
Cowboys Casino
EAT. DRINK. PLAY. 🤠 Open 7 days a week 9:30am-5am. 24/7 Poker Room. HOTTEST HOCKEY NIGHT AFTER PARTY 🔥 🍻Daily Happy Hour 4pm-8pm 📍Victoria Park



EAT. DRINK. PLAY. 🤠 Open 7 days a week 9:30am-5am. 24/7 Poker Room. HOTTEST HOCKEY NIGHT AFTER PARTY 🔥 🍻Daily Happy Hour 4pm-8pm 📍Victoria Park

BJs Bingo is a family run group of purpose built modern Bingo clubs, consider by many to be one of the leading independent operators. We are highly focused on our customer service & experience, opening our first club in Reading in 2002, followed by Leigh in 2003 & then Kitt's Green in 2007. We are market leaders in our areas and pride ourselves on our innovative & technology driven approach to the industry. We are often a testing house for major suppliers for latest equipment and ideas. We have also developed our own sister company Shipley Creative which provides digital media & print to the whole gaming industry and beyond!
Security & Compliance Standards Overview












No incidents recorded for Cowboys Casino in 2025.
No incidents recorded for BJ's Bingo in 2025.
Cowboys Casino cyber incidents detection timeline including parent company and subsidiaries
BJ's Bingo cyber incidents detection timeline including parent company and subsidiaries
Last 3 Security & Risk Events by Company
NXLog Agent before 6.11 can load a file specified by the OPENSSL_CONF environment variable.
uriparser through 0.9.9 allows unbounded recursion and stack consumption, as demonstrated by ParseMustBeSegmentNzNc with large input containing many commas.
A vulnerability was detected in Mayan EDMS up to 4.10.1. The affected element is an unknown function of the file /authentication/. The manipulation results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. Upgrading to version 4.10.2 is sufficient to fix this issue. You should upgrade the affected component. The vendor confirms that this is "[f]ixed in version 4.10.2". Furthermore, that "[b]ackports for older versions in process and will be out as soon as their respective CI pipelines complete."
MJML through 4.18.0 allows mj-include directory traversal to test file existence and (in the type="css" case) read files. NOTE: this issue exists because of an incomplete fix for CVE-2020-12827.
A half-blind Server Side Request Forgery (SSRF) vulnerability exists in kube-controller-manager when using the in-tree Portworx StorageClass. This vulnerability allows authorized users to leak arbitrary information from unprotected endpoints in the control plane’s host network (including link-local or loopback services).