
Pegasus Company Cyber Security Posture
cendyn.comPegasus has recently merged with Cendyn, bringing together two of the leading technology providers in the hospitality industry, helping us deliver on our mission of personalizing and enriching the guest journey. For more information, please visit Cendyn's LinkedIn page.
Pegasus Company Details
pegasus-solutions
768 employees
16498.0
721
Hospitality
cendyn.com
Scan still pending
PEG_2487061
In-progress

Between 900 and 1000
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

Pegasus Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 900 and 1000 |
Pegasus Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
Pegasus | Breach | 60 | 4 | 10/2021 | PEG133991222 | Link | |
Rankiteo Explanation : Attack with significant impact with customers data leaksDescription: The hacking collective "Black Shadow" has exposed data from a number of Israeli businesses, including the Pegasus travel agency, the Dan bus firm, and the LGBTQ dating service "Atraf." The business contacted the Transport Ministry and the Cyber Security Headquarters in addition to hiring outside experts in the area to conduct a thorough, competent, and unbiased investigation into the occurrence. Additionally, they expressed regret to their users for the breach of their private information and promised to take steps to stop similar occurrences in the future. |
Pegasus Company Subsidiaries

Pegasus has recently merged with Cendyn, bringing together two of the leading technology providers in the hospitality industry, helping us deliver on our mission of personalizing and enriching the guest journey. For more information, please visit Cendyn's LinkedIn page.
Access Data Using Our API

Get company history
.png)
Pegasus Cyber Security News
Pegasus (spyware)
Pegasus (spyware), spyware developed by Israeli cyber-intelligence firm NSO Group (founded in 2010) for eavesdropping on mobile phones andย ...
NSO Group Fined $168M for Targeting 1,400 WhatsApp Users With Pegasus Spyware
NSO must pay $168M after targeting 1400+ users via WhatsApp zero-day flaw, court finds illegal spyware use.
Arms Cyber selected by Microsoft for Startups Pegasus Program
The Pegasus Program offers a robust platform for startups to rapidly scale by connecting them with Microsoft's vast enterprise ecosystem.
Pegasus Spyware Now Targeting Business Executives and Financial Sector Professionals
These findings underscore a systemic shift in cyber-espionage tactics, leveraging zero-click exploits and advanced persistence mechanism.
Surveillance at the intersection of technology, business and politics: A case study of Pegasus spyware
The digitization of surveillance has enhanced the capabilities of spyware like Pegasus. Such spyware relies on exploiting vulnerabilities inย ...
US judge finds Israel's NSO Group liable for hacking in WhatsApp lawsuit
WhatsApp accused NSO of exploiting a bug to install spy software.
Pegasus spyware infections found on several private sector phones
Mobile security company iVerify says that it discovered about a dozen new infections of the powerful Pegasus spyware on phones mostly usedย ...
Isreali NSO Group's Pegasus Spyware Detected in New Mobile Devices
The company's newly launched Mobile Threat Hunting feature has detected multiple instances of the infamous Pegasus spyware, developed by NSOย ...
Pegasus Spyware Manufacturer NSO Group Found Liable in WhatsApp Lawsuit, Violated US State and Federal Hacking Laws
Pegasus spyware has specialized in abusing numerous software flaws. Though WhatsApp discovered the flaw in May 2019 and filed its complaintย ...

Pegasus Similar Companies

Carlson Hotels "Park Plaza, Chandigarh
A full-service, upper midscale hotel brand for business and leisure travelers, Park Plazaยฎ offers award-winning meeting facilities and staff who live the brandโs value proposition by going out of their way to show their appreciation to their guests. Park Plazaยฎ hotels are located in city centers

Fairmont Hotels & Resorts
Located in the heart of each destination we call home, a stay at any Fairmont hotel is truly unforgettable. Known for grand and awe-inspiring properties and thoughtful and engaging colleagues who aim to make each and every stay a cherished and memorable experience, we have been the stage for some of

Hilton Grand Vacations
Hilton Grand Vacations is a global leader in vacation ownership, developing, marketing and operating a portfolio of high-quality, shared-ownership properties in highly desired vacation destinations. Our company also manages and operates innovative club membership programs providing exclusive exchang

Four Seasons Hotels and Resorts
Four Seasons Hotels and Resorts opened its first hotel in 1961, and since that time has been dedicated to perfecting the travel experience through continual innovation and the highest standards of hospitality. Currently operating more than 120 hotels and resorts, and more than 50 residential propert

Kerzner International
Kerzner International has built a diverse collection of iconic brands and luxury properties, earning international acclaim for pioneering destination-defining hospitality, delivering unrivalled service, and curating transformative guest experiences. We are renowned for creating hospitality brands

Whitbread
Whitbread PLC is the owner of the UKโs favourite hotel chain, Premier Inn, as well as restaurant brands, Beefeater, Brewers Fayre, Table Table, Bar + Block and Cookhouse and Pub. Whitbread employs more than 35,000 people in more than 1,200 Premier Inn hotels and restaurants across the UK and German

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
Pegasus CyberSecurity History Information
How many cyber incidents has Pegasus faced?
Total Incidents: According to Rankiteo, Pegasus has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at Pegasus?
Incident Types: The types of cybersecurity incidents that have occurred incident Breach.
How does Pegasus detect and respond to cybersecurity incidents?
Detection and Response: The company detects and responds to cybersecurity incidents through third party assistance with Outside experts and remediation measures with Steps to prevent similar occurrences and communication strategy with Expressed regret to users.
Incident Details
Can you provide details on each incident?

Incident : Data Breach
Title: Black Shadow Data Breach
Description: The hacking collective "Black Shadow" has exposed data from a number of Israeli businesses, including the Pegasus travel agency, the Dan bus firm, and the LGBTQ dating service "Atraf."
Type: Data Breach
Threat Actor: Black Shadow
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Breach.
Impact of the Incidents
What was the impact of each incident?

Incident : Data Breach PEG133991222
Data Compromised: Private Information
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Private Information.
Which entities were affected by each incident?
Response to the Incidents
What measures were taken in response to each incident?

Incident : Data Breach PEG133991222
Third Party Assistance: Outside experts
Remediation Measures: Steps to prevent similar occurrences
Communication Strategy: Expressed regret to users
How does the company involve third-party assistance in incident response?
Third-Party Assistance: The company involves third-party assistance in incident response through Outside experts.
Data Breach Information
What type of data was compromised in each breach?

Incident : Data Breach PEG133991222
Type of Data Compromised: Private Information
What measures does the company take to prevent data exfiltration?
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Steps to prevent similar occurrences.
Regulatory Compliance
Were there any regulatory violations and fines imposed for each incident?

Incident : Data Breach PEG133991222
Regulatory Notifications: Transport Ministry, Cyber Security Headquarters
Investigation Status
How does the company communicate the status of incident investigations to stakeholders?
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through was Expressed regret to users.
Post-Incident Analysis
What is the company's process for conducting post-incident analysis?
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Outside experts.
Additional Questions
General Information
Who was the attacking group in the last incident?
Last Attacking Group: The attacking group in the last incident was an Black Shadow.
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident was Private Information.
Response to the Incidents
What third-party assistance was involved in the most recent incident?
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Outside experts.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Private Information.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
