Badge
11,371 badges added since 01 January 2025
ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

ING ING is a global bank with a strong European base. With 14,500 employees in the Netherlands, we’re one of the biggest employers of the country. Our research tells us that we stand out here because of our great working culture, competitive benefits, and interesting work. We believe in sustainable progress for all, not just for the few. We aim to support and contribute to economic, social and environmental progress. Collaborative and inclusive We’re proud of our diverse and multinational make-up. Joining the ING team means contributing to a collaborative and inclusive culture, having a hybrid way of working, and being part of the positive impact that we strive to make on people and the planet. Purpose ING's purpose is empowering people to stay a step ahead in life and in business. This purpose guides us in everything we do. Rather than telling our people what to do, we trust them and encourage them to carve out their career in a way that works best for them. We want to enable them to grow in their own way, without being held down. Because doing great things starts by doing your thing.

ING Nederland A.I CyberSecurity Scoring

ING Nederland

Company Details

Linkedin ID:

ing-nederland

Employees number:

10,446

Number of followers:

976

NAICS:

52211

Industry Type:

Banking

Homepage:

ing.nl

IP Addresses:

0

Company ID:

ING_2481690

Scan Status:

In-progress

AI scoreING Nederland Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/ing-nederland.jpeg
ING Nederland Banking
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreING Nederland Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/ing-nederland.jpeg
ING Nederland Banking
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

ING Nederland Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

ING Nederland Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for ING Nederland

Incidents vs Banking Industry Average (This Year)

No incidents recorded for ING Nederland in 2026.

Incidents vs All-Companies Average (This Year)

No incidents recorded for ING Nederland in 2026.

Incident Types ING Nederland vs Banking Industry Avg (This Year)

No incidents recorded for ING Nederland in 2026.

Incident History — ING Nederland (X = Date, Y = Severity)

ING Nederland cyber incidents detection timeline including parent company and subsidiaries

ING Nederland Company Subsidiaries

SubsidiaryImage

ING ING is a global bank with a strong European base. With 14,500 employees in the Netherlands, we’re one of the biggest employers of the country. Our research tells us that we stand out here because of our great working culture, competitive benefits, and interesting work. We believe in sustainable progress for all, not just for the few. We aim to support and contribute to economic, social and environmental progress. Collaborative and inclusive We’re proud of our diverse and multinational make-up. Joining the ING team means contributing to a collaborative and inclusive culture, having a hybrid way of working, and being part of the positive impact that we strive to make on people and the planet. Purpose ING's purpose is empowering people to stay a step ahead in life and in business. This purpose guides us in everything we do. Rather than telling our people what to do, we trust them and encourage them to carve out their career in a way that works best for them. We want to enable them to grow in their own way, without being held down. Because doing great things starts by doing your thing.

Loading...
similarCompanies

ING Nederland Similar Companies

CIB Egypt

Commercial International Bank was established in 1975 as a joint venture between the National Bank of Egypt (NBE, 51%) and the Chase Manhattan Bank (49%) under the name "Chase National Bank of Egypt”. Following Chase's decision to divest its equity stake in 1987, NBE increased its shareholding to 99

China CITIC Bank

Overview Thinking on the corporate banking of small and medium sized commercial banks • Ranked the 99th among 2008 Global Top 500 Financial Brands • Chen Xiaoxian, the Bank’s President, was granted “Top 10 Financial Figures” Award in the fourth consecutive year • Selection activity about the ranki

Desjardins

Desjardins Group is the largest cooperative financial group in North America and the fifth largest cooperative financial group in the world, with assets of $435.8 billion as at March 31, 2024. It was named one of Canada's Best Employers by Forbes magazine and by Mediacorp. To meet the diverse needs

Comerica Bank

Comerica Incorporated (NYSE: CMA) is a financial services company headquartered in Dallas, Texas, strategically aligned by the Business Bank, the Retail Bank, and Wealth Management. The Business Bank provides companies of all sizes with an array of credit and non-credit financial products and servic

Handelsbanken

We are Europe's safest commercial bank, with roots in local communities throughout Sweden, the Netherlands, Norway, and the UK. Across a range of digital and physical meeting places, our branch teams offer ‘up close and personal’ financial advice and solutions, based on customers’ individual needs.

MCB Bank Limited

Welcome to the Official LinkedIn page of MCB Bank Limited. Established in 1947, MCB Bank Limited is one of the largest Banks in Pakistan with a total customer base exceeding 7 million. We have products and services to suit the every need of customers. To learn more about MCB Bank, please visit our w

Bank of the Philippine Islands (BPI)

Founded in 1851, the Bank of the Philippine Islands is the first bank in the Philippines and in Southeast Asia. Together with its subsidiaries and affiliates, BPI, a universal bank, offers a wide range of financial products and services that serve both retail and corporate clients. Get ready to sta

BMO U.S.

