Data Breaches at Home Telecom and Hertz Compromise Customer Information

Data Breaches at Home Telecom and Hertz Compromise Customer Information

2025-04-18 companies

United States, Friday, 18 April 2025.
Recent breaches at Home Telecom and Hertz exposed sensitive customer data, including names and Social Security numbers, highlighting the critical need for enhanced cybersecurity measures.

The Scope of the Breaches

Significant data breaches have affected Home Telecom and Hertz, exposing personal information of thousands of customers. Home Telecom’s incident was discovered on March 17, 2025, when cybercriminals gained access to sensitive data stored in a third-party vendor’s inadequate security network [1]. Similarly, Hertz reported an unauthorized access to Cleo Communications’ systems in February 2025, compromising the information of hundreds of thousands of individuals globally [2][3].

Implications for Customers

The type of data compromised includes names, Social Security numbers, and, in Hertz’s case, financial and driver’s license information [1][2]. This information is at risk of being sold on the dark web or used for identity theft, posing severe risks for those affected [1]. As a countermeasure, Hertz is offering identity monitoring services to potentially impacted individuals, signaling the seriousness of the breach’s implications [3].

Murphy Law Firm has taken proactive steps by investigating legal claims on behalf of the affected individuals. The firm is considering class action lawsuits against both companies, highlighting the need for stronger legal frameworks to address cybersecurity lapses [1][2]. At an operational level, Hertz has engaged with national regulators and law enforcement to navigate the ongoing crisis, while Home Telecom is conducting internal reviews to mitigate further risks [2][3].

Broader Cybersecurity Challenges

These incidents underscore the persistent challenges organizations face in cybersecurity. The vulnerabilities exploited in these breaches, particularly zero-day flaws in third-party platforms like Cleo, reveal gaps in corporate cybersecurity strategies [3]. Cybersecurity experts emphasize the urgency for organizations to upgrade their security measures, incorporate data encryption, and monitor external connections rigorously to prevent similar occurrences [3].

Sources


cybersecurity data breach