65 datasets found
  1. Number of data compromises and impacted individuals in U.S. 2005-2024

    • statista.com
    • ai-chatbox.pro
    Updated May 23, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Number of data compromises and impacted individuals in U.S. 2005-2024 [Dataset]. https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/
    Explore at:
    Dataset updated
    May 23, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    United States
    Description

    In 2024, the number of data compromises in the United States stood at 3,158 cases. Meanwhile, over 1.35 billion individuals were affected in the same year by data compromises, including data breaches, leakage, and exposure. While these are three different events, they have one thing in common. As a result of all three incidents, the sensitive data is accessed by an unauthorized threat actor. Industries most vulnerable to data breaches Some industry sectors usually see more significant cases of private data violations than others. This is determined by the type and volume of the personal information organizations of these sectors store. In 2024 the financial services, healthcare, and professional services were the three industry sectors that recorded most data breaches. Overall, the number of healthcare data breaches in some industry sectors in the United States has gradually increased within the past few years. However, some sectors saw decrease. Largest data exposures worldwide In 2020, an adult streaming website, CAM4, experienced a leakage of nearly 11 billion records. This, by far, is the most extensive reported data leakage. This case, though, is unique because cyber security researchers found the vulnerability before the cyber criminals. The second-largest data breach is the Yahoo data breach, dating back to 2013. The company first reported about one billion exposed records, then later, in 2017, came up with an updated number of leaked records, which was three billion. In March 2018, the third biggest data breach happened, involving India’s national identification database Aadhaar. As a result of this incident, over 1.1 billion records were exposed.

  2. Online hacking cases South Korea 2023, by type

    • statista.com
    • ai-chatbox.pro
    Updated Dec 3, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2024). Online hacking cases South Korea 2023, by type [Dataset]. https://www.statista.com/statistics/1228659/south-korea-online-hacking-cases-by-type/
    Explore at:
    Dataset updated
    Dec 3, 2024
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    2023
    Area covered
    South Korea
    Description

    In 2023, there were over 12,730 cases of malicious code hidden site detection in South Korea. These websites can infect a user's computer with malicious code, which can lead to information leakage or interference with the computer's operating system.

  3. w

    Websites using hack-font

    • webtechsurvey.com
    csv
    Updated Jan 13, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    WebTechSurvey (2025). Websites using hack-font [Dataset]. https://webtechsurvey.com/technology/hack-font
    Explore at:
    csvAvailable download formats
    Dataset updated
    Jan 13, 2025
    Dataset authored and provided by
    WebTechSurvey
    License

    https://webtechsurvey.com/termshttps://webtechsurvey.com/terms

    Time period covered
    2025
    Area covered
    Global
    Description

    A complete list of live websites using the hack-font technology, compiled through global website indexing conducted by WebTechSurvey.

  4. Favorite platforms or products for hacking worldwide 2020

    • statista.com
    Updated Jul 9, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Favorite platforms or products for hacking worldwide 2020 [Dataset]. https://www.statista.com/statistics/800918/worldwide-favorite-hacking-platforms-product/
    Explore at:
    Dataset updated
    Jul 9, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    Dec 2019 - Jan 2020
    Area covered
    Worldwide
    Description

    The favorite platform to hack for global hackers was websites, with ** percent of respondents indicating as such in 2020. Unsurprisingly, the least favorite platform for hacking was firmware.

  5. m

    Small Business Cybersecurity 2020-2021 Checklist

    • data.mendeley.com
    Updated Sep 12, 2020
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    lissa coffey (2020). Small Business Cybersecurity 2020-2021 Checklist [Dataset]. http://doi.org/10.17632/gk9t7zs5hz.1
    Explore at:
    Dataset updated
    Sep 12, 2020
    Authors
    lissa coffey
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Cyber attacks are a growing concern for small businesses during COVID-19 . Be Protected While You Work. Upgrade Your Small Business's Virus Protection Today! Before going for a Cyber security solutions for small to mid-sized businesses deliver enterprise-level protection.

