Company Details
bell
33,894
363,183
517
bell.ca
0
BEL_1877834
In-progress


Bell Vendor Cyber Rating & Cyber Score
bell.caWe advance how people connect with each other and the world #ConnectionIsEverything. Bell is Canada's largest communications company providing advanced Bell broadband wireless, Internet, TV, media and business communications services. Founded in Montréal in 1880, Bell is wholly owned by BCE Inc. To learn more, please visit Bell.ca or BCE.ca Through Bell for Better, we are investing to create a better today and a better tomorrow by supporting the social and economic prosperity of our communities. This includes the Bell Let's Talk initiative, which promotes Canadian mental health with national awareness and anti-stigma campaigns like Bell Let's Talk Day and significant Bell funding of community care and access, research and workplace initiatives throughout the country. To learn more, please visit Bell.ca/LetsTalk
Company Details
bell
33,894
363,183
517
bell.ca
0
BEL_1877834
In-progress
Between 0 and 549

Bell Global Score (TPRM)XXXX

Description: Bell Ambulance Suffers Major Data Breach in Medusa Ransomware Attack In February 2025, Wisconsin-based Bell Ambulance, a leading emergency medical services provider, fell victim to a cyberattack by the Medusa ransomware-as-a-service operation. The breach compromised sensitive data belonging to 237,830 individuals, including Social Security numbers, financial account details, driver’s license numbers, medical records, and health insurance information. Bell Ambulance disclosed the incident in breach notices filed with Maine regulators, confirming that threat actors exfiltrated the data. While the company began sending breach notifications in April 2025, additional victims were identified in the following months. The attack traces back to a 2024 ransom demand by Medusa, which sought $400,000 in exchange for not leaking the stolen 219 GB of data. The FBI has since highlighted Medusa’s growing threat, noting that the group has targeted over 300 critical infrastructure organizations since its emergence in June 2021. The Bell Ambulance breach underscores the persistent risks posed by ransomware operations to healthcare and emergency services.
Description: Cyberattack on Bell Ambulance Exposes Data of Over 235,000 Individuals Bell Ambulance, Wisconsin’s largest ambulance provider, confirmed a data breach affecting 237,830 individuals after hackers infiltrated its systems in early 2025. The attack, discovered on February 13, resulted in the theft of sensitive information, including Social Security numbers, driver’s license details, financial accounts, medical records, and health insurance data. The company, which serves Milwaukee and surrounding cities with over 750 employees handling roughly 140,000 calls annually, engaged cybersecurity experts to investigate and mitigate the breach. Notifications to affected individuals began in April 2025, with additional victims identified through the fall. The Medusa ransomware gang claimed responsibility for the attack, demanding a $400,000 ransom for the 219 GB of stolen data. The group, active since June 2021, has targeted critical infrastructure, including healthcare and government entities across multiple states. In March 2025, the FBI issued an advisory warning of Medusa’s escalating attacks, noting its use of triple extortion tactics demanding multiple ransom payments under false pretenses. The breach underscores the persistent threat ransomware groups pose to healthcare and emergency services.
Description: Hackers have illegally obtained customer information, primarily subscriber names and e-mail addresses. Up to 100,000 customers were affected by the hack. Hackers accessed nearly 1.9 million Bell customer e-mail addresses as well as 1,700 names and phone numbers.
Description: Bell suffered from a data breach incident that exposed1.9 million customer e-mail addresses, and 700 names and phone numbers were illegally accessed. Financial, password or other sensitive personal information was not accessed. Bell takes swift action to protect vulnerable systems. The business has contacted the Office of the Privacy Commissioner and has been closely collaborating with the RCMP cybercrime unit in its investigation.


Bell has 44.44% fewer incidents than the average of same-industry companies with at least one recorded incident.
Bell has 14.53% fewer incidents than the average of all companies with at least one recorded incident.
Bell reported 1 incidents this year: 0 cyber attacks, 1 ransomware, 0 vulnerabilities, 0 data breaches, compared to industry peers with at least 1 incident.
Bell cyber incidents detection timeline including parent company and subsidiaries

