24 datasets found
  1. Deep web employee data leaks of selected e-commerce platforms 2024

    • statista.com
    Updated Jul 11, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Deep web employee data leaks of selected e-commerce platforms 2024 [Dataset]. https://www.statista.com/statistics/1350068/e-commerce-websites-deep-web-employee-credential-leaks/
    Explore at:
    Dataset updated
    Jul 11, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    May 15, 2024
    Area covered
    Worldwide
    Description

    Company information such as employee credentials is one of the most common assets online vendors trade illegally on the darknet. According to the source, Zalando.com has suffered thousands of data leakage incidents on the deep web in the 12 months leading up to ********, in which more than ***** employee credentials were compromised. Amazon registered a relatively low number of deep web data leaks, with roughly *** in the last 12 months.

  2. All-time biggest online data breaches 2025

    • statista.com
    • ai-chatbox.pro
    Updated May 26, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). All-time biggest online data breaches 2025 [Dataset]. https://www.statista.com/statistics/290525/cyber-crime-biggest-online-data-breaches-worldwide/
    Explore at:
    Dataset updated
    May 26, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    Jan 2025
    Area covered
    Worldwide
    Description

    The largest reported data leakage as of January 2025 was the Cam4 data breach in March 2020, which exposed more than 10 billion data records. The second-largest data breach in history so far, the Yahoo data breach, occurred in 2013. The company initially reported about one billion exposed data records, but after an investigation, the company updated the number, revealing that three billion accounts were affected. The National Public Data Breach was announced in August 2024. The incident became public when personally identifiable information of individuals became available for sale on the dark web. Overall, the security professionals estimate the leakage of nearly three billion personal records. The next significant data leakage was the March 2018 security breach of India's national ID database, Aadhaar, with over 1.1 billion records exposed. This included biometric information such as identification numbers and fingerprint scans, which could be used to open bank accounts and receive financial aid, among other government services.

    Cybercrime - the dark side of digitalization As the world continues its journey into the digital age, corporations and governments across the globe have been increasing their reliance on technology to collect, analyze and store personal data. This, in turn, has led to a rise in the number of cyber crimes, ranging from minor breaches to global-scale attacks impacting billions of users – such as in the case of Yahoo. Within the U.S. alone, 1802 cases of data compromise were reported in 2022. This was a marked increase from the 447 cases reported a decade prior. The high price of data protection As of 2022, the average cost of a single data breach across all industries worldwide stood at around 4.35 million U.S. dollars. This was found to be most costly in the healthcare sector, with each leak reported to have cost the affected party a hefty 10.1 million U.S. dollars. The financial segment followed closely behind. Here, each breach resulted in a loss of approximately 6 million U.S. dollars - 1.5 million more than the global average.

  3. Number of data compromises and impacted individuals in U.S. 2005-2024

    • statista.com
    • ai-chatbox.pro
    Updated May 23, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Number of data compromises and impacted individuals in U.S. 2005-2024 [Dataset]. https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/
    Explore at:
    Dataset updated
    May 23, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    United States
    Description

    In 2024, the number of data compromises in the United States stood at 3,158 cases. Meanwhile, over 1.35 billion individuals were affected in the same year by data compromises, including data breaches, leakage, and exposure. While these are three different events, they have one thing in common. As a result of all three incidents, the sensitive data is accessed by an unauthorized threat actor. Industries most vulnerable to data breaches Some industry sectors usually see more significant cases of private data violations than others. This is determined by the type and volume of the personal information organizations of these sectors store. In 2024 the financial services, healthcare, and professional services were the three industry sectors that recorded most data breaches. Overall, the number of healthcare data breaches in some industry sectors in the United States has gradually increased within the past few years. However, some sectors saw decrease. Largest data exposures worldwide In 2020, an adult streaming website, CAM4, experienced a leakage of nearly 11 billion records. This, by far, is the most extensive reported data leakage. This case, though, is unique because cyber security researchers found the vulnerability before the cyber criminals. The second-largest data breach is the Yahoo data breach, dating back to 2013. The company first reported about one billion exposed records, then later, in 2017, came up with an updated number of leaked records, which was three billion. In March 2018, the third biggest data breach happened, involving India’s national identification database Aadhaar. As a result of this incident, over 1.1 billion records were exposed.

