Badge
11,371 badges added since 01 January 2025
ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Charlotte-based Belk, Inc., a privately-owned department store, began when William Henry Belk opened his first store in 1888 with his brother, Dr. John Belk, joining as a partner. What started as two brothers in business has now grown into a legacy of selling great products at great prices, treating customers like family, and giving back to the community. Throughout the years, we’ve changed and grown in so many ways. We’ve added exciting products, adapted the way we work, and made it easier to shop with new technology and services. Today, Belk serves customers at nearly 300 Belk stores in 16 Southeastern states, at belk.com, and through the mobile app.

Belk A.I CyberSecurity Scoring

Belk

Company Details

Linkedin ID:

belk

Employees number:

12,732

Number of followers:

121,054

NAICS:

43

Industry Type:

Retail

Homepage:

belkcareers.com

IP Addresses:

1

Company ID:

BEL_1829420

Scan Status:

Completed

AI scoreBelk Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/belk.jpeg
Belk Retail
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreBelk Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/belk.jpeg
Belk Retail
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Belk Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

Belk Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Belk

Incidents vs Retail Industry Average (This Year)

No incidents recorded for Belk in 2026.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Belk in 2026.

Incident Types Belk vs Retail Industry Avg (This Year)

No incidents recorded for Belk in 2026.

Incident History — Belk (X = Date, Y = Severity)

Belk cyber incidents detection timeline including parent company and subsidiaries

Belk Company Subsidiaries

SubsidiaryImage

Charlotte-based Belk, Inc., a privately-owned department store, began when William Henry Belk opened his first store in 1888 with his brother, Dr. John Belk, joining as a partner. What started as two brothers in business has now grown into a legacy of selling great products at great prices, treating customers like family, and giving back to the community. Throughout the years, we’ve changed and grown in so many ways. We’ve added exciting products, adapted the way we work, and made it easier to shop with new technology and services. Today, Belk serves customers at nearly 300 Belk stores in 16 Southeastern states, at belk.com, and through the mobile app.

Loading...
similarCompanies

Belk Similar Companies

Marisa S.A.

Marisa S.A. is the largest Brazilian department store chain specialized in women’s clothing based on the number of stores in Brazil. The Company’s business strategy and operations focus primarily on middle-lower income women between the ages of 20 and 35. The Company’s target customers are members o

Shoppers Stop

Shoppers Stop is one of the pioneers of modern retailing in India. Launched in 1991, Shoppers Stop was the first department store in the country that revolutionized the way modern India shopped. Today, with 81 stores across 37 cities and a growing online presence at www.shoppersstop.com, Shoppers St

O'Reilly Auto Parts

O’Reilly Auto Parts started as a single store and has grown into a leading retailer in the automotive aftermarket industry with more than 6,100 locations and counting. With more than 94,000 team members, O’Reilly has expanded into 48 states, Puerto Rico, Mexico, and Canada. O’Reilly, headquartered

Endeavour Group

At Endeavour Group we exist to bring people together in better, more enjoyable, and more meaningful ways. Because we believe that social communities are thriving communities, built through great experiences and positive, memorable moments. United behind a common purpose of ‘Creating a more sociabl

Fred Meyer

The Kroger Co., together with its subsidiaries, operates as a food retailer in the United States. The company operates three formats of supermarkets: combination food and drug stores (combo stores), multi department stores, and price impact warehouse stores or marketplace stores. The combo stores op

Somos la cadena de tiendas de conveniencia más grande de México y América Latina, con 45 años de experiencia y más de 22 mil establecimientos ubicados a lo largo de la República Mexicana, Colombia, Perú, Chile y Brasil. En OXXO como compañía 100% mexicana y como parte de la División Proxi

Landmark Group

For over five decades, Landmark Group has shaped the region’s retail and hospitality landscape-growing from a single store in Bahrain to one of the largest and most successful omnichannel and hospitality groups across the Middle East, Asia and Africa. Rooted in purpose and powered by innovation, we

Canadian Tire Corporation

Canadian Tire Corporation, Limited (“CTC”) is one of Canada’s most admired and trusted companies. With world-class owned brands and exciting market-leading merchandising strategies, we are continually innovating with purpose: to be there for Canadians from coast-to-coast. We are a group of compani

Kmart Australia Limited

We’re Team Kmart, on a mission to make everyday living brighter for our customers by improving the Kmart shopping experience – every time and everywhere they engage with us. For over fifty years now, we’ve been spreading the Kmart love to families of all shapes and sizes in Australia, then New Zea

newsone

Belk CyberSecurity News

December 02, 2025 08:00 AM
Three degrees, one vision: Natarajan Ravikumar blends technical depth, business acumen and data mastery

Today, he is a three-time Charlotte master's alumnus and a technology executive at Honeywell, where he is bridging the gap between...

October 07, 2025 07:00 AM
Major NASCAR race team is latest company hit with lawsuit following data breach

Over 13000 people were impacted, including 2900 in NC, the company said. Data included Social Security, driver's license info.

July 21, 2025 07:00 AM
What You Need to Know About the Belk Data Breach: DragonForce Hackers Say They Did It

July 16, 2025 07:00 AM
Ransomware gang claims credit for Belk data breach. ‘We hope this serves as a lesson.’

A ransomware group has claimed credit for Belk's data breach in May. DragonForce stole 156 GB of data from the Charlotte-based department store chain.

July 16, 2025 07:00 AM
Belk data breach leads to lawsuits, hackers refuse payment

A ransomware group is claiming to be behind Belk's data breach in May. A cybersecurity company told the Charlotte Observer a group named DragonForce posted...

July 15, 2025 07:00 AM
DragonForce hackers claim responsibility for Belk data breach

A threat group claimed credit for an attack against Belk. The group claimed to have a trove of company data linked to a May 2025 attack.

July 15, 2025 07:00 AM
Belk hit by May cyberattack: DragonForce stole 150GB of data

Ransomware group DragonForce claims it attacked U.S. retailer Belk in May, stealing over 150GB of data in a disruptive cyberattack.

July 15, 2025 07:00 AM
US retailer Belk hit by DragonForce, the Marks & Spencer hackers

Belk, the popular US department store chain, has allegedly been targeted by the DragonForce hacker group. This is the same group that struck UK retailer Marks...

July 15, 2025 07:00 AM
Ransomware Group Claims Attack on Belk

DragonForce says it stole more than 150 gigabytes of data from US department store chain Belk in a May cyberattack.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Belk CyberSecurity History Information

Official Website of Belk

The official website of Belk is https://www.belkcareers.com/.

Belk’s AI-Generated Cybersecurity Score

According to Rankiteo, Belk’s AI-generated cybersecurity score is 790, reflecting their Fair security posture.

How many security badges does Belk’ have ?

According to Rankiteo, Belk currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Has Belk been affected by any supply chain cyber incidents ?

According to Rankiteo, Belk has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.

Does Belk have SOC 2 Type 1 certification ?

According to Rankiteo, Belk is not certified under SOC 2 Type 1.

Does Belk have SOC 2 Type 2 certification ?

According to Rankiteo, Belk does not hold a SOC 2 Type 2 certification.

Does Belk comply with GDPR ?

According to Rankiteo, Belk is not listed as GDPR compliant.

Does Belk have PCI DSS certification ?

According to Rankiteo, Belk does not currently maintain PCI DSS compliance.

Does Belk comply with HIPAA ?

According to Rankiteo, Belk is not compliant with HIPAA regulations.

Does Belk have ISO 27001 certification ?

According to Rankiteo,Belk is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Belk

Belk operates primarily in the Retail industry.

Number of Employees at Belk

Belk employs approximately 12,732 people worldwide.

Subsidiaries Owned by Belk

Belk presently has no subsidiaries across any sectors.

Belk’s LinkedIn Followers

Belk’s official LinkedIn profile has approximately 121,054 followers.

NAICS Classification of Belk

Belk is classified under the NAICS code 43, which corresponds to Retail Trade.

Belk’s Presence on Crunchbase

Yes, Belk has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/belk.

Belk’s Presence on LinkedIn

Yes, Belk maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/belk.

Cybersecurity Incidents Involving Belk

As of January 24, 2026, Rankiteo reports that Belk has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

Belk has an estimated 15,595 peer or competitor companies worldwide.

Belk CyberSecurity History Information

How many cyber incidents has Belk faced ?

Total Incidents: According to Rankiteo, Belk has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at Belk ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

Typemill is a flat-file, Markdown-based CMS designed for informational documentation websites. A reflected Cross-Site Scripting (XSS) exists in the login error view template `login.twig` of versions 2.19.1 and below. The `username` value can be echoed back without proper contextual encoding when authentication fails. An attacker can execute script in the login page context. This issue has been fixed in version 2.19.2.

Risk Information
cvss3
Base: 5.4
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
Description

A DOM-based Cross-Site Scripting (XSS) vulnerability exists in the DomainCheckerApp class within domain/script.js of Sourcecodester Domain Availability Checker v1.0. The vulnerability occurs because the application improperly handles user-supplied data in the createResultElement method by using the unsafe innerHTML property to render domain search results.

Description

A Remote Code Execution (RCE) vulnerability exists in Sourcecodester Modern Image Gallery App v1.0 within the gallery/upload.php component. The application fails to properly validate uploaded file contents. Additionally, the application preserves the user-supplied file extension during the save process. This allows an unauthenticated attacker to upload arbitrary PHP code by spoofing the MIME type as an image, leading to full system compromise.

Description

A UNIX symbolic link following issue in the jailer component in Firecracker version v1.13.1 and earlier and 1.14.0 on Linux may allow a local host user with write access to the pre-created jailer directories to overwrite arbitrary host files via a symlink attack during the initialization copy at jailer startup, if the jailer is executed with root privileges. To mitigate this issue, users should upgrade to version v1.13.2 or 1.14.1 or above.

Risk Information
cvss3
Base: 6.0
Severity: LOW
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H
cvss4
Base: 6.0
Severity: LOW
CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

An information disclosure vulnerability exists in the /srvs/membersrv/getCashiers endpoint of the Aptsys gemscms backend platform thru 2025-05-28. This unauthenticated endpoint returns a list of cashier accounts, including names, email addresses, usernames, and passwords hashed using MD5. As MD5 is a broken cryptographic function, the hashes can be easily reversed using public tools, exposing user credentials in plaintext. This allows remote attackers to perform unauthorized logins and potentially gain access to sensitive POS operations or backend functions.

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=belk' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge