Comparison Overview

Sydney Fish Market

VS

Razgulay Group

Sydney Fish Market

Locked Bag 247, Pyrmont, NSW 2009, AU
Last Update: 2025-03-16 (UTC)

Excellent

Home of Australia's Seafood, Sydney Fish Market (SFM) is the largest market of its kind in the Southern Hemisphere and the world's second largest seafood market in terms of variety outside of Japan. A working fish market, SFM sources' product both nationally and internationally and trades over 14,500 tonnes of seafood annually - with up to a hundred species of sustainable Australian seafood traded every day. SFM employs approximately fifty-seven staff to organise the weekday wholesale auction, promote Sydney Fish Market as the centre of seafood excellence and operate the Sydney Seafood School. Since opening in 1989, Sydney Seafood School has played an important part in persuading Sydney residents to eat more fish. The School is considered to be one of Australiaโ€™s leading cooking schools. Over 13,000 people come to classes each year. Visit the SSS pages for more information or to book a class. Onsite, SFM hosts six seafood retailers, a bottle shop, fruit and veg market, bakery, sushi bar, restaurants, gift shop and deli.

NAICS: 424
NAICS Definition:
Employees: 0
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Razgulay Group

Last Update: 2025-03-15 (UTC)

Excellent

Between 900 and 1000

Core busines of the Group ($1 mlrd revenue, 15'000 hc); - agricultural production on 500 000 hectars; - 12 regional trading companies; - import of the sugar raw materials and cereals; - processing and storage capacity: * storage 17 silos 2 000 000 MT * sugar 11 plants 650 000 MT, * cereals - 4 plants 400 000 MT * flour - 4 plants 600 000 MT, - production of meat and poultry, processing to sausages, cans, freezed and cooled meat and poultry; - export of grain to 17 countries; - domestik wholesale to B2B and to trade; - production and distribution of grocery products to retail; Show more Show less

NAICS: 424
NAICS Definition:
Employees: 10,001+
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/defaultcompany.jpeg
Sydney Fish Market
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/razgulay-group.jpeg
Razgulay Group
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
Sydney Fish Market
100%
Compliance Rate
0/4 Standards Verified
Razgulay Group
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Wholesale Industry Average (This Year)

No incidents recorded for Sydney Fish Market in 2025.

Incidents vs Wholesale Industry Average (This Year)

No incidents recorded for Razgulay Group in 2025.

Incident History โ€” Sydney Fish Market (X = Date, Y = Severity)

Sydney Fish Market cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” Razgulay Group (X = Date, Y = Severity)

Razgulay Group cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/defaultcompany.jpeg
Sydney Fish Market
Incidents

No Incident

https://images.rankiteo.com/companyimages/razgulay-group.jpeg
Razgulay Group
Incidents

No Incident

FAQ

Both Sydney Fish Market company and Razgulay Group company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Historically, Razgulay Group company has disclosed a higher number of cyber incidents compared to Sydney Fish Market company.

In the current year, Razgulay Group company and Sydney Fish Market company have not reported any cyber incidents.

Neither Razgulay Group company nor Sydney Fish Market company has reported experiencing a ransomware attack publicly.

Neither Razgulay Group company nor Sydney Fish Market company has reported experiencing a data breach publicly.

Neither Razgulay Group company nor Sydney Fish Market company has reported experiencing targeted cyberattacks publicly.

Neither Sydney Fish Market company nor Razgulay Group company has reported experiencing or disclosing vulnerabilities publicly.

Neither Sydney Fish Market company nor Razgulay Group company has publicly disclosed detailed information about the number of their subsidiaries.

Neither Sydney Fish Market company nor Razgulay Group company has publicly disclosed the exact number of their employees.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in bftpd up to 6.2. Impacted is the function expand_groups of the file options.c of the component Configuration File Handler. Executing manipulation can lead to heap-based buffer overflow. It is possible to launch the attack on the local host. Attacks of this nature are highly complex. The exploitability is considered difficult. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 3.5
Severity: HIGH
AV:L/AC:H/Au:S/C:P/I:P/A:P
cvss3
Base: 4.5
Severity: HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 2.0
Severity: HIGH
CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in LogicalDOC Community Edition up to 9.2.1. This issue affects some unknown processing of the file /frontend.jsp of the component Add Contact Page. Performing manipulation of the argument First Name/Last Name/Company/Address/Phone/Mobile results in cross site scripting. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:N/I:P/A:N
cvss3
Base: 3.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in toeverything AFFiNE up to 0.24.1. This vulnerability affects unknown code of the component Avatar Upload Image Endpoint. Such manipulation leads to cross site scripting. The attack may be launched remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:N/I:P/A:N
cvss3
Base: 3.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was determined in givanz Vvveb up to 1.0.7.3. This affects the function Import of the file admin/controller/tools/import.php of the component Raw SQL Handler. This manipulation causes sql injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. Patch name: 52204b4a106b2fb02d16eee06a88a1f2697f9b35. It is recommended to apply a patch to fix this issue.

Risk Information
cvss2
Base: 5.8
Severity: LOW
AV:N/AC:L/Au:M/C:P/I:P/A:P
cvss3
Base: 4.7
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability has been found in 70mai X200 up to 20251010. Affected by this vulnerability is an unknown functionality of the component HTTP Web Server. The manipulation leads to use of default credentials. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X