Company Details
amaya
245
5,434
7132
amaya.com
0
AMA_3142740
In-progress

Amaya Company CyberSecurity Posture
amaya.comAmaya is a leading provider of technology-based solutions, products and services in the global gaming and interactive entertainment industries. Amaya owns gaming and related consumer businesses and brands including PokerStars, Full Tilt, StarsDraft, the European Poker Tour, PokerStars Caribbean Adventure, the Latin American Poker Tour and the Asia Pacific Poker Tour. These brands collectively form the largest poker business in the world, comprising online poker games and tournaments, live poker competitions, branded poker rooms in popular casinos in major cities around the world, and poker programming created for television and online audiences. Amaya, through certain of these brands, also offers non-poker online gaming products, including casino, sportsbook and daily fantasy sports.
Company Details
amaya
245
5,434
7132
amaya.com
0
AMA_3142740
In-progress
Between 750 and 799

Amaya Global Score (TPRM)XXXX



No incidents recorded for Amaya in 2025.
No incidents recorded for Amaya in 2025.
No incidents recorded for Amaya in 2025.
Amaya cyber incidents detection timeline including parent company and subsidiaries

Amaya is a leading provider of technology-based solutions, products and services in the global gaming and interactive entertainment industries. Amaya owns gaming and related consumer businesses and brands including PokerStars, Full Tilt, StarsDraft, the European Poker Tour, PokerStars Caribbean Adventure, the Latin American Poker Tour and the Asia Pacific Poker Tour. These brands collectively form the largest poker business in the world, comprising online poker games and tournaments, live poker competitions, branded poker rooms in popular casinos in major cities around the world, and poker programming created for television and online audiences. Amaya, through certain of these brands, also offers non-poker online gaming products, including casino, sportsbook and daily fantasy sports.


BoyleSports is the largest and most successful independently-owned bookmaker on the island of Ireland. Founded in 1982 by John Boyle, the business has grown to over 375 shops in Ireland & the UK and now offers telephone, mobile and internet betting and gaming services in Ireland, the UK and a range

With two decades’ experience in online gaming, Mansion enjoys a global reputation as one of the industry’s most trusted and innovative names. Our vision is simple – to provide players worldwide with the best in class service that is knowledgeable and personalised, while ensuring that all products ar

SKYCITY Darwin is the ultimate entertainment destination in the Northern Territory. Boasting over 700 electronic gaming machines, more than 30 exciting table games, 4 restaurants, 5 bars, Darwin’s only five star beachfront resort with 154 luxury accommodation rooms, VIP Gaming Suites, Lagoon Day Spa

The Gaming Standards Association (GSA) is an international trade association that pioneers cutting edge and innovative solutions for the global gaming industry. Our mission is to facilitate the implementation of solutions that empower suppliers, operators and regulators with the highest level of ex

Now Part of Inspired Entertainment Inspired offers an expanding portfolio of content, technology, hardware and services for regulated gaming, betting, lottery, social and leisure operators across land-based and mobile channels around the world. Inspired’s gaming, virtual sports, interactive and leis

#BallysAC has endless THRILLS! 🎲 Gaming 🎉 Day & Nightlife 🍝 Dining 🛌 1200 rooms & suites Must be 21+. Gambling problem? Call 1-800-GAMBLER. Bally’s Atlantic City is an escape overlooking the gorgeous Atlantic City beach and Boardwalk. With over $100 million in renovations, this oceanfront property
.png)
State Chief Information Officer Amaya Capellan and Chief Technology Officer Brian Andrews have stepped down.
Brian Andrews is out as CTO, and Amaya Capellán is out as CIO.
Docomo business Rink is an integrated security NaaS service that delivers the security functions required in enterprise ICT environments,...
CUERO, Texas — Hackers are setting their sights on rural communities, and several Texas counties have paid a heavy price.
The Cynder Project (“Addressing the Gender Gap in the Cybersecurity Agenda of the Americas and the Caribbean”) is a comprehensive initiative aimed at...
Accenture has acquired IAMConcepts, a privately held Canadian company specializing in identity and access management (IAM) services.
"Love Island USA" Season 7 winners Amaya and Bryan are facing breakup rumors ahead of the reunion. Here's the latest on their relationship...
These 25 state and local IT leaders keep the lights on and the wheels of innovation turning in government.
Three Suffolk college students have been honored by PSEG Long Island for National Intern Day while completing their summer internships.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Amaya is http://www.amaya.com.
According to Rankiteo, Amaya’s AI-generated cybersecurity score is 766, reflecting their Fair security posture.
According to Rankiteo, Amaya currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Amaya is not certified under SOC 2 Type 1.
According to Rankiteo, Amaya does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Amaya is not listed as GDPR compliant.
According to Rankiteo, Amaya does not currently maintain PCI DSS compliance.
According to Rankiteo, Amaya is not compliant with HIPAA regulations.
According to Rankiteo,Amaya is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Amaya operates primarily in the Gambling Facilities and Casinos industry.
Amaya employs approximately 245 people worldwide.
Amaya presently has no subsidiaries across any sectors.
Amaya’s official LinkedIn profile has approximately 5,434 followers.
Amaya is classified under the NAICS code 7132, which corresponds to Gambling Industries.
No, Amaya does not have a profile on Crunchbase.
Yes, Amaya maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/amaya.
As of November 28, 2025, Rankiteo reports that Amaya has not experienced any cybersecurity incidents.
Amaya has an estimated 894 peer or competitor companies worldwide.
Total Incidents: According to Rankiteo, Amaya has faced 0 incidents in the past.
Incident Types: The types of cybersecurity incidents that have occurred include .
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.