Company Details
thecal
77
449
713
thecal.com
0
CAL_1006883
In-progress

California Hotel & Casino Company CyberSecurity Posture
thecal.comThe hospitality of the Hawaiian Islands will flower during your visit to the California Hotel Casino. We like to say "Aloha" is spoken fluently here, and our guests enjoy many Hawaiian touches, ranging from dining delicacies such as oxtail soup to the colorful decor reminiscent of the islands' lush, tropical beauty.
Company Details
thecal
77
449
713
thecal.com
0
CAL_1006883
In-progress
Between 750 and 799

CHC Global Score (TPRM)XXXX

Description: Boyd Gaming Corporation, a Las Vegas-based casino operator, suffered a cyberattack resulting in unauthorized access to its internal IT systems. The breach led to the theft of sensitive data, primarily employee information and a limited number of other individuals' details. While the attack did not disrupt business operations or casino properties, the exfiltrated data included confidential employee records. The company has engaged federal law enforcement and external cybersecurity experts to investigate and mitigate the incident. Boyd Gaming holds cybersecurity insurance to cover related costs, including forensic analysis, legal claims, and regulatory fines. Despite the breach, the company does not anticipate a material adverse financial impact. The incident aligns with a broader trend of cyberattacks targeting Las Vegas casinos and government entities, though no group has claimed responsibility for this specific attack. Notification of affected parties and regulatory bodies is underway as part of the response protocol.
Description: Boyd Gaming Corp., a major Las Vegas-based casino operator with 11 properties in the Las Vegas Valley and additional locations across 10 U.S. states, suffered a cyberattack in early September 2023 (reportedly between **September 5–7**). The breach involved unauthorized access and exfiltration of **employee data and records tied to a limited number of other individuals**, including customers and former employees. The company delayed notifying victims, with lawsuits alleging negligence in safeguarding personal information and failing to disclose the breach promptly. Multiple class-action lawsuits—filed by employees, ex-employees, and customers from Nevada, Texas, Louisiana, and Ohio—accuse Boyd of **breach of implied contract, negligence, invasion of privacy, and unjust enrichment**. The SEC filing confirmed data theft, but Boyd has not clarified whether ransomware was involved or if a ransom was paid. The incident impacts **thousands of individuals**, raising concerns over financial fraud, identity theft, and reputational damage to the company. Plaintiffs claim Boyd **intentionally obscured the breach’s scope**, including how hackers accessed sensitive data and the duration of unauthorized access.
Description: Boyd Gaming Corporation, a major U.S. gambling and hospitality company operating 28 casinos and online gaming platforms, suffered a data breach in early September 2025. An unauthorized third party gained access to its internal IT systems between **September 5–7, 2025**, exfiltrating sensitive personally identifiable information (PII) of customers. The compromised data included **names, addresses, Social Security numbers, driver’s license numbers, government-issued ID numbers (e.g., passports), and dates of birth**. The breach impacted thousands of individuals across multiple states, with **4,300 affected in Texas alone**. Boyd Gaming notified regulators, attorney general offices, and the **U.S. Securities and Exchange Commission (SEC)**. While the company offered **two years of free credit monitoring and identity protection services**, the exposure of high-risk PII (e.g., SSNs, driver’s licenses) poses significant long-term risks, including **identity theft, financial fraud, and unauthorized account access**. Legal firms are investigating potential class-action lawsuits, as affected individuals may be entitled to compensation for the **unauthorized exposure of their sensitive data**, even if no immediate fraud has occurred. The breach underscores vulnerabilities in Boyd Gaming’s cybersecurity defenses, particularly given the **targeted extraction of highly sensitive customer records** by external threat actors.
Description: Boyd Gaming Corporation, a major casino and entertainment company, suffered a cyber breach in September 2025 where unauthorized actors infiltrated its internal systems and exfiltrated confidential data. The stolen information included employee records (such as Social Security numbers) and data from a limited number of other individuals. While casino and hotel operations remained unaffected, the breach triggered legal action from a former employee, Scott Levy, who filed a class-action lawsuit alleging negligence, breach of implied contract, and violations of Nevada’s Consumer Fraud Act. The lawsuit argues Boyd’s security measures were inadequate, as the company admitted personal data was stolen—not merely accessed. The incident follows a trend of escalating cyberattacks on the gaming sector, with prior high-profile cases like Caesars Entertainment (paid $15M ransom) and MGM Resorts (lost ~$100M in disruptions). Boyd is cooperating with cybersecurity experts and law enforcement, but the breach underscores growing legal, financial, and reputational risks tied to data exposure in the industry.
Description: Boyd Gaming, a major casino entertainment company, suffered a cyber breach where an unauthorized third party infiltrated its IT systems and exfiltrated sensitive data belonging to current/former employees and a limited number of customers. The breach has triggered five class-action lawsuits, with plaintiffs—including employees and customers—alleging negligence in cybersecurity safeguards. The stolen data reportedly includes personal information, leading to increased spam calls and phishing attempts for affected individuals. While Boyd Gaming confirmed the incident in an SEC filing and claimed casino operations remained unaffected, it has not disclosed the exact timeline, scope of stolen data, or whether a ransom was paid. The company is relying on cybersecurity insurance to cover investigation costs, lawsuits, and potential regulatory fines. The breach aligns with a broader trend of cyberattacks targeting Nevada’s gaming industry, following similar incidents at MGM Resorts and Caesars Entertainment in 2023.
Description: Boyd Gaming suffered a cyberattack where hackers infiltrated its IT systems, compromising sensitive data of **current and former employees** as well as **a limited number of customers**. The breach led to **five class-action lawsuits**, with plaintiffs alleging negligence in cybersecurity measures. Affected individuals reported **increased spam calls and phishing attempts**, while the company failed to notify some victims directly. Though casino operations remained unaffected, the breach exposed **personal and employment-related data**, triggering legal, financial, and reputational repercussions. The incident aligns with a broader trend of cyberattacks targeting Nevada’s gaming sector, including prior breaches at MGM Resorts and Caesars Entertainment. Boyd Gaming acknowledged the attack in a regulatory filing but did not disclose whether ransomware was involved or if a ransom was paid. The company is relying on cybersecurity insurance to cover costs, including investigations and potential penalties.


