Company Details
huntington-national-bank
18,314
139,411
52211
http://www.huntington.com
0
HUN_2373107
In-progress


Huntington National Bank Company CyberSecurity Posture
http://www.huntington.comWelcome to Huntington. Huntington Bancshares Incorporated is a $210 billion asset regional bank holding company headquartered in Columbus, Ohio. Founded in 1866, The Huntington National Bank and its affiliates provide consumers, small and middle-market businesses, corporations, municipalities, and other organizations with a comprehensive suite of banking, payments, wealth management, and risk management products and services. Huntington operates approximately 972 branches in 13 states, with certain businesses operating in extended geographies. Visit Huntington.com for more information. We are committed to doing the right thing for our customers, colleagues, and communities. Our “Welcome” philosophy means they are at the center of everything we do. Here’s how we look out for people: • We aim to make banking easier for our customers. Our comprehensive suite of innovative banking tools and products is specifically designed to strengthen the financial health of those we serve. • Our internal culture is built around making things great—rather than just good enough—and to be the best place our colleagues will ever work. We offer a flexible work environment with opportunities for growth, and we’ll provide all the resources needed to create a lasting and rewarding career path. • Our $40 billion Community Plan, environmental sustainability strategy, and robust small-business lending program are just a few of the ways we are helping to improve the economic vitality of the areas where we live and work. Explore Huntington Career opportunities at https://huntington-careers.com. Huntington is an Equal Opportunity Employer. The Huntington National Bank, Member FDIC. The logo mark and Huntington® are federally registered service marks of Huntington Bancshares Incorporated. Huntington Social Media Community Guidelines & Terms: http://bit.ly/HuntingtonSocialMedia
Company Details
huntington-national-bank
18,314
139,411
52211
http://www.huntington.com
0
HUN_2373107
In-progress
Between 750 and 799

HNB Global Score (TPRM)XXXX

Description: The Maine Attorney General's Office disclosed a data breach affecting Ronald & Elizabeth Brent on December 20, 2023, stemming from an incident on October 2, 2023. The breach resulted from inadvertent disclosure and an external system compromise (hacking), leading to the exposure of financial account numbers combined with security codes belonging to two individuals. The exposed data financial credentials paired with security codes poses a significant risk of fraudulent activity, identity theft, or unauthorized transactions. While the breach impacted only two individuals, the nature of the compromised information (direct financial identifiers) elevates the potential for immediate financial harm, including unauthorized access to bank accounts or credit lines. The involvement of an external hacking incident further suggests a targeted or opportunistic cyber attack rather than a mere accidental leak. Given the sensitivity of the exposed data, affected individuals may face long-term reputational and financial repercussions, including the need for credit monitoring, account freezes, or legal recourse. The breach underscores vulnerabilities in data protection measures, particularly in safeguarding high-value financial information against external threats.


No incidents recorded for Huntington National Bank in 2026.
No incidents recorded for Huntington National Bank in 2026.
No incidents recorded for Huntington National Bank in 2026.
HNB cyber incidents detection timeline including parent company and subsidiaries

Welcome to Huntington. Huntington Bancshares Incorporated is a $210 billion asset regional bank holding company headquartered in Columbus, Ohio. Founded in 1866, The Huntington National Bank and its affiliates provide consumers, small and middle-market businesses, corporations, municipalities, and other organizations with a comprehensive suite of banking, payments, wealth management, and risk management products and services. Huntington operates approximately 972 branches in 13 states, with certain businesses operating in extended geographies. Visit Huntington.com for more information. We are committed to doing the right thing for our customers, colleagues, and communities. Our “Welcome” philosophy means they are at the center of everything we do. Here’s how we look out for people: • We aim to make banking easier for our customers. Our comprehensive suite of innovative banking tools and products is specifically designed to strengthen the financial health of those we serve. • Our internal culture is built around making things great—rather than just good enough—and to be the best place our colleagues will ever work. We offer a flexible work environment with opportunities for growth, and we’ll provide all the resources needed to create a lasting and rewarding career path. • Our $40 billion Community Plan, environmental sustainability strategy, and robust small-business lending program are just a few of the ways we are helping to improve the economic vitality of the areas where we live and work. Explore Huntington Career opportunities at https://huntington-careers.com. Huntington is an Equal Opportunity Employer. The Huntington National Bank, Member FDIC. The logo mark and Huntington® are federally registered service marks of Huntington Bancshares Incorporated. Huntington Social Media Community Guidelines & Terms: http://bit.ly/HuntingtonSocialMedia

