ISO 27001 Certificate
SOC 1 Type I Certificate
SOC 2 Type II Certificate
PCI DSS
HIPAA
RGPD
Internal validation & live display
Multiple badges & continuous verification
Faster underwriting decisions
ISOSOC2 Type 1SOC2 Type 2PCI DSSHIPAAGDPR

Charlotte-based Belk, Inc., a privately-owned department store, began when William Henry Belk opened his first store in 1888 with his brother, Dr. John Belk, joining as a partner. What started as two brothers in business has now grown into a legacy of selling great products at great prices, treating customers like family, and giving back to the community. Throughout the years, we’ve changed and grown in so many ways. We’ve added exciting products, adapted the way we work, and made it easier to shop with new technology and services. Today, Belk serves customers at nearly 300 Belk stores in 16 Southeastern states, at belk.com, and through the mobile app.

Belk A.I CyberSecurity Scoring

Belk

Company Details

Linkedin ID:

belk

Employees number:

12,356

Number of followers:

115,300

NAICS:

43

Industry Type:

Retail

Homepage:

belkcareers.com

IP Addresses:

1

Company ID:

BEL_1829420

Scan Status:

Completed

AI scoreBelk Risk Score (AI oriented)

Between 750 and 799

https://images.rankiteo.com/companyimages/belk.jpeg
Belk Retail
Updated:
  • Powered by our proprietary A.I cyber incident model
  • Insurance preferes TPRM score to calculate premium
globalscoreBelk Global Score (TPRM)

XXXX

https://images.rankiteo.com/companyimages/belk.jpeg
Belk Retail
  • Instant access to detailed risk factors
  • Benchmark vs. industry & size peers
  • Vulnerabilities
  • Findings

Belk Company CyberSecurity News & History

Past Incidents
0
Attack Types
0
No data available
Ailogo

Belk Company Scoring based on AI Models

Cyber Incidents Likelihood 3 - 6 - 9 months

🔒
Incident Predictions locked
Access Monitoring Plan

A.I Risk Score Likelihood 3 - 6 - 9 months

🔒
A.I. Risk Score Predictions locked
Access Monitoring Plan
statics

Underwriter Stats for Belk

Incidents vs Retail Industry Average (This Year)

No incidents recorded for Belk in 2025.

Incidents vs All-Companies Average (This Year)

No incidents recorded for Belk in 2025.

Incident Types Belk vs Retail Industry Avg (This Year)

No incidents recorded for Belk in 2025.

Incident History — Belk (X = Date, Y = Severity)

Belk cyber incidents detection timeline including parent company and subsidiaries

Belk Company Subsidiaries

SubsidiaryImage

Charlotte-based Belk, Inc., a privately-owned department store, began when William Henry Belk opened his first store in 1888 with his brother, Dr. John Belk, joining as a partner. What started as two brothers in business has now grown into a legacy of selling great products at great prices, treating customers like family, and giving back to the community. Throughout the years, we’ve changed and grown in so many ways. We’ve added exciting products, adapted the way we work, and made it easier to shop with new technology and services. Today, Belk serves customers at nearly 300 Belk stores in 16 Southeastern states, at belk.com, and through the mobile app.

Loading...
similarCompanies

Belk Similar Companies

Specsavers

Specsavers began 40 years ago with the vision of two optometrists, Doug and Mary Perkins, who set out to provide best-value eyecare to everybody. Their passion for optometry has led Specsavers to become the largest privately-owned optical group in the world, delivering high-quality, affordable opt

Hobby Lobby

In 1970, entrepreneurs David and Barbara Green, along with their young family, began making miniature picture frames in their garage. A few years later, on August 3, 1972, the Green family opened the first Hobby Lobby store with a mere 300 square feet of retail space. Hobby Lobby has not stopped g

Grupo Carrefour Brasil

Reunimos uma equipe com mais de 70.000 colaboradores que representam a diversidade deste país. Hoje, somos um dos maiores empregadores do Brasil. Junto com os nossos fornecedores e parceiros, estamos comprometidos em satisfazer e encantar os consumidores todos os dias, construindo a nossa história c

Sally Beauty

Sally Beauty Holdings, Inc. (“Sally”) through its affiliates is the world’s largest distributor of professional beauty supplies. Sally provides the channels that allow manufacturers of beauty supplies to reach customers, both professional and non-professional. Sally Beauty Company, Inc. began a

PT. Trans Retail Indonesia

Pada bulan Januari 2013, Trans Corp melalui anak perusahaannya, PT Trans Ritel mengambil alih 100% saham PT Carrefour Indonesia sehingga nama perusahaan pun berubah menjadi PT Trans Retail Indonesia. PT Trans Retail Indonesia berinovasi dalam memberikan standar pelayanan kelas dunia di industri r

SPAR South Africa

There’s something different about shopping at SPAR, that’s because we’ve created a culture of caring and community to ensure our customers have a consistently enjoyable shopping experience in a uniquely friendly and family orientated store. Nothing means more to us than our valued customers and we

Costco Wholesale

Costco Wholesale is a multibillion dollar global retailer with warehouse club operations in 11 countries. We are the recognized leader in our field, dedicated to quality in every area of our business and respected for our outstanding business ethics. Despite our large size and rapid international ex

Nossa página oficial no LinkedIn é https://bit.ly/2XT3eZl Fundada em 1905 na cidade de Araraquara, a Raia é uma das bandeiras da RD Saúde (Raia Drogasil S.A.) e possui mais de 1000 farmácias em todo o Brasil. A RD Saúde é um ecossistema de saúde integral, com 3 mil farmácias em todo o Brasil e neg

EXPRESS

EXPRESS is a multichannel fashion brand dedicated to creating confidence and inspiring self-expression. Since its launch in 1980, the brand has embraced a design philosophy rooted in modern, confident and effortless style. Whether dressing for work, everyday or special occasions, EXPRESS ensures you

newsone

Belk CyberSecurity News

July 21, 2025 07:00 AM
What You Need to Know About the Belk Data Breach: DragonForce Hackers Say They Did It

July 17, 2025 09:55 AM
Belk Suffers Major Data Breach; Law Firm Investigates Class Action

The Belk Data Breach exposed sensitive customer info after a cyberattack. DragonForce claims responsibility of the attack.

July 16, 2025 07:00 AM
Ransomware gang claims credit for Belk data breach. ‘We hope this serves as a lesson.’

A ransomware group has claimed credit for Belk's data breach in May. DragonForce stole 156 GB of data from the Charlotte-based department store chain.

July 16, 2025 07:00 AM
Belk data breach leads to lawsuits, hackers refuse payment

A ransomware group is claiming to be behind Belk's data breach in May. A cybersecurity company told the Charlotte Observer a group named DragonForce posted...

July 16, 2025 07:00 AM
News - DragonForce hackers breach Belk, exposing customer data

Belk, a prominent American retail chain, said it experienced a data security incident earlier this year that led to the unauthorised access...

July 15, 2025 07:00 AM
DragonForce hackers claim responsibility for Belk data breach

A threat group claimed credit for an attack against Belk. The group claimed to have a trove of company data linked to a May 2025 attack.

July 15, 2025 07:00 AM
US retailer Belk hit by DragonForce, the Marks & Spencer hackers

Belk, the popular US department store chain, has allegedly been targeted by the DragonForce hacker group. This is the same group that struck UK retailer Marks...

July 15, 2025 07:00 AM
Belk hit by May cyberattack: DragonForce stole 150GB of data

Ransomware group DragonForce claims it attacked U.S. retailer Belk in May, stealing over 150GB of data in a disruptive cyberattack.

July 15, 2025 07:00 AM
Data Breach at Debt Settlement Firm Impacts 160,000 People

Pennsylvania-based Century Support Services is disclosing a data breach after its systems were hacked in November 2024.

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

Belk CyberSecurity History Information

Official Website of Belk

The official website of Belk is https://www.belkcareers.com/.

Belk’s AI-Generated Cybersecurity Score

According to Rankiteo, Belk’s AI-generated cybersecurity score is 790, reflecting their Fair security posture.

How many security badges does Belk’ have ?

According to Rankiteo, Belk currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.

Does Belk have SOC 2 Type 1 certification ?

According to Rankiteo, Belk is not certified under SOC 2 Type 1.

Does Belk have SOC 2 Type 2 certification ?

According to Rankiteo, Belk does not hold a SOC 2 Type 2 certification.

Does Belk comply with GDPR ?

According to Rankiteo, Belk is not listed as GDPR compliant.

Does Belk have PCI DSS certification ?

According to Rankiteo, Belk does not currently maintain PCI DSS compliance.

Does Belk comply with HIPAA ?

According to Rankiteo, Belk is not compliant with HIPAA regulations.

Does Belk have ISO 27001 certification ?

According to Rankiteo,Belk is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.

Industry Classification of Belk

Belk operates primarily in the Retail industry.

Number of Employees at Belk

Belk employs approximately 12,356 people worldwide.

Subsidiaries Owned by Belk

Belk presently has no subsidiaries across any sectors.

Belk’s LinkedIn Followers

Belk’s official LinkedIn profile has approximately 115,300 followers.

NAICS Classification of Belk

Belk is classified under the NAICS code 43, which corresponds to Retail Trade.

Belk’s Presence on Crunchbase

Yes, Belk has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/belk.

Belk’s Presence on LinkedIn

Yes, Belk maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/belk.

Cybersecurity Incidents Involving Belk

As of November 27, 2025, Rankiteo reports that Belk has not experienced any cybersecurity incidents.

Number of Peer and Competitor Companies

Belk has an estimated 15,225 peer or competitor companies worldwide.

Belk CyberSecurity History Information

How many cyber incidents has Belk faced ?

Total Incidents: According to Rankiteo, Belk has faced 0 incidents in the past.

What types of cybersecurity incidents have occurred at Belk ?

Incident Types: The types of cybersecurity incidents that have occurred include .

Incident Details

What are the most common types of attacks the company has faced ?

Additional Questions

cve

Latest Global CVEs (Not Company-Specific)

Description

Angular is a development platform for building mobile and desktop web applications using TypeScript/JavaScript and other languages. Prior to versions 19.2.16, 20.3.14, and 21.0.1, there is a XSRF token leakage via protocol-relative URLs in angular HTTP clients. The vulnerability is a Credential Leak by App Logic that leads to the unauthorized disclosure of the Cross-Site Request Forgery (XSRF) token to an attacker-controlled domain. Angular's HttpClient has a built-in XSRF protection mechanism that works by checking if a request URL starts with a protocol (http:// or https://) to determine if it is cross-origin. If the URL starts with protocol-relative URL (//), it is incorrectly treated as a same-origin request, and the XSRF token is automatically added to the X-XSRF-TOKEN header. This issue has been patched in versions 19.2.16, 20.3.14, and 21.0.1. A workaround for this issue involves avoiding using protocol-relative URLs (URLs starting with //) in HttpClient requests. All backend communication URLs should be hardcoded as relative paths (starting with a single /) or fully qualified, trusted absolute URLs.

Risk Information
cvss4
Base: 7.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Uncontrolled Recursion vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft deep ASN.1 structures that trigger unbounded recursive parsing. This leads to a Denial-of-Service (DoS) via stack exhaustion when parsing untrusted DER inputs. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 8.7
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Forge (also called `node-forge`) is a native implementation of Transport Layer Security in JavaScript. An Integer Overflow vulnerability in node-forge versions 1.3.1 and below enables remote, unauthenticated attackers to craft ASN.1 structures containing OIDs with oversized arcs. These arcs may be decoded as smaller, trusted OIDs due to 32-bit bitwise truncation, enabling the bypass of downstream OID-based security decisions. This issue has been patched in version 1.3.2.

Risk Information
cvss4
Base: 6.3
Severity: LOW
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. Prior to versions 7.0.13 and 8.0.2, working with large buffers in Lua scripts can lead to a stack overflow. Users of Lua rules and output scripts may be affected when working with large buffers. This includes a rule passing a large buffer to a Lua script. This issue has been patched in versions 7.0.13 and 8.0.2. A workaround for this issue involves disabling Lua rules and output scripts, or making sure limits, such as stream.depth.reassembly and HTTP response body limits (response-body-limit), are set to less than half the stack size.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Description

Suricata is a network IDS, IPS and NSM engine developed by the OISF (Open Information Security Foundation) and the Suricata community. In versions from 8.0.0 to before 8.0.2, a NULL dereference can occur when the entropy keyword is used in conjunction with base64_data. This issue has been patched in version 8.0.2. A workaround involves disabling rules that use entropy in conjunction with base64_data.

Risk Information
cvss3
Base: 7.5
Severity: LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=belk' -H 'apikey: YOUR_API_KEY_HERE'

What Do We Measure ?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge