Comparison Overview

American Red Cross

VS

Save the Children International

American Red Cross

430 17th St NW, Washington, 20006, US
Last Update: 2026-04-05
Between 750 and 799

The American Red Cross prevents and alleviates human suffering in the face of emergencies by mobilizing the power of volunteers and the generosity of donors. Each day, thousands of people – people just like you – provide compassionate care to those in need. Our network of generous donors, volunteers and employees share a mission of preventing and relieving suffering, here at home and around the world. We roll up our sleeves and donate time, money and blood. We learn or teach life-saving skills so our communities can be better prepared when the need arises. We do this every day because the Red Cross is needed - every day.

NAICS: 8135
NAICS Definition: Others
Employees: 33,242
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
1

Save the Children International

1 St. Johns Lane , London, England, GB, EC1M 4BL 
Last Update: 2026-04-04

Save the Children Save the Children is the world's leading independent organisation for children. We work in around 120 countries. Our vision is to live in a world in which every child attains the right to survival, protection, development and participation. Last year Save the Children's programmes and campaigns reached more than 55 million children directly around the world, through our and our partners'​ work. We work to inspire breakthroughs in the way the world treats children and to achieve immediate and lasting change in their lives. Across all of our work, we pursue several core values: accountability, ambition, collaboration, creativity and integrity.

NAICS: 8135
NAICS Definition: Others
Employees: 17,354
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/american-red-cross.jpeg
American Red Cross
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/save-the-children-international.jpeg
Save the Children International
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
American Red Cross
100%
Compliance Rate
0/4 Standards Verified
Save the Children International
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Non-profit Organizations Industry Average (This Year)

No incidents recorded for American Red Cross in 2026.

Incidents vs Non-profit Organizations Industry Average (This Year)

No incidents recorded for Save the Children International in 2026.

Incident History — American Red Cross (X = Date, Y = Severity)

American Red Cross cyber incidents detection timeline including parent company and subsidiaries

Incident History — Save the Children International (X = Date, Y = Severity)

Save the Children International cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/american-red-cross.jpeg
American Red Cross
Incidents

Date Detected: 01/2022
Type:Ransomware
Attack Vector: Malware
Blog: Blog
https://images.rankiteo.com/companyimages/save-the-children-international.jpeg
Save the Children International
Incidents

Date Detected: 9/2023
Type:Ransomware
Motivation: Financial Gain
Blog: Blog

FAQ

Save the Children International company demonstrates a stronger AI Cybersecurity Score compared to American Red Cross company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

American Red Cross and Save the Children International have experienced a similar number of publicly disclosed cyber incidents.

In the current year, Save the Children International company and American Red Cross company have not reported any cyber incidents.

Both Save the Children International company and American Red Cross company have confirmed experiencing at least one ransomware attack.

Neither Save the Children International company nor American Red Cross company has reported experiencing a data breach publicly.

Neither Save the Children International company nor American Red Cross company has reported experiencing targeted cyberattacks publicly.

Neither American Red Cross company nor Save the Children International company has reported experiencing or disclosing vulnerabilities publicly.

Neither American Red Cross nor Save the Children International holds any compliance certifications.

Neither company holds any compliance certifications.

Neither American Red Cross company nor Save the Children International company has publicly disclosed detailed information about the number of their subsidiaries.

American Red Cross company employs more people globally than Save the Children International company, reflecting its scale as a Non-profit Organizations.

Neither American Red Cross nor Save the Children International holds SOC 2 Type 1 certification.

Neither American Red Cross nor Save the Children International holds SOC 2 Type 2 certification.

Neither American Red Cross nor Save the Children International holds ISO 27001 certification.

Neither American Red Cross nor Save the Children International holds PCI DSS certification.

Neither American Red Cross nor Save the Children International holds HIPAA certification.

Neither American Red Cross nor Save the Children International holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A security flaw has been discovered in Tenda 4G03 Pro up to 1.0/1.1/04.03.01.53/192.168.0.1. Affected by this vulnerability is an unknown functionality of the file /bin/httpd. The manipulation results in improper access controls. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Wikipedia 12.0 contains a denial of service vulnerability that allows unauthenticated attackers to crash the application by submitting oversized input through the search functionality. Attackers can paste a large buffer of repeated characters into the search bar to trigger an application crash.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Nodcms contains a cross-site request forgery vulnerability that allows attackers to perform unauthorized administrative actions by crafting malicious forms. Attackers can trick authenticated administrators into submitting requests to admin/user_manipulate and admin/settings/generall endpoints to create users or modify application settings without explicit consent.

Risk Information
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

10-Strike LANState 8.8 contains a local buffer overflow vulnerability in structured exception handling that allows local attackers to execute arbitrary code by crafting malicious LSM map files. Attackers can create a specially formatted LSM file with a payload in the ObjCaption parameter that overflows the buffer, overwrites the SEH chain, and executes shellcode when the file is opened in the application.

Risk Information
cvss3
Base: 8.4
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 8.6
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

NICO-FTP 3.0.1.19 contains a structured exception handler buffer overflow vulnerability that allows remote attackers to execute arbitrary code by sending crafted FTP commands. Attackers can connect to the FTP service and send oversized data in response handlers to overwrite SEH pointers and redirect execution to injected shellcode.

Risk Information
cvss3
Base: 9.8
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss4
Base: 9.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X