Comparison Overview

LyondellBasell

VS

AkzoNobel

LyondellBasell

LyondellBasell Tower, Ste. 700, 1221 McKinney Street, Houston, TX, US, 77010
Last Update: 2026-04-01

We are LyondellBasell (NYSE: LYB) – a leader in the global chemical industry creating solutions for everyday sustainable living. Through advanced technology and focused investments, we are enabling a circular and low carbon economy. Across all we do, we aim to unlock value for our customers, investors and society. As one of the world's largest producers of polymers and a leader in polyolefin technologies, we develop, manufacture and market high-quality and innovative products for applications ranging from sustainable transportation and food safety to clean water and quality healthcare. For more information, please visit www.lyondellbasell.com.

NAICS: 325
NAICS Definition: Chemical Manufacturing
Employees: 15,083
Subsidiaries: 1
12-month incidents
0
Known data breaches
0
Attack type number
0

AkzoNobel

Christian Neefestraat 2, Amsterdam, Noord Holland, NL, 1077 WW
Last Update: 2026-04-01
Between 0 and 549

Since 1792, we’ve been supplying the innovative paints and coatings that help to color people’s lives and protect what matters most. Our world class portfolio of brands – including Dulux, International, Sikkens and Interpon – is trusted by customers around the globe. We’re active in more than 150 countries and use our expertise to sustain and enhance everyday life. Because we believe every surface is an opportunity. It’s what you’d expect from a pioneering and long-established paints company that’s dedicated to providing sustainable solutions and preserving the best of what we have today – while creating an even better tomorrow. Let’s paint the future together.

NAICS: 325
NAICS Definition: Chemical Manufacturing
Employees: 31,151
Subsidiaries: 10
12-month incidents
2
Known data breaches
0
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/lyondell-basell.jpeg
LyondellBasell
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/akzonobel.jpeg
AkzoNobel
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
LyondellBasell
100%
Compliance Rate
0/4 Standards Verified
AkzoNobel
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Chemical Manufacturing Industry Average (This Year)

No incidents recorded for LyondellBasell in 2026.

Incidents vs Chemical Manufacturing Industry Average (This Year)

AkzoNobel has 25.09% fewer incidents than the average of same-industry companies with at least one recorded incident.

Incident History — LyondellBasell (X = Date, Y = Severity)

LyondellBasell cyber incidents detection timeline including parent company and subsidiaries

Incident History — AkzoNobel (X = Date, Y = Severity)

AkzoNobel cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/lyondell-basell.jpeg
LyondellBasell
Incidents

No Incident

https://images.rankiteo.com/companyimages/akzonobel.jpeg
AkzoNobel
Incidents

Date Detected: 3/2026
Type:Ransomware
Motivation: Financial gain, Operational disruption, Data theft
Blog: Blog

Date Detected: 2/2026
Type:Ransomware
Attack Vector: Exploitation of unpatched vulnerability (React2Shell)
Motivation: Data exfiltration and ransom demand
Blog: Blog

Date Detected: 12/2024
Type:Ransomware
Motivation: Financial gain (ransom demand), data exfiltration
Blog: Blog

FAQ

LyondellBasell company demonstrates a stronger AI Cybersecurity Score compared to AkzoNobel company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

AkzoNobel company has historically faced a number of disclosed cyber incidents, whereas LyondellBasell company has not reported any.

In the current year, AkzoNobel company has reported more cyber incidents than LyondellBasell company.

AkzoNobel company has confirmed experiencing a ransomware attack, while LyondellBasell company has not reported such incidents publicly.

Neither AkzoNobel company nor LyondellBasell company has reported experiencing a data breach publicly.

Neither AkzoNobel company nor LyondellBasell company has reported experiencing targeted cyberattacks publicly.

Neither LyondellBasell company nor AkzoNobel company has reported experiencing or disclosing vulnerabilities publicly.

Neither LyondellBasell nor AkzoNobel holds any compliance certifications.

Neither company holds any compliance certifications.

AkzoNobel company has more subsidiaries worldwide compared to LyondellBasell company.

AkzoNobel company employs more people globally than LyondellBasell company, reflecting its scale as a Chemical Manufacturing.

Neither LyondellBasell nor AkzoNobel holds SOC 2 Type 1 certification.

Neither LyondellBasell nor AkzoNobel holds SOC 2 Type 2 certification.

Neither LyondellBasell nor AkzoNobel holds ISO 27001 certification.

Neither LyondellBasell nor AkzoNobel holds PCI DSS certification.

Neither LyondellBasell nor AkzoNobel holds HIPAA certification.

Neither LyondellBasell nor AkzoNobel holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 5.0
Severity: LOW
AV:N/AC:L/Au:N/C:N/I:N/A:P
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Risk Information
cvss3
Base: 7.8
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
cvss4
Base: 8.4
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X