Comparison Overview

Yik Yak

VS

e&

Yik Yak

New York, New York, US
Last Update: 2025-12-17

Yik Yak is a location-based social network that helps you connect with the people right around you. By letting you express yourself, exchange thoughts, and explore your world, Yik Yak helps you feel at home within your local community.

NAICS: 513
NAICS Definition: Others
Employees: 161
Subsidiaries: 0
12-month incidents
0
Known data breaches
1
Attack type number
1

e&

Abu Dhabi, Abu Dhabi, undefined, undefined, AE
Last Update: 2025-12-17
Between 750 and 799

We're a global technology group focused on innovation and collaboration to create a better future for all. Since 1976, we've been pioneering new technologies and expanding our reach to more people and places. Today, we provide services to over 163 million customers across 16 countries in the Middle East, Asia, and Africa through our telecom brands under e& international and e& UAE. We're committed to driving the digital future to empower societies and help businesses and governments create a smarter, safer, and more sustainable world through all our business verticals including e& enterprise, e& life, and e& capital. Our goal is to empower people, communities, and societies worldwide to achieve more.

NAICS: None
NAICS Definition:
Employees: 28,188
Subsidiaries: 18
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/yikyakapp.jpeg
Yik Yak
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/eandgroup.jpeg
e&
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Yik Yak
100%
Compliance Rate
0/4 Standards Verified
e&
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Technology, Information and Internet Industry Average (This Year)

No incidents recorded for Yik Yak in 2025.

Incidents vs Technology, Information and Internet Industry Average (This Year)

No incidents recorded for e& in 2025.

Incident History — Yik Yak (X = Date, Y = Severity)

Yik Yak cyber incidents detection timeline including parent company and subsidiaries

Incident History — e& (X = Date, Y = Severity)

e& cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/yikyakapp.jpeg
Yik Yak
Incidents

Date Detected: 6/2013
Type:Breach
Attack Vector: Accidental Data Exposure
Blog: Blog
https://images.rankiteo.com/companyimages/eandgroup.jpeg
e&
Incidents

No Incident

FAQ

e& company demonstrates a stronger AI Cybersecurity Score compared to Yik Yak company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Yik Yak company has historically faced a number of disclosed cyber incidents, whereas e& company has not reported any.

In the current year, e& company and Yik Yak company have not reported any cyber incidents.

Neither e& company nor Yik Yak company has reported experiencing a ransomware attack publicly.

Yik Yak company has disclosed at least one data breach, while the other e& company has not reported such incidents publicly.

Neither e& company nor Yik Yak company has reported experiencing targeted cyberattacks publicly.

Neither Yik Yak company nor e& company has reported experiencing or disclosing vulnerabilities publicly.

Neither Yik Yak nor e& holds any compliance certifications.

Neither company holds any compliance certifications.

e& company has more subsidiaries worldwide compared to Yik Yak company.

e& company employs more people globally than Yik Yak company, reflecting its scale as a Technology, Information and Internet.

Neither Yik Yak nor e& holds SOC 2 Type 1 certification.

Neither Yik Yak nor e& holds SOC 2 Type 2 certification.

Neither Yik Yak nor e& holds ISO 27001 certification.

Neither Yik Yak nor e& holds PCI DSS certification.

Neither Yik Yak nor e& holds HIPAA certification.

Neither Yik Yak nor e& holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Hitachi Vantara Pentaho Data Integration and Analytics Community Dashboard Framework prior to versions 10.2.0.4, including 9.3.0.x and 8.3.x display the full server stack trace when encountering an error within the GetCdfResource servlet.

Risk Information
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Description

Pentaho Data Integration and Analytics Community Dashboard Editor plugin versions before 10.2.0.4, including 9.3.0.x and 8.3.x, deserialize untrusted JSON data without constraining the parser to approved classes and methods.

Risk Information
cvss3
Base: 8.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Description

A security flaw has been discovered in CTCMS Content Management System up to 2.1.2. The impacted element is an unknown function in the library /ctcms/libs/Ct_Config.php of the component Backend System Configuration Module. The manipulation of the argument Cj_Add/Cj_Edit results in code injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 5.8
Severity: LOW
AV:N/AC:L/Au:M/C:P/I:P/A:P
cvss3
Base: 4.7
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in CTCMS Content Management System up to 2.1.2. The affected element is the function Save of the file /ctcms/libs/Ct_App.php of the component Backend App Configuration Module. The manipulation of the argument CT_App_Paytype leads to code injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 5.8
Severity: LOW
AV:N/AC:L/Au:M/C:P/I:P/A:P
cvss3
Base: 4.7
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 5.1
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Weblate is a web based localization tool. In versions prior to 5.15, it was possible to accept an invitation opened by a different user. Version 5.15. contains a patch. As a workaround, avoid leaving one's Weblate sessions with an invitation opened unattended.

Risk Information
cvss4
Base: 1.0
Severity: HIGH
CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X