Company Details
cic
11,132
135,903
52211
cic.fr
0
CIC_1804538
In-progress

CIC Company CyberSecurity Posture
cic.frCIC is the fourth largest banking group in France, consisting of seven regional banks which operate across France through a network of 1,844 branches employing 24,000 staff. CIC's customer base includes 2.7 million retail clients. One in eleven self-employed professionals is a CIC group client and nearly one in three companies banks with CIC Group.
Company Details
cic
11,132
135,903
52211
cic.fr
0
CIC_1804538
In-progress
Between 750 and 799

CIC Global Score (TPRM)XXXX



No incidents recorded for CIC in 2025.
No incidents recorded for CIC in 2025.
No incidents recorded for CIC in 2025.
CIC cyber incidents detection timeline including parent company and subsidiaries

CIC is the fourth largest banking group in France, consisting of seven regional banks which operate across France through a network of 1,844 branches employing 24,000 staff. CIC's customer base includes 2.7 million retail clients. One in eleven self-employed professionals is a CIC group client and nearly one in three companies banks with CIC Group.


PT Bank Danamon Indonesia Tbk (BEI: BDMN) didirikan pada tahun 1956. Per 31 Desember 2024, Danamon mengelola aset konsolidasian sebesar Rp242 triliun dengan anak perusahannya, Adira Finance. Dalam hal kepemilikan saham, 92,47% saham Danamon dimiliki oleh MUFG, dan 7,53% lainnya dimiliki oleh publik.

Bank Rakyat Indonesia (BRI) adalah salah satu bank milik pemerintah yang terbesar di Indonesia. BRI didirikan di Purwokerto, Jawa Tengah oleh Raden Bei Aria Wirjaatmadja pada 16 Desember 1895. Lebih dari 128 tahun memberi pelayanan terbaik bagi seluruh lapisan masyarakat, BRI turut andil dalam upa

Crédit Agricole CIB is the corporate and investment banking arm of Crédit Agricole Group, 9th largest banking group worldwide in terms of balance sheet size in 2023 (The Banker, July 2024). Nearly 8,600 employees across Europe, the Americas, Asia-Pacific, the Middle East and North Africa support Cr
Founded in 1908 by Maharaja Sir Sayaji Rao Gaekwad III, Bank of Baroda is a top notch Public Sector Bank with a business of around Rs.10 trillion and network of 8100+ branches of which 105 overseas branches / offices are located in 17 countries excluding India spanning across Europe, US, Africa, As
Bank of China, include BOC Hong Kong, BOC International, BOCG Insurance and other financial institutions, providing a comprehensive range of high-quality financial services to individual and corporate customers as well as financial institutions worldwide. Over the past century, Bank of China pla

O Bradesco é um dos líderes do setor financeiro privado e um dos maiores empregadores na categoria. Além disso, apresenta o melhor índice de eficiência entre os bancos de varejo. Nossa missão é fornecer soluções, produtos e serviços financeiros e de seguros com agilidade e competência, principal

We’re here to do Right By You. At UOB, we aspire to build a better future for the people and businesses in the region. Through our extensive network and suite of capabilities, we offer financial solutions to the people and businesses within, and connecting with ASEAN. We create solutions tail

With our universal banking model, our pan-African scope, the complementarity of our businesses and our solid expertise, we are a leading player in the Moroccan and African financial sector. For over a century, we’ve been able to adapt by diversifying our business lines, renewing our offers and rev

