17 datasets found
  1. All-time biggest online data breaches 2025

    • statista.com
    Updated May 26, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). All-time biggest online data breaches 2025 [Dataset]. https://www.statista.com/statistics/290525/cyber-crime-biggest-online-data-breaches-worldwide/
    Explore at:
    Dataset updated
    May 26, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    Jan 2025
    Area covered
    Worldwide
    Description

    The largest reported data leakage as of January 2025 was the Cam4 data breach in March 2020, which exposed more than 10 billion data records. The second-largest data breach in history so far, the Yahoo data breach, occurred in 2013. The company initially reported about one billion exposed data records, but after an investigation, the company updated the number, revealing that three billion accounts were affected. The National Public Data Breach was announced in August 2024. The incident became public when personally identifiable information of individuals became available for sale on the dark web. Overall, the security professionals estimate the leakage of nearly three billion personal records. The next significant data leakage was the March 2018 security breach of India's national ID database, Aadhaar, with over 1.1 billion records exposed. This included biometric information such as identification numbers and fingerprint scans, which could be used to open bank accounts and receive financial aid, among other government services.

    Cybercrime - the dark side of digitalization As the world continues its journey into the digital age, corporations and governments across the globe have been increasing their reliance on technology to collect, analyze and store personal data. This, in turn, has led to a rise in the number of cyber crimes, ranging from minor breaches to global-scale attacks impacting billions of users – such as in the case of Yahoo. Within the U.S. alone, 1802 cases of data compromise were reported in 2022. This was a marked increase from the 447 cases reported a decade prior. The high price of data protection As of 2022, the average cost of a single data breach across all industries worldwide stood at around 4.35 million U.S. dollars. This was found to be most costly in the healthcare sector, with each leak reported to have cost the affected party a hefty 10.1 million U.S. dollars. The financial segment followed closely behind. Here, each breach resulted in a loss of approximately 6 million U.S. dollars - 1.5 million more than the global average.

  2. m

    Data Breach Notification Reports

    • mass.gov
    Updated Apr 27, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Office of Consumer Affairs and Business Regulation (2023). Data Breach Notification Reports [Dataset]. https://www.mass.gov/lists/data-breach-notification-reports
    Explore at:
    Dataset updated
    Apr 27, 2023
    Dataset authored and provided by
    Office of Consumer Affairs and Business Regulation
    Area covered
    Massachusetts
    Description

    View Data Breach Notification Reports, which include how many breaches are reported each year and the number of affected residents.

  3. s

    Data Breach Statistics

    • searchlogistics.com
    Updated Apr 1, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2025). Data Breach Statistics [Dataset]. https://www.searchlogistics.com/learn/statistics/cybersecurity-statistics/
    Explore at:
    Dataset updated
    Apr 1, 2025
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    The average cyber attack takes 280 days to identify and contain and it costs an average of about $3.86 million to deal with properly.

  4. "Pwned Passwords" Dataset

    • academictorrents.com
    bittorrent
    Updated Aug 3, 2018
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    haveibeenpwned.com (2018). "Pwned Passwords" Dataset [Dataset]. https://academictorrents.com/details/53555c69e3799d876159d7290ea60e56b35e36a9
    Explore at:
    bittorrent(11101449979)Available download formats
    Dataset updated
    Aug 3, 2018
    Dataset provided by
    Have I Been Pwned?http://haveibeenpwned.com/
    License

    https://academictorrents.com/nolicensespecifiedhttps://academictorrents.com/nolicensespecified

    Description

    Version 3 with 517M hashes and counts of password usage ordered by most to least prevalent Pwned Passwords are 517,238,891 real world passwords previously exposed in data breaches. This exposure makes them unsuitable for ongoing use as they re at much greater risk of being used to take over other accounts. They re searchable online below as well as being downloadable for use in other online system. The entire set of passwords is downloadable for free below with each password being represented as a SHA-1 hash to protect the original value (some passwords contain personally identifiable information) followed by a count of how many times that password had been seen in the source data breaches. The list may be integrated into other systems and used to verify whether a password has previously appeared in a data breach after which a system may warn the user or even block the password outright.

  5. s

    What’s The Cost Of A Data Breach?

    • searchlogistics.com
    Updated Apr 1, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2025). What’s The Cost Of A Data Breach? [Dataset]. https://www.searchlogistics.com/learn/statistics/cybersecurity-statistics/
    Explore at:
    Dataset updated
    Apr 1, 2025
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Data breaches cost companies and businesses a lot of money. The average cost of a data breach is $3.86 million.

  6. C

    Cybersecurity Statistics

    • searchlogistics.com
    Updated Apr 1, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Search Logistics (2025). Cybersecurity Statistics [Dataset]. https://www.searchlogistics.com/learn/statistics/cybersecurity-statistics/
    Explore at:
    Dataset updated
    Apr 1, 2025
    Dataset authored and provided by
    Search Logistics
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    These cybersecurity statistics will help you understand the state of online security and give you a better idea of what it takes to protect yourself.

  7. AOL Search Data 20M web queries (2006)

    • academictorrents.com
    bittorrent
    Updated Dec 17, 2016
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    AOL (2016). AOL Search Data 20M web queries (2006) [Dataset]. https://academictorrents.com/details/cd339bddeae7126bb3b15f3a72c903cb0c401bd1
    Explore at:
    bittorrent(460409936)Available download formats
    Dataset updated
    Dec 17, 2016
    Dataset authored and provided by
    AOLhttp://aol.com/
    License

    https://academictorrents.com/nolicensespecifiedhttps://academictorrents.com/nolicensespecified

    Description

    500k User Session Collection This collection is distributed for NON-COMMERCIAL RESEARCH USE ONLY. Any application of this collection for commercial purposes is STRICTLY PROHIBITED. #### Brief description: This collection consists of ~20M web queries collected from ~650k users over three months. The data is sorted by anonymous user ID and sequentially arranged. The goal of this collection is to provide real query log data that is based on real users. It could be used for personalization, query reformulation or other types of search research. The data set includes AnonID, Query, QueryTime, ItemRank, ClickURL. AnonID - an anonymous user ID number. Query - the query issued by the user, case shifted with most punctuation removed. QueryTime - the time at which the query was submitted for search. ItemRank - if the user clicked on a search result, the rank of the item on which they clicked is listed. ClickURL - if the user clicked on a search result, the domain portion of the URL i

  8. s

    Cybersecurity Statistics & COVID-19

    • searchlogistics.com
    Updated Apr 1, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2025). Cybersecurity Statistics & COVID-19 [Dataset]. https://www.searchlogistics.com/learn/statistics/cybersecurity-statistics/
    Explore at:
    Dataset updated
    Apr 1, 2025
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Did the COVID-19 pandemic really affect cybersecurity? Short answer – Yes. Cybercrime is up 600% due to COVID-19.

  9. s

    Causes Of Cybersecurity Incidents

    • searchlogistics.com
    Updated Apr 1, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2025). Causes Of Cybersecurity Incidents [Dataset]. https://www.searchlogistics.com/learn/statistics/cybersecurity-statistics/
    Explore at:
    Dataset updated
    Apr 1, 2025
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Over 95% of cybersecurity breaches occur as a result of human error.

  10. s

    Where Do Cyber Attacks Come From?

    • searchlogistics.com
    Updated Apr 1, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2025). Where Do Cyber Attacks Come From? [Dataset]. https://www.searchlogistics.com/learn/statistics/cybersecurity-statistics/
    Explore at:
    Dataset updated
    Apr 1, 2025
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Pay attention to the following cybersecurity statistics to learn how to protect yourself from attacks.

  11. s

    Who’s Affected By Cyber Attacks?

    • searchlogistics.com
    Updated Apr 1, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2025). Who’s Affected By Cyber Attacks? [Dataset]. https://www.searchlogistics.com/learn/statistics/cybersecurity-statistics/
    Explore at:
    Dataset updated
    Apr 1, 2025
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Some industries are affected by cyber attacks more than others. These next cybersecurity statistics detail specifically who is affected by cyber-attacks and why they are.

  12. e

    Data from: A dataset containing S&P500 information security breaches and...

    • b2find.eudat.eu
    • dataverse.nl
    Updated Jul 30, 2024
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2024). A dataset containing S&P500 information security breaches and related financial firm performances [Dataset]. https://b2find.eudat.eu/dataset/3dda16ee-4e98-570f-8db0-53837a6b899c
    Explore at:
    Dataset updated
    Jul 30, 2024
    Description

    In this document, comprehensive datasets are presented to advance research on information security breaches. The datasets include data on disclosed information security breaches affecting S&P500 companies between 2020 and 2023, collected through manual search of the Internet. Overall, the datasets include 504 companies, with detailed information security breach and financial data available for 97 firms that experienced a disclosed information security breach. This document will describe the datasets in detail, explain the data collection procedure and shows the initial versions of the datasets. Contact at Tilburg University Francesco Lelli Data files: 6 raw Microsoft Excel files (.xls) Supplemental material: Data_Publication_Package.pdf Detailed description of the data has been released in the following preprint: [Preprint in progress] Structure data package The folder contains the 6 .xls documents, the data publication package. Link to the preprint describing the dataset is in the description of the dataset itself. The six .xls documents are also present in their preferred file format csv (see Notes for further explanation). Production date: 01-2024---- 05-2024 Method: Data on information security breaches through manual search of the Internet, financial data through Refinitiv (LSEG). (Approval obtained from Refinitiv to publish these data) Universe: S&P500 companies Country / Nation: USA

  13. s

    How Big Is The Global Cybersecurity Market?

    • searchlogistics.com
    Updated Apr 1, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2025). How Big Is The Global Cybersecurity Market? [Dataset]. https://www.searchlogistics.com/learn/statistics/cybersecurity-statistics/
    Explore at:
    Dataset updated
    Apr 1, 2025
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Revenue in the cybersecurity industry worldwide reached $146.32 billion in 2022.

  14. D

    Database Audit and Protection Report

    • datainsightsmarket.com
    doc, pdf, ppt
    Updated Jun 17, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Data Insights Market (2025). Database Audit and Protection Report [Dataset]. https://www.datainsightsmarket.com/reports/database-audit-and-protection-1950612
    Explore at:
    pdf, doc, pptAvailable download formats
    Dataset updated
    Jun 17, 2025
    Dataset authored and provided by
    Data Insights Market
    License

    https://www.datainsightsmarket.com/privacy-policyhttps://www.datainsightsmarket.com/privacy-policy

    Time period covered
    2025 - 2033
    Area covered
    Global
    Variables measured
    Market Size
    Description

    The Database Audit and Protection market is experiencing robust growth, driven by increasing regulatory compliance mandates (like GDPR, CCPA, HIPAA), the rising frequency and sophistication of cyberattacks targeting sensitive data stored in databases, and the expanding adoption of cloud-based database solutions. The market's complexity necessitates robust audit trails for security, governance, and compliance purposes. Organizations are actively seeking solutions to monitor database activity, detect anomalies, and prevent unauthorized access or data breaches. This demand is further fueled by the need for data loss prevention (DLP) and the growing awareness of the financial and reputational risks associated with data vulnerabilities. While the specific market size and CAGR figures are unavailable, a reasonable estimate based on industry trends suggests a market valued at approximately $5 billion in 2025, growing at a Compound Annual Growth Rate (CAGR) of 15% from 2025 to 2033. This growth is projected to continue, driven by increasing data volumes, the expansion of big data analytics, and the continued evolution of sophisticated threat vectors. Key players in the market, including Imperva, Dell, Dataguise, GreenSQL, Fortinet, IBM, Identity Finder, Intel Security (McAfee), Oracle, and Netskope, are actively innovating to offer comprehensive solutions that encompass data masking, access control, encryption, anomaly detection, and real-time monitoring. The market is segmented by deployment (on-premises, cloud), database type (relational, NoSQL), and organization size (small, medium, large). Growth restraints include the high initial investment costs associated with implementing these solutions, the complexity of integration with existing infrastructure, and the shortage of skilled professionals to manage and maintain these systems. However, the rising awareness of cybersecurity threats and the increasing stringency of data protection regulations are expected to outweigh these restraints, driving continued market expansion.

  15. Minimizing Search Areas for Leak Detection in Water Distribution Networks -...

    • data.europa.eu
    unknown
    Updated Jan 23, 2022
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Zenodo (2022). Minimizing Search Areas for Leak Detection in Water Distribution Networks - Code [Dataset]. https://data.europa.eu/data/datasets/oai-zenodo-org-6718875?locale=bg
    Explore at:
    unknown(13186)Available download formats
    Dataset updated
    Jan 23, 2022
    Dataset authored and provided by
    Zenodohttp://zenodo.org/
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    This database includes the code used to analyze and produce the results for the following research article: Minimizing Search Areas for Leak Detection in Water Distribution Networks by B. Snider, G. Lewis, A.S. Chen, L. Vamvakeridou-Lyroudia, S. Djordjevic, D.A. Savic. Journal of Hydroinformatics. (Accepted - awaiting publication).

  16. v

    Global exporters importers-export import data of Leakage detector

    • volza.com
    csv
    Updated Aug 15, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Volza FZ LLC (2025). Global exporters importers-export import data of Leakage detector [Dataset]. https://www.volza.com/p/leakage-detector/
    Explore at:
    csvAvailable download formats
    Dataset updated
    Aug 15, 2025
    Dataset authored and provided by
    Volza FZ LLC
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Variables measured
    Count of exporters, Count of importers, Count of shipments, Sum of export import value
    Description

    610 Global exporters importers export import shipment records of Leakage detector with prices, volume & current Buyer's suppliers relationships based on actual Global export trade database.

  17. Number of data points exposed in breaches in Russia 2013-2023

    • statista.com
    Updated Jul 9, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Number of data points exposed in breaches in Russia 2013-2023 [Dataset]. https://www.statista.com/statistics/1462614/data-points-exposed-in-breaches-russia/
    Explore at:
    Dataset updated
    Jul 9, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    Russia
    Description

    Over *** billion personal data points were exposed during breaches in Russia in 2023. That was the highest figure over the observed period. To compare, in the previous year, the number of data points exposed stood at approximately *** million.

  18. Not seeing a result you expected?
    Learn how you can add new datasets to our index.

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
Statista (2025). All-time biggest online data breaches 2025 [Dataset]. https://www.statista.com/statistics/290525/cyber-crime-biggest-online-data-breaches-worldwide/
Organization logo

All-time biggest online data breaches 2025

Explore at:
32 scholarly articles cite this dataset (View in Google Scholar)
Dataset updated
May 26, 2025
Dataset authored and provided by
Statistahttp://statista.com/
Time period covered
Jan 2025
Area covered
Worldwide
Description

The largest reported data leakage as of January 2025 was the Cam4 data breach in March 2020, which exposed more than 10 billion data records. The second-largest data breach in history so far, the Yahoo data breach, occurred in 2013. The company initially reported about one billion exposed data records, but after an investigation, the company updated the number, revealing that three billion accounts were affected. The National Public Data Breach was announced in August 2024. The incident became public when personally identifiable information of individuals became available for sale on the dark web. Overall, the security professionals estimate the leakage of nearly three billion personal records. The next significant data leakage was the March 2018 security breach of India's national ID database, Aadhaar, with over 1.1 billion records exposed. This included biometric information such as identification numbers and fingerprint scans, which could be used to open bank accounts and receive financial aid, among other government services.

Cybercrime - the dark side of digitalization As the world continues its journey into the digital age, corporations and governments across the globe have been increasing their reliance on technology to collect, analyze and store personal data. This, in turn, has led to a rise in the number of cyber crimes, ranging from minor breaches to global-scale attacks impacting billions of users – such as in the case of Yahoo. Within the U.S. alone, 1802 cases of data compromise were reported in 2022. This was a marked increase from the 447 cases reported a decade prior. The high price of data protection As of 2022, the average cost of a single data breach across all industries worldwide stood at around 4.35 million U.S. dollars. This was found to be most costly in the healthcare sector, with each leak reported to have cost the affected party a hefty 10.1 million U.S. dollars. The financial segment followed closely behind. Here, each breach resulted in a loss of approximately 6 million U.S. dollars - 1.5 million more than the global average.

Search
Clear search
Close search
Google apps
Main menu