74 datasets found
  1. Number of data compromises and impacted individuals in U.S. 2005-2024

    • statista.com
    • ai-chatbox.pro
    Updated May 23, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Number of data compromises and impacted individuals in U.S. 2005-2024 [Dataset]. https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/
    Explore at:
    Dataset updated
    May 23, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    United States
    Description

    In 2024, the number of data compromises in the United States stood at 3,158 cases. Meanwhile, over 1.35 billion individuals were affected in the same year by data compromises, including data breaches, leakage, and exposure. While these are three different events, they have one thing in common. As a result of all three incidents, the sensitive data is accessed by an unauthorized threat actor. Industries most vulnerable to data breaches Some industry sectors usually see more significant cases of private data violations than others. This is determined by the type and volume of the personal information organizations of these sectors store. In 2024 the financial services, healthcare, and professional services were the three industry sectors that recorded most data breaches. Overall, the number of healthcare data breaches in some industry sectors in the United States has gradually increased within the past few years. However, some sectors saw decrease. Largest data exposures worldwide In 2020, an adult streaming website, CAM4, experienced a leakage of nearly 11 billion records. This, by far, is the most extensive reported data leakage. This case, though, is unique because cyber security researchers found the vulnerability before the cyber criminals. The second-largest data breach is the Yahoo data breach, dating back to 2013. The company first reported about one billion exposed records, then later, in 2017, came up with an updated number of leaked records, which was three billion. In March 2018, the third biggest data breach happened, involving India’s national identification database Aadhaar. As a result of this incident, over 1.1 billion records were exposed.

  2. All-time biggest online data breaches 2025

    • statista.com
    • ai-chatbox.pro
    Updated May 26, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). All-time biggest online data breaches 2025 [Dataset]. https://www.statista.com/statistics/290525/cyber-crime-biggest-online-data-breaches-worldwide/
    Explore at:
    Dataset updated
    May 26, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    Jan 2025
    Area covered
    Worldwide
    Description

    The largest reported data leakage as of January 2025 was the Cam4 data breach in March 2020, which exposed more than 10 billion data records. The second-largest data breach in history so far, the Yahoo data breach, occurred in 2013. The company initially reported about one billion exposed data records, but after an investigation, the company updated the number, revealing that three billion accounts were affected. The National Public Data Breach was announced in August 2024. The incident became public when personally identifiable information of individuals became available for sale on the dark web. Overall, the security professionals estimate the leakage of nearly three billion personal records. The next significant data leakage was the March 2018 security breach of India's national ID database, Aadhaar, with over 1.1 billion records exposed. This included biometric information such as identification numbers and fingerprint scans, which could be used to open bank accounts and receive financial aid, among other government services.

    Cybercrime - the dark side of digitalization As the world continues its journey into the digital age, corporations and governments across the globe have been increasing their reliance on technology to collect, analyze and store personal data. This, in turn, has led to a rise in the number of cyber crimes, ranging from minor breaches to global-scale attacks impacting billions of users – such as in the case of Yahoo. Within the U.S. alone, 1802 cases of data compromise were reported in 2022. This was a marked increase from the 447 cases reported a decade prior. The high price of data protection As of 2022, the average cost of a single data breach across all industries worldwide stood at around 4.35 million U.S. dollars. This was found to be most costly in the healthcare sector, with each leak reported to have cost the affected party a hefty 10.1 million U.S. dollars. The financial segment followed closely behind. Here, each breach resulted in a loss of approximately 6 million U.S. dollars - 1.5 million more than the global average.

  3. D

    Data Breach Notifications Affecting Washington Residents

    • data.wa.gov
    • catalog.data.gov
    application/rdfxml +5
    Updated Jun 24, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Washington State Attorney General's Office Consumer Protection Division (2025). Data Breach Notifications Affecting Washington Residents [Dataset]. https://data.wa.gov/Consumer-Protection/Data-Breach-Notifications-Affecting-Washington-Res/sb4j-ca4h
    Explore at:
    xml, csv, json, application/rssxml, application/rdfxml, tsvAvailable download formats
    Dataset updated
    Jun 24, 2025
    Dataset authored and provided by
    Washington State Attorney General's Office Consumer Protection Division
    Area covered
    Washington
    Description

    Washington law requires entities impacted by a data breach to notify the Attorney General’s Office (AGO) when more than 500 Washingtonians personal information was compromised as a result of the breach. This dataset is a collection of various statistics that have been derived from these notices, and is the source of data used to produce the AGO’s Annual Data Breach Report.

  4. Global number of breached user accounts Q1 2020-Q3 2024

    • statista.com
    • ai-chatbox.pro
    Updated Jun 23, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Global number of breached user accounts Q1 2020-Q3 2024 [Dataset]. https://www.statista.com/statistics/1307426/number-of-data-breaches-worldwide/
    Explore at:
    Dataset updated
    Jun 23, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    Worldwide
    Description

    During the third quarter of 2024, data breaches exposed more than *** million records worldwide. Since the first quarter of 2020, the highest number of data records were exposed in the first quarter of ***, more than *** million data sets. Data breaches remain among the biggest concerns of company leaders worldwide. The most common causes of sensitive information loss were operating system vulnerabilities on endpoint devices. Which industries see the most data breaches? Meanwhile, certain conditions make some industry sectors more prone to data breaches than others. According to the latest observations, the public administration experienced the highest number of data breaches between 2021 and 2022. The industry saw *** reported data breach incidents with confirmed data loss. The second were financial institutions, with *** data breach cases, followed by healthcare providers. Data breach cost Data breach incidents have various consequences, the most common impact being financial losses and business disruptions. As of 2023, the average data breach cost across businesses worldwide was **** million U.S. dollars. Meanwhile, a leaked data record cost about *** U.S. dollars. The United States saw the highest average breach cost globally, at **** million U.S. dollars.

  5. i

    Data from: Rockyou

    • ieee-dataport.org
    Updated Apr 27, 2021
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Zeeshan Shaikh (2021). Rockyou [Dataset]. https://ieee-dataport.org/documents/rockyou
    Explore at:
    Dataset updated
    Apr 27, 2021
    Authors
    Zeeshan Shaikh
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Passwords that were leaked or stolen from sites. The Rockyou Dataset is about 14 million passwords.

  6. "Pwned Passwords" Dataset

    • academictorrents.com
    bittorrent
    Updated Aug 3, 2018
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    haveibeenpwned.com (2018). "Pwned Passwords" Dataset [Dataset]. https://academictorrents.com/details/53555c69e3799d876159d7290ea60e56b35e36a9
    Explore at:
    bittorrent(11101449979)Available download formats
    Dataset updated
    Aug 3, 2018
    Dataset provided by
    Have I Been Pwned?http://haveibeenpwned.com/
    License

    https://academictorrents.com/nolicensespecifiedhttps://academictorrents.com/nolicensespecified

    Description

    Version 3 with 517M hashes and counts of password usage ordered by most to least prevalent Pwned Passwords are 517,238,891 real world passwords previously exposed in data breaches. This exposure makes them unsuitable for ongoing use as they re at much greater risk of being used to take over other accounts. They re searchable online below as well as being downloadable for use in other online system. The entire set of passwords is downloadable for free below with each password being represented as a SHA-1 hash to protect the original value (some passwords contain personally identifiable information) followed by a count of how many times that password had been seen in the source data breaches. The list may be integrated into other systems and used to verify whether a password has previously appeared in a data breach after which a system may warn the user or even block the password outright.

  7. Data Breach Notification Software Market by Deployment and Geography -...

    • technavio.com
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Technavio, Data Breach Notification Software Market by Deployment and Geography - Forecast and Analysis 2020-2024 [Dataset]. https://www.technavio.com/report/data-breach-notification-software-market-industry-analysis
    Explore at:
    Dataset provided by
    TechNavio
    Authors
    Technavio
    Time period covered
    2021 - 2025
    Area covered
    Global
    Description

    Snapshot img

    The data breach notification software market size has the potential to grow by USD 725.41 million during 2020-2024, and the market’s growth momentum will accelerate during the forecast period.

    This report provides a detailed analysis of the market by deployment (on-premise and cloud-based) and geography (North America, Europe, APAC, MEA, and South America). Also, the report analyzes the market’s competitive landscape and offers information on several market vendors, including AO Kaspersky Lab, Canopy Software Inc., Exterro Inc. , Infocomply Corp., International Business Machines Corp., OneTrust LLC, PKWARE Inc., Proteus-Cyber Ltd., RADAR LLC, and Thales Group.

