Comparison Overview

Stone Creek Surfaces

VS

Julius Berger Nigeria PLC

Stone Creek Surfaces

3520 Central Park Blvd, Louisville, Tennessee 37777-4752, US
Last Update: 2025-03-06 (UTC)

Excellent

Stone Creek Surfaces, located in the Knoxville area is proud to showcase East Tennessee’s widest array of counter top materials available. We carry many different colors of both granite and marble and also offer six brands of quartz. We offer surface materials for kitchen countertops, bathroom vanities, tables, fireplaces, and more.

NAICS: 23
NAICS Definition:
Employees: 8
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Julius Berger Nigeria PLC

10 Shettima A. Munguno Crescent Utako, FCT Abuja 900 108, NG
Last Update: 2025-05-06 (UTC)

Excellent

Between 900 and 1000

Julius Berger Nigeria Plc is a leading construction company offering integrated construction solutions and related services. Since its pioneer project in 1965, Julius Berger has played a pivotal role in the development of Nigeria’s industrial and civil infrastructure. Julius Berger specialises in executing complex works requiring the highest level of technical expertise and Nigeria-specific knowhow. The Company utilises state-of-the-art construction methods and technologies to ensure that quality and innovation are prioritised for the benefit of clients. Julius Berger’s business is supported by vertically integrated operations, which augment efficiency and timely project execution. Subsidiaries and additional facilities make it possible to realise multifaceted construction projects at the highest level of performance. Core competencies cover all project phases including planning, design, engineering, construction, operation and maintenance, for infrastructure industry and building projects. Furthermore, Julius Berger is a forerunner in developing green buildings that comply with the Leadership in Energy and Environmental Design (LEED) requirements. The Company’s value system has, over time, defined and differentiated its business, thereby setting a benchmark in the Nigerian construction industry. Excellence in health, safety and environmental protection, investment in the professional development of staff as well as sustainable business practices are fundamental components of Julius Berger’s corporate culture. Julius Berger is unmistakably recognised throughout Nigeria as a reliable partner. The breadth and depth of Julius Berger’s expertise, knowhow and strong supply chains provide particular assurance for clients. Moreover, the company’s competitive edge is solidified through adherence to globally recognized standards and through collaborative partnership, focused on efficient and value-driven project planning and execution.

NAICS: 23
NAICS Definition: Construction
Employees: 10,001+
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/defaultcompany.jpeg
Stone Creek Surfaces
ISO 27001
Not verified
SOC 2
Not verified
GDPR
No public badge
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/julius-berger-nigeria-plc.jpeg
Julius Berger Nigeria PLC
ISO 27001
Not verified
SOC 2
Not verified
GDPR
No public badge
PCI DSS
No public badge
Compliance Summary
Stone Creek Surfaces
100%
Compliance Rate
0/4 Standards Verified
Julius Berger Nigeria PLC
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Construction Industry Average (This Year)

No incidents recorded for Stone Creek Surfaces in 2025.

Incidents vs Construction Industry Average (This Year)

No incidents recorded for Julius Berger Nigeria PLC in 2025.

Incident History — Stone Creek Surfaces (X = Date, Y = Severity)

Stone Creek Surfaces cyber incidents detection timeline including parent company and subsidiaries

Incident History — Julius Berger Nigeria PLC (X = Date, Y = Severity)

Julius Berger Nigeria PLC cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/defaultcompany.jpeg
Stone Creek Surfaces
Incidents

No Incident

https://images.rankiteo.com/companyimages/julius-berger-nigeria-plc.jpeg
Julius Berger Nigeria PLC
Incidents

No Incident

FAQ

Both Stone Creek Surfaces company and Julius Berger Nigeria PLC company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Historically, Julius Berger Nigeria PLC company has disclosed a higher number of cyber incidents compared to Stone Creek Surfaces company.

In the current year, Julius Berger Nigeria PLC company and Stone Creek Surfaces company have not reported any cyber incidents.

Neither Julius Berger Nigeria PLC company nor Stone Creek Surfaces company has reported experiencing a ransomware attack publicly.

Neither Julius Berger Nigeria PLC company nor Stone Creek Surfaces company has reported experiencing a data breach publicly.

Neither Julius Berger Nigeria PLC company nor Stone Creek Surfaces company has reported experiencing targeted cyberattacks publicly.

Neither Stone Creek Surfaces company nor Julius Berger Nigeria PLC company has reported experiencing or disclosing vulnerabilities publicly.

Neither Stone Creek Surfaces company nor Julius Berger Nigeria PLC company has publicly disclosed detailed information about the number of their subsidiaries.

Stone Creek Surfaces company employs more people globally than Julius Berger Nigeria PLC company, reflecting its scale as a Construction.

Latest Global CVEs (Not Company-Specific)

Description

Formbricks is an open source qualtrics alternative. Prior to version 4.0.1, Formbricks is missing JWT signature verification. This vulnerability stems from a token validation routine that only decodes JWTs (jwt.decode) without verifying their signatures. Both the email verification token login path and the password reset server action use the same validator, which does not check the token’s signature, expiration, issuer, or audience. If an attacker learns the victim’s actual user.id, they can craft an arbitrary JWT with an alg: "none" header and use it to authenticate and reset the victim’s password. This issue has been patched in version 4.0.1.

Risk Information
cvss3
Base: 9.4
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
Description

Apollo Studio Embeddable Explorer & Embeddable Sandbox are website embeddable software solutions from Apollo GraphQL. Prior to Apollo Sandbox version 2.7.2 and Apollo Explorer version 3.7.3, a cross-site request forgery (CSRF) vulnerability was identified. The vulnerability arises from missing origin validation in the client-side code that handles window.postMessage events. A malicious website can send forged messages to the embedding page, causing the victim’s browser to execute arbitrary GraphQL queries or mutations against their GraphQL server while authenticated with the victim’s cookies. This issue has been patched in Apollo Sandbox version 2.7.2 and Apollo Explorer version 3.7.3.

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:N
Description

A security vulnerability has been detected in Portabilis i-Educar up to 2.10. Affected by this vulnerability is an unknown functionality of the file /consulta-dispensas. Such manipulation leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.

Risk Information
cvss2
Base: 6.5
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in Portabilis i-Educar up to 2.10. Affected is an unknown function of the file /module/Api/aluno. This manipulation of the argument aluno_id causes improper authorization. The attack may be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 6.5
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:P/A:P
cvss3
Base: 6.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tencent WeKnora 0.1.0. This impacts the function testEmbeddingModel of the file /api/v1/initialization/embedding/test. The manipulation of the argument baseUrl results in server-side request forgery. The attack can be launched remotely. The exploit has been released to the public and may be exploited. It is advisable to upgrade the affected component. The vendor responds: "We have confirmed that the issue mentioned in the report does not exist in the latest releases".

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X