Comparison Overview

PTSB

VS

Bank of Communications Co., Ltd. London Branch

PTSB

56/59 St. Stephens Green, Dublin 2, IE
Last Update: 2025-05-06 (UTC)
Between 800 and 900

Strong

We will never ask you for any personal data on LinkedIn. Please protect yourself by not posting any personal information such as account details or contact details. For customer service queries, find us on Facebook 'PTSB Ireland' and Twitter @AskPTSB permanent tsb p.l.c. is regulated by the Central Bank of Ireland.

NAICS: 52211
NAICS Definition: Commercial Banking
Employees: 1,001-5,000
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Bank of Communications Co., Ltd. London Branch

undefined, undefined, undefined, undefined, CN
Last Update: 2025-03-05 (UTC)

Founded in 1908, Bank of Communications Co., Ltd. ("the Bank"โ€‹) is one of the oldest banks in China as well as one of the note-issuing banks in modern China. The Bank was listed on the Hong Kong Stock Exchange in June 2005 and on the Shanghai Stock Exchange in May 2007. The Bank currently has 182 domestic branches, comprising 30 provincial branches, 7 branches directly managed by the Head Office and 145 managed by provinces. It has also established 2,701 banking outlets in 202 cities and 144 counties nationwide. In addition, the Bank has set up 12 overseas institutions, comprising branches in Hong Kong, New York, San Francisco, Tokyo, Singapore, Seoul, Frankfurt, Sydney, Macau, Ho Chi Minh City, Taipei and Bank of Communications (UK) Co., Ltd. According to the "Top 1000 World Banks 2012"โ€‹ published by the British magazine "The Banker"โ€‹, the Bank was ranked number 30 in terms of its Tier 1 Capital, moving 5 positions forward as compared with the prior year, and was among the top 50 for the fourth consecutive year. The Bank is one of the major financial services providers in China. The Bank's business scope includes commercial banking, securities services, trust services, financial leasing, fund management, insurance and offshore financial services. Its wholly-owned subsidiaries include BOCOM International Holdings Company Limited, China BOCOM Insurance Co., Ltd and Bank of Communications Finance Leasing Co., Ltd. Subsidiaries controlled by the Bank include Bank of Communications Schroder Fund Management Co., Ltd, Bank of Communications International Trust Co., Ltd, BoCommLife Insurance Company Limited, Dayi Bocomm Xingmin Rural Bank, Zhejiang Anji BOCOM Rural Bank Ltd, Xinjiang Shihezi BOCOM Rural Bank and Qingdao Laoshan BOCOM Rural Bank. In addition, the Bank is the largest shareholder of Jiangsu Changshu Rural Commercial Bank Co., Ltd.

NAICS: 52211
NAICS Definition: Commercial Banking
Employees: 12,684
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/permanent-tsb.jpeg
PTSB
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
https://images.rankiteo.com/companyimages/bank-of-communications-limited-london-branch.jpeg
Bank of Communications Co., Ltd. London Branch
โ€”
ISO 27001
Not verified
โ€”
SOC 2
Not verified
โ€”
GDPR
No public badge
โ€”
PCI DSS
No public badge
Compliance Summary
PTSB
100%
Compliance Rate
0/4 Standards Verified
Bank of Communications Co., Ltd. London Branch
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Banking Industry Average (This Year)

No incidents recorded for PTSB in 2025.

Incidents vs Banking Industry Average (This Year)

No incidents recorded for Bank of Communications Co., Ltd. London Branch in 2025.

Incident History โ€” PTSB (X = Date, Y = Severity)

PTSB cyber incidents detection timeline including parent company and subsidiaries

Incident History โ€” Bank of Communications Co., Ltd. London Branch (X = Date, Y = Severity)

Bank of Communications Co., Ltd. London Branch cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/permanent-tsb.jpeg
PTSB
Incidents

No Incident

https://images.rankiteo.com/companyimages/bank-of-communications-limited-london-branch.jpeg
Bank of Communications Co., Ltd. London Branch
Incidents

No Incident

FAQ

Both PTSB company and Bank of Communications Co., Ltd. London Branch company demonstrate a comparable AI risk posture, with strong governance and monitoring frameworks in place.

Historically, Bank of Communications Co., Ltd. London Branch company has disclosed a higher number of cyber incidents compared to PTSB company.

In the current year, Bank of Communications Co., Ltd. London Branch company and PTSB company have not reported any cyber incidents.

Neither Bank of Communications Co., Ltd. London Branch company nor PTSB company has reported experiencing a ransomware attack publicly.

Neither Bank of Communications Co., Ltd. London Branch company nor PTSB company has reported experiencing a data breach publicly.

Neither Bank of Communications Co., Ltd. London Branch company nor PTSB company has reported experiencing targeted cyberattacks publicly.

Neither PTSB company nor Bank of Communications Co., Ltd. London Branch company has reported experiencing or disclosing vulnerabilities publicly.

Neither PTSB company nor Bank of Communications Co., Ltd. London Branch company has publicly disclosed detailed information about the number of their subsidiaries.

Bank of Communications Co., Ltd. London Branch company employs more people globally than PTSB company, reflecting its scale as a Banking.

Latest Global CVEs (Not Company-Specific)

Description

An issue was discovered in chinabugotech hutool before 5.8.4 allowing attackers to execute arbitrary expressions that lead to arbitrary method invocation and potentially remote code execution (RCE) via the QLExpressEngine class.

Description

A weakness has been identified in JeecgBoot up to 3.8.2. The impacted element is an unknown function of the file /sys/role/exportXls. This manipulation causes improper authorization. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A security flaw has been discovered in JeecgBoot up to 3.8.2. The affected element is an unknown function of the file /sys/user/exportXls of the component Filter Handler. The manipulation results in improper authorization. The attack may be performed from remote. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 4.0
Severity: LOW
AV:N/AC:L/Au:S/C:P/I:N/A:N
cvss3
Base: 4.3
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 5.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was identified in JeecgBoot up to 3.8.2. Impacted is an unknown function of the file /sys/tenant/deleteBatch. The manipulation of the argument ids leads to improper authorization. The attack is possible to be carried out remotely. The complexity of an attack is rather high. The exploitability is considered difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 2.1
Severity: HIGH
AV:N/AC:H/Au:S/C:P/I:N/A:N
cvss3
Base: 3.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 2.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

A vulnerability was determined in JeecgBoot up to 3.8.2. This issue affects some unknown processing of the file /api/getDepartUserList. Executing manipulation of the argument departId can lead to improper authorization. The attack can be executed remotely. This attack is characterized by high complexity. The exploitability is assessed as difficult. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

Risk Information
cvss2
Base: 2.1
Severity: HIGH
AV:N/AC:H/Au:S/C:P/I:N/A:N
cvss3
Base: 3.1
Severity: HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
cvss4
Base: 2.3
Severity: HIGH
CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X