Comparison Overview

Sydney Fish Market

VS

Assaí Atacadista

Sydney Fish Market

Locked Bag 247, Pyrmont, NSW 2009, AU
Last Update: 2025-03-16 (UTC)

Excellent

Home of Australia's Seafood, Sydney Fish Market (SFM) is the largest market of its kind in the Southern Hemisphere and the world's second largest seafood market in terms of variety outside of Japan. A working fish market, SFM sources' product both nationally and internationally and trades over 14,500 tonnes of seafood annually - with up to a hundred species of sustainable Australian seafood traded every day. SFM employs approximately fifty-seven staff to organise the weekday wholesale auction, promote Sydney Fish Market as the centre of seafood excellence and operate the Sydney Seafood School. Since opening in 1989, Sydney Seafood School has played an important part in persuading Sydney residents to eat more fish. The School is considered to be one of Australia’s leading cooking schools. Over 13,000 people come to classes each year. Visit the SSS pages for more information or to book a class. Onsite, SFM hosts six seafood retailers, a bottle shop, fruit and veg market, bakery, sushi bar, restaurants, gift shop and deli.

NAICS: 424
NAICS Definition:
Employees: 0
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Assaí Atacadista

Avenida Aricanduva 5555 São Paulo, SP 03527900, BR
Last Update: 2025-06-06 (UTC)

Strong

Between 800 and 900

Crescimento, oportunidade, valorização e respeito. Isso é Ser Assaí! Muito prazer, somos o Assaí Atacadista, empresa de atacado de autosserviço que está entre as maiores empregadoras privadas do país, que também carrega uma das Marcas Mais Valiosas do Brasil, segundo o ranking da Interbrand! Hoje, temos mais de 290 lojas, com mais de 80 mil colaboradores(as) que atuam com muita paixão por atender nossos(as) clientes, desde pequenos(as) e médios(as) comerciantes(as) e transformadores(as), até consumidores(as) finais que buscam por variedade e economia, cumprindo a nossa missão de abastecer os lares de milhares de brasileiros(as) com alimentos e itens básicos. Somos uma empresa que cuida da Nossa Gente, zela pela simplicidade, valoriza o Ser Humano e acredita no poder da diversidade e inclusão, atitudes que fazem parte dos valores da Nossa Cultura e, mais do que isso, são vivenciadas e praticadas no dia a dia de toda a Nossa Gente! E com o nosso processo de expansão acelerado, estamos crescendo e trazendo cada vez mais pessoas para fazerem parte do nosso time. Afinal, o crescimento do Nosso Negócio significa o crescimento da Nossa Gente! Por isso, buscamos profissionais que tenham muita vontade de se desenvolver em um ambiente inclusivo, que respeita todos e todas, jeitos, raças, cores e crenças, além de muito dinâmico, repleto de desafios e oportunidades! #VemSerAssaí: acesse assai.gupy.io e cadastre seu CV!

NAICS: 42
NAICS Definition: Wholesale Trade
Employees: 10,001+
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/defaultcompany.jpeg
Sydney Fish Market
ISO 27001
Not verified
SOC 2
Not verified
GDPR
No public badge
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/assaiatacadista.jpeg
Assaí Atacadista
ISO 27001
Not verified
SOC 2
Not verified
GDPR
No public badge
PCI DSS
No public badge
Compliance Summary
Sydney Fish Market
100%
Compliance Rate
0/4 Standards Verified
Assaí Atacadista
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Wholesale Industry Average (This Year)

No incidents recorded for Sydney Fish Market in 2025.

Incidents vs Wholesale Industry Average (This Year)

No incidents recorded for Assaí Atacadista in 2025.

Incident History — Sydney Fish Market (X = Date, Y = Severity)

Sydney Fish Market cyber incidents detection timeline including parent company and subsidiaries

Incident History — Assaí Atacadista (X = Date, Y = Severity)

Assaí Atacadista cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/defaultcompany.jpeg
Sydney Fish Market
Incidents

No Incident

https://images.rankiteo.com/companyimages/assaiatacadista.jpeg
Assaí Atacadista
Incidents

No Incident

FAQ

Sydney Fish Market company company demonstrates a stronger AI risk posture compared to Assaí Atacadista company company, reflecting its advanced AI governance and monitoring frameworks.

Historically, Assaí Atacadista company has disclosed a higher number of cyber incidents compared to Sydney Fish Market company.

In the current year, Assaí Atacadista company and Sydney Fish Market company have not reported any cyber incidents.

Neither Assaí Atacadista company nor Sydney Fish Market company has reported experiencing a ransomware attack publicly.

Neither Assaí Atacadista company nor Sydney Fish Market company has reported experiencing a data breach publicly.

Neither Assaí Atacadista company nor Sydney Fish Market company has reported experiencing targeted cyberattacks publicly.

Neither Sydney Fish Market company nor Assaí Atacadista company has reported experiencing or disclosing vulnerabilities publicly.

Neither Sydney Fish Market company nor Assaí Atacadista company has publicly disclosed detailed information about the number of their subsidiaries.

Neither Sydney Fish Market company nor Assaí Atacadista company has publicly disclosed the exact number of their employees.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in bftpd up to 6.2. Impacted is the function expand_groups of the file options.c of the component Configuration File Handler. Executing manipulation can lead to heap-based buffer overflow. It is possible to launch the attack on the local host. Attacks of this nature are highly complex. The exploitability is considered difficult. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 3.5
Severity: HIGH
AV:L/AC:H/Au:S/C:P/I:P/A:P
cvss3
Base: 4.5
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 2.0
Severity: HIGH
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in LogicalDOC Community Edition up to 9.2.1. This issue affects some unknown processing of the file /frontend.jsp of the component Add Contact Page. Performing manipulation of the argument First Name/Last Name/Company/Address/Phone/Mobile results in cross site scripting. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:N/I:P/A:N
cvss3
Base: 3.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in toeverything AFFiNE up to 0.24.1. This vulnerability affects unknown code of the component Avatar Upload Image Endpoint. Such manipulation leads to cross site scripting. The attack may be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:N/I:P/A:N
cvss3
Base: 3.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was determined in givanz Vvveb up to 1.0.7.3. This affects the function Import of the file admin/controller/tools/import.php of the component Raw SQL Handler. This manipulation causes sql injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. Patch name: 52204b4a106b2fb02d16eee06a88a1f2697f9b35. It is recommended to apply a patch to fix this issue.

Risk Information
cvss2
Base: 5.8
Severity: LOW
AV:N/AC:L/Au:M/C:P/I:P/A:P
cvss3
Base: 4.7
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability has been found in 70mai X200 up to 20251010. Affected by this vulnerability is an unknown functionality of the component HTTP Web Server. The manipulation leads to use of default credentials. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X