  4. Biggest data breaches in the U.S. 2024, by impact

    • statista.com
    Updated Mar 7, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Biggest data breaches in the U.S. 2024, by impact [Dataset]. https://www.statista.com/statistics/1448545/us-biggest-data-breaches/
    Explore at:
    Dataset updated
    Mar 7, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    Dec 2024
    Area covered
    United States
    Description

    As of December 2024, the most significant data breach incident in the United States was the Yahoo data breach that dates back to 2013-2016. Impacting over three billion online users, this incident still remains one of the most significant data breaches worldwide. The second-biggest case was the January 2021 data breach at Microsoft, involving about 30 thousand companies in the United States and around 60 thousand companies around the world.

  5. D

    Data Breach Notifications Affecting Washington Residents (Personal...

    • data.wa.gov
    • catalog.data.gov
    application/rdfxml +5
    Updated Jul 14, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Washington State Attorney General's Office Consumer Protection Division (2025). Data Breach Notifications Affecting Washington Residents (Personal Information Breakdown) [Dataset]. https://data.wa.gov/Consumer-Protection/Data-Breach-Notifications-Affecting-Washington-Res/padd-mby7
    Explore at:
    csv, json, application/rssxml, application/rdfxml, tsv, xmlAvailable download formats
    Dataset updated
    Jul 14, 2025
    Dataset authored and provided by
    Washington State Attorney General's Office Consumer Protection Division
    Area covered
    Washington
    Description
    • Washington law requires entities impacted by a data breach to notify the Attorney General’s Office (AGO) when more than 500 Washingtonians personal information was compromised as a result of the breach. This dataset breaks out the individual types of breached personal information that were identified in each notice our office received. This data is used to produce the AGO’s Annual Data Breach Report. For additional statistics relating to data breaches, also see the main dataset at: https://data.wa.gov/Consumer-Protection/Data-Breach-Notifications-Affecting-Washington-Res/sb4j-ca4h.
  6. i

    Data from: Rockyou

    • ieee-dataport.org
    Updated Apr 27, 2021
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Zeeshan Shaikh (2021). Rockyou [Dataset]. https://ieee-dataport.org/documents/rockyou
    Explore at:
    Dataset updated
    Apr 27, 2021
    Authors
    Zeeshan Shaikh
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Passwords that were leaked or stolen from sites. The Rockyou Dataset is about 14 million passwords.

  7. O

    Texas Commission on Environmental Quality - Leaking Petroleum Storage Tank...

    • data.texas.gov
    • datasets.ai
    • +2more
    application/rdfxml +5
    Updated Jul 13, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Office of Waste (2025). Texas Commission on Environmental Quality - Leaking Petroleum Storage Tank (LPST) Sites [Dataset]. https://data.texas.gov/dataset/Texas-Commission-on-Environmental-Quality-Leaking-/hedz-nn4q
    Explore at:
    application/rdfxml, csv, application/rssxml, json, xml, tsvAvailable download formats
    Dataset updated
    Jul 13, 2025
    Dataset authored and provided by
    Office of Waste
    Description

    List of Leaking Petroleum Storage Tank sites in Texas with associated PST Registration ID number(s), location information, the date each site was reported to the TCEQ, and the closure date (if closed).

  8. AOL Search Data 20M web queries (2006)

    • academictorrents.com
    bittorrent
    Updated Dec 17, 2016
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    AOL (2016). AOL Search Data 20M web queries (2006) [Dataset]. https://academictorrents.com/details/cd339bddeae7126bb3b15f3a72c903cb0c401bd1
    Explore at:
    bittorrent(460409936)Available download formats
    Dataset updated
    Dec 17, 2016
    Dataset authored and provided by
    AOLhttp://aol.com/
    License

    https://academictorrents.com/nolicensespecifiedhttps://academictorrents.com/nolicensespecified

    Description

    500k User Session Collection This collection is distributed for NON-COMMERCIAL RESEARCH USE ONLY. Any application of this collection for commercial purposes is STRICTLY PROHIBITED. #### Brief description: This collection consists of ~20M web queries collected from ~650k users over three months. The data is sorted by anonymous user ID and sequentially arranged. The goal of this collection is to provide real query log data that is based on real users. It could be used for personalization, query reformulation or other types of search research. The data set includes AnonID, Query, QueryTime, ItemRank, ClickURL. AnonID - an anonymous user ID number. Query - the query issued by the user, case shifted with most punctuation removed. QueryTime - the time at which the query was submitted for search. ItemRank - if the user clicked on a search result, the rank of the item on which they clicked is listed. ClickURL - if the user clicked on a search result, the domain portion of the URL i