No incidents recorded for California Hotel & Casino in 2025.
No incidents recorded for California Hotel & Casino in 2025.
No incidents recorded for California Hotel & Casino in 2025.
CHC cyber incidents detection timeline including parent company and subsidiaries

The hospitality of the Hawaiian Islands will flower during your visit to the California Hotel Casino. We like to say "Aloha" is spoken fluently here, and our guests enjoy many Hawaiian touches, ranging from dining delicacies such as oxtail soup to the colorful decor reminiscent of the islands' lush, tropical beauty.


Boomtown Casino & Hotel New Orleans, located on the West Bank of the Mississippi in New Orleans and approximately 15 minutes from the French Quarter, opened in 1994 and features a 30,000-square-foot casino with more than 1,200 slot machines and 31 table games, including a non-smoking slot area, high

Santa Anita Park is a thoroughbred racetrack in Arcadia, California, United States. It offers some of the prominent racing events in the United States during the autumn and in winter. The track is home to numerous prestigious races including both the Santa Anita Derby and the Santa Anita Handicap. S

River City Casino & Hotel, which opened in March 2010, is St. Louis' newest gateway to an exciting entertainment experience. Located approximately 10 miles south of downtown St. Louis, in the community of Lemay, the multi-use complex includes a 90,000-square-foot casino with the best slot machines

Tipbet is a Malta-based gambling company. Its headquarters are in Gzira and the company has grown significantly since its inception in 1995. With a business heavily focused on the online market, there are also fully branded physical betting shops that are run by franchisers. The land-based operation

VegasMaster is a fun, first-class online gambling magazine, news source and informational hub. We are a diverse team of gambling industry veterans who understand that there is so much more to the world of online and land-based betting than simply being lucky. We offer something for everyone. Wheth

