Comparison Overview

Samsung Electronics

VS

Apple

Samsung Electronics

129 Samsung-ro, None, Suwon-Si, Gyeonggi-Do, KR, 443-742
Last Update: 2025-12-09
Between 750 and 799

Samsung Electronics is a global leader in technology, opening new possibilities for people everywhere. Through relentless innovation and discovery, we are transforming the worlds of TVs, smartphones, wearable devices, tablets, digital appliances, network systems, medical devices, semiconductors and LED solutions. Samsung is also leading in the Internet of Things space through, among others, our Smart Home and Digital Health initiatives. Since being established in 1969, Samsung Electronics has grown into one of the world’s leading technology companies, and become recognized as one of the top 10 global brands. Our network now extends across the world, and Samsung takes great pride in the creativity and diversity of its talented people, who drive our growth. To discover more, please visit our website at www.samsung.com and our official newsroom at news.samsung.com

NAICS: 334
NAICS Definition: Computer and Electronic Product Manufacturing
Employees: 161,321
Subsidiaries: 41
12-month incidents
4
Known data breaches
6
Attack type number
3

Apple

1 Apple Park Way, Cupertino, California, US, 95014
Last Update: 2025-12-13
Between 750 and 799

We’re a diverse collective of thinkers and doers, continually reimagining what’s possible to help us all do what we love in new ways. And the same innovation that goes into our products also applies to our practices — strengthening our commitment to leave the world better than we found it. This is where your work can make a difference in people’s lives. Including your own. Apple is an equal opportunity employer that is committed to inclusion and diversity. Visit apple.com/careers to learn more.

NAICS: 334
NAICS Definition: Computer and Electronic Product Manufacturing
Employees: 161,773
Subsidiaries: 0
12-month incidents
8
Known data breaches
8
Attack type number
4

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/samsung-electronics.jpeg
Samsung Electronics
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/apple.jpeg
Apple
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Samsung Electronics
100%
Compliance Rate
0/4 Standards Verified
Apple
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Computers and Electronics Manufacturing Industry Average (This Year)

Samsung Electronics has 1011.11% more incidents than the average of same-industry companies with at least one recorded incident.

Incidents vs Computers and Electronics Manufacturing Industry Average (This Year)

Apple has 2122.22% more incidents than the average of same-industry companies with at least one recorded incident.

Incident History — Samsung Electronics (X = Date, Y = Severity)

Samsung Electronics cyber incidents detection timeline including parent company and subsidiaries

Incident History — Apple (X = Date, Y = Severity)

Apple cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/samsung-electronics.jpeg
Samsung Electronics
Incidents

Date Detected: 11/2025
Type:Vulnerability
Blog: Blog

Date Detected: 8/2025
Type:Vulnerability
Attack Vector: Malicious Image Files, Closed-Source Library Exploitation (libimagecodec.quram.so)
Blog: Blog

Date Detected: 7/2025
Type:Breach
Motivation: Unauthorized disclosure of confidential information
Blog: Blog
https://images.rankiteo.com/companyimages/apple.jpeg
Apple
Incidents

Date Detected: 12/2025
Type:Breach
Attack Vector: Insider Threat / Unauthorized Access
Blog: Blog

Date Detected: 10/2025
Type:Breach
Attack Vector: Physical Access to Device, Insider Threat (Former Employee), Social Engineering (Trust Exploitation)
Motivation: Financial Gain, Reputation/Influence (Leaking Exclusive Information)
Blog: Blog

Date Detected: 6/2025
Type:Vulnerability
Attack Vector: Malicious image file, Memory manipulation
Motivation: Targeted attacks against high-value individuals, Potential mass exploitation post-patch
Blog: Blog

FAQ

Apple company demonstrates a stronger AI Cybersecurity Score compared to Samsung Electronics company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Apple company has faced a higher number of disclosed cyber incidents historically compared to Samsung Electronics company.

In the current year, Apple company has reported more cyber incidents than Samsung Electronics company.

Apple company has confirmed experiencing a ransomware attack, while Samsung Electronics company has not reported such incidents publicly.

Both Apple company and Samsung Electronics company have disclosed experiencing at least one data breach.

Apple company has reported targeted cyberattacks, while Samsung Electronics company has not reported such incidents publicly.

Both Samsung Electronics company and Apple company have disclosed vulnerabilities.

Neither Samsung Electronics nor Apple holds any compliance certifications.

Neither company holds any compliance certifications.

Samsung Electronics company has more subsidiaries worldwide compared to Apple company.

Apple company employs more people globally than Samsung Electronics company, reflecting its scale as a Computers and Electronics Manufacturing.

Neither Samsung Electronics nor Apple holds SOC 2 Type 1 certification.

Neither Samsung Electronics nor Apple holds SOC 2 Type 2 certification.

Neither Samsung Electronics nor Apple holds ISO 27001 certification.

Neither Samsung Electronics nor Apple holds PCI DSS certification.

Neither Samsung Electronics nor Apple holds HIPAA certification.

Neither Samsung Electronics nor Apple holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 2.6
Severity: HIGH
AV:N/AC:H/Au:N/C:N/I:P/A:N
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 6.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X