Comparison Overview

Stiles Custom Metals Inc

VS

Extra Co Group

Stiles Custom Metals Inc

1885 Kinser Rd, Ceres, CA, 95307, US
Last Update: 2025-11-28
Between 750 and 799

Stiles Custom Metal, Inc. has played a vital role in the hollow metal door and frame industry for over 40 years. Our company is a nationwide leader in the design and manufacturing of built-to-order commercial steel doors and window systems. We are a trusted partner to architects, dealers, and building owners -- guided by the values of The Golden Rule. Stiles Custom Metal is a custom door and frame Manufacturer in Ceres, CA, an ASSA ABLOY company.

NAICS: None
NAICS Definition:
Employees: 5
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Extra Co Group

Industrial Area 2, Sharjah, AE
Last Update: 2025-11-27
Between 750 and 799

Extra Co is a leading industrial manufacturer for thousands of different products, with more than 2,000 employees throughout the United Arab Emirates. Extra Co’s products and services have reached many parts of the world, including the Middle East, Africa, Europe, and the United States of America. Throughout its operations, Extra Co has adopted state-of-the-art manufacturing technologies and has pioneered new manufacturing methods to bring customer requirements to reality; all while maintaining the highest quality standards. Extra Co possesses several accreditations for its product ranges and operational procedures from the most globally acknowledged and reputed quality standards institutions. Extra Co’s has four major Business Units: The Fibreglass Composites Business Unit manufactures everything from standard fibreglass infrastructure products to specialized custom fibreglass products. The Prefab & Interiors Business Unit manufactures both standard and custom-designed prefab houses for temporary and permanent use, as well as complete interior fit-outs and carpentry work. The Precast Business Unit produces and installs standard and custom elements in GRC, gypsum, and concrete. The Metal Works Business Unit produces and erects all types of Steel Structures, designs and manufactures scaffolding systems, and supplies cut and bent steel reinforcement bars for the construction industry and manufactures steel profiles for structural and sheeting requirements.

NAICS: None
NAICS Definition: Others
Employees: 234
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/stiles-custom-metals-inc.jpeg
Stiles Custom Metals Inc
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/extra-co-group.jpeg
Extra Co Group
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Stiles Custom Metals Inc
100%
Compliance Rate
0/4 Standards Verified
Extra Co Group
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Mechanical Or Industrial Engineering Industry Average (This Year)

No incidents recorded for Stiles Custom Metals Inc in 2025.

Incidents vs Mechanical Or Industrial Engineering Industry Average (This Year)

No incidents recorded for Extra Co Group in 2025.

Incident History — Stiles Custom Metals Inc (X = Date, Y = Severity)

Stiles Custom Metals Inc cyber incidents detection timeline including parent company and subsidiaries

Incident History — Extra Co Group (X = Date, Y = Severity)

Extra Co Group cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/stiles-custom-metals-inc.jpeg
Stiles Custom Metals Inc
Incidents

No Incident

https://images.rankiteo.com/companyimages/extra-co-group.jpeg
Extra Co Group
Incidents

No Incident

FAQ

Stiles Custom Metals Inc company demonstrates a stronger AI Cybersecurity Score compared to Extra Co Group company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Extra Co Group company has disclosed a higher number of cyber incidents compared to Stiles Custom Metals Inc company.

In the current year, Extra Co Group company and Stiles Custom Metals Inc company have not reported any cyber incidents.

Neither Extra Co Group company nor Stiles Custom Metals Inc company has reported experiencing a ransomware attack publicly.

Neither Extra Co Group company nor Stiles Custom Metals Inc company has reported experiencing a data breach publicly.

Neither Extra Co Group company nor Stiles Custom Metals Inc company has reported experiencing targeted cyberattacks publicly.

Neither Stiles Custom Metals Inc company nor Extra Co Group company has reported experiencing or disclosing vulnerabilities publicly.

Neither Stiles Custom Metals Inc nor Extra Co Group holds any compliance certifications.

Neither company holds any compliance certifications.

Neither Stiles Custom Metals Inc company nor Extra Co Group company has publicly disclosed detailed information about the number of their subsidiaries.

Extra Co Group company employs more people globally than Stiles Custom Metals Inc company, reflecting its scale as a Mechanical Or Industrial Engineering.

Neither Stiles Custom Metals Inc nor Extra Co Group holds SOC 2 Type 1 certification.

Neither Stiles Custom Metals Inc nor Extra Co Group holds SOC 2 Type 2 certification.

Neither Stiles Custom Metals Inc nor Extra Co Group holds ISO 27001 certification.

Neither Stiles Custom Metals Inc nor Extra Co Group holds PCI DSS certification.

Neither Stiles Custom Metals Inc nor Extra Co Group holds HIPAA certification.

Neither Stiles Custom Metals Inc nor Extra Co Group holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H