We advance how people connect with each other and the world #ConnectionIsEverything. Bell is Canada's largest communications company providing advanced Bell broadband wireless, Internet, TV, media and business communications services. Founded in Montréal in 1880, Bell is wholly owned by BCE Inc. To learn more, please visit Bell.ca or BCE.ca Through Bell for Better, we are investing to create a better today and a better tomorrow by supporting the social and economic prosperity of our communities. This includes the Bell Let's Talk initiative, which promotes Canadian mental health with national awareness and anti-stigma campaigns like Bell Let's Talk Day and significant Bell funding of community care and access, research and workplace initiatives throughout the country. To learn more, please visit Bell.ca/LetsTalk


ACN is the leading direct selling telecommunications and essential services provider. ACN Inc. was founded in 1993 by four entrepreneurs and is now operating in North America. ACN offers essential products and services that people use every day, while also offering a powerful business ownership oppo

(Formerly etisalat UAE) For more than four decades, we have connected people and now we’ve evolved to become the digital telco of the future. Our mission is to grow, transform and excel as the region’s technology leader while enhancing digital customer experience and operation agility. e& UAE offe

TELMEX, la empresa líder de telecomunicaciones y servicios TI en México, ha realizado importantes inversiones para desarrollar la plataforma tecnológica más robusta y vanguardista del país, que le permite ofrecer la más amplia gama de soluciones, con los mayores estándares de calidad, seguridad, con

We are a forward-focused digital champion always been focused on innovation and evolution. Our purpose is to create and bring greater dimension and richness to people’s personal and professional lives. With stc, You will always be empowered to focus on delivering what’s next through collaborati
We understand that our customers want an easier, less complicated life. We’re using our network, labs, products, services, and people to create a world where everything works together seamlessly, and life is better as a result. How will we continue to drive for this excellence in innovation?
Idea Cellular is an Aditya Birla Group Company, India's first truly multinational corporation. Idea is a pan-India integrated GSM operator offering 2G and 3G services, and has its own NLD and ILD operations, and ISP license. With revenue in excess of $4 billion; revenue market share of 18%; and subs

Reliance Communications Limited, founded by the late Shri Dhirubhai H Ambani (1932-2002), has Corporate clientele that includes 40,000 Indian and multinational corporations, including small and medium enterprises. Reliance Communications has established a pan-India, Next-Generation, digital network
Ciena (NYSE:CIEN) is the global leader in high-speed connectivity. We build advanced networks to support exponential growth in bandwidth demand—empowering our customers, partners, and communities to thrive in the AI era. With unparalleled expertise and innovation, our networking systems, interconnec