    Market Overview

    Browse TOC and LoE with selected illustrations and example pages of Data Breach Notification Software Market

    Request a FREE sample now!

    Market Competitive Analysis

    The market is fragmented. AO Kaspersky Lab, Canopy Software Inc., Exterro Inc., Infocomply Corp., International Business Machines Corp., OneTrust LLC, PKWARE Inc., Proteus-Cyber Ltd., RADAR LLC, and Thales Group are some of the major market participants. Factors such as the rise in the number of data breach notification regulations will offer immense growth opportunities. However, the lack of awareness regarding cybersecurity may impede market growth. To make the most of the opportunities, vendors should focus on growth prospects in the fast-growing segments, while maintaining their positions in the slow-growing segments.

    To help clients improve their market position, this data breach notification software market forecast report provides a detailed analysis of the market leaders and offers information on the competencies and capacities of these companies. The report also covers details on the market’s competitive landscape and offers information on the products offered by various companies. Moreover, this data breach notification software market analysis report provides information on the upcoming trends and challenges that will influence market growth. This will help companies create strategies to make the most of future growth opportunities.

    This report provides information on the production, sustainability, and prospects of several leading companies, including:

    AO Kaspersky Lab Canopy Software Inc. Exterro Inc. Infocomply Corp. International Business Machines Corp. OneTrust LLC PKWARE Inc. Proteus-Cyber Ltd. RADAR LLC Thales Group

    Data Breach Notification Software Market: Segmentation by Geography

    For more insights on the market share of various regions Request for a FREE sample now!

    The report offers an up-to-date analysis regarding the current global market scenario, latest trends and drivers, and the overall market environment. North America will offer several growth opportunities to market vendors during the forecast period. The increasing number of cyberattacks and threats will significantly influence data breach notification software market's growth in this region.

    44% of the market’s growth will originate from North America during the forecast period. The US is one of the key markets for data breach notification software in North America. This report provides an accurate prediction of the contribution of all segments to the growth of the data breach notification software market size.

    Data Breach Notification Software Market: Key Highlights of the Report for 2020-2024

    CAGR of the market during the forecast period 2020-2024 Detailed information on factors that will data breach notification software market growth during the next five years Precise estimation of the data breach notification software market size and its contribution to the parent market Accurate predictions on upcoming trends and changes in consumer behavior The growth of the data breach notification software industry across North America, Europe, APAC, MEA, and South America A thorough analysis of the market’s competitive landscape and detailed information on vendors Comprehensive details of factors that will challenge the growth of data breach notification software market vendors

    We can help! Our analysts can customize this report to meet your requirements. Get in touch

  8. s

    Data Breach Statistics

    • searchlogistics.com
    Updated Apr 1, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2025). Data Breach Statistics [Dataset]. https://www.searchlogistics.com/learn/statistics/cybersecurity-statistics/
    Explore at:
    Dataset updated
    Apr 1, 2025
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    The average cyber attack takes 280 days to identify and contain and it costs an average of about $3.86 million to deal with properly.

  9. Biggest data breaches in the U.S. 2024, by impact

    • statista.com
    Updated Mar 7, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Biggest data breaches in the U.S. 2024, by impact [Dataset]. https://www.statista.com/statistics/1448545/us-biggest-data-breaches/
    Explore at:
    Dataset updated
    Mar 7, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    Dec 2024
    Area covered
    United States
    Description

    As of December 2024, the most significant data breach incident in the United States was the Yahoo data breach that dates back to 2013-2016. Impacting over three billion online users, this incident still remains one of the most significant data breaches worldwide. The second-biggest case was the January 2021 data breach at Microsoft, involving about 30 thousand companies in the United States and around 60 thousand companies around the world.

  10. s

    What’s The Cost Of A Data Breach?

    • searchlogistics.com
    Updated Apr 1, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2025). What’s The Cost Of A Data Breach? [Dataset]. https://www.searchlogistics.com/learn/statistics/cybersecurity-statistics/
    Explore at:
    Dataset updated
    Apr 1, 2025
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Data breaches cost companies and businesses a lot of money. The average cost of a data breach is $3.86 million.

  11. b

    CNSS Jabaroot Leaked Data (April 2025)

    • breachlookup.me
    Updated Apr 8, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Caisse Nationale de Sécurité Sociale (CNSS) - Data Source (2025). CNSS Jabaroot Leaked Data (April 2025) [Dataset]. https://breachlookup.me/2025/cnss
    Explore at:
    Dataset updated
    Apr 8, 2025
    Dataset provided by
    National Social Security Fund
    Authors
    Caisse Nationale de Sécurité Sociale (CNSS) - Data Source
    Area covered
    Morocco
    Description

    Searchable datasets derived from the CNSS data breach posted by Jabaroot on breachforums in April 2025. Includes company details (~500k records) and employee information (~2M records).

  12. Data from: Cyber Security Breaches Survey 2019

    • gov.uk
    Updated Jul 2, 2019
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Department for Digital, Culture, Media & Sport (2019). Cyber Security Breaches Survey 2019 [Dataset]. https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2019
    Explore at:
    Dataset updated
    Jul 2, 2019
    Dataset provided by
    GOV.UKhttp://gov.uk/
    Authors
    Department for Digital, Culture, Media & Sport
    Description

    The Government has surveyed UK businesses and charities to find out they approach cyber security and help them learn more about the cyber security issues faced by industry. The research informs Government policy on cyber security and how Government works with industry to make Britain one of the most secure places to do business online.

    Released

    3 April 2019

    Period covered

    Respondents were asked about their approach to cyber security and any breaches or attacks over the 12 months before the interview. Main survey interviews took place between October and December 2018. Qualitative follow up interviews took place in January and February 2019.

    Geographic coverage

    UK

    Further Information

    The survey is part of the Government’s National Cyber Security Programme.

    Cyber security guidance and information for businesses, including details of free training and support, can be found on the National Cyber Security Centre website and GOV.UK at: https://www.ncsc.gov.uk" class="govuk-link">www.ncsc.gov.uk and www.gov.uk.

    The survey was carried out by Ipsos MORI and its partner, the Institute of Criminal Justice Studies (ICJS) at the University of Portsmouth.

    The UK Statistics Authority

    This release is published in accordance with the Code of Practice for Statistics (2018), as produced by the UK Statistics Authority. The UKSA has the overall objective of promoting and safeguarding the production and publication of official statistics that serve the public good. It monitors and reports on all official statistics, and promotes good practice in this area.

    Pre-release access

    The document above contains a list of ministers and officials who have received privileged early access to this release. In line with best practice, the list has been kept to a minimum and those given access for briefing purposes had a maximum of 24 hours.

    Contact

    The responsible statistician for this release is Rishi Vaidya. For any queries please contact 020 7211 2320 or evidence@culture.gov.uk.

  13. D

    Data from: A dataset containing S&P500 information security breaches and...

    • dataverse.nl
    csv, pdf, xlsx
    Updated Jul 2, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Nynke Voermans; Francesco Lelli; Francesco Lelli; Nynke Voermans (2024). A dataset containing S&P500 information security breaches and related financial firm performances [Dataset]. http://doi.org/10.34894/Z2IDYZ
    Explore at:
    xlsx(1831436), csv(2072394), csv(22649), xlsx(36429), xlsx(89376), csv(93304), csv(2014511), csv(58832), pdf(153677), csv(23048), xlsx(1844452), xlsx(64856), xlsx(36000)Available download formats
    Dataset updated
    Jul 2, 2024
    Dataset provided by
    DataverseNL
    Authors
    Nynke Voermans; Francesco Lelli; Francesco Lelli; Nynke Voermans
    License

    CC0 1.0 Universal Public Domain Dedicationhttps://creativecommons.org/publicdomain/zero/1.0/
    License information was derived automatically

    Description

    In this document, comprehensive datasets are presented to advance research on information security breaches. The datasets include data on disclosed information security breaches affecting S&P500 companies between 2020 and 2023, collected through manual search of the Internet. Overall, the datasets include 504 companies, with detailed information security breach and financial data available for 97 firms that experienced a disclosed information security breach. This document will describe the datasets in detail, explain the data collection procedure and shows the initial versions of the datasets. Contact at Tilburg University Francesco Lelli

