Adobe Breach 2026 · Self-Assessment

Is your organisation at risk from the alleged Adobe support breach?

A free 10-question check for enterprise teams using Adobe B2B platforms. Understand your exposure and get a tailored action list.

No personal data required to complete Results shown immediately Breach claim unverified by Adobe

Before you start

A threat actor claims to have accessed Adobe's customer support database via a third-party BPO vendor, reportedly exporting 13 million support tickets. Adobe has not confirmed this as of April 2026.

This assessment helps you understand whether your organisation's support history is likely to have contained sensitive information, and what to do about it.

  • 10 questions, takes about 3 minutes
  • If you only use Adobe creative tools, the assessment ends early - this primarily affects enterprise B2B platforms
  • Results are tailored to your specific product stack and usage pattern
  • Your answers stay in your browser. Only your email is ever sent anywhere - and only if you choose to subscribe at the end
Your answers are processed entirely in your browser. No data is collected during the assessment. This assessment does not require any personal information to complete.
Built by Arjen Segers · Adobe Certified Master (Marketo Engage Architect), MUG Benelux Leader. Read the full analysis →
Which Adobe products does your organisation use?
Select all that apply. This determines whether the breach is relevant to your stack and shapes all subsequent questions.
Marketing Automation & B2B Experience Cloud
Analytics, Optimisation & Data
Other Enterprise Products
Creative Cloud & Consumer Products
🔒

Creative tools only - lower direct exposure risk

The alleged breach targeted Adobe's customer support database primarily used by enterprise B2B and Experience Cloud customers. Creative Cloud support tickets typically contain less operationally sensitive data - integration configurations, API credentials, and CRM-connected data are specific to enterprise platform usage.

That said, the breach claim remains unverified and developing. Subscribe below to receive updates as the situation evolves - we'll update this assessment when more details emerge.

No spam. Updates only when the story develops.

Read the full analysis →   
How long has your organisation been actively using these enterprise products?
Longer usage typically means a larger support case history and more accumulated data in Adobe's support environment.
Is your Adobe platform integrated with a CRM system?
CRM integrations are one of the most common reasons for technical support tickets - and one of the most configuration-heavy. Sync issues typically involve sharing field mappings and record-level details.
Do you use API integrations or third-party tools connected to your Adobe instance?
API troubleshooting often requires sharing authentication tokens, request/response logs, and endpoint configurations - all high-value if exposed.
When your team reproduces issues for Adobe support, do you use a sandbox or test environment with non-production data?
Adobe's support guidance asks for "links to specific leads that are examples of the issue" and uncropped CRM screenshots. Whether those contained real contacts or test data determines the personal data exposure.
How often does your team contact Adobe support for your enterprise products?
More tickets over time means more accumulated correspondence in the support database - including attachments, screenshots, and logs.
Do your marketing databases or platforms contain personal data of EU-based contacts?
If personal data of EU data subjects was submitted in support tickets and the breach is confirmed, GDPR Article 33 creates a 72-hour notification obligation for your organisation as data controller.
How many people have admin-level access to your primary Adobe enterprise platform?
More admins typically means more people with access to submit detailed technical tickets, and a wider exposure surface if any credentials were shared in correspondence.
Have people who no longer work at your organisation previously had admin access to your Adobe platform?
Former team members may have submitted support tickets containing credentials or data that your current team is unaware of - and those credentials may still be active.
Has your team ever shared API keys, authentication tokens, or integration credentials in an Adobe support ticket?
This can happen intentionally (as part of troubleshooting instructions) or by mistake (included in logs or screenshots). Either way, it is the highest-priority credential rotation trigger.
What type of Adobe support or partner engagement do you use?
Adobe support access is included in all enterprise licenses. This question is about whether you have additional engagement that may have resulted in more detailed or more frequent ticket submissions on your behalf.
See your recommended actions
Free resource
Copy-paste notice to send your admins, architects and support contacts
A ready-to-send message asking admins and vendors to review what they submitted to Adobe support.