41 datasets found
  1. All-time biggest online data breaches 2025

    • statista.com
    • ai-chatbox.pro
    Updated May 26, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). All-time biggest online data breaches 2025 [Dataset]. https://www.statista.com/statistics/290525/cyber-crime-biggest-online-data-breaches-worldwide/
    Explore at:
    Dataset updated
    May 26, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    Jan 2025
    Area covered
    Worldwide
    Description

    The largest reported data leakage as of January 2025 was the Cam4 data breach in March 2020, which exposed more than 10 billion data records. The second-largest data breach in history so far, the Yahoo data breach, occurred in 2013. The company initially reported about one billion exposed data records, but after an investigation, the company updated the number, revealing that three billion accounts were affected. The National Public Data Breach was announced in August 2024. The incident became public when personally identifiable information of individuals became available for sale on the dark web. Overall, the security professionals estimate the leakage of nearly three billion personal records. The next significant data leakage was the March 2018 security breach of India's national ID database, Aadhaar, with over 1.1 billion records exposed. This included biometric information such as identification numbers and fingerprint scans, which could be used to open bank accounts and receive financial aid, among other government services.

    Cybercrime - the dark side of digitalization As the world continues its journey into the digital age, corporations and governments across the globe have been increasing their reliance on technology to collect, analyze and store personal data. This, in turn, has led to a rise in the number of cyber crimes, ranging from minor breaches to global-scale attacks impacting billions of users – such as in the case of Yahoo. Within the U.S. alone, 1802 cases of data compromise were reported in 2022. This was a marked increase from the 447 cases reported a decade prior. The high price of data protection As of 2022, the average cost of a single data breach across all industries worldwide stood at around 4.35 million U.S. dollars. This was found to be most costly in the healthcare sector, with each leak reported to have cost the affected party a hefty 10.1 million U.S. dollars. The financial segment followed closely behind. Here, each breach resulted in a loss of approximately 6 million U.S. dollars - 1.5 million more than the global average.

  2. m

    Data Breach Notification Reports

    • mass.gov
    Updated Jan 19, 2019
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Office of Consumer Affairs and Business Regulation (2019). Data Breach Notification Reports [Dataset]. https://www.mass.gov/lists/data-breach-notification-reports
    Explore at:
    Dataset updated
    Jan 19, 2019
    Dataset authored and provided by
    Office of Consumer Affairs and Business Regulation
    Area covered
    Massachusetts
    Description

    View Data Breach Notification Reports, which include how many breaches are reported each year and the number of affected residents.

  3. "Pwned Passwords" Dataset

    • academictorrents.com
    bittorrent
    Updated Aug 3, 2018
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    "Pwned Passwords" Dataset [Dataset]. https://academictorrents.com/details/53555c69e3799d876159d7290ea60e56b35e36a9
    Explore at:
    bittorrent(11101449979)Available download formats
    Dataset updated
    Aug 3, 2018
    Dataset provided by
    Have I Been Pwned?http://haveibeenpwned.com/
    License

    https://academictorrents.com/nolicensespecifiedhttps://academictorrents.com/nolicensespecified

    Description

    Version 3 with 517M hashes and counts of password usage ordered by most to least prevalent Pwned Passwords are 517,238,891 real world passwords previously exposed in data breaches. This exposure makes them unsuitable for ongoing use as they re at much greater risk of being used to take over other accounts. They re searchable online below as well as being downloadable for use in other online system. The entire set of passwords is downloadable for free below with each password being represented as a SHA-1 hash to protect the original value (some passwords contain personally identifiable information) followed by a count of how many times that password had been seen in the source data breaches. The list may be integrated into other systems and used to verify whether a password has previously appeared in a data breach after which a system may warn the user or even block the password outright.

  4. s

    Data Breach Statistics

    • searchlogistics.com
    Updated Apr 1, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2025). Data Breach Statistics [Dataset]. https://www.searchlogistics.com/learn/statistics/cybersecurity-statistics/
    Explore at:
    Dataset updated
    Apr 1, 2025
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    The average cyber attack takes 280 days to identify and contain and it costs an average of about $3.86 million to deal with properly.

  5. s

    What’s The Cost Of A Data Breach?

    • searchlogistics.com
    Updated Apr 1, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2025). What’s The Cost Of A Data Breach? [Dataset]. https://www.searchlogistics.com/learn/statistics/cybersecurity-statistics/
    Explore at:
    Dataset updated
    Apr 1, 2025
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Data breaches cost companies and businesses a lot of money. The average cost of a data breach is $3.86 million.

  6. Global markets with highest data breach density 2023

    • statista.com
    • ai-chatbox.pro
    Updated Jun 23, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Global markets with highest data breach density 2023 [Dataset]. https://www.statista.com/statistics/1459466/data-breaches-density-countries/
    Explore at:
    Dataset updated
    Jun 23, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    2023
    Area covered
    Worldwide
    Description

    In 2023, Russia ranked first in the world by data breach density. The number of breached e-mail accounts per thousand people in the country amounted to ***. The United States ranked second, with *** user accounts, while Czechia followed, with *** accounts. The data breach density in Denmark, Switzerland, and Italy was relatively lower.

  7. Number of data compromises and impacted individuals in U.S. 2005-2024

    • statista.com
    • ai-chatbox.pro
    Updated Jul 14, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Number of data compromises and impacted individuals in U.S. 2005-2024 [Dataset]. https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/
    Explore at:
    Dataset updated
    Jul 14, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    United States
    Description

    In 2024, the number of data compromises in the United States stood at 3,158 cases. Meanwhile, over 1.35 billion individuals were affected in the same year by data compromises, including data breaches, leakage, and exposure. While these are three different events, they have one thing in common. As a result of all three incidents, the sensitive data is accessed by an unauthorized threat actor. Industries most vulnerable to data breaches Some industry sectors usually see more significant cases of private data violations than others. This is determined by the type and volume of the personal information organizations of these sectors store. In 2024 the financial services, healthcare, and professional services were the three industry sectors that recorded most data breaches. Overall, the number of healthcare data breaches in some industry sectors in the United States has gradually increased within the past few years. However, some sectors saw decrease. Largest data exposures worldwide In 2020, an adult streaming website, CAM4, experienced a leakage of nearly 11 billion records. This, by far, is the most extensive reported data leakage. This case, though, is unique because cyber security researchers found the vulnerability before the cyber criminals. The second-largest data breach is the Yahoo data breach, dating back to 2013. The company first reported about one billion exposed records, then later, in 2017, came up with an updated number of leaked records, which was three billion. In March 2018, the third biggest data breach happened, involving India’s national identification database Aadhaar. As a result of this incident, over 1.1 billion records were exposed.

  8. e

    Data from: A dataset containing S&P500 information security breaches and...

    • b2find.eudat.eu
    • dataverse.nl
    Updated Jul 30, 2024
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2024). A dataset containing S&P500 information security breaches and related financial firm performances [Dataset]. https://b2find.eudat.eu/dataset/3dda16ee-4e98-570f-8db0-53837a6b899c
    Explore at:
    Dataset updated
    Jul 30, 2024
    Description

    In this document, comprehensive datasets are presented to advance research on information security breaches. The datasets include data on disclosed information security breaches affecting S&P500 companies between 2020 and 2023, collected through manual search of the Internet. Overall, the datasets include 504 companies, with detailed information security breach and financial data available for 97 firms that experienced a disclosed information security breach. This document will describe the datasets in detail, explain the data collection procedure and shows the initial versions of the datasets. Contact at Tilburg University Francesco Lelli Data files: 6 raw Microsoft Excel files (.xls) Supplemental material: Data_Publication_Package.pdf Detailed description of the data has been released in the following preprint: [Preprint in progress] Structure data package The folder contains the 6 .xls documents, the data publication package. Link to the preprint describing the dataset is in the description of the dataset itself. The six .xls documents are also present in their preferred file format csv (see Notes for further explanation). Production date: 01-2024---- 05-2024 Method: Data on information security breaches through manual search of the Internet, financial data through Refinitiv (LSEG). (Approval obtained from Refinitiv to publish these data) Universe: S&P500 companies Country / Nation: USA

  9. d

    Data from: Health IT, hacking, and cybersecurity: national trends in data...

    • search.dataone.org
    • data.niaid.nih.gov
    • +2more
    Updated Apr 6, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Jay G. Ronquillo; J. Erik Winterholler; Kamil Cwikla; Raphael Szymanski; Christopher Levy (2025). Health IT, hacking, and cybersecurity: national trends in data breaches of protected health information [Dataset]. http://doi.org/10.5061/dryad.24275c6
    Explore at:
    Dataset updated
    Apr 6, 2025
    Dataset provided by
    Dryad Digital Repository
    Authors
    Jay G. Ronquillo; J. Erik Winterholler; Kamil Cwikla; Raphael Szymanski; Christopher Levy
    Time period covered
    May 25, 2019
    Description

    Objective: The rapid adoption of health information technology (IT) coupled with growing reports of ransomware, and hacking has made cybersecurity a priority in health care. This study leverages federal data in order to better understand current cybersecurity threats in the context of health IT.

    Materials and Methods: Retrospective observational study of all available reported data breaches in the United States from 2013 to 2017, downloaded from a publicly available federal regulatory database.

    Results: There were 1512 data breaches affecting 154 415 257 patient records from a heterogeneous distribution of covered entities (P < .001). There were 128 electronic medical record-related breaches of 4 867 920 patient records, while 363 hacking incidents affected 130 702 378 records.

    Discussion and Conclusion: Despite making up less than 25% of all breaches, hacking was responsible for nearly 85% of all affected patient records. As medicine becomes increasingly interconnected and ...

  10. C

    Cybersecurity Statistics

    • searchlogistics.com
    Updated Apr 1, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Search Logistics (2025). Cybersecurity Statistics [Dataset]. https://www.searchlogistics.com/learn/statistics/cybersecurity-statistics/
    Explore at:
    Dataset updated
    Apr 1, 2025
    Dataset authored and provided by
    Search Logistics
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    These cybersecurity statistics will help you understand the state of online security and give you a better idea of what it takes to protect yourself.

  11. Cyber Security - Global Thematic Research

    • store.globaldata.com
    Updated Nov 4, 2016
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    GlobalData UK Ltd. (2016). Cyber Security - Global Thematic Research [Dataset]. https://store.globaldata.com/report/cyber-security-global-thematic-research/
    Explore at:
    Dataset updated
    Nov 4, 2016
    Dataset provided by
    GlobalDatahttps://www.globaldata.com/
    Authors
    GlobalData UK Ltd.
    License

    https://www.globaldata.com/privacy-policy/https://www.globaldata.com/privacy-policy/

    Time period covered
    2016 - 2020
    Area covered
    Global
    Description

    The world has entered the era of the Code War where every digital device, however small and innocuous, can be “weaponised” – as the recent Dyn cyber-attack aptly illustrated – to send “rogue code” deep into the Internet's engine room to create mayhem.
    Cybersecurity is critical to almost every business. Yet it is a non-core competence for most boards. The frequency of high profile corporate data breaches may accelerate because CEOs are not sufficiently trained in cyber risks.
    Almost every cyber-breach is an “inside job” – whether malicious or accidental – so real-time behavioural analytics is becoming increasingly important as a defense.
    Insidt this report, we look at the evolution, nature, growth in cybersecurity technologies and threat. Read More

  12. U

    FIIS_Breach_Shorelines.shp - Fire Island National Seashore Wilderness Breach...

    • data.usgs.gov
    • search.dataone.org
    • +3more
    Updated Oct 7, 2014
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Rachel Henderson; Cheryl Hapke; Owen Brenner; Billy Reynolds (2014). FIIS_Breach_Shorelines.shp - Fire Island National Seashore Wilderness Breach Shoreline Data Collected from Fire Island, New York, October 2014 to September 2016 [Dataset]. http://doi.org/10.5066/F7G15Z17
    Explore at:
    Dataset updated
    Oct 7, 2014
    Dataset provided by
    United States Geological Surveyhttp://www.usgs.gov/
    Authors
    Rachel Henderson; Cheryl Hapke; Owen Brenner; Billy Reynolds
    License

    U.S. Government Workshttps://www.usa.gov/government-works
    License information was derived automatically

    Time period covered
    Oct 7, 2014 - Sep 27, 2016
    Area covered
    New York, Fire Island
    Description

    Hurricane Sandy made U.S. landfall, coincident with astronomical high tides, near Atlantic City, New Jersey, on October 29, 2012. The storm, the largest on historical record in the Atlantic basin, affected an extensive area of the east coast of the United States. The highest waves and storm surge were focused along the heavily populated New York and New Jersey coasts. At the height of the storm, a record significant wave height of 9.6 meters (m) was recorded at the wave buoy offshore of Fire Island, New York. During the storm an overwash channel opened a breach in the location of Old Inlet, in the Otis Pike High Dunes Wilderness Area. This breach is referred to as the wilderness breach (fig 1).

    Fire Island, New York is the site of a long term coastal morphologic change and processes project conducted by the U.S. Geological Survey (USGS). One of the objectives of the project was to understand the morphologic evolution of the barrier system on a variety of time scales (days - year ...

  13. s

    Where Do Cyber Attacks Come From?

    • searchlogistics.com
    Updated Apr 1, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2025). Where Do Cyber Attacks Come From? [Dataset]. https://www.searchlogistics.com/learn/statistics/cybersecurity-statistics/
    Explore at:
    Dataset updated
    Apr 1, 2025
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Pay attention to the following cybersecurity statistics to learn how to protect yourself from attacks.

  14. T

    Storage capacity curve of the Hongshiyan, yibadao and xiaogangjian...

    • data.tpdc.ac.cn
    • tpdc.ac.cn
    zip
    Updated Mar 7, 2022
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Xinhua ZHANG (2022). Storage capacity curve of the Hongshiyan, yibadao and xiaogangjian impoundment and flow hydrograph data of breach [Dataset]. http://doi.org/10.11888/HumanNat.tpdc.272072
    Explore at:
    zipAvailable download formats
    Dataset updated
    Mar 7, 2022
    Dataset provided by
    TPDC
    Authors
    Xinhua ZHANG
    Area covered
    Description

    Data content: Storage capacity curve of the Hongshiyan, yibadao and xiaogangjian impoundment and flow hydrograph data of breach Data source: through literature search, classification, consolidation and compilation. Data quality description: through literature retrieval, data of four typical barrier lakes were compiled, including Hongshiyan barrier lake in Ludian, Yunnan, xiaogangjian (upper) barrier lake in Mianzhu County, Deyang City, Sichuan, and yibadao barrier lake in Mianzhu County, Deyang City, Sichuan. The basic parameters compiled here include: dam crest elevation, dam height, dam width and other basic parameters, as well as discharge channel parameters, dam grading, storage capacity curve, breach discharge hydrograph and other parameters, which were summarized and analyzed. It can provide a reference for the parameters of barrier lakes in the Qinghai Tibet Plateau.

  15. c

    The Fire Island Wilderness Breach Bathymetric Data collected with Personal...

    • s.cnmilf.com
    • data.usgs.gov
    • +4more
    Updated Jul 6, 2024
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    U.S. Geological Survey (2024). The Fire Island Wilderness Breach Bathymetric Data collected with Personal Watercraft and Backpack in Fire Island, New York (2014) as a GeoTIFF [Dataset]. https://s.cnmilf.com/user74170196/https/catalog.data.gov/dataset/the-fire-island-wilderness-breach-bathymetric-data-collected-withpersonal-watercraft-and-b
    Explore at:
    Dataset updated
    Jul 6, 2024
    Dataset provided by
    United States Geological Surveyhttp://www.usgs.gov/
    Area covered
    New York, Fire Island
    Description

    Scientists from the U.S. Geological Survey St. Petersburg Coastal and Marine Science Center in St. Petersburg, Florida, conducted a bathymetric survey of Fire Island, New York, from October 5 to 10, 2014. The U.S. Geological Survey is involved in a post-Hurricane Sandy effort to map and monitor the morphologic evolution of the wilderness breach, which formed in October 2012 during Hurricane Sandy, as part of the Hurricane Sandy Supplemental Project GS2-2B. During this study, bathymetry data were collected, using single-beam echo sounders and global positioning systems mounted to personal watercraft, along the Fire Island shoreface and within the wilderness breach, Fire Island Inlet, Narrow Bay, and Great South Bay east of Nicoll Bay. Additional bathymetry and elevation data were collected using backpack and wheel-mounted global positioning systems along the subaerial beach (foreshore and backshore), and flood shoals and shallow channels within the wilderness breach and adjacent shoreface.

  16. A

    Asia-Pacific Data Center Physical Security Market Report

    • datainsightsmarket.com
    doc, pdf, ppt
    Updated Mar 8, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Data Insights Market (2025). Asia-Pacific Data Center Physical Security Market Report [Dataset]. https://www.datainsightsmarket.com/reports/asia-pacific-data-center-physical-security-market-20434
    Explore at:
    pdf, doc, pptAvailable download formats
    Dataset updated
    Mar 8, 2025
    Dataset authored and provided by
    Data Insights Market
    License

    https://www.datainsightsmarket.com/privacy-policyhttps://www.datainsightsmarket.com/privacy-policy

    Time period covered
    2025 - 2033
    Area covered
    Asia–Pacific
    Variables measured
    Market Size
    Description

    The Asia-Pacific data center physical security market is experiencing robust growth, projected to reach $0.53 billion in 2025 and expand at a Compound Annual Growth Rate (CAGR) of 14.50% from 2025 to 2033. This surge is fueled by the increasing adoption of cloud computing, the proliferation of data centers across the region, and heightened concerns about data breaches and cyber threats. Key drivers include stringent government regulations mandating enhanced data security, the rising adoption of advanced security technologies like video surveillance, access control systems, and integrated security solutions, and the growing need for robust physical security infrastructure to protect against both internal and external threats. The market is segmented by solution type (video surveillance, access control, and others), service type (consulting, professional, and system integration services), and end-user sectors (IT & telecommunications, BFSI, government, healthcare, and others). The Asia-Pacific region, particularly countries like China, Japan, South Korea, and India, is witnessing significant investments in data center infrastructure, creating lucrative opportunities for physical security vendors. Market leaders like Axis Communications, Dahua Technology, and Bosch are actively expanding their presence in this rapidly evolving landscape. While the market presents significant opportunities, challenges remain. The high initial investment costs associated with implementing sophisticated security systems can act as a restraint, particularly for smaller data centers. Furthermore, the complexities of integrating various security technologies and managing a diverse range of security solutions pose challenges for data center operators. However, the increasing awareness of data security risks and the availability of cost-effective financing options are likely to mitigate these restraints. The market's future growth is expected to be driven by the adoption of AI-powered security solutions, the growing demand for managed security services, and the increasing focus on improving operational efficiency and minimizing downtime through integrated security solutions. The strong economic growth and rising digitalization in the Asia-Pacific region will further accelerate this market's expansion in the forecast period. This comprehensive report provides an in-depth analysis of the Asia-Pacific data center physical security market, covering the period 2019-2033. With a focus on the estimated year 2025 and a forecast period extending to 2033, this study offers invaluable insights for businesses operating in this rapidly expanding sector. The report leverages data from the historical period (2019-2024) to provide a robust understanding of market trends and future projections, valued in millions of units. Key search terms like data center security, Asia-Pacific security market, physical security solutions, access control systems, and video surveillance are integrated throughout to ensure maximum search engine visibility. Recent developments include: August 2023: Securitas signed an expanded 5-year agreement to provide data center security for Microsoft in 31 countries (including APAC countries), solidifying a strong relationship. The global agreement includes risk management, comprehensive security technology as a system integrator, specialised safety, and security resources, guarding services and digital interfaces. Securitas ensures that the data center physical security program remains innovative, robust, and effective. This demonstrates stability as a collaborator, assisting in navigating the challenges of Microsoft's expanding business., August 2023: Metrasens announced its partnership with Convergint. Through this partnership, Metrasens will provide its advanced detection systems through Convergint’s portfolio offering to its customers.. Key drivers for this market are: Increased Data Center Activities and Investment by the Hyperscale and Colocation Operators, Advancements in Video Surveillance Systems Connected to Cloud Systems. Potential restraints include: Increased Data Center Activities and Investment by the Hyperscale and Colocation Operators, Advancements in Video Surveillance Systems Connected to Cloud Systems. Notable trends are: The IT & Telecom Segment is Expected to Hold Significant Share.

  17. d

    Ground-Based Bathymetric Data Collected within the Wilderness Breach, Fire...

    • catalog.data.gov
    • search.dataone.org
    • +1more
    Updated Jul 6, 2024
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    U.S. Geological Survey (2024). Ground-Based Bathymetric Data Collected within the Wilderness Breach, Fire Island, New York, (2014) in XYZ ASCII Text File Format [Dataset]. https://catalog.data.gov/dataset/ground-based-bathymetric-data-collected-within-the-wilderness-breach-fire-island-new-york-
    Explore at:
    Dataset updated
    Jul 6, 2024
    Dataset provided by
    United States Geological Surveyhttp://www.usgs.gov/
    Area covered
    New York, Fire Island
    Description

    Scientists from the U.S. Geological Survey St. Petersburg Coastal and Marine Science Center in St. Petersburg, Florida, conducted a bathymetric survey of Fire Island, New York, from October 5 to 10, 2014. The U.S. Geological Survey is involved in a post-Hurricane Sandy effort to map and monitor the morphologic evolution of the wilderness breach, which formed in October 2012 during Hurricane Sandy, as part of the Hurricane Sandy Supplemental Project GS2-2B. During this study, bathymetry data were collected, using single-beam echo sounders and global positioning systems mounted to personal watercraft, along the Fire Island shoreface and within the wilderness breach, Fire Island Inlet, Narrow Bay, and Great South Bay east of Nicoll Bay. Additional bathymetry and elevation data were collected using backpack and wheel-mounted global positioning systems along the subaerial beach (foreshore and backshore), and flood shoals and shallow channels within the wilderness breach and adjacent shoreface.

  18. Cyber crime: distribution of data exposed 2014-2019, by sector

    • statista.com
    Updated Jul 9, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Cyber crime: distribution of data exposed 2014-2019, by sector [Dataset]. https://www.statista.com/statistics/422139/distribution-of-records-exposed-usa-by-sector/
    Explore at:
    Dataset updated
    Jul 9, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    United States
    Description

    The statistic presents the distribution of records exposed due to data breaches in the United States from 2014 to 2019, by sector. It was found that the share of sensitive records exposed as a result of data breaches in the government sector constituted **** percent of all exposed sensitive records in the United States in the most recently measured period. The banking and financial sector accounted for the majority of exposed sensitive records.

  19. Cybersecurity in Medical Devices - Thematic Research

    • store.globaldata.com
    Updated Oct 30, 2020
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    GlobalData UK Ltd. (2020). Cybersecurity in Medical Devices - Thematic Research [Dataset]. https://store.globaldata.com/report/cybersecurity-in-medical-devices-thematic-research/
    Explore at:
    Dataset updated
    Oct 30, 2020
    Dataset provided by
    GlobalDatahttps://www.globaldata.com/
    Authors
    GlobalData UK Ltd.
    License

    https://www.globaldata.com/privacy-policy/https://www.globaldata.com/privacy-policy/

    Time period covered
    2020 - 2024
    Area covered
    Global
    Description

    The global healthcare industry is increasingly embracing digital technologies, such as cloud, Big Data, Internet of Things (IoT), remote monitoring, and more, to deliver the best patient care. However, as more digital technologies are utilized, the greater potential there is for cyberattack. Healthcare data is particularly sensitive to cyberattack, since healthcare cyber breaches often involve loss of sensitive personal information and medical records. Digitally-connected medical devices are also susceptible to cyberattack, and interference with how these devices operate could potentially lead to patient harm or even death. Health system data breaches have occurred in the past and continue to occur. In 2019, there were 510 healthcare breaches of 500 records or more (up from 371 in 2018) reported to the US Department of Health and Human Services (HHS), which in total affected over 41 million patient records. Read More

  20. Vector sequences in early WIV SRA sequencing data of SARS-CoV-2 inform on a...

    • zenodo.org
    • data.niaid.nih.gov
    Updated Mar 21, 2021
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Daoyu Zhang; Daoyu Zhang (2021). Vector sequences in early WIV SRA sequencing data of SARS-CoV-2 inform on a potential large-scale security breach at the beginning of the COVID-19 pandemic [Dataset]. http://doi.org/10.5281/zenodo.4486195
    Explore at:
    Dataset updated
    Mar 21, 2021
    Dataset provided by
    Zenodohttp://zenodo.org/
    Authors
    Daoyu Zhang; Daoyu Zhang
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    DESCRIPTION

    Sequences identified as Influenza A virus, Spodoptera frugiperda rhabdovirus and Nipah henipavirus have been previously identified within the early HiSeq 1000 and HiSeq 3000 sequencing data of SARS-CoV-2, SRR11092059,SRR11092060,SRR11092061 and SRR11092062, and were being used to support the hypothesis that a "simultaneous outbreak of multiple zoonotic viruses" have happened in the Huanan Seafood market. https://doi.org/10.31219/osf.io/s4td6

    However, a closer examination of these sequences revealed that they were not sequences of actual wild viruses, but were in stead fragments left behind from PCR products and cloning vectors harboring both cDNA clones and infectious clones of such viruses, with evidence of viral sequences being joined directly to DNA sequences of vector and non-human origin within the same short reads.

    Here are the vector sequences and PCR product-like sequences recovered from the earliest WIV SRA sequencing data of Human SARS-CoV-2 from dataset SRR11092059,SRR11092060,SRR11092061,SRR11092062.

    Sequences associated with Vectors and PCR products from 3 distinct viral species have been obtained: The 3'-end of a Nipah Henipahvirus with fusion to a Hepatitis D virus Ribozyme, a T7 terminator and a Tetracycline resistance gene, The 5'-end of the same Nipah Henipahvirus with fusion to sequences found in diverse vectors, A complete vector genome encoding the HA gene of Influenza A virus subtype H7N9 under a CMV promoter and a bgH polyA terminator, and 221 Contiguous sequences corresponding to the Spodoptera frugiperda rhabdovirus reference genome fused to sequences that were homologous to multiple Plastid sequences and Notably Mitochondrial sequences of Rodents.

    As sequences corresponding to a rescued infectious clone of a BSL-4 organism (Nipah Henipahvirus) were found in sample sequences that supposedy represents patient samples that were obtained from Hospital ICU and sequenced in a pathogen diagnosis laboratory (which is separate from the Virology Research laboratory which is implied by the context of an Infectious Clone of such an organism, evident by the 3'-HDV ribozyme and T7 terminator fused directly to the 3'-terminus of the Nipah Henipahvirus reads), The discovery of artifact-containing sequences of at least 3 different pathogen species that are phylogenetically and methodologically distinct from each other in samples that were supposedly submitted by a laboratory that is Separate from the virological research laboratories that could have hosted such clone sequences imply extensive crosstalk and cross-contamination between the various laboratories within the Wuhan Institute of Virology, which includes at least one BSL-4 laboratory with evidence of containment breach of a BSL-4 organism and it's subsequent introduction into RNA-seq samples that were processed by a laboratory of distinct and separate purposes than the basic virological research evidenced by the Infectious Clone of the Hipah Henipahvirus.

    Such a discovery therefore likely imply a major security breach happening within the Wuhan institute of Virology at the time when the first sequences of SARS-CoV-2 was sampled and sequenced, which have important implications on the origins of the SARS-CoV-2 virus itself.

    METHODS

    The metagenomic sequencing datasets, SRR11092059,SRR11092060,SRR11092061 and SRR11092062 were first analyzed using the NCBI phylogenetic analysis tool, which identified viral sequences that is not related to SARS-CoV-2 itself. These include Influenza A virus (IAV, subtype H7N9), Spodoptera frugiperda rhabdovirus and Nipah Henipahvirus.

    The datasets were then subjected to BLAST search using MEGABLAST against the reference sequences of such viruses to verify the existence of the viral sequences and determine the exact sybtype of such viruses and the closest sequences on GenBank that corresponds to the reads. There seuqences are MH926031.1 for the Spodoptera frugiperda rhabdovirus, KY199425.1 for the Influenza A virus and AY988601.1 for the Nipah Henipahvirus.

    A second round BLAST analysis with these identified sequences were then performed, which unexpectedly revealed numerous reads corresponding to Cloning vectors and non-human Mitochondrial and Plastid sequences being fused directly to the sequences of the identified viral species. Reads were then downloaded and subjected to assembly using the CAP3 sequence assembly program and the EGASSEMBLER tool. Contig sequences were then queried against the NCBI nr/nt database which unanimously identified the original sample sequences as viral sequences inserted into cloning vectors.

    The complete sequence of the Influenza A virus Haemagluttinin (HA) gene clone was obtained from SRR11092061,SRR11092062 using multiple rounds of BLAST search and sequence assembly expansion on the existing vector-virus junction contigs, and a partial sequence corresponding the 3'-end of Nipah Henipahvirus AY988601.1 fused to a 3'-HDV ribozyme, T7 terminator and a Tet resistance gene was obtained from SRR11092059. In addition, 221 Contig sequences corresponding to the Rhabdovirus MH926031.1 fused to Chloroplast sequence MN524635.1 and Rodent Mitochondrial sequence MT241668.1 have been recovered from SRR11092061.

    We then performed a BLAST search using the identified vector sequences on SRR11092059,SRR11092060,SRR11092061 and SRR11092062, which confirms the existence of these two vetor sequences in all 4 datasets.

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
Statista (2025). All-time biggest online data breaches 2025 [Dataset]. https://www.statista.com/statistics/290525/cyber-crime-biggest-online-data-breaches-worldwide/
Organization logo

All-time biggest online data breaches 2025

Explore at:
37 scholarly articles cite this dataset (View in Google Scholar)
Dataset updated
May 26, 2025
Dataset authored and provided by
Statistahttp://statista.com/
Time period covered
Jan 2025
Area covered
Worldwide
Description

The largest reported data leakage as of January 2025 was the Cam4 data breach in March 2020, which exposed more than 10 billion data records. The second-largest data breach in history so far, the Yahoo data breach, occurred in 2013. The company initially reported about one billion exposed data records, but after an investigation, the company updated the number, revealing that three billion accounts were affected. The National Public Data Breach was announced in August 2024. The incident became public when personally identifiable information of individuals became available for sale on the dark web. Overall, the security professionals estimate the leakage of nearly three billion personal records. The next significant data leakage was the March 2018 security breach of India's national ID database, Aadhaar, with over 1.1 billion records exposed. This included biometric information such as identification numbers and fingerprint scans, which could be used to open bank accounts and receive financial aid, among other government services.

Cybercrime - the dark side of digitalization As the world continues its journey into the digital age, corporations and governments across the globe have been increasing their reliance on technology to collect, analyze and store personal data. This, in turn, has led to a rise in the number of cyber crimes, ranging from minor breaches to global-scale attacks impacting billions of users – such as in the case of Yahoo. Within the U.S. alone, 1802 cases of data compromise were reported in 2022. This was a marked increase from the 447 cases reported a decade prior. The high price of data protection As of 2022, the average cost of a single data breach across all industries worldwide stood at around 4.35 million U.S. dollars. This was found to be most costly in the healthcare sector, with each leak reported to have cost the affected party a hefty 10.1 million U.S. dollars. The financial segment followed closely behind. Here, each breach resulted in a loss of approximately 6 million U.S. dollars - 1.5 million more than the global average.

Search
Clear search
Close search
Google apps
Main menu