Company Details
deutsche-bank
74,237
2,732,266
52
db.com
0
DEU_9053595
In-progress

Deutsche Bank Company CyberSecurity Posture
db.comDeutsche Bank is the leading German bank with strong European roots and a global network. The bank focuses on its strengths in a Corporate Bank newly created in 2019, a leading Private Bank, a focused investment bank and in asset management. We provide financial services to companies, governments, institutional investors, small and medium-sized businesses and private individuals. Deutsche Bank was founded in 1870 to accompany German businesses into the world, and has worked across borders ever since. Useful links: Jobs https://www.db.com/careers. Netiquette at https://www.db.com/netiquette. Data protection policy https://www.db.com/DataProtection. Imprint https://www.db.com/imprint.
Company Details
deutsche-bank
74,237
2,732,266
52
db.com
0
DEU_9053595
In-progress
Between 750 and 799

Deutsche Bank Global Score (TPRM)XXXX

Description: A former Computacenter manager has filed suit alleging that unauthorized parties repeatedly accessed Deutsche Bank’s high-security New York datacenter between March and June 2023. Court documents claim that a Computacenter employee allowed his uncredentialed girlfriend into server rooms housing critical mainframe systems, while internal CCTV footage reportedly shows Deutsche Bank’s own security staff permitting her entry. During these breaches, she allegedly connected a personal laptop to the bank network and may have circumvented the SIEM monitoring environment. Despite reporting these lapses and urging a regulatory disclosure, the whistleblower was suspended and ultimately terminated. No confirmed data exfiltration or operational outage has been documented, but the incidents exposed serious lapses in multi-layered physical and logical controls, exposing the institution to heightened regulatory, legal and reputational risk. The lawsuit seeks over $20 million in damages under New York whistleblower protections and highlights the potential downstream costs of litigation, internal investigations and remediation measures to shore up security protocols.
Description: An initial access broker hacked multinational investment bank Deutsche Bank and offered access to its systems for sale on Telegram. The IAB claims to have access to around 21000 machines in the bank’s network, most of which are Windows systems. The breacher had access to the chat services used for internal communications. He also claimed to have access to file servers containing 16 terabytes of data.
Description: Customers of Deutsche Bank and its subsidiary Postbank are affected by the incident, and the bank has alerted an unspecified number of clients that their data may have been stolen. The institute declared that an external service provider's data loss was the thieves' entry point. The service provider found the root of the security breach and fixed it. A software vulnerability has been exploited, according to a letter sent to the affected clients. The bank refrained from identifying the service provider who let the data leak happen. Other banks and their customers may also be impacted because account-switching service providers frequently work with several banks.


No incidents recorded for Deutsche Bank in 2025.
No incidents recorded for Deutsche Bank in 2025.
No incidents recorded for Deutsche Bank in 2025.
Deutsche Bank cyber incidents detection timeline including parent company and subsidiaries

Deutsche Bank is the leading German bank with strong European roots and a global network. The bank focuses on its strengths in a Corporate Bank newly created in 2019, a leading Private Bank, a focused investment bank and in asset management. We provide financial services to companies, governments, institutional investors, small and medium-sized businesses and private individuals. Deutsche Bank was founded in 1870 to accompany German businesses into the world, and has worked across borders ever since. Useful links: Jobs https://www.db.com/careers. Netiquette at https://www.db.com/netiquette. Data protection policy https://www.db.com/DataProtection. Imprint https://www.db.com/imprint.


Primerica is a leading provider of financial products and services in North America, with over 2,800 corporate employees who support over 151,000 licensed independent representatives providing financial education and offering financial products and services to their clients. Primerica was founded 48

We are here. So you can stay ahead. For nearly two hundred years we have acquired and shared knowledge, developed global networks and adapted to modern everyday life. To us, it is important to combine profitability with responsibility. DNB is Norway's largest financial services group and one of t

Living mutual has always been at the core of our human existence, and it's the principle that's guided us since our founding in 1851. It's not a concept we invented, but one we champion for the simple reason that people take it for granted today. While the world would have us strive for independenc
IFC, a member of the World Bank Group, is the largest global development institution focused exclusively on the private sector in developing countries. We utilize and leverage our products and services—as well as products and services of other institutions in the World Bank Group—to provide develop

Marsh McLennan (NYSE: MMC) is a global leader in risk, strategy and people, advising clients in 130 countries across four businesses: Marsh, Guy Carpenter, Mercer and Oliver Wyman. With annual revenue of $23 billion and more than 85,000 colleagues,

Founded in 1962 and a public company since 1983, Raymond James Financial, Inc. is a Florida-based diversified holding company providing financial services to individuals, corporations and municipalities through its subsidiary companies engaged primarily in investment and financial planning, in addit

Since 1820, Swedbank has been the bank for the many households and businesses. We are a modern financial services platform focused on customer satisfaction. Our goal is to encourage people to save for a better future, and we aim to help people, businesses and society to grow by promoting a healthy a
Our heritage, since founding a civil law notary practice in the 1940s to establishing the Curacao International Trust Company in the 1960s, is built on challenging paradigms and delivering exceptional service within the financial and professional services industry. Today, we continue to pioneer awar

Since the beginning, our mission has been to provide a range of financial services to the military community and their families. Along the way, we’ve also established ourselves as a destination employer for passionate people looking to serve those who are willing to give it their all. Our mission
.png)
2026 is pivotal for US banks as they navigate macro headwinds, stablecoin disruption, scaling AI, fragmented data, and financial crime.
Cross-sector teams from BT Group, Deutsche Bank, ING, Proximus and Santander join Mastercard's European Cyber Resilience Centre in Belgium...
At Sibos 2025 in Frankfurt, experts spanning multinational banks and fintechs explored the emergence of sophisticated cyberthreats.
Multiple banks have been recruiting senior cybersecurity specialists as technologies like AI make cyberattacks much more powerful. Bank of...
The use of AI is on the rise and when it comes to cyber security, we face advantages as well as fraud or the spread of misinformation.
Deutsche Bank upgraded Palo Alto Networks, calling its business healthy and the CyberArk buyout a smart move for future growth.
Investing.com -- Deutsche Bank upgraded Palo Alto Networks to Buy from Hold and raised its price target to $220, saying investor concerns...
Deutsche Bank has gone live with Swift's Instant Cash Reporting (ICR) – a new, API-driven solution that enables large corporate and...
Hackers using artificial intelligence and other tools are putting a greater strain on banks' cybersecurity systems, and other institutions...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Deutsche Bank is https://www.db.com.
According to Rankiteo, Deutsche Bank’s AI-generated cybersecurity score is 750, reflecting their Fair security posture.
According to Rankiteo, Deutsche Bank currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Deutsche Bank is not certified under SOC 2 Type 1.
According to Rankiteo, Deutsche Bank does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Deutsche Bank is not listed as GDPR compliant.
According to Rankiteo, Deutsche Bank does not currently maintain PCI DSS compliance.
According to Rankiteo, Deutsche Bank is not compliant with HIPAA regulations.
According to Rankiteo,Deutsche Bank is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Deutsche Bank operates primarily in the Financial Services industry.
Deutsche Bank employs approximately 74,237 people worldwide.
Deutsche Bank presently has no subsidiaries across any sectors.
Deutsche Bank’s official LinkedIn profile has approximately 2,732,266 followers.
Deutsche Bank is classified under the NAICS code 52, which corresponds to Finance and Insurance.
Yes, Deutsche Bank has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/deutsche-bank.
Yes, Deutsche Bank maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/deutsche-bank.
As of December 11, 2025, Rankiteo reports that Deutsche Bank has experienced 3 cybersecurity incidents.
Deutsche Bank has an estimated 30,346 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Data Leak and Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an communication strategy with alerted affected clients, and remediation measures with remediation measures to shore up security protocols..
Title: Deutsche Bank Systems Access Offered for Sale by Initial Access Broker
Description: An initial access broker hacked multinational investment bank Deutsche Bank and offered access to its systems for sale on Telegram.
Type: Data Breach
Attack Vector: Initial Access Broker
Threat Actor: Initial Access Broker
Motivation: Financial Gain
Title: Deutsche Bank and Postbank Data Breach
Description: Customers of Deutsche Bank and its subsidiary Postbank are affected by a data breach due to a vulnerability in an external service provider's software.
Type: Data Breach
Attack Vector: Exploitation of Software Vulnerability
Vulnerability Exploited: Software Vulnerability
Title: Unauthorized Access at Deutsche Bank's New York Datacenter
Description: A former Computacenter manager has filed suit alleging that unauthorized parties repeatedly accessed Deutsche Bank’s high-security New York datacenter between March and June 2023. Court documents claim that a Computacenter employee allowed his uncredentialed girlfriend into server rooms housing critical mainframe systems, while internal CCTV footage reportedly shows Deutsche Bank’s own security staff permitting her entry. During these breaches, she allegedly connected a personal laptop to the bank network and may have circumvented the SIEM monitoring environment. Despite reporting these lapses and urging a regulatory disclosure, the whistleblower was suspended and ultimately terminated. No confirmed data exfiltration or operational outage has been documented, but the incidents exposed serious lapses in multi-layered physical and logical controls, exposing the institution to heightened regulatory, legal and reputational risk. The lawsuit seeks over $20 million in damages under New York whistleblower protections and highlights the potential downstream costs of litigation, internal investigations and remediation measures to shore up security protocols.
Date Detected: March 2023
Type: Physical and Logical Security Breach
Attack Vector: Physical AccessLogical Access
Vulnerability Exploited: Unauthorized physical accessUnauthorized network access
Threat Actor: Unauthorized individual (uncredentialed girlfriend of a Computacenter employee)
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through External Service Provider and Physical access to server rooms.

Data Compromised: Internal communications, File servers containing 16 terabytes of data
Systems Affected: 21000 machinesWindows systemsChat services

Data Compromised: Customer Data

Systems Affected: Critical mainframe systems
Brand Reputation Impact: Heightened reputational risk
Legal Liabilities: Heightened legal risk
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Internal Communications, File Server Data, and Customer Data.

Entity Name: Deutsche Bank
Entity Type: Multinational Investment Bank
Industry: Financial Services

Entity Name: Deutsche Bank
Entity Type: Bank
Industry: Financial Services

Entity Name: Postbank
Entity Type: Bank
Industry: Financial Services

Entity Name: Deutsche Bank
Entity Type: Financial Institution
Industry: Banking
Location: New York

Communication Strategy: Alerted affected clients

Remediation Measures: Remediation measures to shore up security protocols

Type of Data Compromised: Internal communications, File server data

Type of Data Compromised: Customer Data

Data Exfiltration: No confirmed data exfiltration
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Remediation measures to shore up security protocols.

Legal Actions: Lawsuit seeking over $20 million in damages
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Lawsuit seeking over $20 million in damages.

Source: Court documents
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Court documents.
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Alerted affected clients.

Customer Advisories: Letter sent to affected clients
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: was Letter sent to affected clients.

Entry Point: External Service Provider

Entry Point: Physical access to server rooms
High Value Targets: Critical mainframe systems
Data Sold on Dark Web: Critical mainframe systems

Root Causes: Software Vulnerability
Corrective Actions: Fixed the vulnerability

Root Causes: Lapses In Multi-Layered Physical And Logical Controls,
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Fixed the vulnerability.
Last Attacking Group: The attacking group in the last incident were an Initial Access Broker and Unauthorized individual (uncredentialed girlfriend of a Computacenter employee).
Most Recent Incident Detected: The most recent incident detected was on March 2023.
Most Significant Data Compromised: The most significant data compromised in an incident were Internal communications, File servers containing 16 terabytes of data, and Customer Data.
Most Significant System Affected: The most significant system affected in an incident was 21000 machinesWindows systemsChat services and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Customer Data, File servers containing 16 terabytes of data and Internal communications.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Lawsuit seeking over $20 million in damages.
Most Recent Source: The most recent source of information about an incident is Court documents.
Most Recent Customer Advisory: The most recent customer advisory issued was an Letter sent to affected clients.
Most Recent Entry Point: The most recent entry point used by an initial access broker were an External Service Provider and Physical access to server rooms.
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Software Vulnerability, Lapses in multi-layered physical and logical controls.
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Fixed the vulnerability.
.png)
FreePBX Endpoint Manager is a module for managing telephony endpoints in FreePBX systems. Versions prior to 16.0.96 and 17.0.1 through 17.0.9 have a weak default password. By default, this is a 6 digit numeric value which can be brute forced. (This is the app_password parameter). Depending on local configuration, this password could be the extension, voicemail, user manager, DPMA or EPM phone admin password. This issue is fixed in versions 16.0.96 and 17.0.10.
Neuron is a PHP framework for creating and orchestrating AI Agents. In versions 2.8.11 and below, the MySQLWriteTool executes arbitrary SQL provided by the caller using PDO::prepare() + execute() without semantic restrictions. This is consistent with the name (“write tool”), but in an LLM/agent context it becomes a high-risk capability: prompt injection or indirect prompt manipulation can cause execution of destructive queries such as DROP TABLE, TRUNCATE, DELETE, ALTER, or privilege-related statements (subject to DB permissions). Deployments that expose an agent with MySQLWriteTool enabled to untrusted input and/or run the tool with a DB user that has broad privileges are impacted. This issue is fixed in version 2.8.12.
Neuron is a PHP framework for creating and orchestrating AI Agents. Versions 2.8.11 and below use MySQLSelectTool, which is vulnerable to Read-Only Bypass. MySQLSelectTool is intended to be a read-only SQL tool (e.g., for LLM agent querying, however, validation based on the first keyword (e.g., SELECT) and a forbidden-keyword list does not block file-writing constructs such as INTO OUTFILE / INTO DUMPFILE. As a result, an attacker who can influence the tool input (e.g., via prompt injection through a public agent endpoint) may write arbitrary files to the DB server if the MySQL/MariaDB account has the FILE privilege and server configuration permits writes to a useful location (e.g., a web-accessible directory). This issue is fixed in version 2.8.12.
Okta Java Management SDK facilitates interactions with the Okta management API. In versions 11.0.0 through 20.0.0, race conditions may arise from concurrent requests using the ApiClient class. This could cause a status code or response header from one request’s response to influence another request’s response. This issue is fixed in version 20.0.1.
The Auth0 Next.js SDK is a library for implementing user authentication in Next.js applications. When using versions 4.11.0 through 4.11.2 and 4.12.0, simultaneous requests on the same client may result in improper lookups in the TokenRequestCache for the request results. This issue is fixed in versions 4.11.2 and 4.12.1.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.