We are the leading financial group in the Spanish market, comprised of banking business, insurance activity and investments in international banks and leading companies in the services sector. CaixaBank is a financial group with a socially responsible, long-term universal banking model, based on qua
.png)
India News: The Supreme Court deferred pleas to make shortlisted candidates for information commissioner posts public, as the Centre expects...
Following a recent data breach at the National Credit Information Centre (CIC) and a surge in online scams, Vietnamese banks are stepping up...
SK Telecom (SKT) has established an internal independent company, AI CIC, to consolidate and expand its AI business, accelerating AI...
Cybercriminals have breached Vietnam's National Credit Information Center, exposing over 160 million sensitive financial records and...
Experts warned that false claims of data breaches not only damage the reputation of institutions and cause public anxiety, but also create...
Ho Chi Minh City police warn of advanced scams after personal data from CIC was leaked.
The State Bank of Vietnam (SBV) has issued a statement on a recent data breach at the National Credit Information Center of Vietnam (CIC),...
Vietnam's CIC was hit by a ShinyHunters cyberattack, with VNCERT confirming signs of unauthorized access to steal personal data.
Vietnam investigates cyberattack on its national credit database, with hackers suspected to be linked to Shiny Hunters.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of CIC is http://www.cic.fr.
According to Rankiteo, CIC’s AI-generated cybersecurity score is 775, reflecting their Fair security posture.
According to Rankiteo, CIC currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, CIC is not certified under SOC 2 Type 1.
According to Rankiteo, CIC does not hold a SOC 2 Type 2 certification.
According to Rankiteo, CIC is not listed as GDPR compliant.
According to Rankiteo, CIC does not currently maintain PCI DSS compliance.
According to Rankiteo, CIC is not compliant with HIPAA regulations.
According to Rankiteo,CIC is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
CIC operates primarily in the Banking industry.
CIC employs approximately 11,132 people worldwide.
CIC presently has no subsidiaries across any sectors.
CIC’s official LinkedIn profile has approximately 135,903 followers.
CIC is classified under the NAICS code 52211, which corresponds to Commercial Banking.
No, CIC does not have a profile on Crunchbase.
Yes, CIC maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/cic.
As of December 11, 2025, Rankiteo reports that CIC has not experienced any cybersecurity incidents.
CIC has an estimated 6,989 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, CIC has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions prior to 16.0.96 and 17.0.1 through 17.0.9 have a weak default password. By default, this is a 6 digit numeric value which can be brute forced. (This is the app_password parameter). Depending on local configuration, this password could be the extension, voicemail, user manager, DPMA or EPM phone admin password. This issue is fixed in versions 16.0.96 and 17.0.10.
Neuron is a PHP framework for creating and orchestrating AI Agents. In versions 2.8.11 and below, the MySQLWriteTool executes arbitrary SQL provided by the caller using PDO::prepare() + execute() without semantic restrictions. This is consistent with the name (“write tool”), but in an LLM/agent context it becomes a high-risk capability: prompt injection or indirect prompt manipulation can cause execution of destructive queries such as DROP TABLE, TRUNCATE, DELETE, ALTER, or privilege-related statements (subject to DB permissions). Deployments that expose an agent with MySQLWriteTool enabled to untrusted input and/or run the tool with a DB user that has broad privileges are impacted. This issue is fixed in version 2.8.12.
Neuron is a PHP framework for creating and orchestrating AI Agents. Versions 2.8.11 and below use MySQLSelectTool, which is vulnerable to Read-Only Bypass. MySQLSelectTool is intended to be a read-only SQL tool (e.g., for LLM agent querying, however, validation based on the first keyword (e.g., SELECT) and a forbidden-keyword list does not block file-writing constructs such as INTO OUTFILE / INTO DUMPFILE. As a result, an attacker who can influence the tool input (e.g., via prompt injection through a public agent endpoint) may write arbitrary files to the DB server if the MySQL/MariaDB account has the FILE privilege and server configuration permits writes to a useful location (e.g., a web-accessible directory). This issue is fixed in version 2.8.12.
Okta Java Management SDK facilitates interactions with the Okta management API. In versions 11.0.0 through 20.0.0, race conditions may arise from concurrent requests using the ApiClient class. This could cause a status code or response header from one request’s response to influence another request’s response. This issue is fixed in version 20.0.1.
The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. When using versions 4.11.0 through 4.11.2 and 4.12.0, simultaneous requests on the same client may result in improper lookups in the TokenRequestCache for the request results. This issue is fixed in versions 4.11.2 and 4.12.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.