Company Details
deutsche-bank
74,237
2,732,266
52
db.com
0
DEU_9053595
In-progress

Deutsche Bank Company CyberSecurity Posture
db.comDeutsche Bank is the leading German bank with strong European roots and a global network. The bank focuses on its strengths in a Corporate Bank newly created in 2019, a leading Private Bank, a focused investment bank and in asset management. We provide financial services to companies, governments, institutional investors, small and medium-sized businesses and private individuals. Deutsche Bank was founded in 1870 to accompany German businesses into the world, and has worked across borders ever since. Useful links: Jobs https://www.db.com/careers. Netiquette at https://www.db.com/netiquette. Data protection policy https://www.db.com/DataProtection. Imprint https://www.db.com/imprint.
Company Details
deutsche-bank
74,237
2,732,266
52
db.com
0
DEU_9053595
In-progress
Between 750 and 799

Deutsche Bank Global Score (TPRM)XXXX

Description: A former Computacenter manager has filed suit alleging that unauthorized parties repeatedly accessed Deutsche Bank’s high-security New York datacenter between March and June 2023. Court documents claim that a Computacenter employee allowed his uncredentialed girlfriend into server rooms housing critical mainframe systems, while internal CCTV footage reportedly shows Deutsche Bank’s own security staff permitting her entry. During these breaches, she allegedly connected a personal laptop to the bank network and may have circumvented the SIEM monitoring environment. Despite reporting these lapses and urging a regulatory disclosure, the whistleblower was suspended and ultimately terminated. No confirmed data exfiltration or operational outage has been documented, but the incidents exposed serious lapses in multi-layered physical and logical controls, exposing the institution to heightened regulatory, legal and reputational risk. The lawsuit seeks over $20 million in damages under New York whistleblower protections and highlights the potential downstream costs of litigation, internal investigations and remediation measures to shore up security protocols.
Description: An initial access broker hacked multinational investment bank Deutsche Bank and offered access to its systems for sale on Telegram. The IAB claims to have access to around 21000 machines in the bank’s network, most of which are Windows systems. The breacher had access to the chat services used for internal communications. He also claimed to have access to file servers containing 16 terabytes of data.
Description: Customers of Deutsche Bank and its subsidiary Postbank are affected by the incident, and the bank has alerted an unspecified number of clients that their data may have been stolen. The institute declared that an external service provider's data loss was the thieves' entry point. The service provider found the root of the security breach and fixed it. A software vulnerability has been exploited, according to a letter sent to the affected clients. The bank refrained from identifying the service provider who let the data leak happen. Other banks and their customers may also be impacted because account-switching service providers frequently work with several banks.


No incidents recorded for Deutsche Bank in 2025.
No incidents recorded for Deutsche Bank in 2025.
No incidents recorded for Deutsche Bank in 2025.
Deutsche Bank cyber incidents detection timeline including parent company and subsidiaries

Deutsche Bank is the leading German bank with strong European roots and a global network. The bank focuses on its strengths in a Corporate Bank newly created in 2019, a leading Private Bank, a focused investment bank and in asset management. We provide financial services to companies, governments, institutional investors, small and medium-sized businesses and private individuals. Deutsche Bank was founded in 1870 to accompany German businesses into the world, and has worked across borders ever since. Useful links: Jobs https://www.db.com/careers. Netiquette at https://www.db.com/netiquette. Data protection policy https://www.db.com/DataProtection. Imprint https://www.db.com/imprint.


Wells Fargo & Company (NYSE: WFC) is a diversified, community-based financial services company with approximately $1.9 trillion in assets. Wells Fargo’s vision is to satisfy our customers’ financial needs and help them succeed financially. Founded in 1852 and headquartered in San Francisco, Wells Fa
People deserve more from their money. More visibility, more control, and more freedom. Since 2015, Revolut has been on a mission to deliver just that. Our powerhouse of products help our 50+ million customers get more from their money every day. As we continue our lightning-fast growth, 2 things a
We exist to shape decisions for the better — to protect and enrich the lives of people around the world. Through actionable analytic insight, globally integrated Risk Capital and Human Capital expertise, and locally relevant solutions, our colleagues provide clients in over 120 countries with the cl
IFC, a member of the World Bank Group, is the largest global development institution focused exclusively on the private sector in developing countries. We utilize and leverage our products and services—as well as products and services of other institutions in the World Bank Group—to provide develop

Navy Federal is the world’s largest credit union, with more than 14 million members, $180 billion+ in assets and 24,000+ employees. Throughout campuses in Vienna, VA Pensacola, FL and Winchester, VA, as well as more than 360 branches, we serve the Armed Forces, Department of Defense, Veterans and th

Many know us as the most trusted way to send money to friends and family overseas and across borders, but we're much more than that. Our talented teams around the world are building new ways to send, save and spend money. Wherever you are in the world, in whatever currency you choose, we're evolvi
Ally Financial Inc. (NYSE: ALLY) is a leading digital financial services company and a top 25 U.S. financial holding company offering financial products for consumers, businesses, automotive dealers and corporate clients. NMLS #3015 | #181005 | https://www.nmlsconsumeraccess.org/ Ally's legacy da

Since 1820, Swedbank has been the bank for the many households and businesses. We are a modern financial services platform focused on customer satisfaction. Our goal is to encourage people to save for a better future, and we aim to help people, businesses and society to grow by promoting a healthy a

Somos el grupo financiero líder en el Perú con una vasta experiencia en el mercado peruano. Contamos con una sólida plataforma de Banca Comercial reforzada por una importante presencia en Banca de Inversión en Latinoamérica destinada a desarrollar el potencial de la región y acompañar a nuestros cli
.png)
2026 is pivotal for US banks as they navigate macro headwinds, stablecoin disruption, scaling AI, fragmented data, and financial crime.
Cross-sector teams from BT Group, Deutsche Bank, ING, Proximus and Santander join Mastercard's European Cyber Resilience Centre in Belgium...
At Sibos 2025 in Frankfurt, experts spanning multinational banks and fintechs explored the emergence of sophisticated cyberthreats.
Multiple banks have been recruiting senior cybersecurity specialists as technologies like AI make cyberattacks much more powerful. Bank of...
The use of AI is on the rise and when it comes to cyber security, we face advantages as well as fraud or the spread of misinformation.
Deutsche Bank upgraded Palo Alto Networks, calling its business healthy and the CyberArk buyout a smart move for future growth.
Investing.com -- Deutsche Bank upgraded Palo Alto Networks to Buy from Hold and raised its price target to $220, saying investor concerns...
Deutsche Bank has gone live with Swift's Instant Cash Reporting (ICR) – a new, API-driven solution that enables large corporate and...
Hackers using artificial intelligence and other tools are putting a greater strain on banks' cybersecurity systems, and other institutions...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Deutsche Bank is https://www.db.com.
According to Rankiteo, Deutsche Bank’s AI-generated cybersecurity score is 750, reflecting their Fair security posture.
According to Rankiteo, Deutsche Bank currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Deutsche Bank is not certified under SOC 2 Type 1.
According to Rankiteo, Deutsche Bank does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Deutsche Bank is not listed as GDPR compliant.
According to Rankiteo, Deutsche Bank does not currently maintain PCI DSS compliance.
According to Rankiteo, Deutsche Bank is not compliant with HIPAA regulations.
According to Rankiteo,Deutsche Bank is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Deutsche Bank operates primarily in the Financial Services industry.
Deutsche Bank employs approximately 74,237 people worldwide.
Deutsche Bank presently has no subsidiaries across any sectors.
Deutsche Bank’s official LinkedIn profile has approximately 2,732,266 followers.
Deutsche Bank is classified under the NAICS code 52, which corresponds to Finance and Insurance.
Yes, Deutsche Bank has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/deutsche-bank.
Yes, Deutsche Bank maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/deutsche-bank.
As of December 10, 2025, Rankiteo reports that Deutsche Bank has experienced 3 cybersecurity incidents.
Deutsche Bank has an estimated 30,304 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Data Leak and Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an communication strategy with alerted affected clients, and remediation measures with remediation measures to shore up security protocols..
Title: Deutsche Bank Systems Access Offered for Sale by Initial Access Broker
Description: An initial access broker hacked multinational investment bank Deutsche Bank and offered access to its systems for sale on Telegram.
Type: Data Breach
Attack Vector: Initial Access Broker
Threat Actor: Initial Access Broker
Motivation: Financial Gain
Title: Deutsche Bank and Postbank Data Breach
Description: Customers of Deutsche Bank and its subsidiary Postbank are affected by a data breach due to a vulnerability in an external service provider's software.
Type: Data Breach
Attack Vector: Exploitation of Software Vulnerability
Vulnerability Exploited: Software Vulnerability
Title: Unauthorized Access at Deutsche Bank's New York Datacenter
Description: A former Computacenter manager has filed suit alleging that unauthorized parties repeatedly accessed Deutsche Bank’s high-security New York datacenter between March and June 2023. Court documents claim that a Computacenter employee allowed his uncredentialed girlfriend into server rooms housing critical mainframe systems, while internal CCTV footage reportedly shows Deutsche Bank’s own security staff permitting her entry. During these breaches, she allegedly connected a personal laptop to the bank network and may have circumvented the SIEM monitoring environment. Despite reporting these lapses and urging a regulatory disclosure, the whistleblower was suspended and ultimately terminated. No confirmed data exfiltration or operational outage has been documented, but the incidents exposed serious lapses in multi-layered physical and logical controls, exposing the institution to heightened regulatory, legal and reputational risk. The lawsuit seeks over $20 million in damages under New York whistleblower protections and highlights the potential downstream costs of litigation, internal investigations and remediation measures to shore up security protocols.
Date Detected: March 2023
Type: Physical and Logical Security Breach
Attack Vector: Physical AccessLogical Access
Vulnerability Exploited: Unauthorized physical accessUnauthorized network access
Threat Actor: Unauthorized individual (uncredentialed girlfriend of a Computacenter employee)
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through External Service Provider and Physical access to server rooms.

Data Compromised: Internal communications, File servers containing 16 terabytes of data
Systems Affected: 21000 machinesWindows systemsChat services

Data Compromised: Customer Data

Systems Affected: Critical mainframe systems
Brand Reputation Impact: Heightened reputational risk
Legal Liabilities: Heightened legal risk
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Internal Communications, File Server Data, and Customer Data.

Entity Name: Deutsche Bank
Entity Type: Multinational Investment Bank
Industry: Financial Services

Entity Name: Deutsche Bank
Entity Type: Bank
Industry: Financial Services

Entity Name: Postbank
Entity Type: Bank
Industry: Financial Services

Entity Name: Deutsche Bank
Entity Type: Financial Institution
Industry: Banking
Location: New York

Communication Strategy: Alerted affected clients

Remediation Measures: Remediation measures to shore up security protocols

Type of Data Compromised: Internal communications, File server data

Type of Data Compromised: Customer Data

Data Exfiltration: No confirmed data exfiltration
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Remediation measures to shore up security protocols.

Legal Actions: Lawsuit seeking over $20 million in damages
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Lawsuit seeking over $20 million in damages.

Source: Court documents
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Court documents.
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Alerted affected clients.

Customer Advisories: Letter sent to affected clients
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Letter sent to affected clients.

Entry Point: External Service Provider

Entry Point: Physical access to server rooms
High Value Targets: Critical mainframe systems
Data Sold on Dark Web: Critical mainframe systems

Root Causes: Software Vulnerability
Corrective Actions: Fixed the vulnerability

Root Causes: Lapses In Multi-Layered Physical And Logical Controls,
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Fixed the vulnerability.
Last Attacking Group: The attacking group in the last incident were an Initial Access Broker and Unauthorized individual (uncredentialed girlfriend of a Computacenter employee).
Most Recent Incident Detected: The most recent incident detected was on March 2023.
Most Significant Data Compromised: The most significant data compromised in an incident were Internal communications, File servers containing 16 terabytes of data, and Customer Data.
Most Significant System Affected: The most significant system affected in an incident was 21000 machinesWindows systemsChat services and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Customer Data, File servers containing 16 terabytes of data and Internal communications.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Lawsuit seeking over $20 million in damages.
Most Recent Source: The most recent source of information about an incident is Court documents.
Most Recent Customer Advisory: The most recent customer advisory issued was an Letter sent to affected clients.
Most Recent Entry Point: The most recent entry point used by an initial access broker were an External Service Provider and Physical access to server rooms.
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Software Vulnerability, Lapses in multi-layered physical and logical controls.
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Fixed the vulnerability.
.png)
WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. Versions 3.5.4 and below contain a Stored Cross-Site Scripting (XSS) vulnerability in the /WeGIA/html/geral/configurar_senhas.php endpoint. The application does not sanitize user-controlled data before rendering it inside the employee selection dropdown. The application retrieves employee names from the database and injects them directly into HTML <option> elements without proper escaping. This issue is fixed in version 3.5.5.
ZITADEL is an open-source identity infrastructure tool. Versions 4.0.0-rc.1 through 4.7.0 are vulnerable to DOM-Based XSS through the Zitadel V2 logout endpoint. The /logout endpoint insecurely routes to a value that is supplied in the post_logout_redirect GET parameter. As a result, unauthenticated remote attacker can execute malicious JS code on Zitadel users’ browsers. To carry out an attack, multiple user sessions need to be active in the same browser, however, account takeover is mitigated when using Multi-Factor Authentication (MFA) or Passwordless authentication. This issue is fixed in version 4.7.1.
ZITADEL is an open-source identity infrastructure tool. Versions 4.7.0 and below are vulnerable to an unauthenticated, full-read SSRF vulnerability. The ZITADEL Login UI (V2) treats the x-zitadel-forward-host header as a trusted fallback for all deployments, including self-hosted instances. This allows an unauthenticated attacker to force the server to make HTTP requests to arbitrary domains, such as internal addresses, and read the responses, enabling data exfiltration and bypassing network-segmentation controls. This issue is fixed in version 4.7.1.
NiceGUI is a Python-based UI framework. Versions 3.3.1 and below are vulnerable to directory traversal through the App.add_media_files() function, which allows a remote attacker to read arbitrary files on the server filesystem. This issue is fixed in version 3.4.0.
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions are vulnerable to authentication bypass when the authentication type is set to "webserver." When providing an Authorization header with an arbitrary value, a session is associated with the target user regardless of valid credentials. This issue is fixed in versions 16.0.44 and 17.0.23.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.