Comparison Overview

Sunair Vakanties

VS

Costa Crociere S.p.A.

Sunair Vakanties

Raoul Wallenbergplein 27, Alphen aan den Rijn, Zuid-Holland, 3074HN, NL
Last Update: 2025-03-15 (UTC)
Between 900 and 1000

Excellent

Sunair Vakanties is een middelgrote zelfstandige Nederlandse reisorganisatie, gespecialiseerd in Stedenvakanties en reizen naar de Kanaaleilanden. Vanuit ons kantoor in Alphen aan den Rijn werken wij met een enthousiast en gedreven team van 30 collegaโ€™s aan ons product; van het bedenken van de vakanties, het inkopen ervan, het samenstellen van de brochures en onze websites Sunair.nl en Stedentrips.nl, het verkopen, zowel via de ANVR reisbureaus als rechtstreeks aan consumenten. Onze organisatie kenmerkt zich door de informele sfeer, korte lijnen en flexibele en daadkrachtige instelling.

NAICS: 561
NAICS Definition:
Employees: 37
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Costa Crociere S.p.A.

Piazza Piccapietra 48, Genova, undefined, 16121, IT
Last Update: 2025-03-05 (UTC)

Excellent

Costa belongs to the Carnival Corporation & plc Group, listed on the London and New York stock exchanges, the largest cruise company in the world. Costa, the only Italian cruise company flying the Italian flag, has been sailing the worldโ€™s seas for more than 75 years, offering its guests a different destination every day to explore via unique experiences, both on board and on land. Over 70 years of pioneering in our Industry are a great starting point. But what truly matters is what comes next. Constant evolution. New ideas and sustainable innovations. Transformations that will deliver outstanding value for Costa, our people and unparalleled experiences for all our guests. Itโ€™s an exciting journey weโ€™re all on. What makes it possible is our unwavering ambition for excellence. Our enthusiasm, creativity and our passion. The drive to create human connections of our 17,000+ diverse multicultural global community. Together, we are empowered and driven to push ahead of the competition and redefine what excellence and success looks like for us. Each day we get a chance to live our passion and are empowered to make dreams come true โ€“ for our guests, for our communities and for ourselves. This is what unites us all, fulfils us, and makes us feel like we truly belong.

NAICS: 5615
NAICS Definition: Travel Arrangement and Reservation Services
Employees: 10,732
Subsidiaries: 22
12-month incidents
0
Known data breaches
7
Attack type number
2

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/sunair.jpeg
Sunair Vakanties
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/costa-crociere.jpeg
Costa Crociere S.p.A.
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
Sunair Vakanties
100%
Compliance Rate
0/4 Standards Verified
Costa Crociere S.p.A.
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Travel Arrangements Industry Average (This Year)

No incidents recorded for Sunair Vakanties in 2025.

Incidents vs Travel Arrangements Industry Average (This Year)

No incidents recorded for Costa Crociere S.p.A. in 2025.

Incident History โ€” Sunair Vakanties (X = Date, Y = Severity)

Sunair Vakanties cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” Costa Crociere S.p.A. (X = Date, Y = Severity)

Costa Crociere S.p.A. cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/sunair.jpeg
Sunair Vakanties
Incidents

No Incident

https://images.rankiteo.com/companyimages/costa-crociere.jpeg
Costa Crociere S.p.A.
Incidents

Date Detected: 3/2021
Type:Breach
Attack Vector: Email Account Compromise
Blog: Blog

Date Detected: 3/2021
Type:Ransomware
Attack Vector: email
Blog: Blog

Date Detected: 3/2021
Type:Ransomware
Attack Vector: email (phishing or credential compromise)
Blog: Blog

FAQ

Both Sunair Vakanties company and Costa Crociere S.p.A. company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Costa Crociere S.p.A. company has historically faced a number of disclosed cyber incidents, whereas Sunair Vakanties company has not reported any.

In the current year, Costa Crociere S.p.A. company and Sunair Vakanties company have not reported any cyber incidents.

Costa Crociere S.p.A. company has confirmed experiencing a ransomware attack, while Sunair Vakanties company has not reported such incidents publicly.

Costa Crociere S.p.A. company has disclosed at least one data breach, while Sunair Vakanties company has not reported such incidents publicly.

Neither Costa Crociere S.p.A. company nor Sunair Vakanties company has reported experiencing targeted cyberattacks publicly.

Neither Sunair Vakanties company nor Costa Crociere S.p.A. company has reported experiencing or disclosing vulnerabilities publicly.

Costa Crociere S.p.A. company has more subsidiaries worldwide compared to Sunair Vakanties company.

Costa Crociere S.p.A. company employs more people globally than Sunair Vakanties company, reflecting its scale as a Travel Arrangements.

Latest Global CVEs (Not Company-Specific)

Description

An issue was discovered in chinabugotech hutool before 5.8.4 allowing attackers to execute arbitrary expressions that lead to arbitrary method invocation and potentially remote code execution (RCE) via the QLExpressEngine class.

Description

A weakness has been identified in JeecgBoot up to 3.8.2. The impacted element is an unknown function of the file /sys/role/exportXls. This manipulation causes improper authorization. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in JeecgBoot up to 3.8.2. The affected element is an unknown function of the file /sys/user/exportXls of the component Filter Handler. The manipulation results in improper authorization. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in JeecgBoot up to 3.8.2. Impacted is an unknown function of the file /sys/tenant/deleteBatch. The manipulation of the argument ids leads to improper authorization. The attack is possible to be carried out remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 2.1
Severity: HIGH
AV:N/AC:H/Au:S/C:P/I:N/A:N
cvss3
Base: 3.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 2.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was determined in JeecgBoot up to 3.8.2. This issue affects some unknown processing of the file /api/getDepartUserList. Executing manipulation of the argument departId can lead to improper authorization. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 2.1
Severity: HIGH
AV:N/AC:H/Au:S/C:P/I:N/A:N
cvss3
Base: 3.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 2.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X