  14. A

    ‘List of Top Data Breaches (2004 - 2021)’ analyzed by Analyst-2

    • analyst-2.ai
    Updated Feb 14, 2022
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Analyst-2 (analyst-2.ai) / Inspirient GmbH (inspirient.com) (2022). ‘List of Top Data Breaches (2004 - 2021)’ analyzed by Analyst-2 [Dataset]. https://analyst-2.ai/analysis/kaggle-list-of-top-data-breaches-2004-2021-e7ac/746cf4e2/?iid=002-610&v=presentation
    Explore at:
    Dataset updated
    Feb 14, 2022
    Dataset authored and provided by
    Analyst-2 (analyst-2.ai) / Inspirient GmbH (inspirient.com)
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Analysis of ‘List of Top Data Breaches (2004 - 2021)’ provided by Analyst-2 (analyst-2.ai), based on source dataset retrieved from https://www.kaggle.com/hishaamarmghan/list-of-top-data-breaches-2004-2021 on 14 February 2022.

    --- Dataset description provided by original source is as follows ---

    This is a dataset containing all the major data breaches in the world from 2004 to 2021

    As we know, there is a big issue related to the privacy of our data. Many major companies in the world still to this day face this issue every single day. Even with a great team of people working on their security, many still suffer. In order to tackle this situation, it is only right that we must study this issue in great depth and therefore I pulled this data from Wikipedia to conduct data analysis. I would encourage others to take a look at this as well and find as many insights as possible.

    This data contains 5 columns: 1. Entity: The name of the company, organization or institute 2. Year: In what year did the data breach took place 3. Records: How many records were compromised (can include information like email, passwords etc.) 4. Organization type: Which sector does the organization belong to 5. Method: Was it hacked? Were the files lost? Was it an inside job?

    Here is the source for the dataset: https://en.wikipedia.org/wiki/List_of_data_breaches

    Here is the GitHub link for a guide on how it was scraped: https://github.com/hishaamarmghan/Data-Breaches-Scraping-Cleaning

    --- Original source retains full ownership of the source dataset ---

  15. Notifications to the CNIL of personal data breaches

    • data.europa.eu
    csv, excel xlsx
    Updated Oct 6, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    CNIL (2024). Notifications to the CNIL of personal data breaches [Dataset]. https://data.europa.eu/data/datasets/5cd42a86634f4147a23df1be?locale=en
    Explore at:
    excel xlsx(1044756), csv(11799571)Available download formats
    Dataset updated
    Oct 6, 2024
    Dataset provided by
    National Commission on Informatics and Liberty
    Authors
    CNIL
    License

    https://www.etalab.gouv.fr/licence-ouverte-open-licencehttps://www.etalab.gouv.fr/licence-ouverte-open-licence

    Description

    The General Data Protection Regulation (GDPR) has made it mandatory to notify the CNIL of any personal data breach that creates a risk to the rights and freedoms of data subjects. A data breach is "a breach of security resulting in the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data transmitted, stored or otherwise processed".

    This notification to the CNIL must be made within 72 hours, by the body responsible for processing or by its representative.

    For more information on data breaches and the CNIL’s follow-up to notifications: https://www.cnil.fr/notify-a-violation-of-personal-donations

    Disclaimer 1: The data published are those transmitted to the CNIL as part of the notifications (excluding those received in the three months preceding the production of the datasets for reasons of confidentiality of the files being processed or recently processed). They may not reflect the Commission's assessment of the situation described.

    Warning 2: Each notification in the dataset corresponds to a specific case, which may have led to several subsequent exchanges with the organization concerned or its representative.

  16. Deep web employee data leaks of selected e-commerce platforms 2024

    • statista.com
    Updated May 16, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2024). Deep web employee data leaks of selected e-commerce platforms 2024 [Dataset]. https://www.statista.com/statistics/1350068/e-commerce-websites-deep-web-employee-credential-leaks/
    Explore at:
    Dataset updated
    May 16, 2024
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    May 15, 2024
    Area covered
    Worldwide
    Description

    Company information such as employee credentials is one of the most common assets online vendors trade illegally on the darknet. According to the source, Zalando.com has suffered thousands of data leakage incidents on the deep web in the 12 months leading up to May 2024, in which more than 4,000 employee credentials were compromised. Amazon registered a relatively low number of deep web data leaks, with roughly 700 in the last 12 months.

  17. d

    Texas Commission on Environmental Quality - Leaking Petroleum Storage Tank...

    • catalog.data.gov
    • data.texas.gov
    • +1more
    Updated May 25, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    data.austintexas.gov (2025). Texas Commission on Environmental Quality - Leaking Petroleum Storage Tank (LPST) Sites [Dataset]. https://catalog.data.gov/dataset/texas-commission-on-environmental-quality-leaking-petroleum-storage-tank-lpst-sites
    Explore at:
    Dataset updated
    May 25, 2025
    Dataset provided by
    data.austintexas.gov
    Description

    List of Leaking Petroleum Storage Tank sites in Texas with associated PST Registration ID number(s), location information, the date each site was reported to the TCEQ, and the closure date (if closed).

  18. d

    FIIS_Breach_Shorelines.shp - Fire Island National Seashore Wilderness Breach...

    • catalog.data.gov
    • data.usgs.gov
    Updated Jul 6, 2024
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    U.S. Geological Survey (2024). FIIS_Breach_Shorelines.shp - Fire Island National Seashore Wilderness Breach Shoreline Data Collected from Fire Island, New York, October 2014 to October 2017 [Dataset]. https://catalog.data.gov/dataset/fiis-breach-shorelines-shp-fire-island-national-seashore-wilderness-breach-shoreline-data--c3985
    Explore at:
    Dataset updated
    Jul 6, 2024
    Dataset provided by
    U.S. Geological Survey
    Area covered
    Fire Island, New York
    Description

    Hurricane Sandy made U.S. landfall, coincident with astronomically high tides, near Atlantic City, New Jersey, on October 29, 2012. The storm, the largest on historical record in the Atlantic basin, affected an extensive area of the east coast of the United States. The highest waves and storm surge were focused along the heavily populated New York and New Jersey coasts. At the height of the storm, a record significant wave height of 9.6 meters (m) was recorded at the wave buoy offshore of Fire Island, New York. During the storm, an overwash channel opened a breach in the location of Old Inlet, in the Otis Pike High Dunes Wilderness Area. This breach is referred to as the Wilderness Breach (fig. 1). Fire Island, New York is the site of a long term coastal morphologic change and processes project conducted by the U.S. Geological Survey (USGS). One of the objectives of the project was to understand the morphologic evolution of the barrier system on a variety of time scales (days - years - decades - centuries). In response to Hurricane Sandy, this effort continued with the intention of resolving storm impact and the response and recovery of the beach. The day before Hurricane Sandy made landfall (October 28, 2012), a USGS field team conducted differential global positioning system (DGPS) surveys at Fire Island to quantify the pre-storm morphologic state of the beach and dunes. The area was re-surveyed after the storm, as soon as access to the island was possible. In order to fully capture the recovery of the barrier system, the USGS Hurricane Sandy Supplemental Fire Island Study was established to include collection in the weeks, months, and years following the storm. As part of the USGS Hurricane Sandy Supplemental Fire Island Study, the beach is monitored periodically to enable better understanding of post-Hurricane Sandy recovery. The alongshore state of the beach is recorded using a DGPS to collect data around the mean high water elevation (MHW; 0.46 meters, North American Vertical Datum of 1988 [NAVD88]) to derive a shoreline, and the cross-shore response and recovery are measured along a series of 15 profiles. Monitoring continued in the weeks following Hurricane Sandy with additional monthly data collection through April 2013 and repeat surveys every 2–3 months thereafter until October 2014. Recurring surveys have been conducted through October 2017. Beginning in October 2014 the USGS also began collecting shoreline data at the Wilderness Breach. The shoreline data collected was an approximation of the MHW shoreline. The operator walked an estimated MHW elevation above the water line and below the berm crest, using knowledge of tides and local conditions to interpret a consistent shoreline. See below for survey collection dates for all data types. The shapefile, FIIS_Breach_Shorelines.shp, consists of Fire Island, NY breach shorelines collected by following an interpreted MHW shoreline as identified in the field. Oct 28 2012 (MHW shoreline/Cross-shore data) Nov 01 2012 (MHW shoreline/Cross-shore data) Nov 04 2012 (Cross-shore data only) Dec 01 2012 (MHW shoreline/Cross-shore data) Dec 12 2012 (MHW shoreline/Cross-shore data) Jan 10 2013 (MHW shoreline/Cross-shore data) Feb 13 2013 (MHW shoreline/Cross-shore data) Mar 13 2013 (MHW shoreline/Cross-shore data) Apr 09 2013 (MHW shoreline/Cross-shore data) Jun 24 2013 (MHW shoreline/Cross-shore data) Sep 18 2013 (MHW shoreline/Cross-shore data) Dec 03 2013 (MHW shoreline/Cross-shore data) Jan 29 2014 (MHW shoreline/Cross-shore data) Jun 11 2014 (Cross-shore data only) Sep 09 2014 (MHW shoreline/Cross-shore data) Oct 07 2014 (Cross-shore data/MHW Breach shoreline) Jan 21 2015 (MHW shoreline/Cross-shore data/Breach shoreline) Mar 19 2015 (MHW shoreline/Cross-shore data) May 16 2015 (MHW shoreline/Cross-shore data/Breach shoreline) Set 28 2015 (MHW shoreline/Cross-shore data/Breach shoreline) Jan 21 2016 (MHW shoreline/Cross-shore data) Jan 25 2016 (MHW shoreline/Cross-shore data) Apr 06 2016 (Cross-shore data only) Apr 11 2016 (MHW shoreline/Cross-shore data/Breach shoreline) Jun 16 2016 (Cross-shore data only) Sep 27 2016 (MHW shoreline/Cross-shore data/Breach shoreline) Jan 24 2017 (MHW shoreline/Cross-shore data/Breach shoreline) May 23 2017 (MHW shoreline/Cross-shore data/Breach shoreline) Oct 17 2017 (MHW shoreline/Cross-shore data/Breach shoreline)

  19. Healthcare Ransomware Dataset

    • kaggle.com
    Updated Feb 21, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Rivalytics (2025). Healthcare Ransomware Dataset [Dataset]. https://www.kaggle.com/datasets/rivalytics/healthcare-ransomware-dataset
    Explore at:
    CroissantCroissant is a format for machine-learning datasets. Learn more about this at mlcommons.org/croissant.
    Dataset updated
    Feb 21, 2025
    Dataset provided by
    Kagglehttp://kaggle.com/
    Authors
    Rivalytics
    License

    Attribution-ShareAlike 4.0 (CC BY-SA 4.0)https://creativecommons.org/licenses/by-sa/4.0/
    License information was derived automatically

    Description

    📌 Context of the Dataset

    The Healthcare Ransomware Dataset was created to simulate real-world cyberattacks in the healthcare industry. Hospitals, clinics, and research labs have become prime targets for ransomware due to their reliance on real-time patient data and legacy IT infrastructure. This dataset provides insight into attack patterns, recovery times, and cybersecurity practices across different healthcare organizations.

    Why is this important?

    Ransomware attacks on healthcare organizations can shut down entire hospitals, delay treatments, and put lives at risk. Understanding how different healthcare organizations respond to attacks can help develop better security strategies. The dataset allows cybersecurity analysts, data scientists, and researchers to study patterns in ransomware incidents and explore predictive modeling for risk mitigation.

    📌 Sources and Research Inspiration This simulated dataset was inspired by real-world cybersecurity reports and built using insights from official sources, including:

    1️⃣ IBM Cost of a Data Breach Report (2024)

    The healthcare sector had the highest average cost of data breaches ($10.93 million per incident). On average, organizations recovered only 64.8% of their data after paying ransom. Healthcare breaches took 277 days on average to detect and contain.

    2️⃣ Sophos State of Ransomware in Healthcare (2024)

    67% of healthcare organizations were hit by ransomware in 2024, an increase from 60% in 2023. 66% of backup compromise attempts succeeded, making data recovery significantly more difficult. The most common attack vectors included exploited vulnerabilities (34%) and compromised credentials (34%).

    3️⃣ Health & Human Services (HHS) Cybersecurity Reports

    Ransomware incidents in healthcare have doubled since 2016. Organizations that fail to monitor threats frequently experience higher infection rates.

    4️⃣ Cybersecurity & Infrastructure Security Agency (CISA) Alerts

    Identified phishing, unpatched software, and exposed RDP ports as top ransomware entry points. Only 13% of healthcare organizations monitor cyber threats more than once per day, increasing the risk of undetected attacks.

    5️⃣ Emsisoft 2020 Report on Ransomware in Healthcare

    The number of ransomware attacks in healthcare increased by 278% between 2018 and 2023. 560 healthcare facilities were affected in a single year, disrupting patient care and emergency services.

    📌 Why is This a Simulated Dataset?

    This dataset does not contain real patient data or actual ransomware cases. Instead, it was built using probabilistic modeling and structured randomness based on industry benchmarks and cybersecurity reports.

    How It Was Created:

    1️⃣ Defining the Dataset Structure

    The dataset was designed to simulate realistic attack patterns in healthcare, using actual ransomware case studies as inspiration.

    Columns were selected based on what real-world cybersecurity teams track, such as: Attack methods (phishing, RDP exploits, credential theft). Infection rates, recovery time, and backup compromise rates. Organization type (hospitals, clinics, research labs) and monitoring frequency.

    2️⃣ Generating Realistic Data Using ChatGPT & Python

    ChatGPT assisted in defining relationships between attack factors, ensuring that key cybersecurity concepts were accurately reflected. Python’s NumPy and Pandas libraries were used to introduce randomized attack simulations based on real-world statistics. Data was validated against industry research to ensure it aligns with actual ransomware attack trends.

    3️⃣ Ensuring Logical Relationships Between Data Points

    Hospitals take longer to recover due to larger infrastructure and compliance requirements. Organizations that track more cyber threats recover faster because they detect attacks earlier. Backup security significantly impacts recovery time, reflecting the real-world risk of backup encryption attacks.

  20. Number of U.S. government data breach incidents 2023, by state

    • statista.com
    Updated Mar 13, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2024). Number of U.S. government data breach incidents 2023, by state [Dataset]. https://www.statista.com/statistics/1455591/us-gov-data-breaches-by-state/
    Explore at:
    Dataset updated
    Mar 13, 2024
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    Jan 2023 - Nov 2023
    Area covered
    United States
    Description

    Between January and November 2023, California was the U.S. state with the highest number of reported data breach incidents targeting the government. In the measured period, the government agencies saw 16 cases of data breaches. Texas ranked second, with eight incidents. Overall, 137 cases of government data breaches were recorded in the United States.

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
Statista (2025). Number of data compromises and impacted individuals in U.S. 2005-2024 [Dataset]. https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/
Organization logo

Number of data compromises and impacted individuals in U.S. 2005-2024

Explore at:
162 scholarly articles cite this dataset (View in Google Scholar)
Dataset updated
May 23, 2025
Dataset authored and provided by
Statistahttp://statista.com/
Area covered
United States
Description

In 2024, the number of data compromises in the United States stood at 3,158 cases. Meanwhile, over 1.35 billion individuals were affected in the same year by data compromises, including data breaches, leakage, and exposure. While these are three different events, they have one thing in common. As a result of all three incidents, the sensitive data is accessed by an unauthorized threat actor. Industries most vulnerable to data breaches Some industry sectors usually see more significant cases of private data violations than others. This is determined by the type and volume of the personal information organizations of these sectors store. In 2024 the financial services, healthcare, and professional services were the three industry sectors that recorded most data breaches. Overall, the number of healthcare data breaches in some industry sectors in the United States has gradually increased within the past few years. However, some sectors saw decrease. Largest data exposures worldwide In 2020, an adult streaming website, CAM4, experienced a leakage of nearly 11 billion records. This, by far, is the most extensive reported data leakage. This case, though, is unique because cyber security researchers found the vulnerability before the cyber criminals. The second-largest data breach is the Yahoo data breach, dating back to 2013. The company first reported about one billion exposed records, then later, in 2017, came up with an updated number of leaked records, which was three billion. In March 2018, the third biggest data breach happened, involving India’s national identification database Aadhaar. As a result of this incident, over 1.1 billion records were exposed.

Search
Clear search
Close search
Google apps
Main menu