular, or telemetry links may exist in specific configurations but generally require additional capabilities or operator error. The vendor reports that USB access has been disabled in current firmware builds.

Risk Information
cvss4
Base: 7.0
Severity: LOW
CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A potential vulnerability was reported in some Lenovo Tablets that could allow a local authenticated user or application to gain access to sensitive device specific information.

Risk Information
cvss3
Base: 5.5
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
cvss4
Base: 6.8
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Nagios XI versions prior to 2024R1.1.3, under certain circumstances, disclose sensitive user account information (including API keys and hashed passwords) to authenticated users who should not have access to that data. Exposure of API keys or password hashes could lead to account compromise, abuse of API privileges, or offline cracking attempts. CVE-2024-13995 addresses a similar vulnerability with a potentially incomplete fix for the underlying problem in earlier versions.

Risk Information
cvss4
Base: 6.0
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Nagios XI versions prior to 2024R1.1.3 contain a privilege escalation vulnerability in which an authenticated administrator could leverage the Migrate Server feature to obtain root privileges on the underlying XI host. By abusing the migration workflow, an admin-level attacker could execute actions outside the intended security scope of the application, resulting in full control of the operating system.

Risk Information
cvss4
Base: 9.4
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X