Company Details
trumphotels
104
6,927
7211
trumphotels.com
0
TRU_6831368
In-progress

Trump Hotels Company CyberSecurity Posture
trumphotels.comA family, both by fate and by choice, that never settles for less than the best. We are straight shooters with an entrepreneurial core and a personal mission to deliver unparalleled service and experiences in our iconic hotels. Your time away is precious. Never Settle.
Company Details
trumphotels
104
6,927
7211
trumphotels.com
0
TRU_6831368
In-progress
Between 700 and 749

Trump Hotels Global Score (TPRM)XXXX

Description: The California Attorney General reported a data breach involving Trump Hotels on June 30, 2017. The breach occurred on August 10, 2016, and the last access to the compromised information was on March 9, 2017. Unauthorized access involved payment card data and certain reservation information for hotel reservations processed through Sabre Hospitality Solutions, affecting an unspecified number of individuals.
Description: The California Office of the Attorney General reported a security incident at the Trump Hotel Collection, specifically affecting the Trump International Hotel & Tower Las Vegas. The breach occurred between May 19, 2014, and June 2, 2015, involving unauthorized malware access to payment card data. Although no evidence indicated that the information was misused, the exact number of affected individuals is unknown. The breach was reported on September 25, 2015.
Description: Trump Hotel Collection suffered a credit card breach the compromised the card details of its customers in July 2015. The hackers mainly targeted the hotel location in New York, Los Angeles, and Las Vegas. The hotel chain immediately launched the investigation and secured the data.


No incidents recorded for Trump Hotels in 2025.
No incidents recorded for Trump Hotels in 2025.
No incidents recorded for Trump Hotels in 2025.
Trump Hotels cyber incidents detection timeline including parent company and subsidiaries

A family, both by fate and by choice, that never settles for less than the best. We are straight shooters with an entrepreneurial core and a personal mission to deliver unparalleled service and experiences in our iconic hotels. Your time away is precious. Never Settle.


Mandarin Oriental Hotel Group is the award-winning owner and operator of some of the world’s most luxurious hotels, resorts and residences. Having grown from its Asian roots into a global brand, the Group now operates 43 hotels, 12 residences and 23 exclusive homes in 26 countries and territories, w

IHG Hotels & Resorts [LON:IHG, NYSE:IHG (ADRs)] is a global hospitality company, with a purpose to provide True Hospitality for Good. With a family of 19 hotel brands and IHG One Rewards, one of the world's largest hotel loyalty programmes, IHG has over 6,300 open hotels in more than 100 countries,

Since inception, Rotana has grown to be the region’s largest hospitality management company, and a brand that is widely recognized and admired. Rotana currently manages a portfolio of over 100 properties throughout the Middle East, Africa, Eastern Europe and Türkiye offering a wide range of servic
Hilton Grand Vacations is a global leader in vacation ownership, developing, marketing and operating a portfolio of high-quality, shared-ownership properties in highly desired vacation destinations. Our company also manages and operates innovative club membership programs providing exclusive exchang

Located in the heart of each destination we call home, a stay at any Fairmont hotel is truly unforgettable. Known for grand and awe-inspiring properties and thoughtful and engaging colleagues who aim to make each and every stay a cherished and memorable experience, we have been the stage for some of
Whitbread PLC is the owner of the UK’s favourite hotel chain, Premier Inn, as well as restaurant brands, Beefeater, Brewers Fayre, Table Table, Bar + Block and Cookhouse and Pub. Whitbread employs more than 35,000 people in more than 1,200 Premier Inn hotels and restaurants across the UK and German
Aramark (NYSE: ARMK) proudly serves the world’s leading educational institutions, Fortune 500 companies, world champion sports teams, prominent healthcare providers, iconic destinations and cultural attractions, and numerous municipalities in 16 countries around the world with food and facilities ma

