Company Details
bnp-paribas-epargne-&-retraite-entreprises
1
6,005
None
bnpparibas.com
0
BNP_1769296
In-progress


BNP Paribas Epargne & Retraite Entreprises Vendor Cyber Rating & Cyber Score
bnpparibas.comIl y a plus de 15 ans, BNP Paribas a fait le choix stratégique de regrouper au sein de BNP Paribas Epargne et Retraite Entreprises, l’épargne salariale et la retraite collective, afin d’apporter des solutions globales à nos épargnants, et de tirer pleinement profit des expertises complémentaires de l’Asset manager et de l’assureur. Ce positionnement fait de BNP Paribas E&RE un acteur incontournable de ce marché grâce à la double expertise de ses équipes, des outils digitaux offrant des espaces et des services consolidés, pour un parcours utilisateur toujours plus fluide et optimisé, et des offres financières cohérentes. E&RE, engagé pour un impact positif sur l’économie réelle soutient les investissements solidaires et responsables dans des domaines tels que l’accès à l’emploi, la microfinance et le soutien à l’entreprenariat, l’hébergement de personnes dépendantes, l’accès au logement, la protection de l’environnement et la consommation responsable, l’accès à la santé et le maintien de l’autonomie, la solidarité internationale. Partenaire de confiance, BNP Paribas E&RE est engagé pour l’avenir en accompagnant les entreprises et leurs salariés à travers des solutions d’épargne collectives performantes et adaptés à leurs besoins.
Company Details
bnp-paribas-epargne-&-retraite-entreprises
1
6,005
None
bnpparibas.com
0
BNP_1769296
In-progress
Between 750 and 799

BPERE Global Score (TPRM)XXXX

Description: The California Office of the Attorney General disclosed a data breach at Bank of the West on June 23, 2022, stemming from an ATM skimming incident detected between November 10, 2021, and April 18, 2022. The breach involved unauthorized access to card numbers, PINs, and personal information of customers using compromised ATMs. While the exact number of affected individuals remains undisclosed, the incident exposed sensitive financial and personal data, posing risks of fraudulent transactions, identity theft, and unauthorized account access.The breach was likely executed through physical tampering of ATMs a common tactic where criminals install skimming devices to capture card details and PINs. Although no explicit mention of large-scale financial losses or systemic disruptions was reported, the exposure of payment card data and personal identifiers suggests a direct threat to customers' financial security and privacy. The prolonged detection window (over five months) further exacerbates the potential for misuse of the stolen data before mitigation measures were implemented.This incident underscores vulnerabilities in physical and digital payment infrastructure, highlighting the need for enhanced monitoring, customer notifications, and fraud prevention protocols to mitigate post-breach risks.
Description: The California Office of the Attorney General reported a data breach involving Bank of the West on April 5, 2019. The breach occurred due to the installation of an ATM skimming device at the Campbell Branch ATM between December 3, 2018, and December 22, 2018, potentially compromising debit card information such as card numbers and PINs for an unspecified number of individuals.
Description: Bank of Montreal have been targeted by hackers. The personal information of tens of thousands of customers may have been stolen. Hackers were demanding a $1-million ransom from the banks. Bank of Montreal had stolen data on up to 50,000 of the bank's customers. The tipsters were the hackers themselves.
Description: On August 20, 2018, the California Office of the Attorney General reported a data breach involving Bank of the West that occurred on March 2, 2018. Unauthorized third parties accessed employee email accounts at a contracted service provider, potentially affecting personal information including business names and Social Security numbers linked to businesses. The number of affected individuals is unknown.
Description: The California Office of the Attorney General reported a data breach involving BMO Harris Bank N.A. on May 31, 2017. The breach occurred on May 15, 2017, when some customers received another customer's IRS Form 5498 due to an error, potentially exposing names, addresses, and the last four digits of Social Security Numbers. This incident highlights the importance of data accuracy and security in financial institutions, as even minor errors can lead to significant data exposure and potential identity theft risks for customers.
Description: The California Office of the Attorney General reported that Bank of the West experienced a data breach involving ATM skimming devices discovered on April 9, 2017. The breach potentially exposed debit card numbers and PINs as a result of fraudulent activities affecting customers in Southern California. It is estimated that the unauthorized devices were in place from February 1, 2017, to April 9, 2017.
Description: The California Office of the Attorney General reported a data breach involving Bank of the West on July 16, 2014. The breach was related to an email scam that compromised the login credentials of two employees, potentially exposing customer names and Social Security Numbers, though no evidence of actual viewing or theft was confirmed.
Description: The California Office of the Attorney General reported a data breach involving Bank of the West on February 5, 2014. The breach, discovered on December 19, 2013, involved unauthorized access to a retired internet application for job listings and applications, potentially exposing user names, passwords, and personal information such as names, addresses, social security numbers, and driver's license numbers. The number of affected individuals is currently unknown.