About Emirates NBD Emirates NBD (DFM: Emirates NBD) is a leading banking group in the MENAT (Middle East, North Africa and Türkiye) region with a presence in 13 countries, serving over 20 million customers. As at 30th September 2023, total assets were AED 836 billion, (equivalent to approx. USD 22
Industrial and Commercial Bank of China Ltd. (ICBC) (simplified Chinese: 中国工商银行; traditional Chinese: 中國工商銀行; pinyin: Zhōngguó Gōngshāng Yínháng, more commonly just 工行 Gōngháng) is China's largest bank and the largest bank in the world. It is one of China's "Big Four" state-owned commercial banks (t

Bancassureur de premier plan en France avec 79 000 collaborateurs au service de 31 millions de clients, Crédit Mutuel Alliance Fédérale propose une offre multiservice à une clientèle de particuliers, de professionnels de proximité et entreprises de toutes tailles, via plus de 4 000 points de vente.
Somos una Corporación líder y comprometida con el país que brinda servicios financieros de excelencia a cada segmento de clientes. Buscamos permanentemente ser el mejor Banco para ellos, ser el mejor lugar para trabajar y ser la mejor inversión para nuestros accionistas. Lo hacemos de forma colabora
UniCredit is a pan-European Bank with a unique service offering in Italy, Germany, Austria, and Central and Eastern Europe. Our Vision is to be the Bank for Europe's Future. Our Purpose is to Empower Communities to Progress, delivering the best-in-class products and services for all stakeholders,

For over 200 years, BNP Paribas Fortis has helped drive the growth and prosperity of Belgium’s economy and communities. The mission of our 12,000 colleagues is clear: be the trusted financial partner for four million individual customers, businesses and organisations. We do this by offering advice a

ING ING is a global bank with a strong European base. With 14,500 employees in the Netherlands, we’re one of the biggest employers of the country. Our research tells us that we stand out here because of our great working culture, competitive benefits, and interesting work. We believe in sustainable
FAB, the UAE’s largest bank and one of the world’s largest financial institutions offers a an extensive range of tailor-made solutions, and products and services, to provide a customised banking experience. Through its strategic offerings, it looks to meet the banking needs of customers across the w

O Bradesco é um dos líderes do setor financeiro privado e um dos maiores empregadores na categoria. Além disso, apresenta o melhor índice de eficiência entre os bancos de varejo. Nossa missão é fornecer soluções, produtos e serviços financeiros e de seguros com agilidade e competência, principal
.png)
COLUMBUS, Ohio and HOUSTON and TUPELO, Miss., Jan. 6, 2026 /PRNewswire/ -- Huntington Bancshares Incorporated (Nasdaq: HBAN); ("Huntington")...
Huntington National Bank has launched its first full-service branches in Charleston and Greenville of South Carolina.
Huntington Bank and Alloy Partners launched a venture studio to create tech companies addressing customer needs in areas such as payments...
Modern treasury solutions company Qolo has forged a "strategic alignment" with Huntington National Bank.
With more than 390 locations across Texas and the South, the addition of Cadence marks a significant milestone in Huntington's strategic...
Our weekly fintech round-up for you to get the latest funding news from around the world. Featuring Finster AI, Clerq, Qolo, and more.
PRNewswire/ -- Huntington Bancshares Incorporated (Nasdaq: HBAN); ("Huntington") and Veritex Holdings, Inc. (Nasdaq: VBTX);...
Huntington Bancshares and Veritex Holdings Merger Approved: A New Era for Regional Banking and Dividend Strategies.
Before the 2025 National Football League (NFL) draft in April, Jax Ulbrich — a 21-year-old Ole Miss student — was visiting his parents'...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Huntington National Bank is http://www.huntington.com.
According to Rankiteo, Huntington National Bank’s AI-generated cybersecurity score is 796, reflecting their Fair security posture.
According to Rankiteo, Huntington National Bank currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Huntington National Bank has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Huntington National Bank is not certified under SOC 2 Type 1.
According to Rankiteo, Huntington National Bank does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Huntington National Bank is not listed as GDPR compliant.
According to Rankiteo, Huntington National Bank does not currently maintain PCI DSS compliance.
According to Rankiteo, Huntington National Bank is not compliant with HIPAA regulations.
According to Rankiteo,Huntington National Bank is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Huntington National Bank operates primarily in the Banking industry.
Huntington National Bank employs approximately 18,314 people worldwide.
Huntington National Bank presently has no subsidiaries across any sectors.
Huntington National Bank’s official LinkedIn profile has approximately 139,411 followers.
Huntington National Bank is classified under the NAICS code 52211, which corresponds to Commercial Banking.
No, Huntington National Bank does not have a profile on Crunchbase.
Yes, Huntington National Bank maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/huntington-national-bank.
As of January 23, 2026, Rankiteo reports that Huntington National Bank has experienced 1 cybersecurity incidents.
Huntington National Bank has an estimated 7,152 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Cyber Attack.
Title: Data Breach at Ronald & Elizabeth Brent
Description: The Maine Attorney General's Office reported a data breach involving Ronald & Elizabeth Brent on December 20, 2023. The breach, which occurred on October 2, 2023, was due to inadvertent disclosure and an external system breach (hacking), affecting 2 individuals' financial account numbers in combination with security codes.
Date Detected: 2023-10-02
Date Publicly Disclosed: 2023-12-20
Type: inadvertent disclosure
Common Attack Types: The most common types of attacks the company has faced is Cyber Attack.

Data Compromised: Financial account numbers, Security codes
Identity Theft Risk: high
Payment Information Risk: high
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Financial Account Numbers, Security Codes and .

Entity Name: Ronald & Elizabeth Brent
Customers Affected: 2

Type of Data Compromised: Financial account numbers, Security codes
Number of Records Exposed: 2
Sensitivity of Data: high

Regulatory Notifications: Maine Attorney General's Office

Source: Maine Attorney General's Office
Date Accessed: 2023-12-20
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Maine Attorney General's OfficeDate Accessed: 2023-12-20.

Root Causes: Inadvertent Disclosure, External System Breach (Hacking),
Most Recent Incident Detected: The most recent incident detected was on 2023-10-02.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2023-12-20.
Most Significant Data Compromised: The most significant data compromised in an incident were financial account numbers, security codes and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were financial account numbers and security codes.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 2.0.
Most Recent Source: The most recent source of information about an incident is Maine Attorney General's Office.
.png)
Backstage is an open framework for building developer portals, and @backstage/backend-defaults provides the default implementations and setup for a standard Backstage backend app. Prior to versions 0.12.2, 0.13.2, 0.14.1, and 0.15.0, the `FetchUrlReader` component, used by the catalog and other plugins to fetch content from URLs, followed HTTP redirects automatically. This allowed an attacker who controls a host listed in `backend.reading.allow` to redirect requests to internal or sensitive URLs that are not on the allowlist, bypassing the URL allowlist security control. This is a Server-Side Request Forgery (SSRF) vulnerability that could allow access to internal resources, but it does not allow attackers to include additional request headers. This vulnerability is fixed in `@backstage/backend-defaults` version 0.12.2, 0.13.2, 0.14.1, and 0.15.0. Users should upgrade to this version or later. Some workarounds are available. Restrict `backend.reading.allow` to only trusted hosts that you control and that do not issue redirects, ensure allowed hosts do not have open redirect vulnerabilities, and/or use network-level controls to block access from Backstage to sensitive internal endpoints.
Backstage is an open framework for building developer portals, and @backstage/cli-common provides config loading functionality used by the backend and command line interface of Backstage. Prior to version 0.1.17, the `resolveSafeChildPath` utility function in `@backstage/backend-plugin-api`, which is used to prevent path traversal attacks, failed to properly validate symlink chains and dangling symlinks. An attacker could bypass the path validation via symlink chains (creating `link1 → link2 → /outside` where intermediate symlinks eventually resolve outside the allowed directory) and dangling symlinks (creating symlinks pointing to non-existent paths outside the base directory, which would later be created during file operations). This function is used by Scaffolder actions and other backend components to ensure file operations stay within designated directories. This vulnerability is fixed in `@backstage/backend-plugin-api` version 0.1.17. Users should upgrade to this version or later. Some workarounds are available. Run Backstage in a containerized environment with limited filesystem access and/or restrict template creation to trusted users.
Backstage is an open framework for building developer portals. Multiple Scaffolder actions and archive extraction utilities were vulnerable to symlink-based path traversal attacks. An attacker with access to create and execute Scaffolder templates could exploit symlinks to read arbitrary files via the `debug:log` action by creating a symlink pointing to sensitive files (e.g., `/etc/passwd`, configuration files, secrets); delete arbitrary files via the `fs:delete` action by creating symlinks pointing outside the workspace, and write files outside the workspace via archive extraction (tar/zip) containing malicious symlinks. This affects any Backstage deployment where users can create or execute Scaffolder templates. This vulnerability is fixed in `@backstage/backend-defaults` versions 0.12.2, 0.13.2, 0.14.1, and 0.15.0; `@backstage/plugin-scaffolder-backend` versions 2.2.2, 3.0.2, and 3.1.1; and `@backstage/plugin-scaffolder-node` versions 0.11.2 and 0.12.3. Users should upgrade to these versions or later. Some workarounds are available. Follow the recommendation in the Backstage Threat Model to limit access to creating and updating templates, restrict who can create and execute Scaffolder templates using the permissions framework, audit existing templates for symlink usage, and/or run Backstage in a containerized environment with limited filesystem access.
FastAPI Api Key provides a backend-agnostic library that provides an API key system. Version 1.1.0 has a timing side-channel vulnerability in verify_key(). The method applied a random delay only on verification failures, allowing an attacker to statistically distinguish valid from invalid API keys by measuring response latencies. With enough repeated requests, an adversary could infer whether a key_id corresponds to a valid key, potentially accelerating brute-force or enumeration attacks. All users relying on verify_key() for API key authentication prior to the fix are affected. Users should upgrade to version 1.1.0 to receive a patch. The patch applies a uniform random delay (min_delay to max_delay) to all responses regardless of outcome, eliminating the timing correlation. Some workarounds are available. Add an application-level fixed delay or random jitter to all authentication responses (success and failure) before the fix is applied and/or use rate limiting to reduce the feasibility of statistical timing attacks.
The Flux Operator is a Kubernetes CRD controller that manages the lifecycle of CNCF Flux CD and the ControlPlane enterprise distribution. Starting in version 0.36.0 and prior to version 0.40.0, a privilege escalation vulnerability exists in the Flux Operator Web UI authentication code that allows an attacker to bypass Kubernetes RBAC impersonation and execute API requests with the operator's service account privileges. In order to be vulnerable, cluster admins must configure the Flux Operator with an OIDC provider that issues tokens lacking the expected claims (e.g., `email`, `groups`), or configure custom CEL expressions that can evaluate to empty values. After OIDC token claims are processed through CEL expressions, there is no validation that the resulting `username` and `groups` values are non-empty. When both values are empty, the Kubernetes client-go library does not add impersonation headers to API requests, causing them to be executed with the flux-operator service account's credentials instead of the authenticated user's limited permissions. This can result in privilege escalation, data exposure, and/or information disclosure. Version 0.40.0 patches the issue.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.