Comparison Overview

NG Nordic

VS

Dalkia

NG Nordic

Lysaker Torg 35 Postboks 567 Sk√∏yen Oslo, 0214, NO
Last Update: 2025-05-06 (UTC)
Between 800 and 900

Strong

NG Group and Fortum Recycling & Waste have joined forces to become a leading Nordic provider of circular solutions and environmental services, tackling the urgent challenges of climate change and resource scarcity. By transforming waste into valuable resources and removing hazardous substances from circulation, we are avoiding emissions and protecting natural ecosystems. Through reuse, collection, recycling, and depollution, we scale access to circular raw materials and help decarbonize society. With a strong presence across the Nordics, and in Poland and the UK, we operate through 90 processing facilities and sites, managing around 4.4 million tonnes of waste annually. Partnering with organizations of all sizes, we provide tailored, innovative solutions across the entire value chain, adding value at every step. We merge data with local know-how, empowering our customers to grow their business, while safeguarding the environment. Today, we are a vital part of the Nordic industrial infrastructure, generating EUR 1,2 billion in revenue with a team of about 3,400 employees. Our goal is to become a true European leader. Our dedicated team of experts is committed to safety and quality. Bringing together the best talents across the industry – from drivers and operators to engineers and leaders – we are building a business with global impact. Together, we are pioneering circularity.

NAICS: 54162
NAICS Definition: Environmental Consulting Services
Employees: 1,001-5,000
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Dalkia

204 rue Sadi Carnot , Saint-André-Lez-Lille, Hauts-de-France, 59350, FR
Last Update: 2025-03-12 (UTC)

Strong

Between 800 and 900

Dalkia : ensemble, relevons le défi climatique ! Depuis 85 ans, Dalkia, filiale du groupe EDF et leader dans les services énergétiques, investit et développe les énergies renouvelables et de récupération et accompagne ses clients dans la durée pour les aider à faire des économies d'énergie et à réduire leurs émissions de CO2. Plus de 20 000 salariés présents partout en France et à l'international assurent la maintenance et l'exploitation des installations de sites industriels, de bâtiments tertiaires, de collectivités, d'établissements de santé, de logements, avec des solutions innovantes et performantes, pour accélérer la décarbonation des sites et des territoires. Retrouvez nos solutions sur notre site écoresponsable www.dalkia.fr

NAICS: 54162
NAICS Definition: Environmental Consulting Services
Employees: 13,328
Subsidiaries: 10
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/norsk-gjenvinning.jpeg
NG Nordic
ISO 27001
Not verified
SOC 2
Not verified
GDPR
No public badge
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/dalkia.jpeg
Dalkia
ISO 27001
Not verified
SOC 2
Not verified
GDPR
No public badge
PCI DSS
No public badge
Compliance Summary
NG Nordic
100%
Compliance Rate
0/4 Standards Verified
Dalkia
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Environmental Services Industry Average (This Year)

No incidents recorded for NG Nordic in 2025.

Incidents vs Environmental Services Industry Average (This Year)

No incidents recorded for Dalkia in 2025.

Incident History — NG Nordic (X = Date, Y = Severity)

NG Nordic cyber incidents detection timeline including parent company and subsidiaries

Incident History — Dalkia (X = Date, Y = Severity)

Dalkia cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/norsk-gjenvinning.jpeg
NG Nordic
Incidents

No Incident

https://images.rankiteo.com/companyimages/dalkia.jpeg
Dalkia
Incidents

No Incident

FAQ

Both NG Nordic company and Dalkia company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Historically, Dalkia company has disclosed a higher number of cyber incidents compared to NG Nordic company.

In the current year, Dalkia company and NG Nordic company have not reported any cyber incidents.

Neither Dalkia company nor NG Nordic company has reported experiencing a ransomware attack publicly.

Neither Dalkia company nor NG Nordic company has reported experiencing a data breach publicly.

Neither Dalkia company nor NG Nordic company has reported experiencing targeted cyberattacks publicly.

Neither NG Nordic company nor Dalkia company has reported experiencing or disclosing vulnerabilities publicly.

Dalkia company has more subsidiaries worldwide compared to NG Nordic company.

Dalkia company employs more people globally than NG Nordic company, reflecting its scale as a Environmental Services.

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability has been found in GNU Binutils 2.45. The affected element is the function elf_swap_shdr in the library bfd/elfcode.h of the component Linker. The manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 9ca499644a21ceb3f946d1c179c38a83be084490. To fix this issue, it is recommended to deploy a patch. The code maintainer replied with "[f]ixed for 2.46".

Risk Information
cvss2
Base: 4.3
Severity: LOW
AV:L/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 4.8
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A flaw has been found in GNU Binutils 2.45. Impacted is the function _bfd_elf_parse_eh_frame of the file bfd/elf-eh-frame.c of the component Linker. Executing manipulation can lead to heap-based buffer overflow. The attack is restricted to local execution. The exploit has been published and may be used. This patch is called ea1a0737c7692737a644af0486b71e4a392cbca8. A patch should be applied to remediate this issue. The code maintainer replied with "[f]ixed for 2.46".

Risk Information
cvss2
Base: 4.3
Severity: LOW
AV:L/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 4.8
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was detected in GNU Binutils 2.45. This issue affects the function dump_dwarf_section of the file binutils/objdump.c. Performing manipulation results in out-of-bounds read. The attack is only possible with local access. The exploit is now public and may be used. The patch is named f87a66db645caf8cc0e6fc87b0c28c78a38af59b. It is suggested to install a patch to address this issue.

Risk Information
cvss2
Base: 1.7
Severity: LOW
AV:L/AC:L/Au:S/C:N/I:N/A:P
cvss3
Base: 3.3
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
cvss4
Base: 4.8
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security vulnerability has been detected in zhuimengshaonian wisdom-education up to 1.0.4. This vulnerability affects the function selectStudentExamInfoList of the file src/main/java/com/education/api/controller/student/ExamInfoController.java. Such manipulation of the argument subjectId leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Campcodes Farm Management System 1.0. Affected by this issue is some unknown functionality. The manipulation results in file and directory information exposure. The attack may be performed from remote. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X