ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Storm International is a gaming business operator with a recognized focus on high-end gaming and service wherever we operate. The company has over 30 years of history and experience in running gaming and entertainment facilities in various countries all over the world. The operations vary in scale, from a stand-alone operation to full-scale entertainment complexes. Storm is a diversified gaming company with independent business-units managed by teams of our professionals locally, reporting to and receiving support from our central strategic, financial, IT, legal, HR, marketing and PR departments. We create a competitive advantage through a branded gaming experience – a strategy proven with the success of Shangri La casinos in the markets of different countries. Our technical expertise with our central IT department and own in-house developed Casino Management Systems are now recognized as one of the best in the world. Our current operation: Shangri La Tbilisi, Shangri La Yerevan, Storm Casinos Germany and online site: Shangrila.com.

Storm International A.I CyberSecurity Scoring

Storm International

Company Details

Linkedin ID:

storm-international

Employees number:

197

Number of followers:

1,679

NAICS:

7132

Industry Type:

Gambling Facilities and Casinos

Homepage:

storminternational.com

IP Addresses:

0

Company ID:

STO_3089923

Scan Status:

In-progress

AI scoreStorm International Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/storm-international.jpeg
Storm International Gambling Facilities and Casinos
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreStorm International Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/storm-international.jpeg
Storm International Gambling Facilities and Casinos
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Storm International Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

Storm International Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Storm International

Incidents vs Gambling Facilities and Casinos Industry Average (This Year)

No incidents recorded for Storm International in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Storm International in 2025.

Incident Types Storm International vs Gambling Facilities and Casinos Industry Avg (This Year)

No incidents recorded for Storm International in 2025.

Incident History — Storm International (X = Date, Y = Severity)

Storm International cyber incidents detection timeline including parent company and subsidiaries

Storm International Company Subsidiaries

SubsidiaryImage

Storm International is a gaming business operator with a recognized focus on high-end gaming and service wherever we operate. The company has over 30 years of history and experience in running gaming and entertainment facilities in various countries all over the world. The operations vary in scale, from a stand-alone operation to full-scale entertainment complexes. Storm is a diversified gaming company with independent business-units managed by teams of our professionals locally, reporting to and receiving support from our central strategic, financial, IT, legal, HR, marketing and PR departments. We create a competitive advantage through a branded gaming experience – a strategy proven with the success of Shangri La casinos in the markets of different countries. Our technical expertise with our central IT department and own in-house developed Casino Management Systems are now recognized as one of the best in the world. Our current operation: Shangri La Tbilisi, Shangri La Yerevan, Storm Casinos Germany and online site: Shangrila.com.

Loading...
similarCompanies

Storm International Similar Companies

Saskatchewan Indian Gaming Authority

SIGA provides first-class entertainment to patrons across Saskatchewan through our seven casino destinations. SIGA casinos deliver entertainment and excitement, offering slot machines, live table games, electronic table games, live on-stage entertainment and food and beverage services. SIGA employee

Fox Cub Games

Fox Cub Games is a profitable startup founded by a group of ex-Zynga employees. We are focusing on bringing mobile entertainment to the masses. Currently, Fox Cub Games is focused on creating mobile free-to-play Slots. Slots Vacation is our main live game, currently ranked #7 for Slots download

Buzz Bingo

Buzz Bingo is reigniting the nation's love of bingo and slots. Launched in 2018 with great support from Caledonia Investment PLC, Buzz Bingo offers bingo and slots that brings people together. With COVID-19 Secure clubs across Britain, the multi-award-winning buzzbingo.com, Safer Gambling tools ava

DC Office of Lottery and Gaming

Celebrating 40 Years in the Game! Founded in 1982, the DC Lottery is the District of Columbia Government agency that regulates the sale of gaming products and charitable gaming activities in the District of Columbia. Since its inception, the DC Lottery has awarded more than $3 billion in prizes to o

Savage Tournaments

Matt Savage is the world's foremost Poker Tournament Director, responsible for directing over 400 televised events such as the World Series of Poker, World Poker Tour and many others. Although Matt's favorite job is running the worlds largest poker tournaments and events he has developed many oth

Prairie Flower Casino

Located just south of the Omaha airport, Abbott Drive & Avenue H in Carter Lake, IA. Prairie Flower Casino is owned and operated by the Ponca Tribe of Nebraska. We are proud of our Mission: As diverse and caring allies of the Ponca Tribe of Nebraska, the Prairie Flower Casino team continually focus

newsone

Storm International CyberSecurity News

October 31, 2025 07:00 AM
Chinese hackers scanning, exploiting Cisco ASA firewalls used by governments worldwide

In a report shared with Recorded Future News, Unit 42 attributed the targeting of Cisco ASA devices to Storm-1849 — a China-based threat...

