30 datasets found
  1. m

    Data Breach Notification Reports

    • mass.gov
    Updated Jun 24, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Office of Consumer Affairs and Business Regulation (2025). Data Breach Notification Reports [Dataset]. https://www.mass.gov/lists/data-breach-notification-reports
    Explore at:
    Dataset updated
    Jun 24, 2025
    Dataset authored and provided by
    Office of Consumer Affairs and Business Regulation
    Area covered
    Massachusetts
    Description

    View Data Breach Notification Reports, which include how many breaches are reported each year and the number of affected residents.

  2. All-time biggest online data breaches 2025

    • statista.com
    Updated Nov 28, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). All-time biggest online data breaches 2025 [Dataset]. https://www.statista.com/statistics/290525/cyber-crime-biggest-online-data-breaches-worldwide/
    Explore at:
    Dataset updated
    Nov 28, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    Jan 2025
    Area covered
    Worldwide
    Description

    The largest reported data leakage as of January 2025 was the Cam4 data breach in March 2020, which exposed more than 10 billion data records. The second-largest data breach in history so far, the Yahoo data breach, occurred in 2013. The company initially reported about one billion exposed data records, but after an investigation, the company updated the number, revealing that three billion accounts were affected. The National Public Data Breach was announced in August 2024. The incident became public when personally identifiable information of individuals became available for sale on the dark web. Overall, the security professionals estimate the leakage of nearly three billion personal records. The next significant data leakage was the March 2018 security breach of India's national ID database, Aadhaar, with over 1.1 billion records exposed. This included biometric information such as identification numbers and fingerprint scans, which could be used to open bank accounts and receive financial aid, among other government services.

    Cybercrime - the dark side of digitalization As the world continues its journey into the digital age, corporations and governments across the globe have been increasing their reliance on technology to collect, analyze and store personal data. This, in turn, has led to a rise in the number of cyber crimes, ranging from minor breaches to global-scale attacks impacting billions of users – such as in the case of Yahoo. Within the U.S. alone, 1802 cases of data compromise were reported in 2022. This was a marked increase from the 447 cases reported a decade prior. The high price of data protection As of 2022, the average cost of a single data breach across all industries worldwide stood at around 4.35 million U.S. dollars. This was found to be most costly in the healthcare sector, with each leak reported to have cost the affected party a hefty 10.1 million U.S. dollars. The financial segment followed closely behind. Here, each breach resulted in a loss of approximately 6 million U.S. dollars - 1.5 million more than the global average.

  3. w

    capital-one-data-breach.com - Historical whois Lookup

    • whoisdatacenter.com
    csv
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    AllHeart Web Inc, capital-one-data-breach.com - Historical whois Lookup [Dataset]. https://whoisdatacenter.com/domain/capital-one-data-breach.com/
    Explore at:
    csvAvailable download formats
    Dataset authored and provided by
    AllHeart Web Inc
    License

    https://whoisdatacenter.com/terms-of-use/https://whoisdatacenter.com/terms-of-use/

    Time period covered
    Mar 15, 1985 - Nov 13, 2025
    Description

    Explore the historical Whois records related to capital-one-data-breach.com (Domain). Get insights into ownership history and changes over time.

  4. Number of data compromises and impacted individuals in U.S. 2005-2024

    • statista.com
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista, Number of data compromises and impacted individuals in U.S. 2005-2024 [Dataset]. https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/
    Explore at:
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    United States
    Description

    In 2024, the number of data compromises in the United States stood at 3,158 cases. Meanwhile, over 1.35 billion individuals were affected in the same year by data compromises, including data breaches, leakage, and exposure. While these are three different events, they have one thing in common. As a result of all three incidents, the sensitive data is accessed by an unauthorized threat actor. Industries most vulnerable to data breaches Some industry sectors usually see more significant cases of private data violations than others. This is determined by the type and volume of the personal information organizations of these sectors store. In 2024 the financial services, healthcare, and professional services were the three industry sectors that recorded most data breaches. Overall, the number of healthcare data breaches in some industry sectors in the United States has gradually increased within the past few years. However, some sectors saw decrease. Largest data exposures worldwide In 2020, an adult streaming website, CAM4, experienced a leakage of nearly 11 billion records. This, by far, is the most extensive reported data leakage. This case, though, is unique because cyber security researchers found the vulnerability before the cyber criminals. The second-largest data breach is the Yahoo data breach, dating back to 2013. The company first reported about one billion exposed records, then later, in 2017, came up with an updated number of leaked records, which was three billion. In March 2018, the third biggest data breach happened, involving India’s national identification database Aadhaar. As a result of this incident, over 1.1 billion records were exposed.

  5. ITRC Breach Alert Database

    • idtheftcenter.org
    pdf
    Updated Aug 20, 2020
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Identity Theft Resource Center (2020). ITRC Breach Alert Database [Dataset]. https://www.idtheftcenter.org/breach-alert/
    Explore at:
    pdfAvailable download formats
    Dataset updated
    Aug 20, 2020
    Dataset authored and provided by
    Identity Theft Resource Center
    Time period covered
    Jan 1, 2005 - Dec 31, 2025
    Description

    Publicly reported U.S. data compromises tracked by the Identity Theft Resource Center since 2005.

  6. d

    Replication Data for: Citizens’ Attitudes to Contact Tracing Apps

    • search.dataone.org
    • dataverse.harvard.edu
    Updated Nov 22, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Horvath, Laszlo; Banducci, Susan; James, Oliver (2023). Replication Data for: Citizens’ Attitudes to Contact Tracing Apps [Dataset]. http://doi.org/10.7910/DVN/KVKGUB
    Explore at:
    Dataset updated
    Nov 22, 2023
    Dataset provided by
    Harvard Dataverse
    Authors
    Horvath, Laszlo; Banducci, Susan; James, Oliver
    Description

    Citizens’ concerns about data privacy and data security breaches may reduce adoption of COVID-19 contact tracing mobile phone applications, making them less effective. We implement a choice experiment (conjoint experiment) where participants indicate which version of two contact tracing apps they would install, varying the apps’ privacy preserving attributes. Citizens do not always prioritize privacy and prefer a centralised National Health Service system over a decentralised system. In a further study asking about participants’ preference for digital vs human-only contact tracing, we find a mixture of digital and human contact tracing is supported. We randomly allocated a subset of participants in each study to receive a stimulus priming data breach as a concern, before asking about contact tracing. Salient threat of unauthorised access or data theft does not significantly alter preferences in either study. We suggest COVID-19 and trust in a national public health service system mitigate respondents’ concerns about privacy.

  7. Number of data breaches in Greece quarterly 2020-2023

    • statista.com
    Updated Jan 30, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2024). Number of data breaches in Greece quarterly 2020-2023 [Dataset]. https://www.statista.com/statistics/1447991/greece-number-of-data-breaches/
    Explore at:
    Dataset updated
    Jan 30, 2024
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    Greece
    Description

    Over ****** data breaches were recorded in Greece between October and December 2023. In the first quarter of 2021, the data breach count exceeded *** million, which was the highest figure over the observed period.

  8. a

    CrackStation's Password Cracking Dictionary (Human Passwords Only)

    • academictorrents.com
    bittorrent
    Updated Aug 10, 2014
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Defuse Security (2014). CrackStation's Password Cracking Dictionary (Human Passwords Only) [Dataset]. https://academictorrents.com/details/7ae809ccd7f0778328ab4b357e777040248b8c7f
    Explore at:
    bittorrent(257973006)Available download formats
    Dataset updated
    Aug 10, 2014
    Dataset authored and provided by
    Defuse Security
    License

    https://academictorrents.com/nolicensespecifiedhttps://academictorrents.com/nolicensespecified

    Description

    The list contains every wordlist, dictionary, and password database leak that I could find on the internet (and I spent a LOT of time looking). It also contains every word in the Wikipedia databases (pages-articles, retrieved 2010, all languages) as well as lots of books from Project Gutenberg. It also includes the passwords from some low-profile database breaches that were being sold in the underground years ago. The format of the list is a standard text file sorted in non-case-sensitive alphabetical order. Lines are separated with a newline " " character. You can test the list without downloading it by giving SHA256 hashes to the free hash cracker or to @PlzCrack on twitter. Here s a tool for computing hashes easily. Here are the results of cracking LinkedIn s and eHarmony s password hash leaks with the list. The list is responsible for cracking about 30% of all hashes given to CrackStation s free hash cracker, but that figure should be taken with a grain of salt because s

  9. Cyber Security - Global Thematic Research

    • store.globaldata.com
    Updated Nov 4, 2016
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    GlobalData UK Ltd. (2016). Cyber Security - Global Thematic Research [Dataset]. https://store.globaldata.com/report/cyber-security-global-thematic-research/
    Explore at:
    Dataset updated
    Nov 4, 2016
    Dataset provided by
    GlobalDatahttps://www.globaldata.com/
    Authors
    GlobalData UK Ltd.
    License

    https://www.globaldata.com/privacy-policy/https://www.globaldata.com/privacy-policy/

    Time period covered
    2016 - 2020
    Area covered
    Global
    Description

    The world has entered the era of the Code War where every digital device, however small and innocuous, can be “weaponised” – as the recent Dyn cyber-attack aptly illustrated – to send “rogue code” deep into the Internet's engine room to create mayhem.
    Cybersecurity is critical to almost every business. Yet it is a non-core competence for most boards. The frequency of high profile corporate data breaches may accelerate because CEOs are not sufficiently trained in cyber risks.
    Almost every cyber-breach is an “inside job” – whether malicious or accidental – so real-time behavioural analytics is becoming increasingly important as a defense.
    Insidt this report, we look at the evolution, nature, growth in cybersecurity technologies and threat. Read More

  10. Number of data points exposed in breaches in Russia 2013-2023

    • statista.com
    Updated Mar 11, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2024). Number of data points exposed in breaches in Russia 2013-2023 [Dataset]. https://www.statista.com/statistics/1462614/data-points-exposed-in-breaches-russia/
    Explore at:
    Dataset updated
    Mar 11, 2024
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    Russia
    Description

    Over *** billion personal data points were exposed during breaches in Russia in 2023. That was the highest figure over the observed period. To compare, in the previous year, the number of data points exposed stood at approximately *** million.

  11. A

    Asia-Pacific Data Center Physical Security Market Report

    • datainsightsmarket.com
    doc, pdf, ppt
    Updated Mar 8, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Data Insights Market (2025). Asia-Pacific Data Center Physical Security Market Report [Dataset]. https://www.datainsightsmarket.com/reports/asia-pacific-data-center-physical-security-market-20434
    Explore at:
    pdf, doc, pptAvailable download formats
    Dataset updated
    Mar 8, 2025
    Dataset authored and provided by
    Data Insights Market
    License

    https://www.datainsightsmarket.com/privacy-policyhttps://www.datainsightsmarket.com/privacy-policy

    Time period covered
    2025 - 2033
    Area covered
    Asia-Pacific
    Variables measured
    Market Size
    Description

    The Asia-Pacific data center physical security market is experiencing robust growth, projected to reach $0.53 billion in 2025 and expand at a Compound Annual Growth Rate (CAGR) of 14.50% from 2025 to 2033. This surge is fueled by the increasing adoption of cloud computing, the proliferation of data centers across the region, and heightened concerns about data breaches and cyber threats. Key drivers include stringent government regulations mandating enhanced data security, the rising adoption of advanced security technologies like video surveillance, access control systems, and integrated security solutions, and the growing need for robust physical security infrastructure to protect against both internal and external threats. The market is segmented by solution type (video surveillance, access control, and others), service type (consulting, professional, and system integration services), and end-user sectors (IT & telecommunications, BFSI, government, healthcare, and others). The Asia-Pacific region, particularly countries like China, Japan, South Korea, and India, is witnessing significant investments in data center infrastructure, creating lucrative opportunities for physical security vendors. Market leaders like Axis Communications, Dahua Technology, and Bosch are actively expanding their presence in this rapidly evolving landscape. While the market presents significant opportunities, challenges remain. The high initial investment costs associated with implementing sophisticated security systems can act as a restraint, particularly for smaller data centers. Furthermore, the complexities of integrating various security technologies and managing a diverse range of security solutions pose challenges for data center operators. However, the increasing awareness of data security risks and the availability of cost-effective financing options are likely to mitigate these restraints. The market's future growth is expected to be driven by the adoption of AI-powered security solutions, the growing demand for managed security services, and the increasing focus on improving operational efficiency and minimizing downtime through integrated security solutions. The strong economic growth and rising digitalization in the Asia-Pacific region will further accelerate this market's expansion in the forecast period. This comprehensive report provides an in-depth analysis of the Asia-Pacific data center physical security market, covering the period 2019-2033. With a focus on the estimated year 2025 and a forecast period extending to 2033, this study offers invaluable insights for businesses operating in this rapidly expanding sector. The report leverages data from the historical period (2019-2024) to provide a robust understanding of market trends and future projections, valued in millions of units. Key search terms like data center security, Asia-Pacific security market, physical security solutions, access control systems, and video surveillance are integrated throughout to ensure maximum search engine visibility. Recent developments include: August 2023: Securitas signed an expanded 5-year agreement to provide data center security for Microsoft in 31 countries (including APAC countries), solidifying a strong relationship. The global agreement includes risk management, comprehensive security technology as a system integrator, specialised safety, and security resources, guarding services and digital interfaces. Securitas ensures that the data center physical security program remains innovative, robust, and effective. This demonstrates stability as a collaborator, assisting in navigating the challenges of Microsoft's expanding business., August 2023: Metrasens announced its partnership with Convergint. Through this partnership, Metrasens will provide its advanced detection systems through Convergint’s portfolio offering to its customers.. Key drivers for this market are: Increased Data Center Activities and Investment by the Hyperscale and Colocation Operators, Advancements in Video Surveillance Systems Connected to Cloud Systems. Potential restraints include: Increased Data Center Activities and Investment by the Hyperscale and Colocation Operators, Advancements in Video Surveillance Systems Connected to Cloud Systems. Notable trends are: The IT & Telecom Segment is Expected to Hold Significant Share.

  12. h

    Data from: Cyber Security Breaches Survey, 2020

    • harmonydata.ac.uk
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Department for Digital, Culture, Media and Sport, Cyber Security Breaches Survey, 2020 [Dataset]. http://doi.org/10.5255/UKDA-SN-8638-1
    Explore at:
    Dataset authored and provided by
    Department for Digital, Culture, Media and Sport
    Description

    The Cyber Security Breaches Survey, 2020 was run to understand organisations' approaches and attitudes to cyber security, and to understand their experience of cyber security breaches. Its aim was to support the Government by providing evidence that can inform policies which help to make Britain a safer place to do business online.The data have been collected annually since 2016 to understand the views of UK organisations on cyber security. Data is collected on topics including online use; attitudes of organisations to cyber security and awareness of Government initiatives; approaches to cyber security (including investment and processes); incidences and impact of a cyber security breach or attack; and how breaches are dealt with by the organisation. This information helps to inform Government policy towards organisations, including how best to target key messages to businesses and charities so that they are cyber secure (and so that the UK is the safest place in the world to do business online). The study is funded by the Cabinet Office as part of the National Cyber Security Programme. The underlying data are useful for researchers to better understand the response across a range of organisations (rather than averages) and for wider comparability over time. The survey originally only covered businesses but was expanded to include charities from the 2018 survey onwards. From 2020, the survey includes a sample of education institutions (primary and secondary schools, further and higher education). Please note that the UK Data Service only holds data from 2018 onwards. Further information and additional publications can be found on the GOV.UK Cyber Security Breaches Survey, 2020 webpage.

    Views, experiences and behaviours of organisations (UK businesses and charities) on cyber security and cyber security breaches.

  13. d

    Ground-Based Bathymetric Data Collected within the Wilderness Breach, Fire...

    • catalog.data.gov
    • search.dataone.org
    Updated Nov 26, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    U.S. Geological Survey (2025). Ground-Based Bathymetric Data Collected within the Wilderness Breach, Fire Island, New York, (2014) in XYZ ASCII Text File Format [Dataset]. https://catalog.data.gov/dataset/ground-based-bathymetric-data-collected-within-the-wilderness-breach-fire-island-new-york-
    Explore at:
    Dataset updated
    Nov 26, 2025
    Dataset provided by
    United States Geological Surveyhttp://www.usgs.gov/
    Area covered
    Fire Island, New York
    Description

    Scientists from the U.S. Geological Survey St. Petersburg Coastal and Marine Science Center in St. Petersburg, Florida, conducted a bathymetric survey of Fire Island, New York, from October 5 to 10, 2014. The U.S. Geological Survey is involved in a post-Hurricane Sandy effort to map and monitor the morphologic evolution of the wilderness breach, which formed in October 2012 during Hurricane Sandy, as part of the Hurricane Sandy Supplemental Project GS2-2B. During this study, bathymetry data were collected, using single-beam echo sounders and global positioning systems mounted to personal watercraft, along the Fire Island shoreface and within the wilderness breach, Fire Island Inlet, Narrow Bay, and Great South Bay east of Nicoll Bay. Additional bathymetry and elevation data were collected using backpack and wheel-mounted global positioning systems along the subaerial beach (foreshore and backshore), and flood shoals and shallow channels within the wilderness breach and adjacent shoreface.

  14. d

    Data-Driven Models For Levee Breach Flows

    • search.dataone.org
    • hydroshare.org
    Updated Oct 25, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    SHIVAKUMAR BALACHANDRAN (2025). Data-Driven Models For Levee Breach Flows [Dataset]. https://search.dataone.org/view/sha256%3Aff67209f8e2e08403dc8c3783fec932cd7e0bbfd20caf486d6457e5f1c7d49b5
    Explore at:
    Dataset updated
    Oct 25, 2025
    Dataset provided by
    Hydroshare
    Authors
    SHIVAKUMAR BALACHANDRAN
    Description

    This study deals with data-driven models that can estimate the breach discharge and approach depth for levee breach flows. The ML models are trained from the data sourced from the validated 2D numerical models. The MLP model uses limited features to estimate the breach discharge non-dimensionalized as a ratio of breach discharge to the inflow discharge. The MLP models are validated with 15 different experimental observations. The results show that the MLP models can estimate the breach discharge with high accuracy.

  15. d

    Single-Beam Bathymetry Point Data Shapefile of the Hurricane Sandy Breach at...

    • catalog.data.gov
    • data.usgs.gov
    • +2more
    Updated Oct 8, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    U.S. Geological Survey (2025). Single-Beam Bathymetry Point Data Shapefile of the Hurricane Sandy Breach at Fire Island, New York, June 2013 [Dataset]. https://catalog.data.gov/dataset/single-beam-bathymetry-point-data-shapefile-of-the-hurricane-sandy-breach-at-fire-island-n
    Explore at:
    Dataset updated
    Oct 8, 2025
    Dataset provided by
    United States Geological Surveyhttp://www.usgs.gov/
    Area covered
    New York, Fire Island
    Description

    This dataset, 20130626_bathy_points.zip, consists of single-beam point data collected in June 2013 during a bathymetry survey of the Wilderness Breach and adjacent coastline. Scientists from the U.S. Army Corps of Engineers (USACE), in collaboration with the U.S. Geological Survey (USGS), St. Petersburg Coastal and Marine Science Center (SPCMSC), conducted a bathymetric survey from June 22-26, 2013. The survey focused on a breach (Wilderness Breach) created by Hurricane Sandy near Pelican Island, NY, which is located in Great South Bay. A total of 41 shore-perpendicular transects with a 50-meter spacing were collected using a Knudsen 320BP single-beam echosounder, centered on the breach.

  16. Z

    Vector sequences in early WIV SRA sequencing data of SARS-CoV-2 inform on a...

    • data.niaid.nih.gov
    Updated Mar 21, 2021
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Daoyu Zhang (2021). Vector sequences in early WIV SRA sequencing data of SARS-CoV-2 inform on a potential large-scale security breach at the beginning of the COVID-19 pandemic [Dataset]. https://data.niaid.nih.gov/resources?id=zenodo_4486194
    Explore at:
    Dataset updated
    Mar 21, 2021
    Authors
    Daoyu Zhang
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    DESCRIPTION

    Sequences identified as Influenza A virus, Spodoptera frugiperda rhabdovirus and Nipah henipavirus have been previously identified within the early HiSeq 1000 and HiSeq 3000 sequencing data of SARS-CoV-2, SRR11092059,SRR11092060,SRR11092061 and SRR11092062, and were being used to support the hypothesis that a "simultaneous outbreak of multiple zoonotic viruses" have happened in the Huanan Seafood market. https://doi.org/10.31219/osf.io/s4td6

    However, a closer examination of these sequences revealed that they were not sequences of actual wild viruses, but were in stead fragments left behind from PCR products and cloning vectors harboring both cDNA clones and infectious clones of such viruses, with evidence of viral sequences being joined directly to DNA sequences of vector and non-human origin within the same short reads.

    Here are the vector sequences and PCR product-like sequences recovered from the earliest WIV SRA sequencing data of Human SARS-CoV-2 from dataset SRR11092059,SRR11092060,SRR11092061,SRR11092062.

    Sequences associated with Vectors and PCR products from 3 distinct viral species have been obtained: The 3'-end of a Nipah Henipahvirus with fusion to a Hepatitis D virus Ribozyme, a T7 terminator and a Tetracycline resistance gene, The 5'-end of the same Nipah Henipahvirus with fusion to sequences found in diverse vectors, A complete vector genome encoding the HA gene of Influenza A virus subtype H7N9 under a CMV promoter and a bgH polyA terminator, and 221 Contiguous sequences corresponding to the Spodoptera frugiperda rhabdovirus reference genome fused to sequences that were homologous to multiple Plastid sequences and Notably Mitochondrial sequences of Rodents.

    As sequences corresponding to a rescued infectious clone of a BSL-4 organism (Nipah Henipahvirus) were found in sample sequences that supposedy represents patient samples that were obtained from Hospital ICU and sequenced in a pathogen diagnosis laboratory (which is separate from the Virology Research laboratory which is implied by the context of an Infectious Clone of such an organism, evident by the 3'-HDV ribozyme and T7 terminator fused directly to the 3'-terminus of the Nipah Henipahvirus reads), The discovery of artifact-containing sequences of at least 3 different pathogen species that are phylogenetically and methodologically distinct from each other in samples that were supposedly submitted by a laboratory that is Separate from the virological research laboratories that could have hosted such clone sequences imply extensive crosstalk and cross-contamination between the various laboratories within the Wuhan Institute of Virology, which includes at least one BSL-4 laboratory with evidence of containment breach of a BSL-4 organism and it's subsequent introduction into RNA-seq samples that were processed by a laboratory of distinct and separate purposes than the basic virological research evidenced by the Infectious Clone of the Hipah Henipahvirus.

    Such a discovery therefore likely imply a major security breach happening within the Wuhan institute of Virology at the time when the first sequences of SARS-CoV-2 was sampled and sequenced, which have important implications on the origins of the SARS-CoV-2 virus itself.

    METHODS

    The metagenomic sequencing datasets, SRR11092059,SRR11092060,SRR11092061 and SRR11092062 were first analyzed using the NCBI phylogenetic analysis tool, which identified viral sequences that is not related to SARS-CoV-2 itself. These include Influenza A virus (IAV, subtype H7N9), Spodoptera frugiperda rhabdovirus and Nipah Henipahvirus.

    The datasets were then subjected to BLAST search using MEGABLAST against the reference sequences of such viruses to verify the existence of the viral sequences and determine the exact sybtype of such viruses and the closest sequences on GenBank that corresponds to the reads. There seuqences are MH926031.1 for the Spodoptera frugiperda rhabdovirus, KY199425.1 for the Influenza A virus and AY988601.1 for the Nipah Henipahvirus.

    A second round BLAST analysis with these identified sequences were then performed, which unexpectedly revealed numerous reads corresponding to Cloning vectors and non-human Mitochondrial and Plastid sequences being fused directly to the sequences of the identified viral species. Reads were then downloaded and subjected to assembly using the CAP3 sequence assembly program and the EGASSEMBLER tool. Contig sequences were then queried against the NCBI nr/nt database which unanimously identified the original sample sequences as viral sequences inserted into cloning vectors.

    The complete sequence of the Influenza A virus Haemagluttinin (HA) gene clone was obtained from SRR11092061,SRR11092062 using multiple rounds of BLAST search and sequence assembly expansion on the existing vector-virus junction contigs, and a partial sequence corresponding the 3'-end of Nipah Henipahvirus AY988601.1 fused to a 3'-HDV ribozyme, T7 terminator and a Tet resistance gene was obtained from SRR11092059. In addition, 221 Contig sequences corresponding to the Rhabdovirus MH926031.1 fused to Chloroplast sequence MN524635.1 and Rodent Mitochondrial sequence MT241668.1 have been recovered from SRR11092061.

    We then performed a BLAST search using the identified vector sequences on SRR11092059,SRR11092060,SRR11092061 and SRR11092062, which confirms the existence of these two vetor sequences in all 4 datasets.

  17. d

    Data from: Impact of dam height and grain size distribution on breaching of...

    • search.dataone.org
    • dataone.org
    • +1more
    Updated Jul 15, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Heather O'Donal; Enrica Viparelli (2025). Impact of dam height and grain size distribution on breaching of non-cohesive dams due to overtopping [Dataset]. http://doi.org/10.5061/dryad.cvdncjt8k
    Explore at:
    Dataset updated
    Jul 15, 2025
    Dataset provided by
    Dryad Digital Repository
    Authors
    Heather O'Donal; Enrica Viparelli
    Time period covered
    Jan 1, 2023
    Description

    The National Inventory of Dams reports 74,400 earthen dams in the United States in 2021; of these dams, approximately 27% are considered at high or significant hazard risk, that is dam failure will cause widespread damage and loss of lives. The most frequent cause of dam failure is breaching caused by overtopping. Accurate predictions of breach evolution are thus crucial to determine flood hydrographs for the safety of communities and properties at risk. Laboratory experiments were conducted on non-cohesive, compacted embankments to understand the role of dam height and sediment grain size on breaching caused by overtopping. Dam heights varied from 10 cm to 45 cm. Model structures were built with fine sand or with a mixture of fine sand and silt. Experiments showed that increasing dam height increases peak discharge. The presence of silt in model embankment material, on the contrary, lowers peak discharge and makes failure longer. In sand dams, sediment deposition on the downstream fac..., Breach hydrographs The breach hydrographs were collected using sonar probes and a point gauge to measure the elevation of the upstream reservoir. An upstream weir was used to control the reservoir head and direct excess flow away from the dam. The head of water over the weir and known inflow discharge were used to compute the weir discharge. Conservation equations were then used to compute the discharge through the channel. The data had then been smoothed and poor data eliminated. Channel width Two cameras monitored spatial and temporal changes in breach width. One camera was placed downstream of the dam to image the downstream dam face and a GoPro camera was placed just upstream of the dam to image the dam crest. Frames were extracted from the video recordings and manually digitized the dam geometry throughout the experiment. This digitized data could then be processed into temporal width data at varying locations along the downstream dam face and crest. Channel depth/incision: Breach..., Microsoft Excel to open all data.

  18. B

    Replication Data for: "Effect of the Presence of a Tailings Dam Beach on...

    • borealisdata.ca
    • search.dataone.org
    Updated Nov 13, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Kayleigh Barlow; Andrea Walsh; Megan McKellar; Ryan P. Mulligan; Scott McDougall; Stephen G. Evans; W. Andy Take (2024). Replication Data for: "Effect of the Presence of a Tailings Dam Beach on Breach Outflow and Erosion During Overtopping Failure" [Dataset]. http://doi.org/10.5683/SP3/YNUID9
    Explore at:
    CroissantCroissant is a format for machine-learning datasets. Learn more about this at mlcommons.org/croissant.
    Dataset updated
    Nov 13, 2024
    Dataset provided by
    Borealis
    Authors
    Kayleigh Barlow; Andrea Walsh; Megan McKellar; Ryan P. Mulligan; Scott McDougall; Stephen G. Evans; W. Andy Take
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Area covered
    Canada, Ontario, Kingston
    Dataset funded by
    Natural Sciences and Engineering Research Council of Canada
    Description

    Data files for: Effect of the Presence of a Tailings Dam Beach on Breach Outflow and Erosion During Overtopping Failure (2024-11-12)

  19. g

    Wilderness Breach Bathymetry Data Collected in May 2015 From Fire Island,...

    • gimi9.com
    • data.usgs.gov
    • +4more
    Updated May 15, 2015
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2015). Wilderness Breach Bathymetry Data Collected in May 2015 From Fire Island, New York: 50-Meter Digital Elevation Model [Dataset]. https://gimi9.com/dataset/data-gov_wilderness-breach-bathymetry-data-collected-in-may-2015-from-fire-island-new-york-50-meter
    Explore at:
    Dataset updated
    May 15, 2015
    Area covered
    Fire Island, New York
    Description

    Scientists from the U.S. Geological Survey St. Petersburg Coastal and Marine Science Center in St. Petersburg, Florida, conducted a bathymetric survey of Fire Island, New York, from May 6 to 20, 2015. The U.S. Geological Survey is involved in a post-Hurricane Sandy effort to map and monitor the morphologic evolution of the wilderness breach as a part of the Hurricane Sandy Supplemental Project GS2-2B. During this study, bathymetry data were collected with single-beam echosounders and Global Positioning Systems, which were mounted to personal watercraft, along the Fire Island shoreface and within the wilderness breach. Additional bathymetry and elevation data were collected using backpack Global Positioning Systems on flood shoals and in shallow channels within the wilderness breach.

  20. U

    The Fire Island Wilderness Breach Bathymetric Data collected with Personal...

    • data.usgs.gov
    • search.dataone.org
    • +3more
    Updated Mar 24, 2017
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    U.S. Geological Survey (2017). The Fire Island Wilderness Breach Bathymetric Data collected with Personal Watercraft and Backpack in Fire Island, New York (2014) as a GeoTIFF [Dataset]. https://data.usgs.gov/datacatalog/data/USGS:256d2fce-4f14-4f50-bd79-a2f8de32fc85
    Explore at:
    Dataset updated
    Mar 24, 2017
    Dataset provided by
    United States Geological Surveyhttp://www.usgs.gov/
    Authors
    U.S. Geological Survey
    License

    U.S. Government Workshttps://www.usa.gov/government-works
    License information was derived automatically

    Time period covered
    Oct 5, 2014 - Oct 10, 2014
    Area covered
    Fire Island, New York
    Description

    Scientists from the U.S. Geological Survey St. Petersburg Coastal and Marine Science Center in St. Petersburg, Florida, conducted a bathymetric survey of Fire Island, New York, from October 5 to 10, 2014. The U.S. Geological Survey is involved in a post-Hurricane Sandy effort to map and monitor the morphologic evolution of the wilderness breach, which formed in October 2012 during Hurricane Sandy, as part of the Hurricane Sandy Supplemental Project GS2-2B. During this study, bathymetry data were collected, using single-beam echo sounders and global positioning systems mounted to personal watercraft, along the Fire Island shoreface and within the wilderness breach, Fire Island Inlet, Narrow Bay, and Great South Bay east of Nicoll Bay. Additional bathymetry and elevation data were collected using backpack and wheel-mounted global positioning systems along the subaerial beach (foreshore and backshore), and flood shoals and shallow channels within the wilderness breach and adjacent sh ...

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
Office of Consumer Affairs and Business Regulation (2025). Data Breach Notification Reports [Dataset]. https://www.mass.gov/lists/data-breach-notification-reports

Data Breach Notification Reports

Explore at:
4 scholarly articles cite this dataset (View in Google Scholar)
Dataset updated
Jun 24, 2025
Dataset authored and provided by
Office of Consumer Affairs and Business Regulation
Area covered
Massachusetts
Description

View Data Breach Notification Reports, which include how many breaches are reported each year and the number of affected residents.

Search
Clear search
Close search
Google apps
Main menu