Opened in 1989, Robinson Rancheria Resort & Casino is owned and operated by the Robinson Rancheria Band of Pomo Indians. Sitting on the beautiful north shore of Clear Lake in Lake County, Robinson Rancheria offers a true resort experience by providing superior comfort guests not only expect, but de
.png)
San Diego's Hotel del Coronado just kicked off "A Holiday in Oz" for the 2025 festive season.
Oram Hotels partners with UC San Diego Stuart Collection to launch an artist residency program, helping make downtown San Diego a cultural...
Correction: An earlier version of this story incorrectly stated that Mission Inn Foundation President Jennifer Gamble confirmed the hotel is...
Azul Hospitality Group debuts EMRE, in the Ava Hotel, Curio Collection by Hilton, its signature restaurant helmed by Chef Julien Asseo.
San Juan Capistrano, one of California's oldest towns, blends rich Spanish mission history with a thriving modern food and arts scene.
Lifestyle hotel operator PM Hotel Group has been selected to manage Avila Village Inn, a boutique property in Avila Beach, Calif.
A Luxury California Hotel Faces Daily Fines Over $11,000 for Privatizing Public Beach Near Resort · Hotel Laguna was accused of blocking public beach access...
Sonesta International Hotels has unveiled the opening of Red Lion Inn & Suites Lemoore in California.
With several global sporting events in the next two and a half years, California has a lot on its plate.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of California Hotel & Casino is http://thecal.com.
According to Rankiteo, California Hotel & Casino’s AI-generated cybersecurity score is 766, reflecting their Fair security posture.
According to Rankiteo, California Hotel & Casino currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, California Hotel & Casino is not certified under SOC 2 Type 1.
According to Rankiteo, California Hotel & Casino does not hold a SOC 2 Type 2 certification.
According to Rankiteo, California Hotel & Casino is not listed as GDPR compliant.
According to Rankiteo, California Hotel & Casino does not currently maintain PCI DSS compliance.
According to Rankiteo, California Hotel & Casino is not compliant with HIPAA regulations.
According to Rankiteo,California Hotel & Casino is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
California Hotel & Casino operates primarily in the Gambling Facilities and Casinos industry.
California Hotel & Casino employs approximately 77 people worldwide.
California Hotel & Casino presently has no subsidiaries across any sectors.
California Hotel & Casino’s official LinkedIn profile has approximately 449 followers.
No, California Hotel & Casino does not have a profile on Crunchbase.
Yes, California Hotel & Casino maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/thecal.
As of November 27, 2025, Rankiteo reports that California Hotel & Casino has experienced 6 cybersecurity incidents.
California Hotel & Casino has an estimated 894 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an third party assistance with federal law enforcement, third party assistance with external cybersecurity experts, and and communication strategy with sec form 8-k filing, communication strategy with regulatory notifications, communication strategy with affected party notifications, and and third party assistance with leading external cybersecurity experts, and and communication strategy with sec filing, communication strategy with notifying affected individuals, communication strategy with regulatory disclosures, and incident response plan activated with yes (investigation conducted), and remediation measures with notification of affected individuals, remediation measures with regulatory disclosures (sec filing), and communication strategy with delayed victim notification, communication strategy with sec filing on 2023-09-23, and and third party assistance with leading cybersecurity experts, and and communication strategy with public disclosure via securities regulators filing, and incident response plan activated with yes (with assistance from external cybersecurity experts), and third party assistance with yes (leading external cybersecurity experts), and law enforcement notified with yes (cooperation with federal law enforcement), and communication strategy with sec filing (2023-09-23), communication strategy with no direct notification to all affected individuals (e.g., scott levy not notified), and incident response plan activated with yes (with external cybersecurity experts), and third party assistance with yes (external cybersecurity experts), and law enforcement notified with yes (federal law enforcement), and recovery measures with offered two years of free credit monitoring and identity protection (via idx, including dark web monitoring and identity recovery services), and communication strategy with notifications sent to affected individuals, regulators, and state attorney general offices; sec filing..