No incidents recorded for BNP Paribas Epargne & Retraite Entreprises in 2026.
No incidents recorded for BNP Paribas Epargne & Retraite Entreprises in 2026.
No incidents recorded for BNP Paribas Epargne & Retraite Entreprises in 2026.
BPERE cyber incidents detection timeline including parent company and subsidiaries

Il y a plus de 15 ans, BNP Paribas a fait le choix stratégique de regrouper au sein de BNP Paribas Epargne et Retraite Entreprises, l’épargne salariale et la retraite collective, afin d’apporter des solutions globales à nos épargnants, et de tirer pleinement profit des expertises complémentaires de l’Asset manager et de l’assureur. Ce positionnement fait de BNP Paribas E&RE un acteur incontournable de ce marché grâce à la double expertise de ses équipes, des outils digitaux offrant des espaces et des services consolidés, pour un parcours utilisateur toujours plus fluide et optimisé, et des offres financières cohérentes. E&RE, engagé pour un impact positif sur l’économie réelle soutient les investissements solidaires et responsables dans des domaines tels que l’accès à l’emploi, la microfinance et le soutien à l’entreprenariat, l’hébergement de personnes dépendantes, l’accès au logement, la protection de l’environnement et la consommation responsable, l’accès à la santé et le maintien de l’autonomie, la solidarité internationale. Partenaire de confiance, BNP Paribas E&RE est engagé pour l’avenir en accompagnant les entreprises et leurs salariés à travers des solutions d’épargne collectives performantes et adaptés à leurs besoins.


Clinic is an independent creative agency. We create bold ideas, and craft them beautifully, to get people thinking, believing and doing. All of our experience goes into what we do today, and although our world’s constantly changing, the endpoint is still people and their experience, no matter
Quad (NYSE: QUAD) is a global marketing experience company that helps brands make direct consumer connections, from household to in-store to online. Supported by state-of-the-art technology and data-driven intelligence, Quad uses its suite of media, creative and production solutions to streamline th
Founded in 1926 by Marcel Bleustein-Blanchet, today Publicis Groupe is the largest communications group in the world and a leader in marketing, communication, and digital business transformation, led by Arthur Sadoun, the third CEO in its history. Publicis Groupe is positioned at every step of the

Clear Channel Europe is a division of leading global Out of Home media company, Clear Channel Outdoor Holdings, Inc. (NYSE: CCO). The Clear Channel Europe portfolio spans 14 markets with 260,000 advertising panels. Clear Channel Europe has 2,600 dedicated employees. Our Mission is To Create the fu

Founded in 1835 in Paris, Havas is one of the world’s largest global communications groups, with nearly 23,000 people in over 100 countries. With the ambition to help brands unlock Growth, Powered by Desire, Havas brings together creativity, media, technology and production capabilities to build str

VML is a global powerhouse born from the unification of Wunderman Thompson and VMLY&R — two of the world's most powerful and accomplished creative agencies with complementary capabilities and geographic strengths. We have an industry-unique opportunity to provide our client partners with a fully int

We are dentsu. We team together to help brands predict and plan for disruptive future opportunities and create new paths to growth in the sustainable economy. We know people better than anyone else and we use those insights to connect brand, content, commerce and experience, underpinned by modern cr

Epsilon is a global data, technology and services company that powers the marketing and advertising ecosystem. The world’s leading brands use Epsilon to harmonize consumer engagement across their paid, owned and earned channels, leveraging capabilities that include data, identity resolution, custo

Ogilvy has been creating impact for brands through iconic, culture-changing, value-driving ideas since the company was founded by David Ogilvy 75 years ago. We build on that rich legacy through Borderless Creativity – innovating at the intersections of its advertising, public relations, relationship
.png)
01/04/2025 - Discover our news on Sustainable Savings and Investments - The bank for a changing world - BNP Paribas.
Axe Group will use the investment to strengthen the company's footprint across France's niche supply chains and automate logistics processes.
La loi de financement de la sécurité sociale pour 2026 (LFSS 2026), promulguée le 30 décembre 2025, agit comme un levier d'ajustement des...
Entech has secured a €60 million loan facility with support from leading French banks to finance working capital, guarantees, and business...
Qair, an independent renewable energy producer, has announced the closing of its inaugural syndicated loan totaling €240 million...
28/11/2025 - Discover our news on Impact Entrepreneurs: Discover the Galaxy of Opportunities at BNP Paribas! - The bank for a changing world...
Lyon-based Ventuno Biotech secures fresh backing to accelerate its preclinical pipeline of first-in-class immuno-oncology assets.
BNP Paribas Cardif and Zurich Insurance Group have both announced significant leadership changes impacting their operations in Asia.
The French Development Agency has signed EUR 22 million in financing for capacity expansion of the Bouillante geothermal power plant in...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of BNP Paribas Epargne & Retraite Entreprises is http://www.epargne-retraite-entreprises.bnpparibas.com.
According to Rankiteo, BNP Paribas Epargne & Retraite Entreprises’s AI-generated cybersecurity score is 751, reflecting their Fair security posture.
According to Rankiteo, BNP Paribas Epargne & Retraite Entreprises currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, BNP Paribas Epargne & Retraite Entreprises has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, BNP Paribas Epargne & Retraite Entreprises is not certified under SOC 2 Type 1.
According to Rankiteo, BNP Paribas Epargne & Retraite Entreprises does not hold a SOC 2 Type 2 certification.
According to Rankiteo, BNP Paribas Epargne & Retraite Entreprises is not listed as GDPR compliant.
According to Rankiteo, BNP Paribas Epargne & Retraite Entreprises does not currently maintain PCI DSS compliance.
According to Rankiteo, BNP Paribas Epargne & Retraite Entreprises is not compliant with HIPAA regulations.
According to Rankiteo,BNP Paribas Epargne & Retraite Entreprises is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
BNP Paribas Epargne & Retraite Entreprises operates primarily in the Services financiers industry.
BNP Paribas Epargne & Retraite Entreprises employs approximately 1 people worldwide.
BNP Paribas Epargne & Retraite Entreprises presently has no subsidiaries across any sectors.
BNP Paribas Epargne & Retraite Entreprises’s official LinkedIn profile has approximately 6,005 followers.
BNP Paribas Epargne & Retraite Entreprises is classified under the NAICS code None, which corresponds to Others.
No, BNP Paribas Epargne & Retraite Entreprises does not have a profile on Crunchbase.
Yes, BNP Paribas Epargne & Retraite Entreprises maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/bnp-paribas-epargne-&-retraite-entreprises.
As of April 03, 2026, Rankiteo reports that BNP Paribas Epargne & Retraite Entreprises has experienced 8 cybersecurity incidents.
BNP Paribas Epargne & Retraite Entreprises has an estimated 7 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an communication strategy with public disclosure via california office of the attorney general..
Title: Bank of Montreal Data Breach
Description: Hackers targeted Bank of Montreal, potentially stealing the personal information of tens of thousands of customers. The hackers demanded a $1-million ransom from the bank.
Type: Data Breach, Ransomware
Threat Actor: Hackers
Motivation: Financial Gain
Title: Bank of the West Data Breach
Description: Unauthorized access to a retired internet application for job listings and applications, potentially exposing user names, passwords, and personal information such as names, addresses, social security numbers, and driver's license numbers.
Date Detected: 2013-12-19
Date Publicly Disclosed: 2014-02-05
Type: Data Breach
Attack Vector: Unauthorized Access
Vulnerability Exploited: Retired Internet Application
Title: BMO Harris Bank N.A. Data Breach
Description: The California Office of the Attorney General reported a data breach involving BMO Harris Bank N.A. on May 31, 2017. The breach occurred on May 15, 2017, when some customers received another customer's IRS Form 5498 due to an error, potentially exposing names, addresses, and the last four digits of Social Security Numbers.
Date Detected: 2017-05-15
Date Publicly Disclosed: 2017-05-31
Type: Data Breach
Attack Vector: Error
Title: Bank of the West ATM Skimming Data Breach
Description: The California Office of the Attorney General reported that Bank of the West experienced a data breach involving ATM skimming devices discovered on April 9, 2017. The breach potentially exposed debit card numbers and PINs as a result of fraudulent activities affecting customers in Southern California. It is estimated that the unauthorized devices were in place from February 1, 2017, to April 9, 2017.
Date Detected: 2017-04-09
Type: Data Breach
Attack Vector: ATM Skimming
Vulnerability Exploited: Physical Security
Motivation: Financial Gain
Title: Bank of the West Data Breach
Description: The California Office of the Attorney General reported a data breach involving Bank of the West on July 16, 2014. The breach was related to an email scam that compromised the login credentials of two employees, potentially exposing customer names and Social Security Numbers, though no evidence of actual viewing or theft was confirmed.
Date Detected: 2014-07-16
Date Publicly Disclosed: 2014-07-16
Type: Data Breach
Attack Vector: Email Scam
Vulnerability Exploited: Compromised Login Credentials
Title: Bank of the West Data Breach
Description: Unauthorized third parties accessed employee email accounts at a contracted service provider, potentially affecting personal information including business names and Social Security numbers linked to businesses.
Date Detected: 2018-03-02
Date Publicly Disclosed: 2018-08-20
Type: Data Breach
Attack Vector: Email Account Compromise
Threat Actor: Unauthorized third parties
Title: Bank of the West ATM Skimming Incident
Description: The California Office of the Attorney General reported a data breach involving Bank of the West on April 5, 2019. The breach occurred due to the installation of an ATM skimming device at the Campbell Branch ATM between December 3, 2018, and December 22, 2018, potentially compromising debit card information such as card numbers and PINs for an unspecified number of individuals.
Date Detected: 2019-04-05
Date Publicly Disclosed: 2019-04-05
Type: Data Breach
Attack Vector: ATM Skimming
Vulnerability Exploited: Physical Security
Motivation: Financial Gain
Title: Bank of the West ATM Skimming Incident
Description: The California Office of the Attorney General reported a data breach involving Bank of the West on June 23, 2022. The breach involved an ATM skimming incident discovered between November 10, 2021, and April 18, 2022, potentially compromising card numbers, PINs, and personal information of affected individuals, but the total number of individuals affected is unknown.
Date Detected: 2022-04-18
Date Publicly Disclosed: 2022-06-23
Type: Data Breach (ATM Skimming)
Attack Vector: Physical ATM Skimming Device
Motivation: Financial Gain (Likely)
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through ATM Machines, Email Scam, Email Account Compromise, ATM Skimming Device and Physical ATM Tampering.