At TELUS, our purpose-driven team works together every day to innovate and do good. From providing technology solutions that make our lives safer and easier, to supporting those who need it most, our inclusive, spirited and giving people are passionate about empowering our customers, communities and
.png)
a group of three cybersecurity experts stand with satisfied looks on their faces with one holding a laptop computer while he group stands in front of a...
This ASX cybersecurity stock could be worth a closer look according to analysts at Bell Potter. Here's what the broker is saying...
Bell Canada's Bell Cyber division has launched a new fully-managed cybersecurity solutions for Canadian SMEs called CyberShield Connect, powered by the...
New partnership expands the McKenna Institute's role in developing job‑ready cybersecurity talent in New Brunswick, with Bell Cyber scaling...
A shortage in artificial intelligence and cybersecurity experts has led to a partnership between the University of New Brunswick and Bell...
Bell invests $1 million in McKenna Institute to strengthen Canada's cybersecurity talent pipeline ... FREDERICTON, NB, Feb. 27, 2026 /CNW/ - Bell...
New partnership expands the McKenna Institute's role in developing job‑ready cybersecurity talent in New Brunswick, with Bell Cyber scaling...
Bell Cyber and Radware are launching a unified, AI-driven managed security service to enhance protection against sophisticated cyberattacks...
Microsoft CEO Satya Nadella has shuffled two of his top lieutenants in a move that puts engineering quality and cybersecurity front and...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Bell is https://letstalk.bell.ca/en/.
According to Rankiteo, Bell’s AI-generated cybersecurity score is 515, reflecting their Critical security posture.
According to Rankiteo, Bell currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Bell has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Bell is not certified under SOC 2 Type 1.
According to Rankiteo, Bell does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Bell is not listed as GDPR compliant.
According to Rankiteo, Bell does not currently maintain PCI DSS compliance.
According to Rankiteo, Bell is not compliant with HIPAA regulations.
According to Rankiteo,Bell is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Bell operates primarily in the Telecommunications industry.
Bell employs approximately 33,894 people worldwide.
Bell presently has no subsidiaries across any sectors.
Bell’s official LinkedIn profile has approximately 363,183 followers.
Bell is classified under the NAICS code 517, which corresponds to Telecommunications.
No, Bell does not have a profile on Crunchbase.
Yes, Bell maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/bell.
As of April 02, 2026, Rankiteo reports that Bell has experienced 4 cybersecurity incidents.
Bell has an estimated 10,042 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware and Breach.
Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with bell takes swift action to protect vulnerable systems., and law enforcement notified with the business has contacted the office of the privacy commissioner and has been closely collaborating with the rcmp cybercrime unit in its investigation., and third party assistance with cybersecurity experts, and communication strategy with notifications to affected individuals, and communication strategy with breach notifications sent to affected individuals..
Title: Bell Customer Data Breach
Description: Hackers have illegally obtained customer information, primarily subscriber names and e-mail addresses.
Type: Data Breach
Title: Bell Data Breach
Description: Bell suffered from a data breach incident that exposed 1.9 million customer e-mail addresses, and 700 names and phone numbers were illegally accessed. Financial, password or other sensitive personal information was not accessed. Bell takes swift action to protect vulnerable systems.
Type: Data Breach
Title: Cyberattack on Bell Ambulance Exposes Data of Over 235,000 Individuals
Description: Bell Ambulance, Wisconsin’s largest ambulance provider, confirmed a data breach affecting 237,830 individuals after hackers infiltrated its systems in early 2025. The attack resulted in the theft of sensitive information, including Social Security numbers, driver’s license details, financial accounts, medical records, and health insurance data.
Date Detected: 2025-02-13
Date Publicly Disclosed: 2025-04
Type: Data Breach, Ransomware
Threat Actor: Medusa ransomware gang
Motivation: Financial gain (ransom)
Title: Bell Ambulance Suffers Major Data Breach in Medusa Ransomware Attack
Description: In February 2025, Wisconsin-based Bell Ambulance, a leading emergency medical services provider, fell victim to a cyberattack by the Medusa ransomware-as-a-service operation. The breach compromised sensitive data belonging to 237,830 individuals, including Social Security numbers, financial account details, driver’s license numbers, medical records, and health insurance information. The attack traces back to a 2024 ransom demand by Medusa, which sought $400,000 in exchange for not leaking the stolen 219 GB of data.
Date Detected: 2025-02
Date Publicly Disclosed: 2025-04
Type: Ransomware
Threat Actor: Medusa ransomware-as-a-service operation
Motivation: Financial gain
Common Attack Types: The most common types of attacks the company has faced is Ransomware.

Data Compromised: Customer e-mail addresses, Subscriber names, Phone numbers

Data Compromised: 1.9 million customer e-mail addresses, 700 names and phone numbers

Data Compromised: Sensitive personal and medical information
Identity Theft Risk: High
Payment Information Risk: High

Data Compromised: Sensitive data of 237,830 individuals, including Social Security numbers, financial account details, driver’s license numbers, medical records, and health insurance information
Identity Theft Risk: High
Payment Information Risk: High
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Customer E-Mail Addresses, Subscriber Names, Phone Numbers, , Email Addresses, Names, Phone Numbers, , Social Security Numbers, Driver’S License Details, Financial Accounts, Medical Records, Health Insurance Data, , Social Security Numbers, Financial Account Details, Driver’S License Numbers, Medical Records, Health Insurance Information and .

Entity Name: Bell
Entity Type: Company
Industry: Telecommunications
Customers Affected: 100000

Entity Name: Bell
Entity Type: Telecommunications Company
Industry: Telecommunications
Customers Affected: 1.9 million customer e-mails, 700 names and phone numbers

Entity Name: Bell Ambulance
Entity Type: Ambulance Service Provider
Industry: Healthcare, Emergency Services
Location: Milwaukee, Wisconsin, USA
Size: 750+ employees, 140,000 calls annually
Customers Affected: 237,830

Entity Name: Bell Ambulance
Entity Type: Emergency medical services provider
Industry: Healthcare
Location: Wisconsin, USA
Customers Affected: 237,830

Incident Response Plan Activated: Bell takes swift action to protect vulnerable systems.
Law Enforcement Notified: The business has contacted the Office of the Privacy Commissioner and has been closely collaborating with the RCMP cybercrime unit in its investigation.