  9. Global number of breached user accounts Q1 2020-Q3 2024

    • statista.com
    • ai-chatbox.pro
    Updated Jun 23, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Global number of breached user accounts Q1 2020-Q3 2024 [Dataset]. https://www.statista.com/statistics/1307426/number-of-data-breaches-worldwide/
    Explore at:
    Dataset updated
    Jun 23, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    Worldwide
    Description

    During the third quarter of 2024, data breaches exposed more than *** million records worldwide. Since the first quarter of 2020, the highest number of data records were exposed in the first quarter of ***, more than *** million data sets. Data breaches remain among the biggest concerns of company leaders worldwide. The most common causes of sensitive information loss were operating system vulnerabilities on endpoint devices. Which industries see the most data breaches? Meanwhile, certain conditions make some industry sectors more prone to data breaches than others. According to the latest observations, the public administration experienced the highest number of data breaches between 2021 and 2022. The industry saw *** reported data breach incidents with confirmed data loss. The second were financial institutions, with *** data breach cases, followed by healthcare providers. Data breach cost Data breach incidents have various consequences, the most common impact being financial losses and business disruptions. As of 2023, the average data breach cost across businesses worldwide was **** million U.S. dollars. Meanwhile, a leaked data record cost about *** U.S. dollars. The United States saw the highest average breach cost globally, at **** million U.S. dollars.

  10. d

    Underground Storage Tanks/Leaking Underground Storage Tanks Database System

    • datasets.ai
    • mydata.iowa.gov
    • +2more
    Updated Aug 9, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    State of Iowa (2024). Underground Storage Tanks/Leaking Underground Storage Tanks Database System [Dataset]. https://datasets.ai/datasets/underground-storage-tanks-leaking-underground-storage-tanks-database-system
    Explore at:
    Dataset updated
    Aug 9, 2024
    Dataset authored and provided by
    State of Iowa
    Description

    Tracks underground storage tanks (UST) site location, site owners, tanks, Risk-Based Corrective Action (RBCA), site classification and remediation; and the current status of UST & Leaking UST sites.

  11. c

    Global Cloud Security Market Report 2025 Edition, Market Size, Share, CAGR,...

    • cognitivemarketresearch.com
    pdf,excel,csv,ppt
    Updated May 18, 2024
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Cognitive Market Research (2024). Global Cloud Security Market Report 2025 Edition, Market Size, Share, CAGR, Forecast, Revenue [Dataset]. https://www.cognitivemarketresearch.com/cloud-security-market-report
    Explore at:
    pdf,excel,csv,pptAvailable download formats
    Dataset updated
    May 18, 2024
    Dataset authored and provided by
    Cognitive Market Research
    License

    https://www.cognitivemarketresearch.com/privacy-policyhttps://www.cognitivemarketresearch.com/privacy-policy

    Time period covered
    2021 - 2033
    Area covered
    Global
    Description

    Market Summary of Cloud Security Market:

    • The Global Cloud Security market size in 2023 was XX Million. The Cloud Security Industry's compound annual growth rate (CAGR) will be XX% from 2024 to 2031. • The market for cloud security is growing because of the emergence of DevSecOps and Data breaches. • The adoption of these solutions by businesses, particularly small and medium-sized businesses, has been greatly hampered by their high cost. • The AI and data analytics capabilities of the cloud are being heavily utilized by telcos. Operating in extremely dynamic and complicated IT environments with a multitude of software, networks, and devices is what has contributed to the expansion of the IT & telecom market. • North America is expected to have the largest market share in the cloud security market

    Market Dynamics of Cloud Security Market:

    Key drivers of Cloud Security Market

    Data breaches and cyberattacks are driving the cloud security market's rapid growth.
    

