Kiuwan logo

2026 Security Data Breaches: The Complete Tracker of Global Incidents

2026-Security-Data-Breaches-The-Complete-Tracker-of-Global-Incidents-blog-image

Understanding and tracking security data breaches

Security data breaches are one of the biggest challenges organizations face today. Every year, companies deal with data leaks, ransomware attacks, or unauthorized access to sensitive information, often because of preventable mistakes in their software or infrastructure.

Staying informed is the first step to staying secure. That’s why we created this updated tracker of major security data breaches to serve as a central place where you can find verified incidents, learn what went wrong, and see how these real-world examples can help you strengthen your own data security practices.

How Kiuwan tracks and verifies major security data breaches

This tracker only includes security data breaches that meet at least one of these criteria:

  • Confirmed by the affected organization, a regulator, or a reputable cybersecurity source
  • involves a significant amount of data, systems, or sensitive information
  • Exposes new or notable attack techniques like cloud misconfigurations, supply-chain compromises, or ransomware-as-a-service campaigns
  • Offers meaningful insight into trends shaping modern software security

We hope this tracker makes it easier for teams to see how breaches happen and, more importantly, what steps they can take to prevent them.

Global security data breaches

Below is an updated list of security data breaches and major cyber incidents. Each item includes when the breach was disclosed, the organization and industry affected, the type of attack, and a link to a credible source for full details.

Top security data breaches of 2026 so far

  • Odido (Netherlands) – February 2026: Customer contact system breach, 6.2M customers (reported by spokesperson)
    Hackers accessed Odido’s customer contact environment and exfiltrated customer data. Source: TechCrunch; SecurityWeek.
  • Canada Goose – February 2026: Data leak claim tied to ShinyHunters, 600K records (claimed)
    Threat actors claimed to have leaked customer data. Canada Goose said the leaked data did not come from its systems and may relate to older exposure. Source: BleepingComputer; The Record.
  • Conduent (benefits and government services vendor) – February 2026 update: Ransomware-related breach impact, 25M+ individuals (updated estimate)
    Reporting in February 2026 indicates the affected population estimate expanded significantly from earlier figures. Source: SecurityWeek.
  • Under Armour – January 2026: Customer dataset posted, ~72M customers (reported)
    Under Armour said it is investigating; reporting indicates emails and other customer attributes were exposed, with no evidence of passwords or payment info in the described dataset. Source: AP. 

Top security data breaches of 2025 

  1. Change Healthcare (UnitedHealth Group)-February:Ransomware, 192.7M records
    1. Attackers breached the U.S. healthcare claims processor, exposing sensitive data for nearly 193 million individuals. Source
  2. AT&T- March:Data exposure, 86M record
    1. A legacy database containing more than 86 million customer records (including Social Security numbers) was leaked online, sparking widespread identity theft concerns. Source
  3. Kering (Gucci, Balenciaga, Alexander McQueen)- March:Third-party vendor breach
    1. Luxury conglomerate Kering confirmed customer data exposure after a compromise linked to one of its Salesforce suppliers. Source
  4. Qantas Airways- May:Third-party platform compromise, 5.7M records
    1. An external customer service platform breach exposed frequent-flyer data and personal details for more than 5 million passengers. Source
  5. Gravy Analytics- April:Unauthorized cloud access, tens of millions of records
    1. A U.S. location data broker exposed massive volumes of user data through a misconfigured cloud storage bucket. Source
  6. Ticketmaster (Live Nation)- May:Data theft via third-party provider, 560M records
    1. A criminal group claimed to have stolen customer data worldwide (including names, addresses, and payment details) through a third-party vendor compromise. Source
  7. Discord.io– January:Database compromise, 760K accounts
    1. Hackers gained access to a third-party service connected to Discord, exposing usernames, emails, and hashed passwords. Source
  8. French Hospital Group AP-HP-September:Ransomware attack, 33M records
    1. France’s largest hospital system suffered a ransomware breach, exposing sensitive health data from multiple hospitals in Paris. Source
  9. Bank of America (via Infosys McCamish)- January:Vendor compromise, 57K records
    1. A ransomware attack on technology vendor Infosys McCamish impacted Bank of America customer data and disrupted operations. Source
  10. LoanDepot- January:Ransomware, 16.6M records
    1. The mortgage lender reported a ransomware breach that disrupted business operations and exposed customer financial information. Source
  11. 700Credit – October: Data breach, 5.6M+ records
    1. A major breach at U.S. credit check provider 700Credit exposed personal data, including names, addresses, dates of birth, and Social Security numbers, for at least 5.6 million individuals. The attacker accessed data collected from auto dealerships between May and October 2025. Affected users are being notified by mail and advised to enable credit freezes and monitoring. Source

Notable major incidents disclosed in 2024

  • AT&T – March 2024: Leaked dataset affecting ~73M current and former account holders (reported by AT&T).
  • Ticketmaster (Live Nation) – May 2024: Large dataset offered for sale affecting 560M users (claimed). This figure is tied to threat-actor postings and was widely reported as an unverified claim at the time.

Additional global cyber incidents in 2026

DisclosedOrganizationIndustryRecords affectedType of attackWhat happenedSource
Feb 2026OdidoTelecom6.2M (reported)Unauthorized accessHackers accessed a customer contact system and exfiltrated customer dataTechCrunch; SecurityWeek
Feb 2026Canada GooseRetail600K (claimed)Data leak claimShinyHunters claimed a leak; company said it did not come from its systemsBleepingComputer; The Record
Feb 2026 (update)ConduentGov/Benefits services25M+ (reported)Ransomware/extortionReporting indicates the affected population estimate expandedSecurityWeek
Jan 2026Under ArmourRetail~72M (reported)Dataset exposureCustomer dataset published; company investigatingAP News
Jul 2025Allianz LifeInsuranceMajority of 1.4MSocial engineeringThird-party cloud system accessed via social engineeringAP News
Jul 2025QantasAirlineUp to 6MThird-party compromiseContact-center platform breach exposed customer infoThe Guardian
Jun 2025 (reported Sep)KeringRetail/LuxuryUndisclosedCyberattackCustomer data theft reported; authorities notifiedThe Guardian
Mar 2025Yale New Haven HealthHealthcare5.6MHacking/IT incidentPatient data exposed per reporting and filingsCT Insider 

Examples of major security data breaches

Every breach is different, but the same problems tend to show up more often than others. Here are common ways real-world security data breaches happen and why they’re still so hard to stop.

Cloud misconfigurations

One of the biggest culprits behind data exposure is cloud misconfiguration. Leaving a storage bucket or API open to the public (whether on AWS, Azure, or another platform) can give anyone access to sensitive data with just a few clicks.

Ransomware attacks

Ransomware attacks are when attackers encrypt systems, steal data, and demand payment to unlock files, often threatening to leak stolen information if the ransom isn’t paid.

Supply-chain compromises

Modern software depends on thousands of third-party tools, packages, and vendors. If even just one is breached, attackers can quickly move through the supply chain, affecting companies downstream.

Phishing and credential theft

Phishing is when attackers impersonate a trusted contact through fake emails or login pages to steal information like: usernames, passwords, or authentication codes. Once they have valid credentials, they can log in as real users and move quietly through systems often leading to larger breaches.

Unpatched vulnerabilities

Many breaches start with known vulnerabilities that were never fixed. When software goes unpatched or updates are delayed, attackers see an opportunity to exploit those weaknesses and gain access to critical systems.

Analyzing real-world breach patterns

Every breach reveals a weakness. From poor dependency management to insecure deployment pipelines, these incidents expose patterns that teams can analyze and learn from.

Dependency risk is growing

Open-source libraries and third-party components are being targeted more than ever. Attackers know that compromising one dependency can have a ripple effect through hundreds of applications downstream.

Human error remains a major factor

Simple mistakes still cause big problems. Weak passwords, reused credentials, or a single overlooked configuration can expose sensitive data to the public.

Cloud visibility gaps

It’s common for organizations moving to hybrid or multi-cloud environments to lose visibility along the way. Teams often focus on securing their applications but overlook the infrastructure-as-code settings and access permissions that quietly control who gets in.

Rising regulatory accountability

Governments and industries are tightening the rules around breach disclosure and data protection. For many, late or incomplete reporting can result in fines and reputational damage. For developers and security teams, tracking these patterns isnt just about awareness, it’s about action. The more we understand how a breach happened, the better we can design systems to prevent it.

Common causes of security data breaches

Security data breaches often start long before the attack itself. They’re often the result of weak processes, limited visibility, or unclear accountability within an organization.

1. Lack of security visibility

When organizations grow quickly or rely on multiple cloud platforms, it becomes harder to track every system, dependency, or user account, leaving blind spots for attackers to target.

2. Reactive security culture

Many organizations focus on fixing breaches after they happen, but without a proactive approach like continuous code scanning or automated vulnerability management, risks can go undetected until it’s too late.

3. Inconsistent patch management

Even when vulnerabilities are identified, it’s common for updates to lag behind production schedules. The longer a known flaw remains unpatched, the greater the chance it will be exploited.

4. Limited collaboration between teams

When development and security teams work in silos, information gets lost. Misaligned priorities can delay fixes, weaken defenses, and increase the risk of exposure.

5. Overreliance on manual processes

Manual reviews and testing can’t always keep pace with today’s fast release cycles. Without automation, mistakes (like a missed configuration or outdated dependency) can slip through and lead to security issues.

How to prevent data breaches before they happen

Preventing security data breaches starts with being proactive. Here are a few key practices every organization should adopt to build security into every stage of the software development lifecycle:

1. Integrate security testing early (Shift Left)

Adopting a shift left approach means bringing security into development from the very start instead of waiting until the end of the release cycle. Use tools like Static Application Security Testing (SAST) to analyze code as it’s written, catching vulnerabilities earlier on when they’re easier, and cheaper to fix.

2. Monitor open-source components continuously

Implement Software Composition Analysis (SCA) to identify vulnerable libraries and outdated dependencies. Regularly generating and reviewing Software Bills of Materials (SBOMs) gives visibility into what’s inside your applications and where risks exist.

3. Strengthen cloud configuration management

Audit permissions, encryption settings, and access controls on a regular basis. Enforce least-privilege principles and automate configuration checks to avoid human error and ensure optimal security.

4. Educate teams on secure coding and awareness

Security isn’t just a tooling issue, it’s a people issue too. Train developers and testers to recognize phishing attempts, sanitize inputs, and follow best practices for credential management.

5. Establish incident response and compliance workflows

Even with defenses in place, breaches can still happen. Create an incident response plan, ensure regulatory reporting readiness (GDPR, HIPAA, CCPA), and run post-incident analyses to close security gaps.

How Kiuwan helps prevent security data breaches

Preventing security data breaches requires security to be part of how software is built. Kiuwan helps organizations embed continuous testing and analysis throughout the development lifecycle.

  • SAST identifies insecure code patterns before deployment.
  • SCA detects outdated or vulnerable third-party components.
  • SBOM generation gives full visibility into your software supply chain.

Together, these tools help teams stay ahead of threats, shifting from reacting to breaches to preventing them before they happen. With Kiuwan, developers and security teams can find and fix vulnerabilities early, stay compliant, and protect their applications from the inside out. Start your free Kiuwan trial today! 


FAQ

What is a data security breach?

A data security breach occurs when sensitive, protected, or confidential information is accessed, disclosed, or stolen without authorization. This can include personal data, financial records, intellectual property, or credentials. Breaches can result from cyberattacks, human error, or security misconfigurations.

What are the main causes of data breaches?

Most data breaches can be traced to one or more of the following root causes:

• Phishing and social engineering: tricking users into revealing passwords or clicking malicious links.
• Exploited software vulnerabilities: attackers taking advantage of unpatched or outdated systems.
• Misconfigured cloud services: public access to sensitive data via unsecured storage buckets or APIs.
• Weak or stolen credentials: reuse of passwords or lack of multifactor authentication.
• Third-party risks: compromised vendors or supply-chain dependencies.

Understanding these causes helps teams build more resilient security practices.

What are the consequences of a data breach?

The impact of a breach depends on its scope and type of data involved. Common consequences include:

• Financial loss from fines, remediation, or downtime
• Reputation damage and customer trust erosion
• Regulatory penalties under GDPR, HIPAA, or CCPA
• Intellectual property theft or competitive disadvantage
• Operational disruption due to system compromise or ransomware

In some cases, organizations experience long-term brand damage that far exceeds the immediate financial costs.

How can organizations prevent data breaches?

Prevention requires a combination of secure coding practices, proactive monitoring, and strong access control. Teams can reduce risk by:

• Using Static Application Security Testing (SAST) to find insecure code early.
• Implementing Software Composition Analysis (SCA) to detect vulnerable open-source libraries.
• Generating Software Bills of Materials (SBOMs) for full dependency visibility.
• Regularly applying patches and updates to all software.
• Training employees on cybersecurity awareness and phishing prevention.
• Enforcing multifactor authentication and least-privilege access policies.

How do data breaches affect software development?

Breaches highlight the importance of building security into every stage of the development lifecycle — not just after release. Developers and QA teams play a critical role in identifying vulnerabilities before attackers exploit them. By integrating automated security testing tools, teams can detect issues early and avoid introducing exploitable code into production.

What should an organization do immediately after a data breach?

If a breach occurs, organizations should:

1. Contain the incident by isolating affected systems.
2. Identify and close the vulnerability that caused the breach.
3. Notify affected users and authorities if required by law.
4. Conduct a forensic investigation to understand the scope.
5. Review and strengthen security controls to prevent recurrence.

Prompt and transparent response helps limit damage and restore trust.

What trends are shaping data breaches today?

Recent trends show a shift toward:

• Supply-chain attacks that target third-party software and services.
• AI-powered phishing campaigns that mimic real users.
• Cloud-centric breaches caused by poor configuration and identity management.
• Ransomware-as-a-service models that lower the barrier for cybercriminals.
• Increasing regulatory scrutiny and mandatory disclosure laws.

These evolving threats underscore why continuous software security testing and monitoring are essential.

In This Article:

Request Your Free Kiuwan Demo Today!

Get Your FREE Demo of Kiuwan Application Security Today!

Identify and remediate vulnerabilities with fast and efficient scanning and reporting. We are compliant with all security standards and offer tailored packages to mitigate your cyber risk within the SDLC.

Related Posts

2026 Security Data Breaches The Complete Tracker of Global Incidents
© 2026 Kiuwan. All Rights Reserved.