Title: Cyberattack on Boyd Gaming Corporation
Description: Las Vegas-based casino operator Boyd Gaming Corporation confirmed a cyberattack resulting in unauthorized access to its internal IT systems and theft of sensitive data, including employee information. The breach was disclosed in a Form 8-K filing to the U.S. SEC. While no operational disruptions occurred, data exfiltration included employee and limited third-party information. Federal law enforcement and external cybersecurity experts are investigating. The company expects its cybersecurity insurance to cover related costs and does not anticipate material financial impact.
Date Publicly Disclosed: 2025-09-24
Type: Data Breach
Title: Boyd Gaming Corporation Data Breach (2025)
Description: Boyd Gaming Corporation, a major casino and entertainment company, disclosed a cybersecurity breach in September 2025 where unauthorized actors stole confidential employee and customer data. The breach prompted a lawsuit alleging negligence, while the company assured that casino and hotel operations remained unaffected. Boyd enlisted external cybersecurity experts and federal law enforcement to investigate the incident, which is part of a broader trend of cyberattacks targeting the gaming sector.
Date Publicly Disclosed: 2025-09-23
Type: Data Breach
Motivation: Data TheftPotential Financial GainFraud/Identity Theft
Title: Boyd Gaming Corp. Data Breach (September 2023)
Description: A cyberattack against Boyd Gaming Corp., a Las Vegas-based casino company, resulted in the theft of personally identifying information (PII) of employees, ex-employees, and customers. The breach was discovered in early September 2023, with unauthorized activity occurring between September 5–7. The company delayed notifying victims and has faced multiple class-action lawsuits alleging negligence, failure to safeguard data, and lack of transparency. The attackers exfiltrated employee data and records tied to a limited number of other individuals. Boyd operates 11 casinos in Las Vegas and nearly a dozen other gaming locations across 10 U.S. states.
Date Detected: 2023-09-06
Date Publicly Disclosed: 2023-09-23
Type: Data Breach
Motivation: Data TheftFinancial Gain
Title: Boyd Gaming Data Breach and Multiple Lawsuits
Description: Boyd Gaming admitted that hackers infiltrated its IT infrastructure, compromising sensitive data involving employees and other individuals connected to the company. The breach led to multiple class-action lawsuits alleging inadequate cybersecurity measures. The company acknowledged the attack on September 23, confirming unauthorized access to employee and limited third-party data. Casino operations remained unaffected, and Boyd Gaming is relying on cybersecurity insurance to cover breach-related costs.
Date Publicly Disclosed: 2023-09-23
Type: Data Breach
Title: Boyd Gaming Data Breach and Class-Action Lawsuits
Description: Boyd Gaming admitted that hackers breached their IT systems and stole sensitive employee and customer data, leading to five class-action lawsuits. The breach exposed personal information, with plaintiffs alleging inadequate cybersecurity measures. The company acknowledged the incident in an SEC filing and stated it is cooperating with law enforcement and cybersecurity experts. Casino operations were reportedly unaffected, and Boyd believes its cybersecurity insurance will cover related costs, including lawsuits and potential fines. The exact timeline, data types stolen, and whether a ransom was paid remain undisclosed.
Date Publicly Disclosed: 2023-09-23
Type: Data Breach
Motivation: Financial GainData Theft
Title: Boyd Gaming Corporation Data Breach (2025)
Description: Boyd Gaming Corporation, a major American gambling and hospitality company, experienced a cybersecurity incident in September 2025 involving unauthorized access to its internal IT systems. An unauthorized third party exfiltrated sensitive personally identifiable information (PII) of individuals, including names, addresses, Social Security numbers, driver’s license numbers, government-issued ID numbers, and dates of birth. The breach impacted at least 4,325 individuals across multiple states, with notifications sent to regulators, attorney general offices, and the U.S. Securities and Exchange Commission (SEC). Boyd Gaming is offering two years of free credit monitoring and identity protection services to affected individuals.
Date Detected: 2025-09-06
Type: Data Breach
Threat Actor: Unauthorized third party
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Employee information, Limited third-party data
Systems Affected: Internal IT Systems
Downtime: None
Operational Impact: None
Identity Theft Risk: Potential (Employee Data)

Data Compromised: Employee records, Customer records, Social security numbers, Personally identifiable information (pii)
Systems Affected: Internal IT Systems
Operational Impact: None (casino and hotel operations remained unaffected)
Brand Reputation Impact: Moderate (legal action and regulatory scrutiny)
Legal Liabilities: Lawsuit filed by former employee (Scott Levy)Potential class actionAllegations of negligence, breach of implied contract, unjust enrichment, and violations of the Nevada Consumer Fraud Act
Identity Theft Risk: High (Social Security numbers and sensitive data exposed)

Data Compromised: Personally identifiable information (pii), Employee records
Customer Complaints: ['Multiple Lawsuits Filed']
Brand Reputation Impact: Negative PublicityLoss of Trust
Legal Liabilities: Four Class-Action Lawsuits (Nevada, Louisiana, Texas, Ohio)Allegations of NegligenceBreach of Implied ContractInvasion of Privacy
Identity Theft Risk: ['High (PII Exposed)']

Systems Affected: IT infrastructure
Operational Impact: None (casino operations remained unaffected)
Customer Complaints: True
Legal Liabilities: Multiple class-action lawsuits filed
Identity Theft Risk: True

Data Compromised: Employee data, Customer data
Systems Affected: Internal IT Systems
Operational Impact: None (casino operations unaffected)
Customer Complaints: Increase in spam calls and phishing texts reported by at least one plaintiff (Scott Levy)
Brand Reputation Impact: Negative (multiple class-action lawsuits filed, allegations of inadequate cybersecurity)
Legal Liabilities: Five class-action lawsuits filedPotential regulatory fines
Identity Theft Risk: High (plaintiffs report increased spam/phishing attempts)

Data Compromised: Name of individual, Address, Social security number, Driver’s license number, Government-issued id number (e.g., passport, state id card), Date of birth
Systems Affected: Internal IT systems
Brand Reputation Impact: Potential reputational damage due to exposure of sensitive customer data
Legal Liabilities: Potential lawsuits and regulatory scrutiny (e.g., SEC, state attorneys general)
Identity Theft Risk: High (due to exposure of SSNs, driver’s license numbers, and other PII)
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Employee Information, Third-Party Personal Data, , Employee Data, Customer Data, Social Security Numbers, Pii, , Personally Identifiable Information (Pii), Employee Records, , Employee Data, Limited Third-Party Data, , Employee Data, Customer Data, Personally Identifiable Information (Pii), , Personally Identifiable Information (Pii), Sensitive Identification Documents and .

Entity Name: Boyd Gaming Corporation
Entity Type: Public Company
Industry: Gaming/Hospitality
Location: Las Vegas, Nevada, USA
Size: 16,000+ employees, $3.9B annual revenue (2024)
Customers Affected: Limited number of individuals (beyond employees)

Entity Name: Boyd Gaming Corporation
Entity Type: Public Company
Industry: Gaming, Hospitality, Entertainment
Location: Las Vegas, Nevada, USA
Size: Large (operates 11 casinos in Las Vegas Valley and nearly a dozen more across 10 states)
Customers Affected: Limited number of individuals (employees and customers)

Entity Name: Boyd Gaming Corp.
Entity Type: Corporation
Industry: Gaming/Hospitality
Location: Las Vegas, Nevada, USA
Size: Large (11 casinos in Las Vegas Valley, ~12 other locations across 10 states)
Customers Affected: Thousands (employees, ex-employees, and customers)

Entity Name: Boyd Gaming
Entity Type: Corporation
Industry: Gaming/Hospitality
Location: Las Vegas, Nevada, USA
Customers Affected: True

Entity Name: Boyd Gaming
Entity Type: Public Company
Industry: Gaming/Hospitality
Location: Las Vegas, Nevada, USA
Customers Affected: Limited number of individuals (exact count undisclosed)

Entity Name: Boyd Gaming Corporation
Entity Type: Public Company
Industry: Gambling and Hospitality
Location: Paradise, Nevada, USA
Size: Large (28 casinos and entertainment properties across 10 states, plus online gaming operations)
Customers Affected: 4,325+ (e.g., 4,300 in Texas, 25 in Maine)

Incident Response Plan Activated: True
Third Party Assistance: Federal Law Enforcement, External Cybersecurity Experts.
Communication Strategy: SEC Form 8-K FilingRegulatory NotificationsAffected Party Notifications

Incident Response Plan Activated: True
Third Party Assistance: Leading External Cybersecurity Experts.
Communication Strategy: SEC filingNotifying affected individualsRegulatory disclosures

Incident Response Plan Activated: Yes (Investigation Conducted)
Remediation Measures: Notification of Affected IndividualsRegulatory Disclosures (SEC Filing)
Communication Strategy: Delayed Victim NotificationSEC Filing on 2023-09-23

Incident Response Plan Activated: True
Third Party Assistance: Leading Cybersecurity Experts.
Communication Strategy: Public disclosure via securities regulators filing

Incident Response Plan Activated: Yes (with assistance from external cybersecurity experts)
Third Party Assistance: Yes (leading external cybersecurity experts)
Law Enforcement Notified: Yes (cooperation with federal law enforcement)
Communication Strategy: SEC filing (2023-09-23)No direct notification to all affected individuals (e.g., Scott Levy not notified)

Incident Response Plan Activated: Yes (with external cybersecurity experts)
Third Party Assistance: Yes (external cybersecurity experts)
Law Enforcement Notified: Yes (federal law enforcement)
Recovery Measures: Offered two years of free credit monitoring and identity protection (via IDX, including dark web monitoring and identity recovery services)
Communication Strategy: Notifications sent to affected individuals, regulators, and state attorney general offices; SEC filing
Incident Response Plan: The company's incident response plan is described as Yes (Investigation Conducted), , Yes (with assistance from external cybersecurity experts), Yes (with external cybersecurity experts).
Third-Party Assistance: The company involves third-party assistance in incident response through Federal Law Enforcement, External Cybersecurity Experts, , Leading external cybersecurity experts, , Leading cybersecurity experts, , Yes (leading external cybersecurity experts), Yes (external cybersecurity experts).

Type of Data Compromised: Employee information, Third-party personal data
Sensitivity of Data: High (Personally Identifiable Information)

Type of Data Compromised: Employee data, Customer data, Social security numbers, Pii
Sensitivity of Data: High

Type of Data Compromised: Personally identifiable information (pii), Employee records
Number of Records Exposed: Several Thousand
Sensitivity of Data: High (PII)
Data Exfiltration: Yes
Personally Identifiable Information: NamesEmployee DataCustomer Data (potential)

Type of Data Compromised: Employee data, Limited third-party data
Sensitivity of Data: High (personal information)

Type of Data Compromised: Employee data, Customer data, Personally identifiable information (pii)
Sensitivity of Data: High (described as a 'treasure trove' of private information)
Data Exfiltration: Yes
Personally Identifiable Information: Yes

Type of Data Compromised: Personally identifiable information (pii), Sensitive identification documents
Number of Records Exposed: 4,325+ (exact total undisclosed)
Sensitivity of Data: High (includes SSNs, driver’s license numbers, and government-issued IDs)
Data Exfiltration: Yes
Personally Identifiable Information: Yes (names, addresses, SSNs, driver’s license numbers, government-issued IDs, dates of birth)
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Notification of Affected Individuals, Regulatory Disclosures (SEC Filing), .

Data Exfiltration: True

Data Exfiltration: True

Data Exfiltration: Yes

Data Exfiltration: True

Data Exfiltration: Yes

Data Exfiltration: Yes
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Offered two years of free credit monitoring and identity protection (via IDX, including dark web monitoring and identity recovery services).

Regulatory Notifications: U.S. Securities and Exchange Commission (SEC)Relevant Government Agencies

Regulations Violated: Potential violations of the Nevada Consumer Fraud Act,
Legal Actions: Lawsuit by Scott Levy (former employee), Potential class action,
Regulatory Notifications: U.S. Securities and Exchange Commission (SEC)Regulators and government agencies (ongoing)

Legal Actions: Four Class-Action Lawsuits (Filed in U.S. District Court, Nevada),
Regulatory Notifications: SEC Filing (2023-09-23)Planned Notifications to Regulators/Government Agencies

Legal Actions: Five class-action lawsuits filed by four law firms,
Regulatory Notifications: Securities regulators filing

Legal Actions: Five class-action lawsuits filed (as of reporting),
Regulatory Notifications: SEC filing (2023-09-23)

Legal Actions: Potential class-action lawsuits (under investigation by Shamis & Gentile P.A.)
Regulatory Notifications: State attorney general offices (e.g., Texas, Maine)U.S. Securities and Exchange Commission (SEC)
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Lawsuit by Scott Levy (former employee), Potential class action, , Four Class-Action Lawsuits (Filed in U.S. District Court, Nevada), , Five class-action lawsuits filed by four law firms, , Five class-action lawsuits filed (as of reporting), , Potential class-action lawsuits (under investigation by Shamis & Gentile P.A.).

Recommendations: Monitor credit reports and accounts for suspicious activity, Place a fraud alert or security freeze on credit files, Utilize offered credit monitoring and identity protection services (IDX), Contact state attorney general’s office for guidance, Consider legal action if affectedMonitor credit reports and accounts for suspicious activity, Place a fraud alert or security freeze on credit files, Utilize offered credit monitoring and identity protection services (IDX), Contact state attorney general’s office for guidance, Consider legal action if affectedMonitor credit reports and accounts for suspicious activity, Place a fraud alert or security freeze on credit files, Utilize offered credit monitoring and identity protection services (IDX), Contact state attorney general’s office for guidance, Consider legal action if affectedMonitor credit reports and accounts for suspicious activity, Place a fraud alert or security freeze on credit files, Utilize offered credit monitoring and identity protection services (IDX), Contact state attorney general’s office for guidance, Consider legal action if affectedMonitor credit reports and accounts for suspicious activity, Place a fraud alert or security freeze on credit files, Utilize offered credit monitoring and identity protection services (IDX), Contact state attorney general’s office for guidance, Consider legal action if affected