Third Party Assistance: Cybersecurity experts
Communication Strategy: Notifications to affected individuals

Communication Strategy: Breach notifications sent to affected individuals
Incident Response Plan: The company's incident response plan is described as Bell takes swift action to protect vulnerable systems..
Third-Party Assistance: The company involves third-party assistance in incident response through Cybersecurity experts.

Type of Data Compromised: Customer e-mail addresses, Subscriber names, Phone numbers
Number of Records Exposed: 1900000

Type of Data Compromised: Email addresses, Names, Phone numbers
Number of Records Exposed: 1.9 million email addresses, 700 names and phone numbers
Sensitivity of Data: Non-sensitive (no financial, password, or other sensitive personal information)
Personally Identifiable Information: NamesPhone numbers

Type of Data Compromised: Social security numbers, Driver’s license details, Financial accounts, Medical records, Health insurance data
Number of Records Exposed: 237,830
Sensitivity of Data: High
Data Exfiltration: 219 GB of stolen data
Personally Identifiable Information: Yes

Type of Data Compromised: Social security numbers, Financial account details, Driver’s license numbers, Medical records, Health insurance information
Number of Records Exposed: 237,830
Sensitivity of Data: High
Data Exfiltration: 219 GB of data
Personally Identifiable Information: Yes

Ransom Demanded: $400,000
Ransomware Strain: Medusa
Data Exfiltration: Yes

Ransom Demanded: $400,000
Ransomware Strain: Medusa
Data Exfiltration: Yes

Regulatory Notifications: The business has contacted the Office of the Privacy Commissioner.

Regulatory Notifications: Breach notices filed with Maine regulators

Source: FBI Advisory

Source: Maine regulators breach notices

Source: FBI report on Medusa ransomware
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: FBI Advisory, and Source: Maine regulators breach notices, and Source: FBI report on Medusa ransomware.

Investigation Status: Ongoing
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notifications to affected individuals and Breach notifications sent to affected individuals.

Customer Advisories: Notifications sent to affected individuals

Customer Advisories: Breach notifications sent to affected individuals
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Notifications sent to affected individuals and Breach notifications sent to affected individuals.
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Cybersecurity experts.
Last Ransom Demanded: The amount of the last ransom demanded was $400,000.
Last Attacking Group: The attacking group in the last incident were an Medusa ransomware gang and Medusa ransomware-as-a-service operation.
Most Recent Incident Detected: The most recent incident detected was on 2025-02-13.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2025-04.
Most Significant Data Compromised: The most significant data compromised in an incident were Customer e-mail addresses, Subscriber names, Phone numbers, , 1.9 million customer e-mail addresses, 700 names and phone numbers, , Sensitive personal and medical information, Sensitive data of 237,830 individuals, including Social Security numbers, financial account details, driver’s license numbers, medical records and and health insurance information.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Cybersecurity experts.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were 700 names and phone numbers, Sensitive personal and medical information, Phone numbers, Customer e-mail addresses, 1.9 million customer e-mail addresses, Sensitive data of 237,830 individuals, including Social Security numbers, financial account details, driver’s license numbers, medical records, and health insurance information and Subscriber names.
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 2.4M.
Highest Ransom Demanded: The highest ransom demanded in a ransomware incident was $400,000.
Most Recent Source: The most recent source of information about an incident are FBI Advisory, FBI report on Medusa ransomware and Maine regulators breach notices.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Most Recent Customer Advisory: The most recent customer advisory issued were an Notifications sent to affected individuals and Breach notifications sent to affected individuals.
.png)
A vulnerability was found in Nothings stb up to 1.26. Impacted is the function stbtt_InitFont_internal in the library stb_truetype.h of the component TTF File Handler. Performing a manipulation results in out-of-bounds read. Remote exploitation of the attack is possible. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read in VS6ComFile!get_macro_mem_COM. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain a stack-based buffer overflow in VS6ComFile!CSaveData::_conv_AnimationItem. Opening a crafted V7 file may lead to arbitrary code execution on the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6MemInIF!set_temp_type_default. Opening a crafted V7 file may lead to information disclosure from the affected product.
V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in VS6ComFile!load_link_inf. Opening a crafted V7 file may lead to information disclosure from the affected product.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.