Comparison Overview

Pegasus Fairways Travel

VS

Princess Cruises

Pegasus Fairways Travel

156 Lindale Gardens,, Blackpool, undefined, FY4 3PL, GB
Last Update: 2025-03-07 (UTC)
Between 900 and 1000

Excellent

Pegasus Fairways Taxis, the number 1 specialists in Blackpool & the Fylde for Long Distance journeys and airport taxi and cab transfers. We provide a friendly

NAICS: 561
NAICS Definition:
Employees: 1
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Princess Cruises

24305 Town Center Drive, Santa Clarita, California, 91355, US
Last Update: 2025-05-06 (UTC)

Excellent

Between 900 and 1000

Princess is the worldโ€™s leading premium cruise line operating a fleet of modern ships visiting over 380 destinations around the globe on more than 160 itineraries. Each moment on Princess is one of wonderful discovery where guests can relax and explore. The choices are endless, from invigorating activities to more relaxing pursuits, and enable guests to share special moments with family and friends and enjoy unique travel experiences that create inspiring memories. At the forefront of innovation, Princess MedallionClass elevates service levels through enhanced guest experiences before and during cruise vacations. Exciting career opportunities in many departments await your discovery. Whether you are in customer service, food and beverage, or fleet operations (just to name a few), weโ€™re certain you will find a career path at Princess Cruises that will keep you engaged and growing for years to come. Teams on shore support colleagues onboard, as together we create memorable experiencesโ€”dining, entertainment, exploration, and celebrationโ€”for our guests. Exceptional customer service is the cornerstone of our success thanks to more than 30,000 of the cruise industryโ€™s finest team members on land and at sea. We create a friendly and welcoming environment not only for our onboard guests, but for our seagoing and land-based teams as well. The result is a remarkable number of loyal staff. We respect the seas we sail and destinations we visit. Our ships adhere to international rules regulating operations from fire safety to navigation, maritime security, and environmental stewardship. Onboard medical facilities meet or exceed standards set by the American College of Emergency Physicians. Thereโ€™s no limit to how far you can go with Princess Cruises!

NAICS: 5615
NAICS Definition: Travel Arrangement and Reservation Services
Employees: 14,486
Subsidiaries: 22
12-month incidents
0
Known data breaches
7
Attack type number
2

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/defaultcompany.jpeg
Pegasus Fairways Travel
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/princess-cruises.jpeg
Princess Cruises
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
Pegasus Fairways Travel
100%
Compliance Rate
0/4 Standards Verified
Princess Cruises
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Travel Arrangements Industry Average (This Year)

No incidents recorded for Pegasus Fairways Travel in 2025.

Incidents vs Travel Arrangements Industry Average (This Year)

No incidents recorded for Princess Cruises in 2025.

Incident History โ€” Pegasus Fairways Travel (X = Date, Y = Severity)

Pegasus Fairways Travel cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” Princess Cruises (X = Date, Y = Severity)

Princess Cruises cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/defaultcompany.jpeg
Pegasus Fairways Travel
Incidents

No Incident

https://images.rankiteo.com/companyimages/princess-cruises.jpeg
Princess Cruises
Incidents

Date Detected: 3/2021
Type:Breach
Attack Vector: Email Account Compromise
Blog: Blog

Date Detected: 3/2021
Type:Ransomware
Attack Vector: email
Blog: Blog

Date Detected: 3/2021
Type:Ransomware
Attack Vector: email (phishing or credential compromise)
Blog: Blog

FAQ

Both Pegasus Fairways Travel company and Princess Cruises company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Princess Cruises company has historically faced a number of disclosed cyber incidents, whereas Pegasus Fairways Travel company has not reported any.

In the current year, Princess Cruises company and Pegasus Fairways Travel company have not reported any cyber incidents.

Princess Cruises company has confirmed experiencing a ransomware attack, while Pegasus Fairways Travel company has not reported such incidents publicly.

Princess Cruises company has disclosed at least one data breach, while Pegasus Fairways Travel company has not reported such incidents publicly.

Neither Princess Cruises company nor Pegasus Fairways Travel company has reported experiencing targeted cyberattacks publicly.

Neither Pegasus Fairways Travel company nor Princess Cruises company has reported experiencing or disclosing vulnerabilities publicly.

Princess Cruises company has more subsidiaries worldwide compared to Pegasus Fairways Travel company.

Princess Cruises company employs more people globally than Pegasus Fairways Travel company, reflecting its scale as a Travel Arrangements.

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability has been found in GNU Binutils 2.45. The affected element is the function elf_swap_shdr in the library bfd/elfcode.h of the component Linker. The manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 9ca499644a21ceb3f946d1c179c38a83be084490. To fix this issue, it is recommended to deploy a patch. The code maintainer replied with "[f]ixed for 2.46".

Risk Information
cvss2
Base: 4.3
Severity: LOW
AV:L/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 4.8
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A flaw has been found in GNU Binutils 2.45. Impacted is the function _bfd_elf_parse_eh_frame of the file bfd/elf-eh-frame.c of the component Linker. Executing manipulation can lead to heap-based buffer overflow. The attack is restricted to local execution. The exploit has been published and may be used. This patch is called ea1a0737c7692737a644af0486b71e4a392cbca8. A patch should be applied to remediate this issue. The code maintainer replied with "[f]ixed for 2.46".

Risk Information
cvss2
Base: 4.3
Severity: LOW
AV:L/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 4.8
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was detected in GNU Binutils 2.45. This issue affects the function dump_dwarf_section of the file binutils/objdump.c. Performing manipulation results in out-of-bounds read. The attack is only possible with local access. The exploit is now public and may be used. The patch is named f87a66db645caf8cc0e6fc87b0c28c78a38af59b. It is suggested to install a patch to address this issue.

Risk Information
cvss2
Base: 1.7
Severity: LOW
AV:L/AC:L/Au:S/C:N/I:N/A:P
cvss3
Base: 3.3
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L
cvss4
Base: 4.8
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security vulnerability has been detected in zhuimengshaonian wisdom-education up to 1.0.4. This vulnerability affects the function selectStudentExamInfoList of the file src/main/java/com/education/api/controller/student/ExamInfoController.java. Such manipulation of the argument subjectId leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Campcodes Farm Management System 1.0. Affected by this issue is some unknown functionality. The manipulation results in file and directory information exposure. The attack may be performed from remote. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:N/A:N
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.5
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X