    Due to digitalization and technological advancements, the use of the Internet is increasing in all sectors. As the use of the Internet increases, the chances of cyber-attacks increase. There is a large scale of cyberattacks that is causing the loss of private, business, and governmental data all around the world when individuals utilize the Internet to conduct focused, politically driven attacks against cloud IT infrastructure. A cyberattack that targets off-site service platforms that use their cloud architecture to provide computing, storage, or hosting services might be categorized as a cloud cyberattack. This can involve assaults on service platforms that make use of SaaS(software as a service), IaaS (infrastructure as a service), and PaaS (platform as a service) service delivery paradigms. For Example, In March 2020, a cloud cyber assault targeted the adult live-streaming website CAM4, exposing 10.8 billion confidential entries totaling 7 TB of data. Location information, email addresses, IP addresses, payment logs, usernames, and more were all included in the compromised database. (Source:https://cisomag.com/adult-website-data-leak/) The growing number of organizational data breaches and leaks is driving the cloud security market. Data in the cloud is more vulnerable to hackers than data on corporate computers. For Instance, Microsoft revealed in 2020, that in December 2019 breach in one of their cloud databases exposed 250 million entries, including IP addresses, email addresses, and support case information. The computer giant claims that a poorly designed network server that was storing the important data was the root cause of this data breach. Despite not being the largest, the high-profile target made it one of the most startling clouds cyberattacks. (Source:https://www.forbes.com/sites/daveywinder/2020/01/22/microsoft-security-shocker-as-250-million-customer-records-exposed-online/?sh=693f59f04d1b)Thus, The cloud service model enhances the dangers and security challenges associated with cloud computing systems by exposing information and offering customers a variety of services. Data loss in cloud computing is a basic security issue. Hackers from both inside and external staff may gain unauthorized or purposeful access to the data. Such setups can be targets for external hackers who utilize hacking tactics like eavesdropping and hijacking to get access to databases. Additionally, malicious programs like Trojan horses which are a kind of malicious software that infiltrates a computer under the guise of an authentic application, and viruses are added to cloud services. Therefore, to put in place a system with stronger security features, it is vital to detect potential cloud risks and protect against such breaches with good cloud security.

    The market for cloud security is growing because of the emergence of DevSecOps.
    

    As more businesses shift their apps and IT infrastructure to the cloud, cloud security is becoming more and more crucial. DevSecOps which is development, security, and operation automation is becoming popular among many enterprises as a means of guaranteeing the best possible cloud security. DevSecOps automation incorporates security into every phase of the development lifecycle, from code generation to deployment and maintenance. DevSecOps helps ...

  12. Leaked U.S. Department of Defense DMED (Defense Medical Epidemiology...

    • data.niaid.nih.gov
    Updated Jul 17, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Dr. Samuel Sigoloff (2024). Leaked U.S. Department of Defense DMED (Defense Medical Epidemiology Database) [Dataset]. https://data.niaid.nih.gov/resources?id=zenodo_5985601
    Explore at:
    Dataset updated
    Jul 17, 2024
    Dataset provided by
    United States Department of Defensehttp://www.defense.gov/
    Thomas Renz
    Lt. Col. Theresa Long
    Leigh Dundas
    Dr. Samuel Sigoloff
    Lt. Col. Peter Chambers
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Area covered
    United States
    Description

    This is a database and accompanying report first appearing on a google drive link shared by Attorney Thomas Renz of Renz Law with the Epoch Times as well as embedded into Thomas Renz' website.

    According to DHA's Armed Forces Surveillance Division, the data in this database is incorrect for the years 2016-2020. (Watson, 2022)

    DMED is a web tool to query medical event data contained within the Defense Medical Surveillance System. The AFHSD claims that due to a serious error in their system, data between the years of 2016-2020 has been incredibly under-reported which has lead to the appearance of a significant increase of occurrences of medical diagnoses in 2021. (Watson 2022)

    References:

    Renz, T. (2021, October 1). Attorney Tom Renz discovers leaked DOD covid files. Renz Law. Retrieved February 6, 2022, from https://renz-law.com/attorney-tom-renz-discovers-leaked-dod-covid-files/

    Watson, S. (2022, February 6). Pentagon responds to DOD whistleblowers' claim of spiking disease rates in the military after Covid Vaccine Mandate. InfoWars. Retrieved February 6, 2022, from https://www.infowars.com/posts/pentagon-responds-to-dod-whistleblowers-claim-of-spiking-disease-rates-in-the-military-after-covid-vaccine-mandate/

  13. Largest data breaches in France 2024

    • statista.com
    Updated Oct 28, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2024). Largest data breaches in France 2024 [Dataset]. https://www.statista.com/statistics/1407355/france-largest-data-breaches/
    Explore at:
    Dataset updated
    Oct 28, 2024
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    May 2018 - Sep 2024
    Area covered
    France
    Description

    Between May 2018 and September 2024, France saw eight incidents of significant data breaches. The first recorded case was the May 2018 data breach at Apollo.io. The marketing company based in San Francisco lost approximately 10.93 million data records from French users. The latest reported data breach incident occurred at the France-based security company Thales. As a result of this incident, 9.5 GB of archive files were leaked.

  14. Dark Web Intelligence Market Report | Global Forecast From 2025 To 2033

    • dataintelo.com
    csv, pdf, pptx
    Updated Jan 7, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Dataintelo (2025). Dark Web Intelligence Market Report | Global Forecast From 2025 To 2033 [Dataset]. https://dataintelo.com/report/global-dark-web-intelligence-market
    Explore at:
    csv, pdf, pptxAvailable download formats
    Dataset updated
    Jan 7, 2025
    Dataset authored and provided by
    Dataintelo
    License

    https://dataintelo.com/privacy-and-policyhttps://dataintelo.com/privacy-and-policy

    Time period covered
    2024 - 2032
    Area covered
    Global
    Description

    Dark Web Intelligence Market Outlook



    The global dark web intelligence market size was valued at USD 500 million in 2023 and is projected to reach USD 1.7 billion by 2032, growing at a CAGR of 15% during the forecast period. The market is witnessing rapid growth due to the increasing need for advanced threat intelligence and cybersecurity solutions to protect sensitive data and prevent cyberattacks. With the rising incidence of cybercrimes, businesses and governments alike are investing in dark web intelligence solutions to proactively monitor and mitigate emerging threats.



    One of the primary growth factors for the dark web intelligence market is the escalating number of data breaches and cyberattacks. Organizations are increasingly recognizing the importance of monitoring the dark web to detect potential threats and leaks of sensitive information. This proactive approach helps in identifying and mitigating risks before they can cause significant damage. Additionally, the growing digitalization and the rise of IoT devices have expanded the attack surface for cybercriminals, thereby driving the demand for robust dark web intelligence solutions.



    Another significant driver is the stringent regulatory landscape mandating enhanced cybersecurity measures. Governments and regulatory bodies across the globe are implementing stringent data protection laws and cybersecurity regulations. Compliance with these regulations often requires organizations to adopt advanced threat intelligence and monitoring solutions, including dark web intelligence. Failure to comply can result in hefty fines and reputational damage, further incentivizing organizations to invest in these technologies.



    The increasing sophistication of cyber threats is also pushing the demand for dark web intelligence. Cybercriminals are employing more advanced techniques to breach security systems and evade detection. As a result, traditional cybersecurity measures are no longer sufficient to protect against these evolving threats. Dark web intelligence provides organizations with deeper insights into the activities and tactics of cybercriminals, enabling them to strengthen their defensive measures and respond more effectively to potential attacks.



    In this context, the role of a Threat Intelligence Solution becomes increasingly critical. These solutions are designed to provide organizations with the necessary tools to proactively identify, assess, and mitigate potential cyber threats. By leveraging advanced analytics and real-time data from various sources, including the dark web, threat intelligence solutions help organizations stay ahead of cybercriminals. They enable businesses to understand the tactics, techniques, and procedures used by attackers, allowing for more informed decision-making and strategic planning in cybersecurity efforts. As cyber threats continue to evolve, the demand for comprehensive threat intelligence solutions is expected to grow, driving innovation and advancements in this field.



    Regionally, North America holds the largest market share due to the presence of major technology companies and a high adoption rate of advanced cybersecurity solutions. The region's strong regulatory framework and high awareness of cyber threats contribute to the robust growth of the dark web intelligence market. Europe is also a significant market, driven by stringent data protection regulations such as GDPR. The Asia Pacific region is expected to witness the highest growth rate, fueled by rapid digitalization, increasing cyber threats, and growing investments in cybersecurity infrastructure.



    Component Analysis



    The dark web intelligence market by component is segmented into software and services. The software segment dominates the market, driven by the growing adoption of advanced analytics and machine learning algorithms that enable organizations to gain actionable insights from dark web data. These software solutions are designed to scan and analyze vast amounts of data from the dark web, identifying potential threats such as leaked credentials, malware, and other malicious activities. The increasing complexity of cyber threats necessitates the use of sophisticated software tools to effectively monitor and respond to these risks.



