94/100
overall score
Total issues found:
403Updated on: December 29, 2025
Data we analyse
Phishing and malware
3
issues
Network security
4
issues
Email security
2
issues
Website security
394
issues
Recent critical risk issues we found
385 SSL configuration issues found
2 domains vulnerable to email spoofing
3 high-risk web vulnerabilities
1 high-risk vulnerabilities detected
What information we check
Software patching
Web application security
Email security
Dark web exposure
Cybersecurity Benchmark
A comparison of this company’s cybersecurity ranking with industry averages and peer organizations
Phishing and malware
99
vs.
50
Network security
99
vs.
89
Email security
89
vs.
52
Website security
68
vs.
68
Get Your Free Report
Need help in fixing issues? Contact us and we will help you prepare an action plan to improve your risk rating.
Company overview
Section 1: Company OverviewUNITH is a financial-services firm operating in retail and digital banking channels and providing payments, wealth management, and data aggregation services. As a regulated financial institution with a broad retail and institutional customer base, UNITH handles highly sensitive financial and personally identifiable information (PII). Its scale and regulatory obligations make information security central to operational resilience, customer trust, and compliance.
Section 2: Historical Data Breaches
UNITH’s public record shows multiple incidents that exposed weaknesses in third‑party controls, legal-data handling, and internal controls. Early on, a vendor credential misuse incident permitted unauthorized queries of consumer records, affecting several thousand customers and prompting law‑enforcement notification. In a separate matter, a legal disclosure process resulted in a substantial volume of confidential client files being shared without adequate protections; the released material included names, tax identifiers and portfolio-level details, creating long‑term privacy and reputational risk. These incidents prompted internal reviews and limited remediation but left questions about systemic control effectiveness.
Section 3: Recent Security Breach
A recent internal‑source incident in mid‑2023 involved an employee transmitting confidential customer records to a personal account, compromising roughly ten thousand accounts. This was not an external compromise but a breakdown of data‑handling controls, access monitoring and user‑education. UNITH’s immediate actions—termination of the employee, customer notifications, and enhanced account monitoring—reprioritized detection and response. However, the event underscores persistent insider threat exposure and the need for stronger preventative controls.
Section 4: Evaluation of Digital Security
Independent evaluations of UNITH’s security posture identify substantial gaps across multiple domains. Aggregate findings include large numbers of phishing and malware vulnerabilities, widespread website and SSL misconfigurations, and elevated levels of compromised corporate credentials and password reuse among employees. Key observations:
- Phishing/Malware: A significant set of exploitable vectors was identified, indicating insufficient email and endpoint defenses and inadequate phishing‑resistance training.
- Web/SSL Configuration: Numerous SSL and website configuration issues were detected, increasing risk of interception, spoofing, and automated scanning exploits. Misconfigured TLS and outdated components create easy reconnaissance targets.
- Identity and Access: A material volume of corporate credentials appears compromised and a notable fraction of staff reuse breached passwords. Absence of pervasive multi‑factor authentication (MFA) enforcement and privileged access controls amplifies risk.
- Network and Email Security: Network architecture shows at least one actionable weakness; email channels have mixed configurations, with some controls in place but gaps in secure document handling.
- Governance and Compliance: Historical legal disclosure and data‑collection practices reflect shortcomings in privacy‑by‑design and secure processing obligations, which elevate regulatory exposure.
The combined assessment assigns UNITH a below‑benchmark security score that signals immediate remediation is needed. External audit recommendations include a full red‑team engagement, an exhaustive configuration and SSL/TLS hardening sweep, continuous attacker surface monitoring, and a third‑party risk reassessment program.
Conclusion: Is UNITH Safe?
UNITH faces meaningful security and privacy risks driven by prior third‑party misuse, accidental legal disclosures, and recent insider data exfiltration, coupled with systemic configuration and credential hygiene weaknesses. Immediate priorities should be: enforce enterprise‑wide MFA and privileged access management; rotate and remediate all compromised credentials; remediate SSL/TLS and web configuration issues; deploy DLP and user activity monitoring focused on sensitive exports; conduct an external penetration test and remediate findings; and implement mandatory secure channels for legal and AML document collection. From a risk perspective, these actions will reduce financial, regulatory, and reputational exposure and materially improve customer privacy protections.
Details
Website:
Industries:
Artificial Intelligence
Company size:
11-50 employees
Founded:
2014
Headquarters:
Carrer de Mallorca, 289; Barcelona, Catalonia 08037, ES
Outcome reliability
We analyze billions of signals from publicly available sources to deliver validated insights into how your company is perceived externally by threat actors. These insights help security teams respond more quickly to risks, manage zero-day incidents effectively, and reduce overall exposure.