Source: Boyd Gaming Corporation SEC Form 8-K Filing
Date Accessed: 2025-09-24

Source: Media Reports on Las Vegas Cyberattacks (2023-2025)
Date Accessed: 2025-09-24

Source: U.S. Securities and Exchange Commission (SEC) Filing
Date Accessed: 2025-09-23

Source: U.S. District Court in Nevada (Scott Levy v. Boyd Gaming Corporation)

Source: Cybersecurity Analyst Reports on Casino Industry Targeting

Source: Historical Context: Caesars Entertainment ($15M ransom, 2023) and MGM Resorts ($100M losses, 2023)

Source: Las Vegas Review-Journal

Source: U.S. Securities and Exchange Commission (SEC) Filing
Date Accessed: 2023-09-23

Source: Article: Boyd Gaming Hit with Multiple Lawsuits After Data Breach

Source: Class-action lawsuits (e.g., Scott Levy v. Boyd Gaming)

Source: News reports on Nevada cyber incidents (e.g., MGM Resorts, Caesars Entertainment breaches)

Source: Shamis & Gentile P.A. Investigation Notice
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Boyd Gaming Corporation SEC Form 8-K FilingDate Accessed: 2025-09-24, and Source: Media Reports on Las Vegas Cyberattacks (2023-2025)Date Accessed: 2025-09-24, and Source: U.S. Securities and Exchange Commission (SEC) FilingDate Accessed: 2025-09-23, and Source: U.S. District Court in Nevada (Scott Levy v. Boyd Gaming Corporation), and Source: Cybersecurity Analyst Reports on Casino Industry Targeting, and Source: Historical Context: Caesars Entertainment ($15M ransom, 2023) and MGM Resorts ($100M losses, 2023), and Source: Las Vegas Review-Journal, and Source: U.S. Securities and Exchange Commission (SEC) FilingDate Accessed: 2023-09-23, and Source: Article: Boyd Gaming Hit with Multiple Lawsuits After Data Breach, and Source: SEC Filing by Boyd GamingDate Accessed: 2023-09-23, and Source: Class-action lawsuits (e.g., Scott Levy v. Boyd Gaming), and Source: News reports on Nevada cyber incidents (e.g., MGM Resorts, Caesars Entertainment breaches), and Source: Shamis & Gentile P.A. Investigation Notice.

Investigation Status: Ongoing (Federal Law Enforcement and External Experts Involved)

Investigation Status: Ongoing (collaboration with federal law enforcement and external cybersecurity experts)

Investigation Status: Ongoing (Lawsuits Pending)

Investigation Status: Ongoing (with federal law enforcement and cybersecurity experts)

Investigation Status: Ongoing (with external cybersecurity experts and federal law enforcement)

Investigation Status: Ongoing (external cybersecurity experts and law enforcement involved)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Sec Form 8-K Filing, Regulatory Notifications, Affected Party Notifications, Sec Filing, Notifying Affected Individuals, Regulatory Disclosures, Delayed Victim Notification, Sec Filing On 2023-09-23, Public Disclosure Via Securities Regulators Filing, Sec Filing (2023-09-23), No Direct Notification To All Affected Individuals (E.G., Scott Levy Not Notified), Notifications sent to affected individuals, regulators and and state attorney general offices; SEC filing.

Stakeholder Advisories: Sec Filing, Regulatory Notifications.
Customer Advisories: Notifications to Affected Individuals

Stakeholder Advisories: Notification To Affected Individuals, Regulatory Disclosures.
Customer Advisories: Encouragement to monitor for fraud/identity theftLegal action considerations for affected parties

Stakeholder Advisories: Sec Filing, Victim Notification Letters.
Customer Advisories: Delayed Notifications to Affected Individuals

Stakeholder Advisories: Notifications sent to affected individuals, regulators, and state attorneys general
Customer Advisories: Boyd Gaming offered two years of free credit monitoring and identity protection (IDX); legal remedies may be available
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Sec Filing, Regulatory Notifications, Notifications To Affected Individuals, , Notification To Affected Individuals, Regulatory Disclosures, Encouragement To Monitor For Fraud/Identity Theft, Legal Action Considerations For Affected Parties, , Sec Filing, Victim Notification Letters, Delayed Notifications To Affected Individuals, , Notifications sent to affected individuals, regulators, and state attorneys general and Boyd Gaming offered two years of free credit monitoring and identity protection (IDX); legal remedies may be available.

