ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Absa Group Limited (Absa) has forged a new way of getting things done, driven by bravery and passion, with the readiness to realise growth on the African continent and beyond. We’re a truly African brand, inspired by the people we serve in Botswana, Ghana, Kenya, Mauritius, Mozambique, Seychelles, South Africa, Tanzania, Uganda, and Zambia. We also have representative offices in China, Namibia, Nigeria and the United States, as well as securities entities in the United Kingdom and the United States, along with technology support colleagues in the Czech Republic.

Absa Group A.I CyberSecurity Scoring

Absa Group

Company Details

Linkedin ID:

absa

Employees number:

41,482

Number of followers:

947,984

NAICS:

52

Industry Type:

Financial Services

Homepage:

absa.africa

IP Addresses:

0

Company ID:

ABS_1215969

Scan Status:

In-progress

AI scoreAbsa Group Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/absa.jpeg
Absa Group Financial Services
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreAbsa Group Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/absa.jpeg
Absa Group Financial Services
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Absa Group Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

Absa Group Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Absa Group

Incidents vs Financial Services Industry Average (This Year)

No incidents recorded for Absa Group in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Absa Group in 2025.

Incident Types Absa Group vs Financial Services Industry Avg (This Year)

No incidents recorded for Absa Group in 2025.

Incident History — Absa Group (X = Date, Y = Severity)

Absa Group cyber incidents detection timeline including parent company and subsidiaries

Absa Group Company Subsidiaries

SubsidiaryImage

Absa Group Limited (Absa) has forged a new way of getting things done, driven by bravery and passion, with the readiness to realise growth on the African continent and beyond. We’re a truly African brand, inspired by the people we serve in Botswana, Ghana, Kenya, Mauritius, Mozambique, Seychelles, South Africa, Tanzania, Uganda, and Zambia. We also have representative offices in China, Namibia, Nigeria and the United States, as well as securities entities in the United Kingdom and the United States, along with technology support colleagues in the Czech Republic.

Loading...
similarCompanies

Absa Group Similar Companies

SONAE

Sonae exists to create a lasting positive impact on businesses, people, communities and on the planet. Managing a diverse portfolio of businesses in retail, financial services, technology, investments, shopping centres and telecommunications, Sonae makes the most of its expertise and pushes itself

Postal Savings Bank of China Co., Ltd.

Postal Savings Bank of China Co., Ltd. also known as PSBC is a commercial retail bank founded in 2007 and headquartered in Beijing. It provides basic financial services, especially to small and medium enterprises, rural[1] and low income customers. As of December 31, 2017, PSBC has 39,798[2] branche

Sumitomo Mitsui Banking Corporation – SMBC Group

SMBC Group is a top-tier global financial group. Headquartered in Tokyo and with a 400-year history, SMBC Group offers a diverse range of financial services, including banking, leasing, securities, credit cards, and consumer finance. The Group has more than 150 offices and 86,000 employees worldwide

Apex Group (Luxembourg)

We are a single-source financial solutions provider dedicated to driving positive change while supporting the growth and ambitions of asset managers, allocators, financial institutions, and family offices around the world. Established in Bermuda in 2003, we have continually disrupted the industry

Fannie Mae

Fannie Mae creates opportunities for people to buy, refinance, or rent a home. We are a leading source of mortgage financing in all markets and at all times. We ensure the availability of affordable mortgage loans. The financing solutions we develop make sustainable homeownership and workforce renta

Fidelity Investments

Fidelity’s mission is to strengthen the financial well-being of our customers and deliver better outcomes for the clients and businesses we serve. Fidelity’s strength comes from the scale of our diversified, market-leading financial services businesses that serve individuals, families, employers, we

Swedbank

Since 1820 Swedbank has been the bank for the many households and businesses. We are a modern financial services platform focused on customer satisfaction. Our goal is to encourage people to save for a better future and we aim to help people, businesses and society to grow by promoting a healthy and

Prudential Financial

Prudential Financial (NYSE:PRU) was founded on the belief that financial security should be within reach for everyone, and for over 140 years, we have helped our customers reach their potential and tackle life's challenges for now and future generations to come. Today, we are one of the world’s larg

SM Investments

SM Investments Corporation is a leading Philippine company that is invested in market-leading businesses in retail, banking, and property. It also invests in ventures that capture high growth opportunities in the emerging Philippine economy. SM’s retail operations are the country’s largest and most

newsone

Absa Group CyberSecurity News

November 19, 2025 10:58 AM
Direct Transact CISO Dirk Labuschagne shares why CIOs must shift cybersecurity to the boardroom

Direct Transact CIO Dirk Labuschagne discusses why IT chiefs in the financial services should convince their boards to invest in a...

November 17, 2025 09:22 AM
Absa group CITO Johnson Idesoh reflects on his 2025 CIO of the Year recognition

Absa group CITO Johnson Idesoh reflects on his triple wins and outlines how the recognition will drive his team's next phase of digital and...

November 14, 2025 01:26 AM
Absa’s Johnson Idesoh named 2025 CIO of the Year

Johnson Idesoh, group CITO at Absa, has been crowned CIO of the Year at the 2025 CIO Awards. Absa's Johnson Idesoh named 2025 CIO of the...

November 13, 2025 12:11 PM
MakwaIT champions proactive resilience with Cybersecurity Award sponsorship at CIO Awards

MakwaIT's head of governance, risk and assurance, Michèle Duncan, shares the company's commitment to recognising IT leaders who are leading...

October 23, 2025 04:43 PM
Code Forces’ Teleka App shines at Absa GirlCode Hackathon 2025

Code Forces, a dynamic team from Makerere University, clinched third place at the 11th annual Absa GirlCode Hackathon, held on October 12,...

October 14, 2025 07:00 AM
MTN, Absa, Mobile Web Ghana Equip Ghana’s Future Tech Women

The MTN Ghana Foundation, in collaboration with Absa Bank Ghana and Mobile Web Ghana, has successfully organized the 2025 Girl Code...

October 14, 2025 07:00 AM
Kenyan All-Women Team to Compete at Absa-GirlCode Tech Finals

Four young Kenyan women are set to represent the country at the continental finals of the Absa Bank Kenya–GirlCode Women-in-Tech Hackathon.

October 13, 2025 07:00 AM
Kenyan innovators to compete at the continental hackathon

Four young Kenyan women, the brains behind the AI-powered fintech platform 'Jasho-Powering Your Hustle', are set to represent Kenya at the...

October 09, 2025 07:00 AM
Absa Commits To Empower 112 Women In Tech As Hackathon Kicks Off

The pan-African hackathon will be happening simultaneously across seven cities in five African countries, including Johannesburg.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Absa Group CyberSecurity History Information

Official Website of Absa Group

The official website of Absa Group is https://www.absa.africa/your-story-matters/.

Absa Group’s AI-Generated Cybersecurity Score

According to Rankiteo, Absa Group’s AI-generated cybersecurity score is 752, reflecting their Fair security posture.

How many security badges does Absa Group’ have ?

According to Rankiteo, Absa Group currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Absa Group have SOC 2 Type 1 certification ?

According to Rankiteo, Absa Group is not certified under SOC 2 Type 1.

Does Absa Group have SOC 2 Type 2 certification ?

According to Rankiteo, Absa Group does not hold a SOC 2 Type 2 certification.

Does Absa Group comply with GDPR ?

According to Rankiteo, Absa Group is not listed as GDPR compliant.

Does Absa Group have PCI DSS certification ?

According to Rankiteo, Absa Group does not currently maintain PCI DSS compliance.

Does Absa Group comply with HIPAA ?

According to Rankiteo, Absa Group is not compliant with HIPAA regulations.

Does Absa Group have ISO 27001 certification ?

According to Rankiteo,Absa Group is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Absa Group

Absa Group operates primarily in the Financial Services industry.

Number of Employees at Absa Group

Absa Group employs approximately 41,482 people worldwide.

Subsidiaries Owned by Absa Group

Absa Group presently has no subsidiaries across any sectors.

Absa Group’s LinkedIn Followers

Absa Group’s official LinkedIn profile has approximately 947,984 followers.

NAICS Classification of Absa Group

Absa Group is classified under the NAICS code 52, which corresponds to Finance and Insurance.

Absa Group’s Presence on Crunchbase

No, Absa Group does not have a profile on Crunchbase.

Absa Group’s Presence on LinkedIn

Yes, Absa Group maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/absa.

Cybersecurity Incidents Involving Absa Group

As of November 27, 2025, Rankiteo reports that Absa Group has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

Absa Group has an estimated 29,517 peer or competitor companies worldwide.

Absa Group CyberSecurity History Information

How many cyber incidents has Absa Group faced ?

Total Incidents: According to Rankiteo, Absa Group has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at Absa Group ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=absa' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge