Dell Hacked - 49m Customers Exposed 

Dell Technologies has suffered a large scale hack of their company portal holding customer information related to purchases. If you have been a Dell customer in the past seven years, it’s likely that your customer data is now on the Dark Web now.

Dell  has sent emails to its customers, warning them of a data breach that potentially exposed the information of approximately 49 million customers.

While Dell has confirmed information about its customers and their orders has been stolen from one of its portals and the hackers have claimed to have stolen 49 million records, which are now up for sale on the Dark Web. Dell has not confirmed exactly how many customers are affected. The customer emails come days after a threat actor calling himself Menelik claimed the breach on Dark Web crime forums, offering to sell “data for 49 million customers and other information systems purchased from Dell between 2017-2024.”

Dell says that while no financial or highly sensitive data was accessed the hack has breached names, physical addresses, and order details. 

Dell says that its investigation has discovered an unauthorised party accessed a database with customer names, addresses, hardware, and order information, including service tags, item descriptions, order dates, and warranty details. However, the company has emphasised that payment information, email addresses, phone numbers and other highly sensitive data were not part of the breached database. “Dell Technologies takes the privacy and confidentiality of your information seriously,” the company said in the message."

Upon discovering the incident, Dell said it promptly implemented security response procedures, began an investigation, took steps to contain the breach, and notified law enforcement authorities. The company has also engaged a third-party forensics firm to investigate the incident further.

@DailyDarkWeb   |    Dell   |      Cybersecuritynews   |     Forbes   |    CSO Online    |    The Register   |    PCWorld  

Toms Guide   |    Bleeping Computer   |    MalwareBytes      

You Might Also Read: 

HCL & Dell Unite Against Ransomware:  

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible



 

« Stolen NHS Data Published On The Dark Web
Cyber Attacks On The British Education Sector Trending »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MAY Cyber Technology

MAY Cyber Technology

MAY Cyber Technology is a Security Management solutions provider located in Turkey & Germany.

Ellipsis Technologies

Ellipsis Technologies

Ellipsis Technologies is a diversified technology company that develops innovative security software for websites and online applications.

FTAPI Software

FTAPI Software

FTAPI SecuTransfer is a software solution for end-to-end encrypted data exchange of large and sensitive data with customers and partners.

Genians

Genians

Genians provides the industry’s leading Network Access Control (NAC) solution, which ensures full visibility of all IP-enabled devices regardless of whether they are wired, wireless, or virtual.

Sky Republic

Sky Republic

Sky Republic offers a Smart Contract Platform to integrate and synchronize business networks beyond EDI and API.

BeyondTrust

BeyondTrust

BeyondTrust is a leader in Privileged Access Management, offering a seamless approach to preventing data breaches related to stolen credentials, misused privileges, and compromised remote access.

Venkon

Venkon

Venkon provides effective and unique solutions to cyber-security threats and IT compliance requirements of your organization.

Intechtel

Intechtel

Intechtel is a cyber security company, in addition to providing other internet, technology and telephone services.

CloudBolt Software

CloudBolt Software

CloudBolt provide solutions for your toughest cloud challenges. From automation, to cost and security, and hybrid IT governance — we have you covered.

CyberHunter Solutions

CyberHunter Solutions

CyberHunter is a leading website security company that provides penetration testing, Network Vulnerability Assessments, cyber security consulting services to prevent cyber attacks.

Extreme Engineering Solutions (X-ES)

Extreme Engineering Solutions (X-ES)

Extreme Engineering Solutions is a leader in the design, manufacture, testing, and support of hardware and software solutions for the embedded computing market.

Mayer Brown

Mayer Brown

Mayer Brown is a global law firm. We have deep experience in high-stakes litigation and complex transactions across industry sectors including the global financial services industry.

BlueCat Networks

BlueCat Networks

BlueCat is the Adaptive DNS company. Our mission is to help the world’s largest organizations thrive on network complexity, from the edge to the core.

IDECSI

IDECSI

IDECSI delivers cutting-edge technology and engages all employees in the security system for effective and cost-efficient data protection.

Raito

Raito

Raito's unique solution integrates with the data development process and lets data teams monitor, manage, and automate data security across the data stack.

RapidFort

RapidFort

RapidFort’s Software Attack Surface Optimization Platform remediates 95% of software vulnerabilities in minutes without code changes.