Comparison Overview

LCL

VS

YES BANK

LCL

20, Avenue de Paris, VILLEJUIF, Île-de-France, FR, 94800
Last Update: 2025-12-09
Between 750 and 799

Depuis son rapprochement avec le Groupe Crédit Agricole SA en 2003, le périmètre d'activités de LCL, réseau national de banque de détail, est axé sur le marché des particuliers, des professionnels, des entreprises et la Banque privée. LCL est une banque de proximité qui compte 2 065 implantations et 20 900 collaborateurs au service de 6 000 000 de clients particuliers, 320 000 clients professionnels et 27 000 clients entreprises et institutionnels.

NAICS: 52211
NAICS Definition: Commercial Banking
Employees: 15,988
Subsidiaries: 46
12-month incidents
0
Known data breaches
0
Attack type number
0

YES BANK

13-103 Western Express Highway, Mumbai, Maharashtra, undefined, IN
Last Update: 2025-12-09
Between 750 and 799

YES BANK is a leading Indian private sector bank committed to transforming the financial landscape of India. With over 1200 branches nationwide and a dedicated team of YES BANKers, we strive to deliver exceptional banking solutions and empower individuals, businesses and communities to thrive. At YES BANK, we believe in the power of innovation and transparency. Operating in Retail, MSME and Corporate banking sectors, we are a full service bank and offer an extensive range of financial services. We leverage cutting-edge technology & industry insights to meet the evolving needs of our diverse clientele. One in three UPI transactions in the country are processed by YES BANK. Driven by our core values, we aim to build long lasting relationships with our customers and stakeholders. Our robust risk management framework ensures the safety and security of your finances, while our unwavering commitment to sustainability drives us to create a positive impact on society and the environment. We recognize the potential within each person and strive to unlock it through opportunities for growth, learning and innovation. Joining our ranks means joining a vibrant ecosystem of individuals who are passionate about making an impact and shaping the future of banking. Together, let’s create a future where your dreams can flourish and make a lasting impact. Note: YES BANK will NEVER ask you to reveal your User ID or Password. Therefore, never disclose your credentials (User ID, Password, OTP, PIN etc.) to anyone either through mail or over phone. If you receive any mail asking you to update or authenticate your User ID or Password, please DO NOT fall into the trap of putting in your Password or OTP or PIN.

NAICS: 52211
NAICS Definition: Commercial Banking
Employees: 36,851
Subsidiaries: 1
12-month incidents
0
Known data breaches
1
Attack type number
1

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/lcl.jpeg
LCL
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/yes-bank.jpeg
YES BANK
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
LCL
100%
Compliance Rate
0/4 Standards Verified
YES BANK
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Banking Industry Average (This Year)

No incidents recorded for LCL in 2025.

Incidents vs Banking Industry Average (This Year)

No incidents recorded for YES BANK in 2025.

Incident History — LCL (X = Date, Y = Severity)

LCL cyber incidents detection timeline including parent company and subsidiaries

Incident History — YES BANK (X = Date, Y = Severity)

YES BANK cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/lcl.jpeg
LCL
Incidents

No Incident

https://images.rankiteo.com/companyimages/yes-bank.jpeg
YES BANK
Incidents

Date Detected: 10/2016
Type:Breach
Attack Vector: Non-bank ATMs
Motivation: Fraud
Blog: Blog

FAQ

LCL company demonstrates a stronger AI Cybersecurity Score compared to YES BANK company, reflecting its advanced cybersecurity posture governance and monitoring frameworks.

YES BANK company has historically faced a number of disclosed cyber incidents, whereas LCL company has not reported any.

In the current year, YES BANK company and LCL company have not reported any cyber incidents.

Neither YES BANK company nor LCL company has reported experiencing a ransomware attack publicly.

YES BANK company has disclosed at least one data breach, while LCL company has not reported such incidents publicly.

Neither YES BANK company nor LCL company has reported experiencing targeted cyberattacks publicly.

Neither LCL company nor YES BANK company has reported experiencing or disclosing vulnerabilities publicly.

Neither LCL nor YES BANK holds any compliance certifications.

Neither company holds any compliance certifications.

LCL company has more subsidiaries worldwide compared to YES BANK company.

YES BANK company employs more people globally than LCL company, reflecting its scale as a Banking.

Neither LCL nor YES BANK holds SOC 2 Type 1 certification.

Neither LCL nor YES BANK holds SOC 2 Type 2 certification.

Neither LCL nor YES BANK holds ISO 27001 certification.

Neither LCL nor YES BANK holds PCI DSS certification.

Neither LCL nor YES BANK holds HIPAA certification.

Neither LCL nor YES BANK holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

A weakness has been identified in itsourcecode Online Pet Shop Management System 1.0. This vulnerability affects unknown code of the file /pet1/addcnp.php. This manipulation of the argument cnpname causes sql injection. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in Tenda AX9 22.03.01.46. This affects the function image_check of the component httpd. The manipulation results in use of weak hash. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is indicated that the exploitability is difficult. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 2.6
Severity: HIGH
AV:N/AC:H/Au:N/C:N/I:P/A:N
cvss3
Base: 3.7
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss4
Base: 6.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A weakness has been identified in code-projects Student File Management System 1.0. This issue affects some unknown processing of the file /admin/update_student.php. This manipulation of the argument stud_id causes sql injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in code-projects Student File Management System 1.0. This vulnerability affects unknown code of the file /admin/save_user.php. The manipulation of the argument firstname results in sql injection. The attack can be executed remotely. The exploit has been released to the public and may be exploited.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in code-projects Student File Management System 1.0. This affects an unknown part of the file /admin/update_user.php. The manipulation of the argument user_id leads to sql injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

Risk Information
cvss2
Base: 7.5
Severity: LOW
AV:N/AC:L/Au:N/C:P/I:P/A:P
cvss3
Base: 7.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
cvss4
Base: 6.9
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X