Data Compromised: Personal Information

Data Compromised: User names, Passwords, Names, Addresses, Social security numbers, Driver's license numbers
Systems Affected: Retired Internet Application for Job Listings and Applications

Data Compromised: Names, Addresses, Last four digits of social security numbers

Data Compromised: Debit card numbers, Pins
Systems Affected: ATM Machines
Payment Information Risk: High

Data Compromised: Customer names, Social security numbers

Data Compromised: Business names, Social security numbers

Data Compromised: Debit card numbers, Pins
Systems Affected: ATM
Payment Information Risk: High

Data Compromised: Card numbers, Pins, Personal information
Systems Affected: ATMs
Brand Reputation Impact: Potential Negative Impact (Undisclosed)
Identity Theft Risk: High (Potential)
Payment Information Risk: High (Card Numbers and PINs Compromised)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information, User Names, Passwords, Names, Addresses, Social Security Numbers, Driver'S License Numbers, , Names, Addresses, Last Four Digits Of Social Security Numbers, , Debit Card Numbers, Pins, , Customer Names, Social Security Numbers, , Business Names, Social Security Numbers, , Debit Card Numbers, Pins, , Card Numbers, Pins, Personal Information and .

Entity Name: Bank of Montreal
Entity Type: Bank
Industry: Financial Services
Customers Affected: Up to 50,000

Entity Name: Bank of the West
Entity Type: Financial Institution
Industry: Banking

Entity Name: BMO Harris Bank N.A.
Entity Type: Bank
Industry: Financial Services

Entity Name: Bank of the West
Entity Type: Financial Institution
Industry: Banking
Location: Southern California

Entity Name: Bank of the West
Entity Type: Financial Institution
Industry: Banking
Location: California

Entity Name: Bank of the West
Entity Type: Financial Institution
Industry: Banking

Entity Name: Bank of the West
Entity Type: Financial Institution
Industry: Banking
Location: Campbell Branch

Entity Name: Bank of the West
Entity Type: Financial Institution
Industry: Banking
Location: California, USA
Customers Affected: Unknown

Communication Strategy: Public Disclosure via California Office of the Attorney General

Type of Data Compromised: Personal Information
Number of Records Exposed: Up to 50,000

Type of Data Compromised: User names, Passwords, Names, Addresses, Social security numbers, Driver's license numbers
Sensitivity of Data: High
Personally Identifiable Information: NamesAddressesSocial Security NumbersDriver's License Numbers

Type of Data Compromised: Names, Addresses, Last four digits of social security numbers
Sensitivity of Data: Medium
File Types Exposed: IRS Form 5498
Personally Identifiable Information: NamesAddressesLast four digits of Social Security Numbers