    Within the software segment, AI-powered threat intelligence platforms are gaining significant traction. These platforms leverage artificial intelligence and machine learning to automate the process of threat det

  15. Share of data leaks in Russia 2023, by channel

    • statista.com
    Updated Jul 9, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Share of data leaks in Russia 2023, by channel [Dataset]. https://www.statista.com/statistics/1060984/data-leaks-share-by-source-russia/
    Explore at:
    Dataset updated
    Jul 9, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    2023
    Area covered
    Russia
    Description

    By far the largest portion of information leaks in Russia in 2023 was committed through the web, such as from a cloud storage or browser data, at over ** percent of the total breaches. Instant messages, such as in the form of text, voice, or video, were the second most common source of data leakage with a share of around ***** percent.

  16. d

    Replication Data and Code for \"Incentives and Information in Methane Leak...

    • search.dataone.org
    Updated Sep 24, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Lewis, Eric (2024). Replication Data and Code for \"Incentives and Information in Methane Leak Detection and Repair\" [Dataset]. http://doi.org/10.7910/DVN/BAVBGX
    Explore at:
    Dataset updated
    Sep 24, 2024
    Dataset provided by
    Harvard Dataverse
    Authors
    Lewis, Eric
    Description

    Replication Data and Code for "Incentives and Information in Methane Leak Detection and Repair" Abstract: Capturing leaked methane can be a win for both firms and the environment. However, leakage volume uncertainty can be a barrier inhibiting leak repair. We study an experiment at oil and gas production sites which randomized whether site operators were informed of methane leakage volumes. At sites with high baseline leakage, we estimate a negative but imprecise effect of information on endline emissions. But at sites with zero measured leakage, giving firms information about methane leakage increased emissions at endline. Our results suggest that giving firms news of low leakage disincentivizes maintenance effort, thereby increasing the likelihood of future leaks. Package includes data from Wang et al. (2024) RCT as well as IEA data on estimated methane emissions and methane abatement costs. Package also includes code for replication.

  17. Biggest data breaches in the UK 2025, by impact

    • statista.com
    Updated Feb 11, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Biggest data breaches in the UK 2025, by impact [Dataset]. https://www.statista.com/statistics/1386728/uk-biggest-data-breaches/
    Explore at:
    Dataset updated
    Feb 11, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    Jan 2025
    Area covered
    United Kingdom
    Description

    As of January 2025, the most significant data breach incident in the United Kingdom (UK) was the 2017-2018 Dixons Carphone breach. As a result of this incident, 14 million user records were affected, and 5.6 million payment card information was exposed. The Equifax data breach between 2011 and 2016 impacted over 15 million customers nationwide.

  18. Web Security Gateway Market Research Report 2033

    • growthmarketreports.com
    csv, pdf, pptx
    Updated Jun 28, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Growth Market Reports (2025). Web Security Gateway Market Research Report 2033 [Dataset]. https://growthmarketreports.com/report/web-security-gateway-market
    Explore at:
    pptx, pdf, csvAvailable download formats
    Dataset updated
    Jun 28, 2025
    Dataset authored and provided by
    Growth Market Reports
    Time period covered
    2024 - 2032
    Area covered
    Global
    Description

    Web Security Gateway Market Outlook



    As per our latest research, the global Web Security Gateway market size in 2024 stands at USD 6.1 billion, with a projected compound annual growth rate (CAGR) of 13.2% from 2025 to 2033. By the end of 2033, the market is forecasted to reach USD 18.1 billion. The primary growth factor driving this expansion is the escalating sophistication of cyber threats and the increasing volume of sensitive data transacted over digital channels, which have made robust web security solutions indispensable for organizations of all sizes and sectors.




    One of the most significant growth drivers for the Web Security Gateway market is the rapid digital transformation and widespread adoption of cloud-based services across various industries. As organizations embrace digital operations, their exposure to cyber risks intensifies, necessitating advanced web security gateways to protect critical assets and data. The proliferation of remote work and BYOD (Bring Your Own Device) policies, especially since the global pandemic, has further expanded the attack surface for enterprises. This shift has compelled businesses to invest in comprehensive web security solutions that can safeguard endpoints, applications, and networks from ever-evolving threats such as phishing, ransomware, and advanced persistent threats. Additionally, regulatory compliance requirements, such as GDPR, HIPAA, and PCI DSS, are pushing organizations to adopt web security gateways to ensure data privacy and security, thereby fueling market growth.




    Another pivotal factor contributing to the expansion of the Web Security Gateway market is the increasing sophistication and frequency of cyber-attacks. Cybercriminals are leveraging advanced techniques, including AI-driven malware and zero-day exploits, to bypass traditional security defenses. In response, organizations are seeking next-generation web security gateways that offer integrated threat intelligence, real-time analytics, and automated response mechanisms. The integration of artificial intelligence and machine learning into security gateways is enabling proactive threat detection and mitigation, reducing the likelihood of successful breaches. Moreover, as organizations migrate to hybrid and multi-cloud environments, the demand for scalable, flexible, and cloud-native web security solutions is surging, further propelling market growth.




    The growing awareness of the financial and reputational risks associated with data breaches is also a major catalyst for the Web Security Gateway market. High-profile cyber incidents and data leaks have underscored the importance of robust web security measures for businesses, government agencies, and educational institutions alike. As a result, there is a marked increase in security budgets and a strategic shift toward adopting comprehensive web security architectures. This trend is particularly pronounced in sectors handling sensitive information, such as banking, healthcare, and government, where the potential impact of cyber incidents is especially severe. The continuous evolution of threat landscapes and the emergence of new attack vectors are expected to sustain strong demand for web security gateways over the forecast period.




    From a regional perspective, North America currently dominates the Web Security Gateway market, driven by the presence of leading technology providers, high cybersecurity awareness, and stringent regulatory frameworks. However, the Asia Pacific region is witnessing the fastest growth, fueled by rapid digitalization, increasing internet penetration, and a surge in cyber-attacks targeting businesses and government entities. Europe also holds a significant share, supported by robust data protection regulations and the rising adoption of cloud-based security solutions. Latin America and the Middle East & Africa are emerging markets, with growing investments in cybersecurity infrastructure and increasing demand for web security gateways among SMEs and large enterprises alike.





    Comp

  19. d

    NIST REFLEAK: NIST Leak/Recharge Simulation Program for Refrigerant Mixtures...

    • datadiscoverystudio.org
    Updated May 30, 2017
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2017). NIST REFLEAK: NIST Leak/Recharge Simulation Program for Refrigerant Mixtures - SRD 73. [Dataset]. http://datadiscoverystudio.org/geoportal/rest/metadata/item/c94929269234471cb80188ea3eb90ab9/html
    Explore at:
    Dataset updated
    May 30, 2017
    Description

    description: REFLEAK estimates composition changes of zeotropic mixtures in leak and recharge processes. The leak/recharge simulation program consists of three parts: 1) the pre-processing section for inputting required data, 2) the computation section which simulates leak/recharge processes and, 3) the post-processing section to display calculated results and to print or store data and graphs. Version 4.0 System Requirements: Free space for complete installation: 10 MB. REFLEAK is designed to run on any personal computer (PC) capable of running Microsoft Windows 7, XP with Service Pack 3, and Vista operating systems. The installation module requires .NET Framework 2.0 Service Pack 2 (or later version), which can be downloaded from the Microsoft website if not present on the user's PC.; abstract: REFLEAK estimates composition changes of zeotropic mixtures in leak and recharge processes. The leak/recharge simulation program consists of three parts: 1) the pre-processing section for inputting required data, 2) the computation section which simulates leak/recharge processes and, 3) the post-processing section to display calculated results and to print or store data and graphs. Version 4.0 System Requirements: Free space for complete installation: 10 MB. REFLEAK is designed to run on any personal computer (PC) capable of running Microsoft Windows 7, XP with Service Pack 3, and Vista operating systems. The installation module requires .NET Framework 2.0 Service Pack 2 (or later version), which can be downloaded from the Microsoft website if not present on the user's PC.

  20. c

    The global Mobile Security Market size is USD 6.3 billion in 2024 and will...

    • cognitivemarketresearch.com
    pdf,excel,csv,ppt
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Cognitive Market Research, The global Mobile Security Market size is USD 6.3 billion in 2024 and will expand at a compound annual growth rate (CAGR) of 18.7% from 2024 to 2031. [Dataset]. https://www.cognitivemarketresearch.com/mobile-security-market-report
    Explore at:
    pdf,excel,csv,pptAvailable download formats
    Dataset authored and provided by
    Cognitive Market Research
    License

    https://www.cognitivemarketresearch.com/privacy-policyhttps://www.cognitivemarketresearch.com/privacy-policy

    Time period covered
    2021 - 2033
    Area covered
    Global
    Description

    According to Cognitive Market Research, the global Mobile Security Market size is USD 6.3 billion in 2024 and will expand at a compound annual growth rate (CAGR) of 18.7% from 2024 to 2031.

