
CEC Bank Company Cyber Security Posture
cec.roCEC Bank este o banca comerciala universala, competitiva, care ofera clientilor sai produse si servicii diverse si de calitate. Urmarim cu precadere finantarea IMM-urilor, agriculturii, administratiilor publice locale, precum si a acelor proiecte bancabile care prin natura lor, contribuie la dezvoltarea economica, crearea si mentinerea locurilor de munca. Vom fi un element activ in sprijinirea clientilor pentru accesarea Fondurilor Europene si se va implica in sustinerea Programelor Guvernamentale.
CEC Bank Company Details
cecbank
1681 employees
19473
522
Banking
cec.ro
Scan still pending
CEC_3296561
In-progress

Between 800 and 900
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

CEC Bank Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 800 and 900 |
CEC Bank Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
CEC Bank | Data Leak | 60 | 4 | 12/2011 | CEC017123 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: Romanian state-owned lender CEC bank suffered a data breach incident after which it blocked the VISA cards of around 17,000 of its clients for security reasons. The account and card information was accessed on the Internet through an international database. Thus, CEC Bank decided to block the cards and re-issue a new card and PIN number. |
CEC Bank Company Subsidiaries

CEC Bank este o banca comerciala universala, competitiva, care ofera clientilor sai produse si servicii diverse si de calitate. Urmarim cu precadere finantarea IMM-urilor, agriculturii, administratiilor publice locale, precum si a acelor proiecte bancabile care prin natura lor, contribuie la dezvoltarea economica, crearea si mentinerea locurilor de munca. Vom fi un element activ in sprijinirea clientilor pentru accesarea Fondurilor Europene si se va implica in sustinerea Programelor Guvernamentale.
Access Data Using Our API

Get company history
.png)
CEC Bank Cyber Security News
Romaniaโs CEC Bank set for retail and corporate banking tech overhaul with Temenos
Temenos will deliver CEC Bank's tech overhaul in collaboration with SoftCentric and India's Tech Mahindra in an effort to โensure a smooth transition and marketย ...
Romaniaโs CEC Bank adopts Temenos core banking platform
โTemenos offers a best-in-class core banking solution and unifying our business lines on their agile platform will help us to scale moreย ...
Romaniaโs CEC Bank taps Temenos to power retail & corporate banking
CEC Bank, Romania's third-largest bank, has selected Temenos to modernise its retail and corporate core banking systems.
Cyber โโexpert: The virus that affected the CEC website steals user data
"Luma is an info-stealer or if we translate it into Albanian, it is a data thief. Its sole purpose is to infiltrate the user's device, in thisย ...
European Commission approves Romanian plan to inject 200 million euros into savings bank
The European Commission has approved Romania's plans to inject 200 million euros of capital in the state-owned CEC Bank.
Moldova faces hacker attack during elections
Hackers have targeted the website of the Central Electoral Commission of Moldova (CEC) on the day of local elections, claims the head of CECย ...

CEC Bank Similar Companies

TD
The Toronto-Dominion Bank & its subsidiaries are collectively known as TD Bank Group (TD). TD is the sixth largest bank in North America by assets & serves approx. 28 million customers in a number of locations in key financial centres around the globe. With over 95,000 employees, TD ranks among the

BMO U.S.
At BMO, banking is our personal commitment to helping people at every stage of their financial lives. The truth is, peopleโs needs change: so we change too. But we never change who we are. Which means weโll never waiver from providing our customers the best possible banking experience in the indust

Bank of Ireland
Welcome to Bank of Ireland on LinkedIn. We're here to keep you up to date on our latest news and to provide useful information and guidance to support your financial needs. A leading Irish bank, we offer a wide range of financial products including savings, loans, mortgages and deposit accounts.

Societe Generale
Societe Generale is one of the leading European financial services groups. Based on a diversified and integrated banking model, the Group combines financial strength and proven expertise in innovation with a strategy of sustainable growth. Committed to the positive transformations of the worldโs soc

ICICI Bank
ICICI Bank is one of Indiaโs leading private sector banks, offering a wide range of banking products and services to corporate, Small and Medium Enterprises (SME) and individual customers across the country. The Bank offers multi-channel touch points including branches, ATMs, mobile banking, interne

Industrial and Commercial Bank of China
Industrial and Commercial Bank of China Ltd. (ICBC) (simplified Chinese: ไธญๅฝๅทฅๅ้ถ่ก; traditional Chinese: ไธญๅๅทฅๅ้่ก; pinyin: Zhลngguรณ Gลngshฤng Yรญnhรกng, more commonly just ๅทฅ่ก Gลnghรกng) is China's largest bank and the largest bank in the world. It is one of China's "Big Four" state-owned commercial banks (t

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
CEC Bank CyberSecurity History Information
How many cyber incidents has CEC Bank faced?
Total Incidents: According to Rankiteo, CEC Bank has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at CEC Bank?
Incident Types: The types of cybersecurity incidents that have occurred incident Data Leak.
How does CEC Bank detect and respond to cybersecurity incidents?
Detection and Response: The company detects and responds to cybersecurity incidents through containment measures with Blocked affected cards and remediation measures with Re-issued new cards and PIN numbers.
Incident Details
Can you provide details on each incident?

Incident : Data Breach
Title: CEC Bank Data Breach
Description: Romanian state-owned lender CEC bank suffered a data breach incident after which it blocked the VISA cards of around 17,000 of its clients for security reasons. The account and card information was accessed on the Internet through an international database. Thus, CEC Bank decided to block the cards and re-issue a new card and PIN number.
Type: Data Breach
Attack Vector: Internet Access
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Data Leak.
Impact of the Incidents
What was the impact of each incident?

Incident : Data Breach CEC017123
Data Compromised: Account information, Card information
Payment Information Risk: True
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Account information and Card information.
Which entities were affected by each incident?

Incident : Data Breach CEC017123
Entity Type: Financial Institution
Industry: Banking
Location: Romania
Customers Affected: 17000
Response to the Incidents
What measures were taken in response to each incident?

Incident : Data Breach CEC017123
Containment Measures: Blocked affected cards
Remediation Measures: Re-issued new cards and PIN numbers
Data Breach Information
What type of data was compromised in each breach?

Incident : Data Breach CEC017123
Type of Data Compromised: Account information, Card information
Number of Records Exposed: 17000
Sensitivity of Data: High
Data Exfiltration: True
Personally Identifiable Information: True
What measures does the company take to prevent data exfiltration?
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Re-issued new cards and PIN numbers.
How does the company handle incidents involving personally identifiable information (PII)?
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through was Blocked affected cards.
Additional Questions
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were Account information and Card information.
Response to the Incidents
What containment measures were taken in the most recent incident?
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Blocked affected cards.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Account information and Card information.
What was the number of records exposed in the most significant breach?
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 170.0.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
