Company Details
hyatt-hotels
929
28,992
7211
hyatt.com
0
HYA_1585952
In-progress


HYATT Hotels Company CyberSecurity Posture
hyatt.comImmerse yourself with the places and people whose every mission is to make the most of your stay. You may be staying with us for an important meeting, to explore a new city, or to reconnect with old friends. No matter the reason, you’ll find yourself surrounded by enthusiastic insiders who delight in sharing the best of what each of our hotels and cities has to offer. We’ll make sure your needs are met, no matter your reason for visiting. Our restaurants and bars are bustling and invigorating. Our guest rooms are restful and reviving. Our people are inviting and in-the-know. At Hyatt hotels, you’re more than welcome.
Company Details
hyatt-hotels
929
28,992
7211
hyatt.com
0
HYA_1585952
In-progress
Between 650 and 699

HYATT Hotels Global Score (TPRM)XXXX

Description: Millions of Job Seekers’ Resumes Exposed in Foh&Boh Data Breach A major data exposure incident involving Foh&Boh, a U.S.-based hiring and onboarding platform for restaurants, hotels, and retailers, has left 5.4 million files primarily CVs and resumes publicly accessible via an unsecured AWS bucket. The breach, discovered by the Cybernews research team, exposed sensitive personal details that job applicants typically share with employers, including work history, contact information, and professional references. The platform serves high-profile clients such as Taco Bell, KFC, Omni Hotels & Resorts, Nordstrom, and Hyatt Grand, raising concerns about the potential misuse of the leaked data. While the dataset was secured after multiple attempts to contact Foh&Boh, the exposure could have enabled targeted phishing attacks, identity theft, and financial fraud. Researchers warned that cybercriminals could exploit the stolen information to craft highly personalized phishing emails, referencing specific job details or career interests to deceive victims. The data could also be weaponized for synthetic identity fraud, allowing attackers to open fraudulent bank accounts or apply for credit under victims’ names. Additionally, scammers might target financially vulnerable individuals with "get-rich-quick" schemes or impersonate past employers to extract further sensitive information. The incident underscores the risks of misconfigured cloud storage, with experts recommending stricter access controls, encryption, and retrospective log reviews to prevent unauthorized access. While the bucket is no longer publicly accessible, the long-term impact on affected job seekers remains unclear.


No incidents recorded for HYATT Hotels in 2026.
No incidents recorded for HYATT Hotels in 2026.
No incidents recorded for HYATT Hotels in 2026.
HYATT Hotels cyber incidents detection timeline including parent company and subsidiaries

Immerse yourself with the places and people whose every mission is to make the most of your stay. You may be staying with us for an important meeting, to explore a new city, or to reconnect with old friends. No matter the reason, you’ll find yourself surrounded by enthusiastic insiders who delight in sharing the best of what each of our hotels and cities has to offer. We’ll make sure your needs are met, no matter your reason for visiting. Our restaurants and bars are bustling and invigorating. Our guest rooms are restful and reviving. Our people are inviting and in-the-know. At Hyatt hotels, you’re more than welcome.


Since inception, Rotana has grown to be the region’s largest hospitality management company, and a brand that is widely recognized and admired. Rotana currently manages a portfolio of over 100 properties throughout the Middle East, Africa, Eastern Europe and Türkiye offering a wide range of servic

J D Wetherspoon is a leading pub operator in the UK and Ireland. Back in 1979, founder chairman Tim Martin opened the very first Wetherspoon – in Muswell Hill, north London. Today, Tim and the company run over 850 pubs and hotels, spread right across the UK and, more recently, Ireland. During its hi
The resorts and casinos of MGM Resorts International™ are some of the most famous in the world. Our 28 destinations are renowned for their winning combination of quality entertainment, luxurious facilities, and exceptional customer service. We are actively expanding our presence globally, with pot
With over 500 properties worldwide, Marriott Hotels has reimagined hospitality to exceed the expectations of business, group, and leisure travelers. Marriott Hotels, Marriott’s flagship brand of quality-tier, full-service hotels and resorts, provides consistent, dependable and genuinely caring

Established in 1975, ITC Hotels Limited has grown to encompass over 140+ hotels across 90+ destinations, solidifying its presence in the Indian subcontinent ITC Hotels seamlessly blends India’s rich tradition of hospitality with globally benchmarked services, offering a collection of hotels and res

Hyatt is guided by its purpose: to care for people so they can be their best. Hyatt’s portfolio includes 1,000+ hotel and all-inclusive properties in over 75 countries across 6 continents. Hyatt’s offerings include brands in the Timeless Collection, including Park Hyatt®, Grand Hyatt®, Hyatt Regency

Jumeirah, a global leader in luxury hospitality and a member of Dubai Holding, operates an exceptional portfolio of 31 properties, including 33 signature F&B restaurants, across the Middle East, Europe, Asia and Africa. In 1999, Jumeirah changed the face of luxury hospitality with the opening of t

IHG Hotels & Resorts [LON:IHG, NYSE:IHG (ADRs)] is a global hospitality company, with a purpose to provide True Hospitality for Good. With a family of 19 hotel brands and IHG One Rewards, one of the world's largest hotel loyalty programmes, IHG has over 6,300 open hotels in more than 100 countries,

Landry's is a multinational, diversified restaurant, hospitality, gaming, and entertainment leader based in Houston, Texas. The company operates more than 600 establishments around the world, including well-known concepts, such as Landry’s Seafood House, Bubba Gump Shrimp Co., Rainforest Cafe, Mo
.png)
In the early hours of a routine January morning in 2026, the cybersecurity world buzzed with alarming claims from a shadowy ransomware group...
The Hyatt Place Chelsea New York hotel, part of the Hyatt Hotels Corporation, appears to have suffered a ransomware attack and lost...
A ransomware gang, operating under the name NightSpire, has claimed it breached Hyatt's global hotel operations and exfiltrated sensitive...
Recent ransomware attacks exposed data at Hyatt Hotels and Ingram Micro, highlighting rising cyber threats and the urgent need for robust...
A ransomware gang has claimed a cyberattack on Hyatt, alleging stolen data and login credentials from the Chelsea New York hotel.
When I go to a hotel, there are plenty of things I worry about. Are there bed bugs? Was the prior guest disgusting? Dear God, is there room service?
Hyatt's updated forecast is due primarily to weaker performance in its distribution segment from cancellations in Jamaica.
The 6th Annual TribalHub Cybersecurity Summit has expanded to include a non-technical Executive Responsibility track, designed for leaders across tribal…
Ransomware has emerged as one of the most dangerous and disruptive cyber threats facing organizations on a global note.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of HYATT Hotels is https://www.hyatt.com/en-US/brands/hyatt.
According to Rankiteo, HYATT Hotels’s AI-generated cybersecurity score is 688, reflecting their Weak security posture.
According to Rankiteo, HYATT Hotels currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, HYATT Hotels has been affected by a supply chain cyber incident involving foh&boh, with the incident ID FOHKFCNORHYAOMN1769001235.
According to Rankiteo, HYATT Hotels is not certified under SOC 2 Type 1.
According to Rankiteo, HYATT Hotels does not hold a SOC 2 Type 2 certification.
According to Rankiteo, HYATT Hotels is not listed as GDPR compliant.
According to Rankiteo, HYATT Hotels does not currently maintain PCI DSS compliance.
According to Rankiteo, HYATT Hotels is not compliant with HIPAA regulations.
According to Rankiteo,HYATT Hotels is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
HYATT Hotels operates primarily in the Hospitality industry.
HYATT Hotels employs approximately 929 people worldwide.
HYATT Hotels presently has no subsidiaries across any sectors.
HYATT Hotels’s official LinkedIn profile has approximately 28,992 followers.
HYATT Hotels is classified under the NAICS code 7211, which corresponds to Traveler Accommodation.
No, HYATT Hotels does not have a profile on Crunchbase.
Yes, HYATT Hotels maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/hyatt-hotels.
As of January 21, 2026, Rankiteo reports that HYATT Hotels has experienced 1 cybersecurity incidents.
HYATT Hotels has an estimated 13,887 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with cybernews research team, and containment measures with aws bucket secured after multiple contact attempts..
Title: Millions of Job Seekers’ Resumes Exposed in Foh&Boh Data Breach
Description: A major data exposure incident involving Foh&Boh, a U.S.-based hiring and onboarding platform for restaurants, hotels, and retailers, has left 5.4 million files (primarily CVs and resumes) publicly accessible via an unsecured AWS bucket. The breach exposed sensitive personal details such as work history, contact information, and professional references. The dataset was secured after multiple attempts to contact Foh&Boh, but the exposure could enable targeted phishing attacks, identity theft, and financial fraud.
Type: Data Breach
Attack Vector: Misconfigured Cloud Storage
Vulnerability Exploited: Unsecured AWS bucket
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: 5.4 million files (CVs and resumes)
Systems Affected: AWS bucket
Brand Reputation Impact: Potential reputational damage to Foh&Boh and its clients
Identity Theft Risk: High (synthetic identity fraud, financial fraud)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Cvs, Resumes and .

Entity Name: Foh&Boh
Entity Type: Hiring and Onboarding Platform
Industry: Human Resources, Hospitality, Retail
Location: U.S.
Customers Affected: Job seekers (number unspecified)

Entity Name: Taco Bell
Entity Type: Restaurant Chain
Industry: Food Service
Location: U.S.

Entity Name: KFC
Entity Type: Restaurant Chain
Industry: Food Service
Location: U.S.

Entity Name: Omni Hotels & Resorts
Entity Type: Hotel Chain
Industry: Hospitality
Location: U.S.

Entity Name: Nordstrom
Entity Type: Retailer
Industry: Retail
Location: U.S.

Entity Name: Hyatt Grand
Entity Type: Hotel Chain
Industry: Hospitality
Location: U.S.

Third Party Assistance: Cybernews research team
Containment Measures: AWS bucket secured after multiple contact attempts
Third-Party Assistance: The company involves third-party assistance in incident response through Cybernews research team.

Type of Data Compromised: Cvs, Resumes
Number of Records Exposed: 5.4 million files
Sensitivity of Data: High (work history, contact information, professional references)
Personally Identifiable Information: Yes (contact information, work history, professional references)
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by aws bucket secured after multiple contact attempts.

Lessons Learned: Risks of misconfigured cloud storage; need for stricter access controls, encryption, and retrospective log reviews.

Recommendations: Stricter access controls, Encryption, Retrospective log reviewsStricter access controls, Encryption, Retrospective log reviewsStricter access controls, Encryption, Retrospective log reviews
Key Lessons Learned: The key lessons learned from past incidents are Risks of misconfigured cloud storage; need for stricter access controls, encryption, and retrospective log reviews.

Source: Cybernews
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Cybernews.

Root Causes: Misconfigured AWS bucket
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Cybernews research team.
Most Significant Data Compromised: The most significant data compromised in an incident was 5.4 million files (CVs and resumes).
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Cybernews research team.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was AWS bucket secured after multiple contact attempts.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was 5.4 million files (CVs and resumes).
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 5.4M.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Risks of misconfigured cloud storage; need for stricter access controls, encryption, and retrospective log reviews.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Retrospective log reviews, Encryption and Stricter access controls.
Most Recent Source: The most recent source of information about an incident is Cybernews.
.png)
SummaryA command injection vulnerability (CWE-78) has been found to exist in the `wrangler pages deploy` command. The issue occurs because the `--commit-hash` parameter is passed directly to a shell command without proper validation or sanitization, allowing an attacker with control of `--commit-hash` to execute arbitrary commands on the system running Wrangler. Root causeThe commitHash variable, derived from user input via the --commit-hash CLI argument, is interpolated directly into a shell command using template literals (e.g., execSync(`git show -s --format=%B ${commitHash}`)). Shell metacharacters are interpreted by the shell, enabling command execution. ImpactThis vulnerability is generally hard to exploit, as it requires --commit-hash to be attacker controlled. The vulnerability primarily affects CI/CD environments where `wrangler pages deploy` is used in automated pipelines and the --commit-hash parameter is populated from external, potentially untrusted sources. An attacker could exploit this to: * Run any shell command. * Exfiltrate environment variables. * Compromise the CI runner to install backdoors or modify build artifacts. Credits Disclosed responsibly by kny4hacker. Mitigation * Wrangler v4 users are requested to upgrade to Wrangler v4.59.1 or higher. * Wrangler v3 users are requested to upgrade to Wrangler v3.114.17 or higher. * Users on Wrangler v2 (EOL) should upgrade to a supported major version.
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are 7.1.14 and 7.2.4. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 8.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.