    North America held largest share of XX% in the year 2024 
    Europe held share of XX% in the year 2024 
    Asia-Pacific held significant share of XX% in the year 2024 
    South America held significant share of XX% in the year 2024
    Middle East and Africa held significant share of XX% in the year 2024 
    

    Market Dynamics of Mobile Security Market

    Key Drivers for Mobile Security Market

    Increase in the usage of BYOD is fueling the market growth
    

    Businesses and organizations are embracing the BYOD phenomenon, resulting in a much more productive workplace for workers. The workers utilize the company's network within working hours and when the device is outside the company's area. Thus, the necessity to protect the security and safety of corporate and financial information at remote ends grows. The security solution that companies adopt must distinguish between employees' personal data and the company's data. Individual users are also subjected to data loss when hackers attack payment information and audio and video files. Mobile security solutions are becoming more essential for all mobile users to safeguard their data. This aspect contributes to the market CAGR in the forecast period. Furthermore, artificial intelligence is inherent in various smartphones and their development. Smartphone developers, like Apple, Samsung, Huawei, and others, integrate machine learning and artificial intelligence into the creation of their smartphone models, thereby, offering promising opportunities for market expansion. In addition, based on a study, 200 mobile security app firms are likely to integrate AI artificial intelligence and machine learning into smartphones to enhance several features, including cameras and security apps. Additionally, firms are integrating artificial intelligence into smartphones and tablets to enable mobile applications and enhance the performance of several mobile devices. AI enables mobile apps to gain insights from different data produced by all users and enhances the decision-making power of the user. So, it turns out to be a profitable chance for Mobile security market revenue growth. For instance, a 2023 study found that 59% of companies have implemented BYOD policies, leading to a surge in mobile security concerns. With more employees using personal devices for work, the risk of data breaches and cyberattacks escalates, prompting companies to invest in mobile security solutions to safeguard sensitive information. Therefore, as businesses continue to prioritize securing mobile endpoints amidst the growing BYOD trend.

    Key Restraints for Mobile Security Market

    Lack of awareness is restraining the mobile security market
    

    Billions of smartphone owners use their phones to access a number of applications. Most users require to be informed about the privacy policies of the applications and how they obtain them. Most individuals employ laptops or mobile phones to access untrusted websites and download unprotected software, raising the risk of cyberattack on these phones. The growth of the market is restrained by a demand for greater information regarding mobile device threats and the security products on hand to counteract them. Mobile device security threats may include malicious applications and websites, data leaks, spyware, social engineering attacks, and more. They are designed to infiltrate a network, steal data, compromise communications, and exploit vulnerabilities found in remote endpoints. Moreover, many of the people are visiting untrusted websites via laptops or mobiles while downloading insecure applications, which make these devices more vulnerable to cyberattacks. Lack of awareness about mobile device threats and their security solutions are restraining the growth of the market. For instance, a 2022 survey revealed that 43% of mobile device users are unaware of the potential risks associated with unsecured devices, making them more vulnerable to cyberattacks. This lack of understanding leads to poor security practices, such as using weak passwords or neglecting software updates. Furthermore, a report from Cybersecurity Ventures indicates that 60% of small to medium-sized businesses do not have a mobile security policy in place, which furthe...

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
Statista (2025). Deep web employee data leaks of selected e-commerce platforms 2024 [Dataset]. https://www.statista.com/statistics/1350068/e-commerce-websites-deep-web-employee-credential-leaks/
Organization logo

Deep web employee data leaks of selected e-commerce platforms 2024

Explore at:
Dataset updated
Jul 11, 2025
Dataset authored and provided by
Statistahttp://statista.com/
Time period covered
May 15, 2024
Area covered
Worldwide
Description

Company information such as employee credentials is one of the most common assets online vendors trade illegally on the darknet. According to the source, Zalando.com has suffered thousands of data leakage incidents on the deep web in the 12 months leading up to ********, in which more than ***** employee credentials were compromised. Amazon registered a relatively low number of deep web data leaks, with roughly *** in the last 12 months.

Search
Clear search
Close search
Google apps
Main menu