Caesars Entertainment, Inc. is the largest casino-entertainment Company in the U.S. and one of the world's most diversified casino-entertainment providers. Since its beginning in Reno, NV, in 1937, Caesars Entertainment, Inc. has grown through development of new resorts, expansions and acquisitions.
Travel + Leisure Co., the world's leading vacation ownership and membership travel company, provides more than six million vacations to travelers every year. The company’s extensive Vacation Ownership portfolio includes trusted and iconic vacation club brands with a combined 270+ resorts worldwide,
.png)
Resorts World applies Acronis Cyber Protect Cloud/Storage with Agilitec support, while a Nevada federal lawsuit alleges RICO violations...
The law includes the bipartisan 988 Lifeline Cybersecurity responsibility Oklahoma Senator Markayne Mullin worked on.
Two Democratic senators urged Trump administration officials on Wednesday to release a report on security issues in the telecommunications...
Cornell University agreed to pay $30 million to the Trump administration to immediately restore millions in federal funding and settle...
NEW YORK– October 16, 2025 – Trump Hotels – the five star luxury hotel brand that never settles – today announced the appointment of...
President Trump's sudden proclamation imposes a $100000 fee on new H-1B visa petitions, shocking the tech and cybersecurity industries.
The White House National Security Council is working on national security, defense and cybersecurity strategies, a top official said Tuesday...
The argument over whether Cybersecurity Maturity Model Certification would ever show up in real contracts is finished. It is over. Basta.
Tom Artiom Alexandrovich was released and returned to Israel after being charged with luring a child for a sex act.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Trump Hotels is http://www.trumphotels.com.
According to Rankiteo, Trump Hotels’s AI-generated cybersecurity score is 737, reflecting their Moderate security posture.
According to Rankiteo, Trump Hotels currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Trump Hotels is not certified under SOC 2 Type 1.
According to Rankiteo, Trump Hotels does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Trump Hotels is not listed as GDPR compliant.
According to Rankiteo, Trump Hotels does not currently maintain PCI DSS compliance.
According to Rankiteo, Trump Hotels is not compliant with HIPAA regulations.
According to Rankiteo,Trump Hotels is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Trump Hotels operates primarily in the Hospitality industry.
Trump Hotels employs approximately 104 people worldwide.
Trump Hotels presently has no subsidiaries across any sectors.
Trump Hotels’s official LinkedIn profile has approximately 6,927 followers.
Trump Hotels is classified under the NAICS code 7211, which corresponds to Traveler Accommodation.
No, Trump Hotels does not have a profile on Crunchbase.
Yes, Trump Hotels maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/trumphotels.
As of December 06, 2025, Rankiteo reports that Trump Hotels has experienced 3 cybersecurity incidents.
Trump Hotels has an estimated 13,767 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Title: Trump Hotel Collection Credit Card Breach
Description: Trump Hotel Collection suffered a credit card breach that compromised the card details of its customers in July 2015. The hackers mainly targeted the hotel locations in New York, Los Angeles, and Las Vegas. The hotel chain immediately launched an investigation and secured the data.
Date Detected: July 2015
Type: Data Breach
Attack Vector: Credit Card Fraud
Motivation: Financial Gain
Title: Trump Hotel Collection Data Breach
Description: The Trump Hotel Collection experienced a security incident affecting payment card information of customers who made purchases at Trump International Hotel & Tower Las Vegas between May 19, 2014, and June 2, 2015.
Date Publicly Disclosed: 2015-09-25
Type: Data Breach
Attack Vector: Malware
Title: Trump Hotels Data Breach
Description: Unauthorized access to payment card data and certain reservation information for hotel reservations processed through Sabre Hospitality Solutions.
Date Detected: 2017-03-09
Date Publicly Disclosed: 2017-06-30
Type: Data Breach
Attack Vector: Unauthorized Access
Common Attack Types: The most common types of attacks the company has faced is Breach.

Data Compromised: Credit Card Details
Payment Information Risk: High

Data Compromised: Payment card data
Payment Information Risk: High

Data Compromised: Payment card data, Reservation information
Payment Information Risk: True
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Credit Card Details, Payment card data, Payment Card Data, Reservation Information and .

Entity Name: Trump Hotel Collection
Entity Type: Hospitality
Industry: Hotel
Location: New YorkLos AngelesLas Vegas

Entity Name: Trump Hotel Collection
Entity Type: Hospitality
Industry: Hospitality
Location: Las Vegas

Entity Name: Trump Hotels
Entity Type: Hospitality
Industry: Hospitality

Incident Response Plan Activated: True

Type of Data Compromised: Credit Card Details
Sensitivity of Data: High

Type of Data Compromised: Payment card data
Sensitivity of Data: High

Type of Data Compromised: Payment card data, Reservation information

Source: California Office of the Attorney General
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: California Office of the Attorney General, and Source: California Attorney GeneralDate Accessed: 2017-06-30.

Investigation Status: Completed
Most Recent Incident Detected: The most recent incident detected was on July 2015.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2017-06-30.
Most Significant Data Compromised: The most significant data compromised in an incident were Credit Card Details, Payment card data, Payment card data, Reservation information and .
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Reservation information, Credit Card Details and Payment card data.
Most Recent Source: The most recent source of information about an incident are California Attorney General and California Office of the Attorney General.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Completed.
.png)
HedgeDoc is an open source, real-time, collaborative, markdown notes application. Prior to 1.10.4, some of HedgeDoc's OAuth2 endpoints for social login providers such as Google, GitHub, GitLab, Facebook or Dropbox lack CSRF protection, since they don't send a state parameter and verify the response using this parameter. This vulnerability is fixed in 1.10.4.
Langflow versions up to and including 1.6.9 contain a chained vulnerability that enables account takeover and remote code execution. An overly permissive CORS configuration (allow_origins='*' with allow_credentials=True) combined with a refresh token cookie configured as SameSite=None allows a malicious webpage to perform cross-origin requests that include credentials and successfully call the refresh endpoint. An attacker-controlled origin can therefore obtain fresh access_token / refresh_token pairs for a victim session. Obtained tokens permit access to authenticated endpoints — including built-in code-execution functionality — allowing the attacker to execute arbitrary code and achieve full system compromise.
A vulnerability was detected in xerrors Yuxi-Know up to 0.4.0. This vulnerability affects the function OtherEmbedding.aencode of the file /src/models/embed.py. Performing manipulation of the argument health_url results in server-side request forgery. The attack can be initiated remotely. The exploit is now public and may be used. The patch is named 0ff771dc1933d5a6b78f804115e78a7d8625c3f3. To fix this issue, it is recommended to deploy a patch. The vendor responded with a vulnerability confirmation and a list of security measures they have established already (e.g. disabled URL parsing, disabled URL upload mode, removed URL-to-markdown conversion).
A security vulnerability has been detected in Rarlab RAR App up to 7.11 Build 127 on Android. This affects an unknown part of the component com.rarlab.rar. Such manipulation leads to path traversal. It is possible to launch the attack remotely. Attacks of this nature are highly complex. It is indicated that the exploitability is difficult. The exploit has been disclosed publicly and may be used. Upgrading to version 7.20 build 128 is able to mitigate this issue. You should upgrade the affected component. The vendor responded very professional: "This is the real vulnerability affecting RAR for Android only. WinRAR and Unix RAR versions are not affected. We already fixed it in RAR for Android 7.20 build 128 and we publicly mentioned it in that version changelog. (...) To avoid confusion among users, it would be useful if such disclosure emphasizes that it is RAR for Android only issue and WinRAR isn't affected."
A weakness has been identified in ZSPACE Q2C NAS up to 1.1.0210050. Affected by this issue is the function zfilev2_api.OpenSafe of the file /v2/file/safe/open of the component HTTP POST Request Handler. This manipulation of the argument safe_dir causes command injection. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.