Comparison Overview

Pasha International

VS

Wind Creek Chicago Southland

Pasha International

None
Last Update: 2025-11-27

Presided by Vedat Erbas, Pasha Group was established as a legal entity in 2005 as Paramaribo Tourism Ltd. With its 1000 employees at present, the Group keeps growing, owing to the high quality and outstanding service principle it has adopted in tourism and entertainment. Today, Pasha Group has an essential place in the sector thanks to Golden Tulip Nicosia Hotel & Casino & Spa, a five star facility located in Nicosia, the capital of TRNC, Grand Pasha Kyrenia Hotel & Casino & Spa, a five star facility in Kyrenia, Acapulco Casino located in Kyrenia as well and Pegasus Casino situated in Svelingrad in Bulgaria. Pasha Group along with its President of Board of Directors Mr. Vedat Erbas and experienced directors, who are open and forward looking for new investments, continues its endeavours keeping the service quality at its highest in each sector it is present.

NAICS: 7132
NAICS Definition: Gambling Industries
Employees: 108
Subsidiaries: 1
12-month incidents
0
Known data breaches
0
Attack type number
0

Wind Creek Chicago Southland

17300 s Halsted St, None, East Hazel Crest, Illinois, US, 60473
Last Update: 2025-11-27

Leading the industry as one of the fastest-growing casino resort brands, Wind Creek Hospitality has multiple properties located throughout the United States and the Caribbean—including Wind Creek Chicago Southland (slated to open in 2024!). Once open, Wind Creek Chicago Southland will be an entertainment enthusiast’s dream destination—providing Guests with world-class gaming experiences, an onsite hotel, dining, bars, an event facility, and more. With so much to do on property, there’s a wide array of departments to choose from. We strive to not only provide a first-class experience to our Guests, but also to our Team Members. Wind Creek is a Purpose driven company and as such, we aspire to make a positive impact in the lives of people—including our Guests, our Community and most importantly, our Team Members.

NAICS: 7132
NAICS Definition: Gambling Industries
Employees: None
Subsidiaries: 0
12-month incidents
0
Known data breaches
0
Attack type number
0

Compliance Badges Comparison

Security & Compliance Standards Overview

https://images.rankiteo.com/companyimages/pasha-international.jpeg
Pasha International
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
https://images.rankiteo.com/companyimages/windcreek-chicagosouthland.jpeg
Wind Creek Chicago Southland
ISO 27001
ISO 27001 certification not verified
Not verified
SOC2 Type 1
SOC2 Type 1 certification not verified
Not verified
SOC2 Type 2
SOC2 Type 2 certification not verified
Not verified
GDPR
GDPR certification not verified
Not verified
PCI DSS
PCI DSS certification not verified
Not verified
HIPAA
HIPAA certification not verified
Not verified
Compliance Summary
Pasha International
100%
Compliance Rate
0/4 Standards Verified
Wind Creek Chicago Southland
0%
Compliance Rate
0/4 Standards Verified

Benchmark & Cyber Underwriting Signals

Incidents vs Gambling Facilities and Casinos Industry Average (This Year)

No incidents recorded for Pasha International in 2025.

Incidents vs Gambling Facilities and Casinos Industry Average (This Year)

No incidents recorded for Wind Creek Chicago Southland in 2025.

Incident History — Pasha International (X = Date, Y = Severity)

Pasha International cyber incidents detection timeline including parent company and subsidiaries

Incident History — Wind Creek Chicago Southland (X = Date, Y = Severity)

Wind Creek Chicago Southland cyber incidents detection timeline including parent company and subsidiaries

Notable Incidents

Last 3 Security & Risk Events by Company

https://images.rankiteo.com/companyimages/pasha-international.jpeg
Pasha International
Incidents

No Incident

https://images.rankiteo.com/companyimages/windcreek-chicagosouthland.jpeg
Wind Creek Chicago Southland
Incidents

No Incident

FAQ

Both Pasha International company and Wind Creek Chicago Southland company demonstrate a comparable AI Cybersecurity Score, with strong governance and monitoring frameworks in place.

Historically, Wind Creek Chicago Southland company has disclosed a higher number of cyber incidents compared to Pasha International company.

In the current year, Wind Creek Chicago Southland company and Pasha International company have not reported any cyber incidents.

Neither Wind Creek Chicago Southland company nor Pasha International company has reported experiencing a ransomware attack publicly.

Neither Wind Creek Chicago Southland company nor Pasha International company has reported experiencing a data breach publicly.

Neither Wind Creek Chicago Southland company nor Pasha International company has reported experiencing targeted cyberattacks publicly.

Neither Pasha International company nor Wind Creek Chicago Southland company has reported experiencing or disclosing vulnerabilities publicly.

Neither Pasha International nor Wind Creek Chicago Southland holds any compliance certifications.

Neither company holds any compliance certifications.

Pasha International company has more subsidiaries worldwide compared to Wind Creek Chicago Southland company.

Neither Pasha International nor Wind Creek Chicago Southland holds SOC 2 Type 1 certification.

Neither Pasha International nor Wind Creek Chicago Southland holds SOC 2 Type 2 certification.

Neither Pasha International nor Wind Creek Chicago Southland holds ISO 27001 certification.

Neither Pasha International nor Wind Creek Chicago Southland holds PCI DSS certification.

Neither Pasha International nor Wind Creek Chicago Southland holds HIPAA certification.

Neither Pasha International nor Wind Creek Chicago Southland holds GDPR certification.

Latest Global CVEs (Not Company-Specific)

Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H