High Value Targets: Employee Data, Internal It Systems,
Data Sold on Dark Web: Employee Data, Internal It Systems,

High Value Targets: Employee Data, Customer Data,
Data Sold on Dark Web: Employee Data, Customer Data,

High Value Targets: Employee Data, Customer Pii,
Data Sold on Dark Web: Employee Data, Customer Pii,

High Value Targets: Employee Data, Customer Data,
Data Sold on Dark Web: Employee Data, Customer Data,

Root Causes: Inadequate Data Protection Measures, Delayed Incident Response,

Root Causes: Alleged Inadequate Cybersecurity Measures,
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Federal Law Enforcement, External Cybersecurity Experts, , Leading External Cybersecurity Experts, , Leading Cybersecurity Experts, , , .
Last Attacking Group: The attacking group in the last incident was an Unauthorized third party.
Most Recent Incident Detected: The most recent incident detected was on 2023-09-06.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2023-09-23.
Most Significant Data Compromised: The most significant data compromised in an incident were Employee Information, Limited Third-Party Data, , Employee Records, Customer Records, Social Security Numbers, Personally Identifiable Information (PII), , Personally Identifiable Information (PII), Employee Records, , , Employee Data, Customer Data, , Name of individual, Address, Social Security number, Driver’s license number, Government-issued ID number (e.g., passport, state ID card), Date of birth and .
Most Significant System Affected: The most significant system affected in an incident was Internal IT Systems and Internal IT Systems and IT infrastructure and Internal IT Systems and .
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was federal law enforcement, external cybersecurity experts, , leading external cybersecurity experts, , leading cybersecurity experts, , , .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Social Security Numbers, Customer Records, Personally Identifiable Information (PII), Name of individual, Customer Data, Driver’s license number, Date of birth, Employee Information, Employee Data, Address, Limited Third-Party Data, Government-issued ID number (e.g., passport, state ID card), Social Security number and Employee Records.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 4.3K.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Lawsuit by Scott Levy (former employee), Potential class action, , Four Class-Action Lawsuits (Filed in U.S. District Court, Nevada), , Five class-action lawsuits filed by four law firms, , Five class-action lawsuits filed (as of reporting), , Potential class-action lawsuits (under investigation by Shamis & Gentile P.A.).
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Utilize offered credit monitoring and identity protection services (IDX), Consider legal action if affected, Monitor credit reports and accounts for suspicious activity, Contact state attorney general’s office for guidance and Place a fraud alert or security freeze on credit files.
Most Recent Source: The most recent source of information about an incident are SEC Filing by Boyd Gaming, Cybersecurity Analyst Reports on Casino Industry Targeting, Las Vegas Review-Journal, Article: Boyd Gaming Hit with Multiple Lawsuits After Data Breach, Boyd Gaming Corporation SEC Form 8-K Filing, Shamis & Gentile P.A. Investigation Notice, U.S. Securities and Exchange Commission (SEC) Filing, U.S. District Court in Nevada (Scott Levy v. Boyd Gaming Corporation), News reports on Nevada cyber incidents (e.g., MGM Resorts, Caesars Entertainment breaches), Historical Context: Caesars Entertainment ($15M ransom, 2023) and MGM Resorts ($100M losses, 2023), Class-action lawsuits (e.g., Scott Levy v. Boyd Gaming) and Media Reports on Las Vegas Cyberattacks (2023-2025).
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing (Federal Law Enforcement and External Experts Involved).
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was SEC Filing, Regulatory Notifications, Notification to affected individuals, Regulatory disclosures, SEC Filing, Victim Notification Letters, Notifications sent to affected individuals, regulators, and state attorneys general, .
Most Recent Customer Advisory: The most recent customer advisory issued were an Notifications to Affected Individuals, Encouragement to monitor for fraud/identity theftLegal action considerations for affected parties, Delayed Notifications to Affected Individuals and Boyd Gaming offered two years of free credit monitoring and identity protection (IDX); legal remedies may be available.
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Inadequate Data Protection MeasuresDelayed Incident Response, Alleged inadequate cybersecurity measures.
.png)
Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.
Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.
Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.