
Banco Tierra del Fuego
Strong
Banco de la Provincia de Tierra del Fuego. Empresa de servicios bancarios de la Provincia de Tierra del Fuego, con sede central en la ciudad de Ushuaia.
Strong
Banco de la Provincia de Tierra del Fuego. Empresa de servicios bancarios de la Provincia de Tierra del Fuego, con sede central en la ciudad de Ushuaia.
Strong
The Allianz Group is one of the world's leading insurers and asset managers with more than 100 million private and corporate customers in more than 70 countries. We are proud to be the Worldwide Insurance Partner of the Olympic & Paralympic Movements from 2021 until 2028 and to be recognized as one of the industry leaders in the Dow Jones Sustainability Index. Caring for our employees, their ambitions, dreams and challenges is what makes us a unique employer. Together we can build an environment where everyone feels empowered and has the confidence to explore, to grow and to shape a better future for our customers and the world around us. Join us and together, letโs care for tomorrow. Credits: https://www.allianz.com/en_GB/credits-allianz-se.html Follow us on: Twitter: twitter.com/Allianz Instagram: https://www.instagram.com/teamallianz Facebook: https://www.facebook.com/AllianzCareers Glassdoor: https://www.glassdoor.de/%C3%9Cberblick/Arbeit-bei-Allianz-EI_IE3062.11,18.htm Allianz Data Privacy Statement: https://www.allianz.com/en_GB/privacy-statement.html Allianz Careers Data Privacy Statement: https://careers.allianz.com/en_EN/footer/data-privacy.html LinkedIn Privacy Policy: https://www.linkedin.com/legal/privacy-policy LinkedIn General Terms: https://www.linkedin.com/legal/user-agreement
Security & Compliance Standards Overview
No incidents recorded for Banco Tierra del Fuego in 2025.
No incidents recorded for Allianz in 2025.
Banco Tierra del Fuego cyber incidents detection timeline including parent company and subsidiaries
Allianz cyber incidents detection timeline including parent company and subsidiaries
Last 3 Security & Risk Events by Company
Mastra is a Typescript framework for building AI agents and assistants. Versions 0.13.8 through 0.13.20-alpha.0 are vulnerable to a Directory Traversal attack that results in the disclosure of directory listings. The code contains a security check to prevent path traversal for reading file contents, but this check is effectively bypassed by subsequent logic that attempts to find directory suggestions. An attacker can leverage this flaw to list the contents of arbitrary directories on the user's filesystem, including the user's home directory, exposing sensitive information about the file system's structure. This issue is fixed in version 0.13.20.
KUNO CMS is a fully deployable full-stack blog application. Versions 1.3.13 and below contain validation flaws in its file upload functionality that can be exploited for stored XSS. The upload endpoint only validates file types based on Content-Type headers, lacks file content analysis and extension whitelist restrictions, allowing attackers to upload SVG files containing malicious scripts (disguised as images). When users access the uploaded resource pages, arbitrary JavaScript executes in their browsers. This issue is fixed in version 1.3.14.
Minecraft RCON Terminal is a VS Code extension that streamlines Minecraft server management. Versions 0.1.0 through 2.0.6 stores passwords using VS Code's configuration API which writes to settings.json in plaintext. This issue is fixed in version 2.1.0.
Anyquery is an SQL query engine built on top of SQLite. Versions 0.4.3 and below allow attackers who have already gained access to localhost, even with low privileges, to use the http server through the port unauthenticated, and access private integration data like emails, without any warning of a foreign login from the provider. This issue is fixed in version 0.4.4.
DataChain is a Python-based AI-data warehouse for transforming and analyzing unstructured data. Versions 0.34.1 and below allow for deseriaization of untrusted data because of the way the DataChain library reads serialized objects from environment variables (such as DATACHAIN__METASTORE and DATACHAIN__WAREHOUSE) in the loader.py module. An attacker with the ability to set these environment variables can trigger code execution when the application loads. This issue is fixed in version 0.34.2.