August 27, 2025 07:00 AM
Storm-0501 Exploits Entra ID to Exfiltrate and Delete Azure Data in Hybrid Cloud Attacks

The financially motivated threat actor known as Storm-0501 has been observed refining its tactics to conduct data exfiltration and extortion...

August 27, 2025 07:00 AM
Storm-0501’s evolving techniques lead to cloud-based ransomware

Microsoft Threat Intelligence has observed financially motivated threat actor Storm-0501 continuously evolving their campaigns to achieve...

August 15, 2025 07:00 AM
Article | Cybersecurity is being taken over by AI — for better or worse

LAS VEGAS — Artificial intelligence loomed large over two major cyber conferences last week, as both the public and private sectors have...

March 27, 2025 07:00 AM
The Perfect Storm: Why Power Plants Are Prime Targets For Cyberattacks

–Read the full story in Power Magazine. Sausalito, Calif. – Mar. 27, 2025. The power sector is on the frontlines of a global cybersecurity...

March 08, 2025 05:03 AM
WannaCry: How the Widespread Ransomware Changed Cybersecurity

This ransomware attack was the biggest cybersecurity event the world had ever seen in part because the impact was wider than the outbreak itself.

February 03, 2025 08:05 PM
Extreme Weather

Over the last 50 years, much of the U.S. has seen increases in prolonged periods of excessively high temperatures and an associated expansion of drought.

December 04, 2024 08:00 AM
Russian FSB Hackers Breach Pakistani APT Storm-0156

Hackers operating on behalf of Russian state intelligence have breached hackers operating out of Pakistan, latching onto their espionage campaigns.

October 28, 2024 07:00 AM
U.S. cybersecurity officials warn of foreign efforts to sow doubt and chaos around election

US intelligence officials have detailed Russian disinformation, Iranian hacking and leaking efforts, and a Chinese focus on congressional candidates critical...

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Storm International CyberSecurity History Information

Official Website of Storm International

The official website of Storm International is http://storminternational.com.

Storm International’s AI-Generated Cybersecurity Score

According to Rankiteo, Storm International’s AI-generated cybersecurity score is 767, reflecting their Fair security posture.

How many security badges does Storm International’ have ?

According to Rankiteo, Storm International currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Storm International have SOC 2 Type 1 certification ?

According to Rankiteo, Storm International is not certified under SOC 2 Type 1.

Does Storm International have SOC 2 Type 2 certification ?

According to Rankiteo, Storm International does not hold a SOC 2 Type 2 certification.

Does Storm International comply with GDPR ?

According to Rankiteo, Storm International is not listed as GDPR compliant.

Does Storm International have PCI DSS certification ?

According to Rankiteo, Storm International does not currently maintain PCI DSS compliance.

Does Storm International comply with HIPAA ?

According to Rankiteo, Storm International is not compliant with HIPAA regulations.

Does Storm International have ISO 27001 certification ?

According to Rankiteo,Storm International is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Storm International

Storm International operates primarily in the Gambling Facilities and Casinos industry.

Number of Employees at Storm International

Storm International employs approximately 197 people worldwide.

Subsidiaries Owned by Storm International

Storm International presently has no subsidiaries across any sectors.

Storm International’s LinkedIn Followers

Storm International’s official LinkedIn profile has approximately 1,679 followers.

NAICS Classification of Storm International

Storm International is classified under the NAICS code 7132, which corresponds to Gambling Industries.

Storm International’s Presence on Crunchbase

No, Storm International does not have a profile on Crunchbase.

Storm International’s Presence on LinkedIn

Yes, Storm International maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/storm-international.

Cybersecurity Incidents Involving Storm International

As of November 28, 2025, Rankiteo reports that Storm International has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

Storm International has an estimated 896 peer or competitor companies worldwide.

Storm International CyberSecurity History Information

How many cyber incidents has Storm International faced ?

Total Incidents: According to Rankiteo, Storm International has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at Storm International ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=storm-international' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge