95 datasets found
  1. Number of data compromises and impacted individuals in U.S. 2005-2024

    • statista.com
    Updated Jul 14, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Number of data compromises and impacted individuals in U.S. 2005-2024 [Dataset]. https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/
    Explore at:
    Dataset updated
    Jul 14, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    United States
    Description

    In 2024, the number of data compromises in the United States stood at 3,158 cases. Meanwhile, over 1.35 billion individuals were affected in the same year by data compromises, including data breaches, leakage, and exposure. While these are three different events, they have one thing in common. As a result of all three incidents, the sensitive data is accessed by an unauthorized threat actor. Industries most vulnerable to data breaches Some industry sectors usually see more significant cases of private data violations than others. This is determined by the type and volume of the personal information organizations of these sectors store. In 2024 the financial services, healthcare, and professional services were the three industry sectors that recorded most data breaches. Overall, the number of healthcare data breaches in some industry sectors in the United States has gradually increased within the past few years. However, some sectors saw decrease. Largest data exposures worldwide In 2020, an adult streaming website, CAM4, experienced a leakage of nearly 11 billion records. This, by far, is the most extensive reported data leakage. This case, though, is unique because cyber security researchers found the vulnerability before the cyber criminals. The second-largest data breach is the Yahoo data breach, dating back to 2013. The company first reported about one billion exposed records, then later, in 2017, came up with an updated number of leaked records, which was three billion. In March 2018, the third biggest data breach happened, involving India’s national identification database Aadhaar. As a result of this incident, over 1.1 billion records were exposed.

  2. m

    Data Breach Notification Reports

    • mass.gov
    Updated Jan 19, 2019
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Office of Consumer Affairs and Business Regulation (2019). Data Breach Notification Reports [Dataset]. https://www.mass.gov/lists/data-breach-notification-reports
    Explore at:
    Dataset updated
    Jan 19, 2019
    Dataset authored and provided by
    Office of Consumer Affairs and Business Regulation
    Area covered
    Massachusetts
    Description

    View Data Breach Notification Reports, which include how many breaches are reported each year and the number of affected residents.

  3. U.S. health data breaches caused by hacking 2014 - H1 2024

    • statista.com
    Updated Jun 23, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). U.S. health data breaches caused by hacking 2014 - H1 2024 [Dataset]. https://www.statista.com/statistics/972228/health-data-breaches-caused-by-hacking-us/
    Explore at:
    Dataset updated
    Jun 23, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    United States
    Description

    In the first half of 2024, the share of health-related U.S. data breaches caused by hacking was ** percent, which marked a *** percent increase from 2023, reaching its highest rate since 2014.

  4. Awareness if smartphone device has been hacked Philippines 2021

    • statista.com
    Updated Aug 8, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Awareness if smartphone device has been hacked Philippines 2021 [Dataset]. https://www.statista.com/statistics/1306741/philippines-smartphone-breaching-awareness/
    Explore at:
    Dataset updated
    Aug 8, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    Oct 12, 2021 - Nov 5, 2021
    Area covered
    Philippines
    Description

    In 2021, majority of adult respondents in the Philippines stated that they were not aware if and when their smartphone devices were compromised. Smartphone users are vulnerable to hacking or information misuse as they increase their internet usage, especially if they do not change their passwords regularly.

  5. "Pwned Passwords" Dataset

    • academictorrents.com
    bittorrent
    Updated Aug 3, 2018
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    haveibeenpwned.com (2018). "Pwned Passwords" Dataset [Dataset]. https://academictorrents.com/details/53555c69e3799d876159d7290ea60e56b35e36a9
    Explore at:
    bittorrent(11101449979)Available download formats
    Dataset updated
    Aug 3, 2018
    Dataset provided by
    Have I Been Pwned?http://haveibeenpwned.com/
    License

    https://academictorrents.com/nolicensespecifiedhttps://academictorrents.com/nolicensespecified

    Description

    Version 3 with 517M hashes and counts of password usage ordered by most to least prevalent Pwned Passwords are 517,238,891 real world passwords previously exposed in data breaches. This exposure makes them unsuitable for ongoing use as they re at much greater risk of being used to take over other accounts. They re searchable online below as well as being downloadable for use in other online system. The entire set of passwords is downloadable for free below with each password being represented as a SHA-1 hash to protect the original value (some passwords contain personally identifiable information) followed by a count of how many times that password had been seen in the source data breaches. The list may be integrated into other systems and used to verify whether a password has previously appeared in a data breach after which a system may warn the user or even block the password outright.

  6. s

    3D Data Hack Docklands Model Starter Guides - Dataset - data.smartdublin.ie

    • data.smartdublin.ie
    Updated Mar 27, 2019
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2019). 3D Data Hack Docklands Model Starter Guides - Dataset - data.smartdublin.ie [Dataset]. https://data.smartdublin.ie/dataset/3d-data-hack-started-guides
    Explore at:
    Dataset updated
    Mar 27, 2019
    License

    Attribution-NonCommercial 2.0 (CC BY-NC 2.0)https://creativecommons.org/licenses/by-nc/2.0/
    License information was derived automatically

    Description

    Starter guides for participants in the 3D Data Hack Dublin to help them visualise the new open 3D model of Dublin's Docklands, using real-time interactive gaming technology. The guides have been prepared by the Building City Dashboards project, a Science Foundation Ireland funded initiative at Maynooth University, Ireland. We gratefully acknowledge funding from Science Foundation Ireland under the Investigator’s Award Program. Award number: 15/IA/3090

  7. Average cost per data breach in the United States 2006-2024

    • statista.com
    Updated Jun 23, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Average cost per data breach in the United States 2006-2024 [Dataset]. https://www.statista.com/statistics/273575/us-average-cost-incurred-by-a-data-breach/
    Explore at:
    Dataset updated
    Jun 23, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    United States
    Description

    As of 2024, the average cost of a data breach in the United States amounted to **** million U.S. dollars, down from **** million U.S. dollars in the previous year. The global average cost per data breach was **** million U.S. dollars in 2024. Cost of a data breach in different countries worldwide Data breaches impose a big threat for organizations globally. The monetary damage caused by data breaches has increased in many markets in the past decade. In 2023, Canada followed the U.S. by data breach costs, with an average of **** million U.S. dollars. Since 2019, the average monetary damage caused by loss of sensitive information in Canada has increased notably. In the United Kingdom, the average cost of a data breach in 2024 amounted to around **** million U.S. dollars, while in Germany it stood at **** million U.S. dollars. The cost of data breach by industry and segment Data breach costs vary depending on the industry and segment. For the fourth consecutive year, the global healthcare sector registered the highest costs of data breach, which in 2024 amounted to about **** million U.S. dollars. Financial institutions ranked second, with an average cost of *** million U.S. dollars for a data breach. Detection and escalation was the costliest segment in data breaches worldwide, with **** U.S. dollars on average. The cost for lost business ranked second, while response following a breach came across as the third-costliest segment.

  8. m

    Small Business Cybersecurity 2020-2021 Checklist

    • data.mendeley.com
    Updated Sep 12, 2020
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    lissa coffey (2020). Small Business Cybersecurity 2020-2021 Checklist [Dataset]. http://doi.org/10.17632/gk9t7zs5hz.1
    Explore at:
    Dataset updated
    Sep 12, 2020
    Authors
    lissa coffey
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Cyber attacks are a growing concern for small businesses during COVID-19 . Be Protected While You Work. Upgrade Your Small Business's Virus Protection Today! Before going for a Cyber security solutions for small to mid-sized businesses deliver enterprise-level protection.

    Download this (Checklist for a Small Firm's Cybersecurity Program 2020-2021) data set to deploy secure functioning of various aspects of your small business including, employee data, website and more.This checklist is provided to
    assist small member firms with limited resources to establish a cybersecurity program to identify and assess cybersecurity threats,
    protect assets from cyber intrusions,
    detect when their systems and assets have been compromised,
    plan for the response when a compromise occurs and implement a plan to recover lost, stolen or unavailable assets. 
    Train employees in security principles.
    Protect information, computers, and networks from malware attacks.
    Provide firewall security for your Internet connection.
    Create a mobile device action plan.
     Make backup copies of important business data and information.
     Learn about the threats and how to protect your website.
     Protect Your Small Business site.
     Learn the basics for protecting your business web sites from cyber attacks at WP Hacked Help Blog
    

    Created With Inputs From Security Experts at WP Hacked Help - Pioneer In WordPress Malware Removal & Security

  9. c

    Global Cloud Security Market Report 2025 Edition, Market Size, Share, CAGR,...

    • cognitivemarketresearch.com
    pdf,excel,csv,ppt
    Updated May 18, 2024
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Cognitive Market Research (2024). Global Cloud Security Market Report 2025 Edition, Market Size, Share, CAGR, Forecast, Revenue [Dataset]. https://www.cognitivemarketresearch.com/cloud-security-market-report
    Explore at:
    pdf,excel,csv,pptAvailable download formats
    Dataset updated
    May 18, 2024
    Dataset authored and provided by
    Cognitive Market Research
    License

    https://www.cognitivemarketresearch.com/privacy-policyhttps://www.cognitivemarketresearch.com/privacy-policy

    Time period covered
    2021 - 2033
    Area covered
    Global
    Description

    Market Summary of Cloud Security Market:

    • The Global Cloud Security market size in 2023 was XX Million. The Cloud Security Industry's compound annual growth rate (CAGR) was XX% from 2024 to 2031. • The market for cloud security is growing because of the emergence of DevSecOps and Data breaches. • The adoption of these solutions by businesses, particularly small and medium-sized businesses, has been greatly hampered by their high cost. • The AI and data analytics capabilities of the cloud are being heavily utilized by telcos. Operating in extremely dynamic and complicated IT environments with a multitude of software, networks, and devices is what has contributed to the expansion of the IT & telecom market. • North America is expected to have the largest market share in the cloud security market

    Market Dynamics of Cloud Security Market:

    Key drivers of Cloud Security Market

    Data breaches and cyberattacks are driving the cloud security market's rapid growth.
    

    Due to digitalization and technological advancements, the use of the Internet is increasing in all sectors. As the use of the Internet increases, the chances of cyber-attacks increase. There is a large scale of cyberattacks that is causing the loss of private, business, and governmental data all around the world when individuals utilize the Internet to conduct focused, politically driven attacks against cloud IT infrastructure. A cyberattack that targets off-site service platforms that use their cloud architecture to provide computing, storage, or hosting services might be categorized as a cloud cyberattack. This can involve assaults on service platforms that make use of SaaS(software as a service), IaaS (infrastructure as a service), and PaaS (platform as a service) service delivery paradigms. For Example, In March 2020, a cloud cyber assault targeted the adult live-streaming website CAM4, exposing 10.8 billion confidential entries totaling 7 TB of data. Location information, email addresses, IP addresses, payment logs, usernames, and more were all included in the compromised database. (Source:https://cisomag.com/adult-website-data-leak/) The growing number of organizational data breaches and leaks is driving the cloud security market. Data in the cloud is more vulnerable to hackers than data on corporate computers. For Instance, Microsoft revealed in 2020, that in December 2019 breach in one of their cloud databases exposed 250 million entries, including IP addresses, email addresses, and support case information. The computer giant claims that a poorly designed network server that was storing the important data was the root cause of this data breach. Despite not being the largest, the high-profile target made it one of the most startling clouds cyberattacks. (Source:https://www.forbes.com/sites/daveywinder/2020/01/22/microsoft-security-shocker-as-250-million-customer-records-exposed-online/?sh=693f59f04d1b)Thus, The cloud service model enhances the dangers and security challenges associated with cloud computing systems by exposing information and offering customers a variety of services. Data loss in cloud computing is a basic security issue. Hackers from both inside and external staff may gain unauthorized or purposeful access to the data. Such setups can be targets for external hackers who utilize hacking tactics like eavesdropping and hijacking to get access to databases. Additionally, malicious programs like Trojan horses which are a kind of malicious software that infiltrates a computer under the guise of an authentic application, and viruses are added to cloud services. Therefore, to put in place a system with stronger security features, it is vital to detect potential cloud risks and protect against such breaches with good cloud security.

    The market for cloud security is growing because of the emergence of DevSecOps.
    

    As more businesses shift their apps and IT infrastructure to the cloud, cloud security is becoming more and more crucial. DevSecOps which is development, security, and operation automation is becoming popular among many enterprises as a means of guaranteeing the best possible cloud security. DevSecOps automation incorporates security into every phase of the development lifecycle, from code generation to deployment and maintenance. DevSecOps helps many...

  10. u

    Parliamentarians: So You Think You’ve Been Hacked? What to do...

    • data.urbandatacentre.ca
    • open.canada.ca
    Updated Oct 1, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2024). Parliamentarians: So You Think You’ve Been Hacked? What to do... [Dataset]. https://data.urbandatacentre.ca/dataset/gov-canada-76bc45da-b35f-4151-8505-71d0120c0762
    Explore at:
    Dataset updated
    Oct 1, 2024
    License

    Open Government Licence - Canada 2.0https://open.canada.ca/en/open-government-licence-canada
    License information was derived automatically

    Description

    A compromise of your social media or email account has serious implications. If you think your email or social media accounts have been breached, you should follow the steps below and contact your IT security officer. Depending on the nature of the suspected compromise, your IT security officer could be with the HoC. It could also be your DSO or your political party CIO. If you are not certain whom to call, you can reach out to the Canadian Centre for Cyber Security (Cyber Centre) and we can assist, as appropriate, and help guide you through the next steps.

  11. i

    Bitcoin Hacked Transactions 2010-2013

    • ieee-dataport.org
    Updated Nov 24, 2019
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Omer Shafiq (2019). Bitcoin Hacked Transactions 2010-2013 [Dataset]. https://ieee-dataport.org/open-access/bitcoin-hacked-transactions-2010-2013
    Explore at:
    Dataset updated
    Nov 24, 2019
    Authors
    Omer Shafiq
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    This dataset was created for research on blockchain anomaly and fraud detection. And donated to IEEE data port online community.https://github.com/epicprojects/blockchain-anomaly-detection Files: bitcoin_hacks_2010_2013.csv: Contains known hashes of bitcoin theft/malicious transactions from 2010-2013malicious_tx_in.csv: Contains hashes of input transactions flowing into malicious transactions.

  12. s

    Hack augusta inc USA Import & Buyer Data

    • seair.co.in
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Seair Exim, Hack augusta inc USA Import & Buyer Data [Dataset]. https://www.seair.co.in
    Explore at:
    .bin, .xml, .csv, .xlsAvailable download formats
    Dataset provided by
    Seair Info Solutions PVT LTD
    Authors
    Seair Exim
    Area covered
    United States
    Description

    Subscribers can find out export and import data of 23 countries by HS code or product’s name. This demo is helpful for market analysis.

  13. Global data breaches of selected alternative social media platforms...

    • statista.com
    Updated Jul 11, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Global data breaches of selected alternative social media platforms 2021-2022 [Dataset]. https://www.statista.com/statistics/1359595/data-breaches-alternative-social-media-platforms-worldwide/
    Explore at:
    Dataset updated
    Jul 11, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    Jan 2021 - Aug 2022
    Area covered
    United States
    Description

    Despite being launched relatively recently and not having a significant user base, alternative social media platforms have become targets for hackers. Parler, the platform often associated with conservatives and used as an alternative to Twitter, saw a breach of more than ** terabytes of data in January 2021. Cybersecurity specialists, though, say there was no evidence that the platform was hacked. Instead, the vulnerability was in the platform's architecture, which resulted in the data breach. Another alt-tech platform, Gab, was hacked two months after Parler's incident. Around ** gigabytes of sensitive user data were exposed in this incident. During the Gettr hack in July 2021, third parties got unauthorized access to ** thousand e-mail addresses of users. The BitChute hack that occurred in August 2022 affected nearly three million users.

  14. B

    Hackathon Archive of Collaboration Knowledge and Engineering Design...

    • borealisdata.ca
    • dataone.org
    Updated Jan 12, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Meagan Flus; Gregory Litster; Alison Olechowski (2025). Hackathon Archive of Collaboration Knowledge and Engineering Design (HACKED): Hackathon 1 Transcript Sample [Dataset]. http://doi.org/10.5683/SP3/7CCTYU
    Explore at:
    CroissantCroissant is a format for machine-learning datasets. Learn more about this at mlcommons.org/croissant.
    Dataset updated
    Jan 12, 2025
    Dataset provided by
    Borealis
    Authors
    Meagan Flus; Gregory Litster; Alison Olechowski
    License

    CC0 1.0 Universal Public Domain Dedicationhttps://creativecommons.org/publicdomain/zero/1.0/
    License information was derived automatically

    Description

    This data was collected by researchers at the University of Toronto under the Research Ethics Board Protocol 44460. The dataset is a transcript of the first 2 hours and 9 minutes of collaborative design communication between four members of a team during a North American hackathon in 2023. The design activities captured in the transcript dataset include team formation, idea generation, idea selection, discussions of team goals, and premature team dissolution. The dataset has six variables (index, timestamp, speaker, speech segment, open code(s), and axial code(s)) and 908 lines of speech.

  15. z

    India Import Data of Hack Buyers or Importers | ZETTALIX.COM

    • zettalix.com
    Updated Dec 31, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Zettalix (2024). India Import Data of Hack Buyers or Importers | ZETTALIX.COM [Dataset]. https://www.zettalix.com/
    Explore at:
    .bin, .xml, .csv, .xlsAvailable download formats
    Dataset updated
    Dec 31, 2024
    Dataset authored and provided by
    Zettalix
    Area covered
    India
    Description

    Subscribers can access export and import data for 80 countries using HS codes or product names-ideal for informed market analysis.

  16. v

    Global import data of Hack Saw

    • volza.com
    csv
    Updated Sep 26, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Volza FZ LLC (2025). Global import data of Hack Saw [Dataset]. https://www.volza.com/imports-global/global-import-data-of-hack+saw-from-south-africa
    Explore at:
    csvAvailable download formats
    Dataset updated
    Sep 26, 2025
    Dataset authored and provided by
    Volza FZ LLC
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Variables measured
    Count of importers, Sum of import value, 2014-01-01/2021-09-30, Count of import shipments
    Description

    252 Global import shipment records of Hack Saw with prices, volume & current Buyer's suppliers relationships based on actual Global export trade database.

  17. c

    HACK Price Prediction Data

    • coinbase.com
    Updated Oct 1, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2025). HACK Price Prediction Data [Dataset]. https://www.coinbase.com/en-ar/price-prediction/hack
    Explore at:
    Dataset updated
    Oct 1, 2025
    Variables measured
    Growth Rate, Predicted Price
    Measurement technique
    User-defined projections based on compound growth. This is not a formal financial forecast.
    Description

    This dataset contains the predicted prices of the asset HACK over the next 16 years. This data is calculated initially using a default 5 percent annual growth rate, and after page load, it features a sliding scale component where the user can then further adjust the growth rate to their own positive or negative projections. The maximum positive adjustable growth rate is 100 percent, and the minimum adjustable growth rate is -100 percent.

  18. o

    Hack Road Cross Street Data in Spearsville, LA

    • ownerly.com
    Updated Dec 10, 2021
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Ownerly (2021). Hack Road Cross Street Data in Spearsville, LA [Dataset]. https://www.ownerly.com/la/spearsville/hack-rd-home-details
    Explore at:
    Dataset updated
    Dec 10, 2021
    Dataset authored and provided by
    Ownerly
    Area covered
    Louisiana, Spearsville, Hack Road
    Description

    This dataset provides information about the number of properties, residents, and average property values for Hack Road cross streets in Spearsville, LA.

  19. v

    Global import data of Hack Saw

    • volza.com
    csv
    Updated Sep 26, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Volza FZ LLC (2025). Global import data of Hack Saw [Dataset]. https://www.volza.com/imports-united-states/united-states-import-data-of-hack+saw
    Explore at:
    csvAvailable download formats
    Dataset updated
    Sep 26, 2025
    Dataset authored and provided by
    Volza FZ LLC
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Variables measured
    Count of importers, Sum of import value, 2014-01-01/2021-09-30, Count of import shipments
    Description

    131 Global import shipment records of Hack Saw with prices, volume & current Buyer's suppliers relationships based on actual Global export trade database.

  20. h

    hackaprompt-dataset

    • huggingface.co
    Updated Oct 23, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    hackaprompt (2023). hackaprompt-dataset [Dataset]. https://huggingface.co/datasets/hackaprompt/hackaprompt-dataset
    Explore at:
    Dataset updated
    Oct 23, 2023
    Dataset authored and provided by
    hackaprompt
    License

    MIT Licensehttps://opensource.org/licenses/MIT
    License information was derived automatically

    Description

    Dataset Card for HackAPrompt 💻🔍

    This dataset contains submissions from a prompt hacking competition. An in-depth analysis of the dataset has been accepted at the EMNLP 2023 conference. 📊👾 Submissions were sourced from two environments: a playground for experimentation and an official submissions platform. The playground itself can be accessed here 🎮 More details about the competition itself here 🏆

      Dataset Details đź“‹
    
    
    
    
    
    
    
      Dataset Description đź“„
    

    We… See the full description on the dataset page: https://huggingface.co/datasets/hackaprompt/hackaprompt-dataset.

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
Statista (2025). Number of data compromises and impacted individuals in U.S. 2005-2024 [Dataset]. https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/
Organization logo

Number of data compromises and impacted individuals in U.S. 2005-2024

Explore at:
172 scholarly articles cite this dataset (View in Google Scholar)
Dataset updated
Jul 14, 2025
Dataset authored and provided by
Statistahttp://statista.com/
Area covered
United States
Description

In 2024, the number of data compromises in the United States stood at 3,158 cases. Meanwhile, over 1.35 billion individuals were affected in the same year by data compromises, including data breaches, leakage, and exposure. While these are three different events, they have one thing in common. As a result of all three incidents, the sensitive data is accessed by an unauthorized threat actor. Industries most vulnerable to data breaches Some industry sectors usually see more significant cases of private data violations than others. This is determined by the type and volume of the personal information organizations of these sectors store. In 2024 the financial services, healthcare, and professional services were the three industry sectors that recorded most data breaches. Overall, the number of healthcare data breaches in some industry sectors in the United States has gradually increased within the past few years. However, some sectors saw decrease. Largest data exposures worldwide In 2020, an adult streaming website, CAM4, experienced a leakage of nearly 11 billion records. This, by far, is the most extensive reported data leakage. This case, though, is unique because cyber security researchers found the vulnerability before the cyber criminals. The second-largest data breach is the Yahoo data breach, dating back to 2013. The company first reported about one billion exposed records, then later, in 2017, came up with an updated number of leaked records, which was three billion. In March 2018, the third biggest data breach happened, involving India’s national identification database Aadhaar. As a result of this incident, over 1.1 billion records were exposed.

Search
Clear search
Close search
Google apps
Main menu