We’re a bank, but there’s more to it than that. We're a top ten bank in North America and have been serving our customers since 1817. BMO provides personal and commercial banking, global markets and investment banking services to 13 million customers and clients. And with over 54,000 employees, we

Banamex

En Banamex una palabra nos ha definido durante nuestra historia: Estar. Estar es acompañar. Estar es avanzar juntos. Acompañar para forjar relaciones auténticas, duraderas, significativas, que nos den confianza y nos impulsen a alcanzar aquello que es importante para ti, para nosotros, para todos.

newsone

ING Nederland CyberSecurity News

May 20, 2025 07:00 AM
Guido Bosch appointed CEO of Nationale-Nederlanden Bank

Today, NN Group announces it has appointed Guido Bosch as Chief Executive Officer of Nationale-Nederlanden Bank as of 1 August 2025.

March 27, 2025 01:57 AM
ING Bank names new CIO

Van Kemenade has 20 years of experience in the financial services and online sectors. Previously CIO of ING in the Netherlands, the promotion will see him...

March 26, 2025 09:38 PM
Funding Options launches in Netherlands with ING

Funding Options, the UK online business finance marketplace, is launching in the Netherlands in partnership with ING to help Dutch businesses find funding.

March 26, 2025 09:18 PM
ABN Amro, ING and Rabobank hit by cyberattacks

Three Dutch banks, ABN Amro, ING and Rabobank, suffered a series of DDoS attacks last weekend (27 and 28 January).

February 13, 2025 08:00 AM
Top 10 Best Paid Tech Job in Netherlands in 2025

Explore the top 10 best paid tech jobs in the Netherlands in 2025, focusing on roles like AI Architect, IT Director, and Data Scientist,...

February 13, 2025 08:00 AM
Ranking the Top 10 High-Paying Tech Jobs in Netherlands in 2025

Explore top 10 high-paying tech jobs in the Netherlands for 2025. Discover leading roles, salaries, and key companies hiring tech talent.

December 24, 2024 08:00 AM
Top In-Demand CyberSecurity Jobs for Beginners in Netherlands

Explore the top in-demand cybersecurity jobs for beginners in Netherlands. Kickstart your career with roles at top companies like Philips...

December 24, 2024 08:00 AM
Top 10 Best Paid Tech Job in Netherlands in 2024

Discover the top 10 best-paid tech jobs in the Netherlands for 2024. Learn about salaries, roles, and top companies hiring in each field.

December 24, 2024 08:00 AM
Top 10 Tech Internships Offered in Netherlands

Top tech internships—like ASML, Philips, Booking.com, and TomTom—offer hands-on skills, networking, and potential job offers...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

ING Nederland CyberSecurity History Information

Official Website of ING Nederland

The official website of ING Nederland is http://www.ing.nl.

ING Nederland’s AI-Generated Cybersecurity Score

According to Rankiteo, ING Nederland’s AI-generated cybersecurity score is 771, reflecting their Fair security posture.

How many security badges does ING Nederland’ have ?

According to Rankiteo, ING Nederland currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has ING Nederland been affected by any supply chain cyber incidents ?

According to Rankiteo, ING Nederland has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.

Does ING Nederland have SOC 2 Type 1 certification ?

According to Rankiteo, ING Nederland is not certified under SOC 2 Type 1.

Does ING Nederland have SOC 2 Type 2 certification ?

According to Rankiteo, ING Nederland does not hold a SOC 2 Type 2 certification.

Does ING Nederland comply with GDPR ?

According to Rankiteo, ING Nederland is not listed as GDPR compliant.

Does ING Nederland have PCI DSS certification ?

According to Rankiteo, ING Nederland does not currently maintain PCI DSS compliance.

Does ING Nederland comply with HIPAA ?

According to Rankiteo, ING Nederland is not compliant with HIPAA regulations.

Does ING Nederland have ISO 27001 certification ?

According to Rankiteo,ING Nederland is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of ING Nederland

ING Nederland operates primarily in the Banking industry.

Number of Employees at ING Nederland

ING Nederland employs approximately 10,446 people worldwide.

Subsidiaries Owned by ING Nederland

ING Nederland presently has no subsidiaries across any sectors.

ING Nederland’s LinkedIn Followers

ING Nederland’s official LinkedIn profile has approximately 976 followers.

NAICS Classification of ING Nederland

ING Nederland is classified under the NAICS code 52211, which corresponds to Commercial Banking.

ING Nederland’s Presence on Crunchbase

No, ING Nederland does not have a profile on Crunchbase.

ING Nederland’s Presence on LinkedIn

Yes, ING Nederland maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/ing-nederland.

Cybersecurity Incidents Involving ING Nederland

As of January 22, 2026, Rankiteo reports that ING Nederland has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

ING Nederland has an estimated 7,153 peer or competitor companies worldwide.

ING Nederland CyberSecurity History Information

How many cyber incidents has ING Nederland faced ?

Total Incidents: According to Rankiteo, ING Nederland has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at ING Nederland ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g.,  execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).

Risk Information
cvss3
Base: 8.1
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Description

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Risk Information
cvss3
Base: 8.2
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=ing-nederland' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge