Company Details
carnival-corporation
2,980
104,710
5615
http://www.carnivalcorp.com
0
CAR_1378716
In-progress

Carnival Corporation Company CyberSecurity Posture
http://www.carnivalcorp.comCarnival Corporation & plc (NYSE: CCL; NYSE: CUK) is the largest global cruise company, and among the largest leisure travel companies, with a portfolio of world-class cruise lines and a fleet of over 90 ships. Together its cruise lines – including AIDA Cruises, Carnival Cruise Line, Costa Cruises, Cunard, Holland America Line, P&O Cruises, Princess Cruises, and Seabourn – visit more than 800 ports around the world and account for nearly 40% of the overall cruise market globally. In 2024, the company’s talented workforce of over 160,000 team members from 150 countries delivered unforgettable happiness to approximately 13.5 million guests by providing extraordinary cruise vacations, while honoring the integrity of every ocean sailed, place visited, and life touched. Carnival Corporation owns and operates eight destinations globally, designed exclusively for guests of the company’s cruise lines, as well as Holland America Princess Alaska Tours, the leading tour company in Alaska and the Canadian Yukon. The company is dual-listed and traded on the London and New York stock exchanges and is included in both the S&P 500 index in the US and the FTSE 250 index in the UK.
Company Details
carnival-corporation
2,980
104,710
5615
http://www.carnivalcorp.com
0
CAR_1378716
In-progress
Between 550 and 599

Carnival Corporation Global Score (TPRM)XXXX

Description: The California Office of the Attorney General reported that Carnival Corporation & PLC experienced a data breach involving unauthorized access to employee email accounts between April 11, 2019, and July 23, 2019. The incident potentially compromised personal information including names, addresses, Social Security numbers, and financial information, affecting an unspecified number of individuals. The breach was reported on March 3, 2020.
Description: The Maine Attorney General's Office reported a data breach involving Carnival Corporation on October 16, 2020. The breach occurred on August 4, 2020, due to an external system breach (hacking), affecting approximately 37,500 individuals in total, with 8 residents specifically impacted. Notifications to potentially affected individuals began on October 13, 2020, following the discovery of the breach on September 29, 2020.
Description: The California Office of the Attorney General reported on October 18, 2021, that Carnival Corporation and plc experienced a data breach with unauthorized access to email accounts detected on March 19, 2021. The impacted personal information may include names, addresses, phone numbers, passport numbers, and health information, but the total number of individuals affected is unknown.
Description: On August 15, 2020, Carnival Corporation and plc experienced a data breach due to unauthorized third-party access to its IT systems. The incident, reported by the California Office of the Attorney General on February 4, 2021, exposed sensitive personal information of both guests and employees. Compromised data included names, addresses, passport numbers, and Social Security numbers—highly sensitive identifiers that could lead to identity theft, financial fraud, or targeted phishing attacks. The breach underscored vulnerabilities in Carnival’s cybersecurity defenses, raising concerns about the protection of customer and employee data. Given the nature of the stolen information, the incident posed significant risks of long-term reputational damage, regulatory scrutiny, and potential legal liabilities. The exposure of passport and Social Security numbers, in particular, elevated the severity, as such data is often exploited in large-scale fraud schemes or sold on dark web marketplaces. Carnival’s failure to prevent the breach highlighted systemic weaknesses in safeguarding critical personal data against sophisticated cyber threats.
Description: Carnival Corporation, the world”s largest cruise line operator suffered a ransomware attack involving unauthorized access and encryption of data. A ransomware attack that gained access to and encrypted a portion of one brand's information technology systems was discovered by Carnival Corporation and Carnival plc, the business stated. Carnival anticipates lawsuits from its visitors, employees, and shareholders alleging that the attack may have involved improper access to customer and staff personal information.
Description: In May 2019, Carnival Corp., the parent company of Princess Cruises and Holland America Cruise Line, fell victim to a targeted **ransomware attack** in Florida, USA. The incident began when hackers gained unauthorized access to an employee’s account, allowing them to monitor internal email traffic and identify high-value targets within the organization. The attackers then encrypted portions of Carnival Corp.’s IT systems, disrupting operations and potentially exposing sensitive corporate and employee data. While the full scope of the breach was not publicly detailed, the attack highlighted vulnerabilities in the company’s cybersecurity defenses, particularly around credential protection and email security. The encryption of critical systems likely caused operational disruptions, financial losses from recovery efforts, and reputational damage. The attack also raised concerns about the potential exposure of employee and customer data, though no large-scale data leak was confirmed in public reports. Carnival Corp. had to invest in incident response, system restoration, and enhanced security measures to mitigate future risks.
Description: In March 2021, Carnival Corp., a Miami-based cruise company, suffered a **ransomware attack** initiated via a phishing email. The attackers breached the IT system of one of its cruise liners, gaining unauthorized access to **personal data of both employees and customers**. While the intrusion was detected on **March 19th**, the company assessed that the **likelihood of misuse of the stolen data was low**. This incident was part of a recurring pattern, as Carnival Corp. had endured **multiple ransomware attacks over a two-year period**, highlighting persistent vulnerabilities in its cybersecurity defenses. The breach exposed sensitive information, though the full scale of the financial, reputational, or operational damage was not explicitly detailed in the report.
Description: In August 2020, Carnival Corp., a Miami-based cruise operator, fell victim to a **ransomware attack** targeting one of its brand’s IT systems. The attackers partially encrypted critical data files, exposing the company to potential legal and financial repercussions. The breach raised concerns over compromised guest, employee, and shareholder data, alongside regulatory scrutiny. This incident marked Carnival Corp.’s **second cyber-attack**, amplifying risks to its operational integrity, customer trust, and financial stability. While the full scope of data exposure (e.g., personal or financial records) was not explicitly detailed, the attack’s disruptive potential—including operational disruptions, reputational damage, and liability claims—positioned it as a high-stakes security failure with broad organizational consequences.


No incidents recorded for Carnival Corporation in 2025.
No incidents recorded for Carnival Corporation in 2025.
No incidents recorded for Carnival Corporation in 2025.
Carnival Corporation cyber incidents detection timeline including parent company and subsidiaries

Carnival Corporation & plc (NYSE: CCL; NYSE: CUK) is the largest global cruise company, and among the largest leisure travel companies, with a portfolio of world-class cruise lines and a fleet of over 90 ships. Together its cruise lines – including AIDA Cruises, Carnival Cruise Line, Costa Cruises, Cunard, Holland America Line, P&O Cruises, Princess Cruises, and Seabourn – visit more than 800 ports around the world and account for nearly 40% of the overall cruise market globally. In 2024, the company’s talented workforce of over 160,000 team members from 150 countries delivered unforgettable happiness to approximately 13.5 million guests by providing extraordinary cruise vacations, while honoring the integrity of every ocean sailed, place visited, and life touched. Carnival Corporation owns and operates eight destinations globally, designed exclusively for guests of the company’s cruise lines, as well as Holland America Princess Alaska Tours, the leading tour company in Alaska and the Canadian Yukon. The company is dual-listed and traded on the London and New York stock exchanges and is included in both the S&P 500 index in the US and the FTSE 250 index in the UK.


DER TOURISTIK GROUP AUF WACHSTUMSKURS Die DER Touristik Group gehört heute zu den führenden europäischen Reisekonzernen. Sie vereint unter ihrem Dach verschiedene Geschäftsfelder rund ums Thema Reisen und agiert seit 2018 strukturell als Holding mit vier Divisions. Durch den Zukauf der europäische

At Enterprise Mobility™ we are paving a new way forward by creating better experiences for how we move. We give people around the world the ability to connect in ways that suit their unique needs. It’s a bold idea that has defined our purpose-led, people-first organization for over 65 years, and it’

Norwegian Cruise Line Holdings Ltd. (NYSE: NCLH) is a leading global cruise company which operates Norwegian Cruise Line, Oceania Cruises and Regent Seven Seas Cruises. With a combined fleet of 32 ships and approximately 66,500 berths, NCLH offers itineraries to approximately 700 destinations worl

BCD Travel helps companies travel smart and achieve more. We drive program adoption, cost savings and talent retention through digital experiences that simplify business travel. Our 15,000+ dedicated team members service clients in 170+ countries as we shape a sustainable future for business travel.

Hertz is one of the world’s largest mobility companies, and through its indirect subsidiary, The Hertz Corporation, operates the Hertz, Dollar, and Thrifty vehicle rental brands throughout North America, Europe, the Caribbean, Latin America, Africa, the Middle East, Asia, Australia, and New Zealand.

Princess is the world’s leading premium cruise line operating a fleet of modern ships visiting over 380 destinations around the globe on more than 160 itineraries. Each moment on Princess is one of wonderful discovery where guests can relax and explore. The choices are endless, from invigorating act
At Royal Caribbean Group, we deliver unforgettable vacations to guests who trust us with life’s greatest moments. We build the best ships, and even better careers, all while doing the right thing. We are passionate. We are innovative. We are unstoppable. We open the world to our employees. Your jour

CWT is a global business travel and meetings specialist, with whom companies and governments partner to keep their people connected, in traditional business locations and some of the most remote and inaccessible parts of the globe. A private company – owned through funds managed by a group of leadin

Headquartered in Geneva, Switzerland, MSC Cruises is the world’s third largest cruise lines and the market leader in Europe, South America, the Middle East and Southern Africa, with a strong and growing presence in North America and the Far East. The MSC Cruises fleet consists of 22 modern ships wi
.png)
Here are the worldwide cybersecurity job openings available as of September 16, 2025, including on-site, hybrid, and remote roles.
In a significant cybersecurity deal, Palo Alto Networks is set to acquire CyberArk for $25 billion in cash and stock.
The deal, among the biggest tech takeovers of 2025, highlights growing consolidation in the cybersecurity sector as organizations...
By Kritika Lamba and Aditya Soni Palo Alto Networks NASDAQ:PANW will buy Israeli peer CyberArk Software NASDAQ:CYBR for about $25 billion,...
Palo Alto Networks will buy Israeli peer CyberArk Software for about $25 billion, in its biggest deal yet, as CEO Nikesh Arora seeks to...
DXC Technology, a leading provider of global technology services, has entered into a strategic, multi-year partnership with Carnival Cruise...
Detailed price information for Carnival Corp (CCL-N) from The Globe and Mail including charting and trades.
Carnival Corporation (NYSE: CCL) posted a strong start to fiscal year 2025, reporting $5.81 billion in revenue and adjusted EPS of $0.13,...
Carnival Corporation & plc, the world's largest global cruise company, has released its 2024 10-K report, showcasing a significant recovery...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Carnival Corporation is http://www.carnivalcorp.com.
According to Rankiteo, Carnival Corporation’s AI-generated cybersecurity score is 576, reflecting their Very Poor security posture.
According to Rankiteo, Carnival Corporation currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Carnival Corporation is not certified under SOC 2 Type 1.
According to Rankiteo, Carnival Corporation does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Carnival Corporation is not listed as GDPR compliant.
According to Rankiteo, Carnival Corporation does not currently maintain PCI DSS compliance.
According to Rankiteo, Carnival Corporation is not compliant with HIPAA regulations.
According to Rankiteo,Carnival Corporation is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Carnival Corporation operates primarily in the Travel Arrangements industry.
Carnival Corporation employs approximately 2,980 people worldwide.
Carnival Corporation presently has no subsidiaries across any sectors.
Carnival Corporation’s official LinkedIn profile has approximately 104,710 followers.
Carnival Corporation is classified under the NAICS code 5615, which corresponds to Travel Arrangement and Reservation Services.
No, Carnival Corporation does not have a profile on Crunchbase.
Yes, Carnival Corporation maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/carnival-corporation.
As of November 27, 2025, Rankiteo reports that Carnival Corporation has experienced 8 cybersecurity incidents.
Carnival Corporation has an estimated 4,748 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach and Ransomware.
Title: Carnival Corporation Ransomware Attack
Description: Carnival Corporation, the world's largest cruise line operator suffered a ransomware attack involving unauthorized access and encryption of data.
Type: Ransomware Attack
Attack Vector: Unauthorized Access and Data Encryption
Title: Carnival Corporation and plc Data Breach
Description: Unauthorized access to email accounts detected on March 19, 2021, compromising personal information including names, addresses, phone numbers, passport numbers, and health information.
Date Detected: 2021-03-19
Date Publicly Disclosed: 2021-10-18
Type: Data Breach
Attack Vector: Email Account Compromise
Title: Carnival Corporation & PLC Data Breach
Description: Unauthorized access to employee email accounts potentially compromised personal information including names, addresses, Social Security numbers, and financial information.
Date Publicly Disclosed: 2020-03-03
Type: Data Breach
Attack Vector: Email Compromise
Title: Carnival Corporation and plc Data Breach
Description: The Maine Attorney General's Office reported a data breach involving Carnival Corporation and plc on October 16, 2020. The breach occurred on August 4, 2020, due to an external system breach (hacking), affecting approximately 37,500 individuals in total, with 8 residents specifically impacted. Notifications to potentially affected individuals began on October 13, 2020, following the discovery of the breach on September 29, 2020.
Date Detected: 2020-09-29
Date Publicly Disclosed: 2020-10-16
Type: Data Breach
Attack Vector: External System Breach (Hacking)
Title: Carnival Corporation and plc Data Breach (2020)
Description: The California Office of the Attorney General reported a data breach involving Carnival Corporation and plc on February 4, 2021. The breach occurred on August 15, 2020, due to unauthorized third-party access to the company's information technology systems, potentially impacting guest and employee personal information including names, addresses, passport numbers, and Social Security numbers.
Date Detected: 2020-08-15
Date Publicly Disclosed: 2021-02-04
Type: Data Breach
Attack Vector: Unauthorized third-party access
Title: Ransomware Attack on Carnival Corporation
Description: In August 2020, Miami (USA) based Carnival Corp. experienced a ransomware attack on their network. The hackers used the ransomware to attack one of the brands' IT systems and partly encrypt certain data files. As a result of this attack, there can be potential claims from guests, employees, shareholders, or regulatory agencies. This has been the second cyber-attack on Carnival Corp.
Date Detected: 2020-08
Type: ransomware
Title: Ransomware Attack on Princess Cruises & Holland America Cruise Line (Carnival Corp)
Description: In May 2019, shipping firm Princess Cruises & Holland America Cruise Line, a part of Carnival Corp., was hit by a ransomware attack in Florida, USA. Hackers gained unauthorized access to a company employee's account and encrypted a part of the company's IT systems. After compromising the account and monitoring the company's email traffic, the hacker allegedly identified potential targets.
Date Detected: 2019-05
Type: ransomware
Attack Vector: compromised employee account
Title: Carnival Corp. Data Breach and Ransomware Attack (March 2021)
Description: In March 2021, Carnival Corp. experienced a data breach where attackers used email to gain unauthorized access to the IT system of one of its cruise liners. The breach resulted in the exposure of personal information of staff and customers. The company detected the unauthorized access on March 19, 2021, with evidence suggesting a low likelihood of misuse of the stolen data. This was part of a ransomware-based attack that Carnival Corp. endured over a span of about two years.
Date Detected: 2021-03-19
Type: data breach
Attack Vector: email (phishing or credential compromise)
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Email Compromise, compromised employee account and email.

Data Compromised: Customer personal information, Employee personal information
Systems Affected: Information Technology Systems
Legal Liabilities: Lawsuits from visitors, employees, and shareholders

Data Compromised: Names, Addresses, Phone numbers, Passport numbers, Health information

Data Compromised: Names, Addresses, Social security numbers, Financial information

Data Compromised: Names, Addresses, Passport numbers, Social security numbers
Systems Affected: information technology systems
Identity Theft Risk: high (PII exposed)


Systems Affected: part of the company's IT systems

Data Compromised: Personal information of staff, Personal information of customers
Systems Affected: IT system of one cruise liner
Identity Theft Risk: low likelihood (as per company assessment)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Personal Information, , Names, Addresses, Phone Numbers, Passport Numbers, Health Information, , Names, Addresses, Social Security Numbers, Financial Information, , Personal Information, Pii, , Personal Information and .

Entity Name: Carnival Corporation
Entity Type: Cruise Line Operator
Industry: Travel and Tourism

Entity Name: Carnival Corporation and plc
Entity Type: Corporation
Industry: Travel and Leisure

Entity Name: Carnival Corporation & PLC
Entity Type: Corporation
Industry: Travel and Leisure

Entity Name: Carnival Corporation and plc
Entity Type: Corporation
Industry: Travel and Leisure
Customers Affected: 37500

Entity Name: Carnival Corporation and plc
Entity Type: Corporation
Industry: Travel & Leisure (Cruise Line)
Location: Global (HQ: USA/UK)

Entity Name: Carnival Corporation
Entity Type: corporation
Industry: travel/leisure (cruise line)
Location: Miami, USA

Entity Name: Princess Cruises
Entity Type: subsidiary
Industry: shipping/cruise line
Location: Florida, USA

Entity Name: Holland America Cruise Line
Entity Type: subsidiary
Industry: shipping/cruise line
Location: Florida, USA

Entity Name: Carnival Corp
Entity Type: parent company
Industry: shipping/cruise line
Location: Florida, USA

Entity Name: Carnival Corp.
Entity Type: corporation
Industry: cruise line / hospitality
Location: Miami, Florida, USA
Customers Affected: yes (number unspecified)

Type of Data Compromised: Personal information

Type of Data Compromised: Names, Addresses, Phone numbers, Passport numbers, Health information

Type of Data Compromised: Names, Addresses, Social security numbers, Financial information
Sensitivity of Data: High

Number of Records Exposed: 37500

Type of Data Compromised: Personal information, Pii
Sensitivity of Data: high
Data Exfiltration: likely
Personally Identifiable Information: namesaddressespassport numbersSocial Security numbers

Data Encryption: True

Data Encryption: True

Type of Data Compromised: Personal information
Sensitivity of Data: moderate (personal information)
Data Exfiltration: yes
Personally Identifiable Information: yes

Data Encryption: True

Data Encryption: True

Data Exfiltration: yes

Regulations Violated: California data breach notification laws (potential),
Regulatory Notifications: California Office of the Attorney General

Source: California Office of the Attorney General
Date Accessed: 2021-10-18

Source: California Office of the Attorney General

Source: California Office of the Attorney General
Date Accessed: 2021-02-04
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney GeneralDate Accessed: 2021-10-18, and Source: California Office of the Attorney General, and Source: Maine Attorney General's OfficeDate Accessed: 2020-10-16, and Source: California Office of the Attorney GeneralDate Accessed: 2021-02-04.

Investigation Status: detected (2021-03-19); ongoing or unresolved details unspecified

Entry Point: Email Compromise

Entry Point: compromised employee account
Reconnaissance Period: monitored email traffic
High Value Targets: identified potential targets
Data Sold on Dark Web: identified potential targets

Entry Point: email
High Value Targets: It System Of One Cruise Liner,
Data Sold on Dark Web: It System Of One Cruise Liner,
Most Recent Incident Detected: The most recent incident detected was on 2021-03-19.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2021-02-04.
Most Significant Data Compromised: The most significant data compromised in an incident were Customer Personal Information, Employee Personal Information, , names, addresses, phone numbers, passport numbers, health information, , names, addresses, Social Security numbers, financial information, , names, addresses, passport numbers, Social Security numbers, , , personal information of staff, personal information of customers and .
Most Significant System Affected: The most significant system affected in an incident was Information Technology Systems and information technology systems and and part of the company's IT systems and IT system of one cruise liner.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were passport numbers, Social Security numbers, addresses, health information, personal information of staff, personal information of customers, Employee Personal Information, phone numbers, financial information, Customer Personal Information and names.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 375.0.
Most Recent Source: The most recent source of information about an incident are Maine Attorney General's Office and California Office of the Attorney General.
Current Status of Most Recent Investigation: The current status of the most recent investigation is detected (2021-03-19); ongoing or unresolved details unspecified.
Most Recent Entry Point: The most recent entry point used by an initial access broker were an compromised employee account, Email Compromise and email.
Most Recent Reconnaissance Period: The most recent reconnaissance period for an incident was monitored email traffic.
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.