Comparison Overview

Banco do Brasil

VS

Abbey

Banco do Brasil

undefined, undefined, undefined, undefined, BR
Last Update: 2025-12-09
Between 750 and 799

Eu experimentei um novo jeito de me comunicar com você. Você usa o mundo digital para criar um universo totalmente seu e nesse novo universo eu acompanho você. Eu sei… Você é muito mais que digital. Eu olho para você e me vejo. Este é um dos motivos de eu estar aqui para conversar com você. Eu sou brasileiro como você. Eu sou um banco de mercado para manter a sustentabilidade da minha atuação. Eu fomento a produção agropecuária e a indústria nacional. Sou o maior parceiro das micro e pequenas empresas. Invisto há décadas no esporte brasileiro porque acredito na sua competência e garra. Eu tenho espírito público para criar valor para cada um dos brasileiros. Persigo a eficiência, com determinação, para otimizar os recursos disponíveis pensando nesta e em futuras gerações. Acredito no potencial de todas as pessoas e tenho como objetivo de vida ser uma referência de comportamento pessoal e profissional. Inovo a cada passo que dou para garantir que você e todos os brasileiros possam contar comigo sempre. Eu sou mais que digital. Estou aqui no LinkedIn para conversar com você sobre como podemos fazer um presente e um futuro melhores. Me encontre também nos outros canais: Facebook: www.facebook.com/bancodobrasil Twitter: www.twitter.com/bancodobrasil Instagram: www.instagram.com/bancodobrasil

NAICS: 52211
NAICS Definition: Commercial Banking
Employees: 67,891
Subsidiaries: 2
12-month incidents
0
Known data breaches
0
Attack type number
0

Abbey

Last Update: 2025-12-09
Between 750 and 799

Abbey National plc is the 6th biggest UK bank with 705 branches under the Abbey brand. It also uses the Cahoot and since September 2008, the Bradford and Bingley savings brands. Subsidiary banks include Cater Allen Limited. Since 2004 Abbey has been part of the Santander group. Santander is the largest Eurozone Financial Services company. Recent Santander acquisitions include UK Bank Alliance and Leicester.

NAICS: 522
NAICS Definition:
Employees: 10,001
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/bancodobrasil.jpeg
Banco do Brasil
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/abbey.jpeg
Abbey
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Banco do Brasil
100%
Compliance Rate
0/4 Standards Verified
Abbey
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Banking Industry Average (This Year)

No incidents recorded for Banco do Brasil in 2025.

Incidents vs Banking Industry Average (This Year)

No incidents recorded for Abbey in 2025.

Incident History — Banco do Brasil (X = Date, Y = Severity)

Banco do Brasil cyber incidents detection timeline including parent company and subsidiaries

Incident History — Abbey (X = Date, Y = Severity)

Abbey cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/bancodobrasil.jpeg
Banco do Brasil
Incidents

No Incident

https://images.rankiteo.com/companyimages/abbey.jpeg
Abbey
Incidents

No Incident

FAQ

Banco do Brasil company demonstrates a stronger AI Cybersecurity Score compared to Abbey company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, Abbey company has disclosed a higher number of cyber incidents compared to Banco do Brasil company.

In the current year, Abbey company and Banco do Brasil company have not reported any cyber incidents.

Neither Abbey company nor Banco do Brasil company has reported experiencing a ransomware attack publicly.

Neither Abbey company nor Banco do Brasil company has reported experiencing a data breach publicly.

Neither Abbey company nor Banco do Brasil company has reported experiencing targeted cyberattacks publicly.

Neither Banco do Brasil company nor Abbey company has reported experiencing or disclosing vulnerabilities publicly.

Neither Banco do Brasil nor Abbey holds any compliance certifications.

Neither company holds any compliance certifications.

Banco do Brasil company has more subsidiaries worldwide compared to Abbey company.

Banco do Brasil company employs more people globally than Abbey company, reflecting its scale as a Banking.

Neither Banco do Brasil nor Abbey holds SOC 2 Type 1 certification.

Neither Banco do Brasil nor Abbey holds SOC 2 Type 2 certification.

Neither Banco do Brasil nor Abbey holds ISO 27001 certification.

Neither Banco do Brasil nor Abbey holds PCI DSS certification.

Neither Banco do Brasil nor Abbey holds HIPAA certification.

Neither Banco do Brasil nor Abbey holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 2.6
Severity: HIGH
AV:N/AC:H/Au:N/C:N/I:P/A:N
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 6.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X