Comparison Overview

Banco do Brasil

VS

CIC

Banco do Brasil

undefined, undefined, undefined, undefined, BR
Last Update: 2025-12-17
Between 750 and 799

Eu experimentei um novo jeito de me comunicar com você. Você usa o mundo digital para criar um universo totalmente seu e nesse novo universo eu acompanho você. Eu sei… Você é muito mais que digital. Eu olho para você e me vejo. Este é um dos motivos de eu estar aqui para conversar com você. Eu sou brasileiro como você. Eu sou um banco de mercado para manter a sustentabilidade da minha atuação. Eu fomento a produção agropecuária e a indústria nacional. Sou o maior parceiro das micro e pequenas empresas. Invisto há décadas no esporte brasileiro porque acredito na sua competência e garra. Eu tenho espírito público para criar valor para cada um dos brasileiros. Persigo a eficiência, com determinação, para otimizar os recursos disponíveis pensando nesta e em futuras gerações. Acredito no potencial de todas as pessoas e tenho como objetivo de vida ser uma referência de comportamento pessoal e profissional. Inovo a cada passo que dou para garantir que você e todos os brasileiros possam contar comigo sempre. Eu sou mais que digital. Estou aqui no LinkedIn para conversar com você sobre como podemos fazer um presente e um futuro melhores. Me encontre também nos outros canais: Facebook: www.facebook.com/bancodobrasil Twitter: www.twitter.com/bancodobrasil Instagram: www.instagram.com/bancodobrasil

NAICS: 52211
NAICS Definition: Commercial Banking
Employees: 67,891
Subsidiaries: 2
12-month incidents
0
Known data breaches
0
Attack type number
0

CIC

6, Avenue de Provence, None, Paris, Île-de-France, FR, 75009
Last Update: 2025-12-17
Between 750 and 799

CIC is the fourth largest banking group in France, consisting of seven regional banks which operate across France through a network of 1,844 branches employing 24,000 staff. CIC's customer base includes 2.7 million retail clients. One in eleven self-employed professionals is a CIC group client and nearly one in three companies banks with CIC Group.

NAICS: 52211
NAICS Definition: Commercial Banking
Employees: 11,132
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/bancodobrasil.jpeg
Banco do Brasil
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/cic.jpeg
CIC
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Banco do Brasil
100%
Compliance Rate
0/4 Standards Verified
CIC
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Banking Industry Average (This Year)

No incidents recorded for Banco do Brasil in 2025.

Incidents vs Banking Industry Average (This Year)

No incidents recorded for CIC in 2025.

Incident History — Banco do Brasil (X = Date, Y = Severity)

Banco do Brasil cyber incidents detection timeline including parent company and subsidiaries

Incident History — CIC (X = Date, Y = Severity)

CIC cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/bancodobrasil.jpeg
Banco do Brasil
Incidents

No Incident

https://images.rankiteo.com/companyimages/cic.jpeg
CIC
Incidents

No Incident

FAQ

Banco do Brasil company demonstrates a stronger AI Cybersecurity Score compared to CIC company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

Historically, CIC company has disclosed a higher number of cyber incidents compared to Banco do Brasil company.

In the current year, CIC company and Banco do Brasil company have not reported any cyber incidents.

Neither CIC company nor Banco do Brasil company has reported experiencing a ransomware attack publicly.

Neither CIC company nor Banco do Brasil company has reported experiencing a data breach publicly.

Neither CIC company nor Banco do Brasil company has reported experiencing targeted cyberattacks publicly.

Neither Banco do Brasil company nor CIC company has reported experiencing or disclosing vulnerabilities publicly.

Neither Banco do Brasil nor CIC holds any compliance certifications.

Neither company holds any compliance certifications.

Banco do Brasil company has more subsidiaries worldwide compared to CIC company.

Banco do Brasil company employs more people globally than CIC company, reflecting its scale as a Banking.

Neither Banco do Brasil nor CIC holds SOC 2 Type 1 certification.

Neither Banco do Brasil nor CIC holds SOC 2 Type 2 certification.

Neither Banco do Brasil nor CIC holds ISO 27001 certification.

Neither Banco do Brasil nor CIC holds PCI DSS certification.

Neither Banco do Brasil nor CIC holds HIPAA certification.

Neither Banco do Brasil nor CIC holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Marshmallow is a lightweight library for converting complex objects to and from simple Python datatypes. In versions from 3.0.0rc1 to before 3.26.2 and from 4.0.0 to before 4.1.2, Schema.load(data, many=True) is vulnerable to denial of service attacks. A moderately sized request can consume a disproportionate amount of CPU time. This issue has been patched in version 3.26.2 and 4.1.2.

Risk Information
cvss3
Base: 5.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Description

KEDA is a Kubernetes-based Event Driven Autoscaling component. Prior to versions 2.17.3 and 2.18.3, an Arbitrary File Read vulnerability has been identified in KEDA, potentially affecting any KEDA resource that uses TriggerAuthentication to configure HashiCorp Vault authentication. The vulnerability stems from an incorrect or insufficient path validation when loading the Service Account Token specified in spec.hashiCorpVault.credential.serviceAccount. An attacker with permissions to create or modify a TriggerAuthentication resource can exfiltrate the content of any file from the node's filesystem (where the KEDA pod resides) by directing the file's content to a server under their control, as part of the Vault authentication request. The potential impact includes the exfiltration of sensitive system information, such as secrets, keys, or the content of files like /etc/passwd. This issue has been patched in versions 2.17.3 and 2.18.3.

Risk Information
cvss4
Base: 8.2
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Fedify is a TypeScript library for building federated server apps powered by ActivityPub. Prior to versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2, a Regular Expression Denial of Service (ReDoS) vulnerability exists in Fedify's document loader. The HTML parsing regex at packages/fedify/src/runtime/docloader.ts:259 contains nested quantifiers that cause catastrophic backtracking when processing maliciously crafted HTML responses. This issue has been patched in versions 1.6.13, 1.7.14, 1.8.15, and 1.9.2.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Authenticated Remote Code Execution (RCE) in PluXml CMS 5.8.22 allows an attacker with administrator panel access to inject a malicious PHP webshell into a theme file (e.g., home.php).

Risk Information
cvss3
Base: 6.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
Description

An issue was discovered in Xiongmai XM530 IP cameras on firmware V5.00.R02.000807D8.10010.346624.S.ONVIF 21.06. The GetStreamUri exposes RTSP URIs containing hardcoded credentials enabling direct unauthorized video stream access.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N