Company Details
cic
11,132
135,903
52211
cic.fr
0
CIC_1804538
In-progress

CIC Company CyberSecurity Posture
cic.frCIC is the fourth largest banking group in France, consisting of seven regional banks which operate across France through a network of 1,844 branches employing 24,000 staff. CIC's customer base includes 2.7 million retail clients. One in eleven self-employed professionals is a CIC group client and nearly one in three companies banks with CIC Group.
Company Details
cic
11,132
135,903
52211
cic.fr
0
CIC_1804538
In-progress
Between 750 and 799

CIC Global Score (TPRM)XXXX



No incidents recorded for CIC in 2025.
No incidents recorded for CIC in 2025.
No incidents recorded for CIC in 2025.
CIC cyber incidents detection timeline including parent company and subsidiaries

CIC is the fourth largest banking group in France, consisting of seven regional banks which operate across France through a network of 1,844 branches employing 24,000 staff. CIC's customer base includes 2.7 million retail clients. One in eleven self-employed professionals is a CIC group client and nearly one in three companies banks with CIC Group.

At U.S. Bank, we help millions of clients achieve their goals with a balance of best-in-class technology and human expertise tailored to individual needs. As the fifth-largest commercial bank in the United States, we’ve built a reputation for strength and stability across a diversified mix of busine

Meezan Bank, Pakistan's first and largest Islamic bank, is one of the fastest growing financial institutions in the banking sector of the country. With its Vision of establishing ‘Islamic banking as banking of first choice’ – the Bank commenced operations in 2002, after being issued the first-ever I

O Bradesco é um dos líderes do setor financeiro privado e um dos maiores empregadores na categoria. Além disso, apresenta o melhor índice de eficiência entre os bancos de varejo. Nossa missão é fornecer soluções, produtos e serviços financeiros e de seguros com agilidade e competência, principal

“Fired by the spirit of nationalism and founded on the idea that Indians should have a national bank of their own, which would further the economic interest of the country, Punjab National Bank Ltd was the result of the efforts of far-sighted visionaries and patriots, among whom were persons like La

PT Bank Danamon Indonesia Tbk (BEI: BDMN) didirikan pada tahun 1956. Per 31 Desember 2024, Danamon mengelola aset konsolidasian sebesar Rp242 triliun dengan anak perusahannya, Adira Finance. Dalam hal kepemilikan saham, 92,47% saham Danamon dimiliki oleh MUFG, dan 7,53% lainnya dimiliki oleh publik.

En Banamex una palabra nos ha definido durante nuestra historia: Estar. Estar es acompañar. Estar es avanzar juntos. Acompañar para forjar relaciones auténticas, duraderas, significativas, que nos den confianza y nos impulsen a alcanzar aquello que es importante para ti, para nosotros, para todos.
ICICI Bank is one of India’s leading private sector banks, offering a wide range of banking products and services to corporate, Small and Medium Enterprises (SME) and individual customers across the country. The Bank offers multi-channel touch points including branches, ATMs, mobile banking, interne

Allied Bank is one of Pakistan's leading banks, with a vision to become a dynamic and efficient institution providing integrated solutions, aiming to be the first choice for customers. Currently, the bank maintains a country-wide network of over 1,400 branches and more than 1,560 ATMs. To protect y

The Crédit Agricole group is the leading partner of the French economy and one of the largest banking groups in Europe. It is the leading retail bank in Europe as well as the first European asset manager, the first bancassurer in Europe and the third European player in project finance. Built on its
.png)
India News: The Supreme Court deferred pleas to make shortlisted candidates for information commissioner posts public, as the Centre expects...
Following a recent data breach at the National Credit Information Centre (CIC) and a surge in online scams, Vietnamese banks are stepping up...
India and the UK launched the CIC with ₹282 crore investment to advance 6G research, telecom cybersecurity, and AI-driven innovation under...
Taking advantage of the high public interest in the incident at the National Credit Information Center (CIC), many bad actors have released...
Authorities dismiss false claims of a widespread cybersecurity leak, urging caution and fact-checking among internet users. Hacker.jpeg...
According to the ministry, in recent days some individuals have exploited public attention on the CIC case to spread false claims of “data...
Cyber Beacon 2025 will convene leading voices from the U.S. military, allied defense institutions, government agencies, academia,...
Cybercriminals have breached Vietnam's National Credit Information Center, exposing over 160 million sensitive financial records and...
The Ho Chi Minh City Police has issued a warning to locals to watch out for online scams, following a cybersecurity breach at the National...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of CIC is http://www.cic.fr.
According to Rankiteo, CIC’s AI-generated cybersecurity score is 775, reflecting their Fair security posture.
According to Rankiteo, CIC currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, CIC is not certified under SOC 2 Type 1.
According to Rankiteo, CIC does not hold a SOC 2 Type 2 certification.
According to Rankiteo, CIC is not listed as GDPR compliant.
According to Rankiteo, CIC does not currently maintain PCI DSS compliance.
According to Rankiteo, CIC is not compliant with HIPAA regulations.
According to Rankiteo,CIC is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
CIC operates primarily in the Banking industry.
CIC employs approximately 11,132 people worldwide.
CIC presently has no subsidiaries across any sectors.
CIC’s official LinkedIn profile has approximately 135,903 followers.
CIC is classified under the NAICS code 52211, which corresponds to Commercial Banking.
No, CIC does not have a profile on Crunchbase.
Yes, CIC maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/cic.
As of November 27, 2025, Rankiteo reports that CIC has not experienced any cybersecurity incidents.
CIC has an estimated 6,710 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, CIC has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.