Type of Data Compromised: Debit card numbers, Pins
Sensitivity of Data: High

Type of Data Compromised: Customer names, Social security numbers
Sensitivity of Data: High

Type of Data Compromised: Business names, Social security numbers
Sensitivity of Data: High

Type of Data Compromised: Debit card numbers, Pins
Sensitivity of Data: High

Type of Data Compromised: Card numbers, Pins, Personal information
Number of Records Exposed: Unknown
Sensitivity of Data: High
Data Exfiltration: Likely (via Skimming Device)
Personally Identifiable Information: Yes

Ransom Demanded: $1-million

Regulatory Notifications: California Office of the Attorney General

Source: California Office of the Attorney General
Date Accessed: 2014-02-05

Source: California Office of the Attorney General
Date Accessed: 2017-05-31

Source: California Office of the Attorney General

Source: California Office of the Attorney General
Date Accessed: 2014-07-16

Source: California Office of the Attorney General
Date Accessed: 2018-08-20

Source: California Office of the Attorney General
Date Accessed: 2019-04-05

Source: California Office of the Attorney General
Date Accessed: 2022-06-23
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney GeneralDate Accessed: 2014-02-05, and Source: California Office of the Attorney GeneralDate Accessed: 2017-05-31, and Source: California Office of the Attorney General, and Source: California Office of the Attorney GeneralDate Accessed: 2014-07-16, and Source: California Office of the Attorney GeneralDate Accessed: 2018-08-20, and Source: California Office of the Attorney GeneralDate Accessed: 2019-04-05, and Source: California Office of the Attorney GeneralDate Accessed: 2022-06-23.

Investigation Status: Disclosed; Details Limited
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public Disclosure via California Office of the Attorney General.

Entry Point: ATM Machines

Entry Point: Email Scam

Entry Point: Email Account Compromise

Entry Point: ATM Skimming Device

Entry Point: Physical ATM Tampering
High Value Targets: Customer Payment Data
Data Sold on Dark Web: Customer Payment Data

Root Causes: Compromised Login Credentials

Root Causes: Installation of ATM skimming device

Root Causes: Likely Physical Security Lapse at ATMs
Last Ransom Demanded: The amount of the last ransom demanded was $1-million.
Last Attacking Group: The attacking group in the last incident were an Hackers and Unauthorized third parties.
Most Recent Incident Detected: The most recent incident detected was on 2013-12-19.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2022-06-23.
Most Significant Data Compromised: The most significant data compromised in an incident were Personal Information, User names, Passwords, Names, Addresses, Social Security Numbers, Driver's License Numbers, , Names, Addresses, Last four digits of Social Security Numbers, , Debit Card Numbers, PINs, , Customer Names, Social Security Numbers, , Business names, Social Security numbers, , Debit card numbers, PINs, , Card Numbers, PINs, Personal Information and .
Most Significant System Affected: The most significant system affected in an incident was Retired Internet Application for Job Listings and Applications and ATM Machines and ATM and ATMs.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Addresses, Social Security Numbers, Last four digits of Social Security Numbers, Business names, Debit Card Numbers, Passwords, Card Numbers, Driver's License Numbers, Customer Names, PINs, Debit card numbers, Social Security numbers, Names, User names and Personal Information.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 50.0K.
Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was $1-million.
Most Recent Source: The most recent source of information about an incident is California Office of the Attorney General.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Disclosed; Details Limited.
Most Recent Entry Point: The most recent entry point used by an initial access broker were an Email Scam, ATM Machines, Email Account Compromise, ATM Skimming Device and Physical ATM Tampering.
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Compromised Login Credentials, Installation of ATM skimming device, Likely Physical Security Lapse at ATMs.
.png)
Hirschmann EagleSDV version 05.4.01 prior to 05.4.02 contains a denial-of-service vulnerability that causes the device to crash during session establishment when using TLS 1.0 or TLS 1.1. Attackers can trigger a crash by initiating TLS connections with these protocol versions to disrupt service availability.
The stored API keys in temporary browser client is not marked as protected allowing for JavScript console or other errors to allow for extraction of the encryption credentials.
XSS vulnerability in cveInterface.js allows for inject HTML to be passed to display, as cveInterface trusts input from CVE API services
Multiple reflected cross-site scripting (XSS) vulnerabilities in the login.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda and red_url parameters.
A reflected cross-site scripting (XSS) vulnerability in the login_newpwd.php endpoint of Interzen Consulting S.r.l ZenShare Suite v17.0 allows attackers to execute arbitrary Javascript in the context of the user's browser via a crafted URL injected into the codice_azienda parameter.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.