    Download this (Checklist for a Small Firm's Cybersecurity Program 2020-2021) data set to deploy secure functioning of various aspects of your small business including, employee data, website and more.This checklist is provided to
    assist small member firms with limited resources to establish a cybersecurity program to identify and assess cybersecurity threats,
    protect assets from cyber intrusions,
    detect when their systems and assets have been compromised,
    plan for the response when a compromise occurs and implement a plan to recover lost, stolen or unavailable assets. 
    Train employees in security principles.
    Protect information, computers, and networks from malware attacks.
    Provide firewall security for your Internet connection.
    Create a mobile device action plan.
     Make backup copies of important business data and information.
     Learn about the threats and how to protect your website.
     Protect Your Small Business site.
     Learn the basics for protecting your business web sites from cyber attacks at WP Hacked Help Blog
    

    Created With Inputs From Security Experts at WP Hacked Help - Pioneer In WordPress Malware Removal & Security

  6. Number of hacking incidents Philippines 2019 by region

    • statista.com
    Updated Jul 9, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Number of hacking incidents Philippines 2019 by region [Dataset]. https://www.statista.com/statistics/1136151/philippines-number-hacking-incidents-by-region/
    Explore at:
    Dataset updated
    Jul 9, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    2019
    Area covered
    Philippines
    Description

    In 2019, the number of hacking cybercrime incidents in the Philippines was highest for those within region 4-a, amounting to approximately ***** thousand victims. Hacking cyberattacks also occurred more in the National Capital Region and Region 3.

  7. Data from: Malware Finances and Operations: a Data-Driven Study of the Value...

    • zenodo.org
    • data.niaid.nih.gov
    zip
    Updated Jun 20, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Juha Nurmi; Juha Nurmi; Mikko Niemelä; Mikko Niemelä; Billy Brumley; Billy Brumley (2023). Malware Finances and Operations: a Data-Driven Study of the Value Chain for Infections and Compromised Access [Dataset]. http://doi.org/10.5281/zenodo.8047205
    Explore at:
    zipAvailable download formats
    Dataset updated
    Jun 20, 2023
    Dataset provided by
    Zenodohttp://zenodo.org/
    Authors
    Juha Nurmi; Juha Nurmi; Mikko Niemelä; Mikko Niemelä; Billy Brumley; Billy Brumley
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Description

    The datasets demonstrate the malware economy and the value chain published in our paper, Malware Finances and Operations: a Data-Driven Study of the Value Chain for Infections and Compromised Access, at the 12th International Workshop on Cyber Crime (IWCC 2023), part of the ARES Conference, published by the International Conference Proceedings Series of the ACM ICPS.

    Using the well-documented scripts, it is straightforward to reproduce our findings. It takes an estimated 1 hour of human time and 3 hours of computing time to duplicate our key findings from MalwareInfectionSet; around one hour with VictimAccessSet; and minutes to replicate the price calculations using AccountAccessSet. See the included README.md files and Python scripts.

    We choose to represent each victim by a single JavaScript Object Notation (JSON) data file. Data sources provide sets of victim JSON data files from which we've extracted the essential information and omitted Personally Identifiable Information (PII). We collected, curated, and modelled three datasets, which we publish under the Creative Commons Attribution 4.0 International License.

    1. MalwareInfectionSet
    We discover (and, to the best of our knowledge, document scientifically for the first time) that malware networks appear to dump their data collections online. We collected these infostealer malware logs available for free. We utilise 245 malware log dumps from 2019 and 2020 originating from 14 malware networks. The dataset contains 1.8 million victim files, with a dataset size of 15 GB.

    2. VictimAccessSet
    We demonstrate how Infostealer malware networks sell access to infected victims. Genesis Market focuses on user-friendliness and continuous supply of compromised data. Marketplace listings include everything necessary to gain access to the victim's online accounts, including passwords and usernames, but also detailed collection of information which provides a clone of the victim's browser session. Indeed, Genesis Market simplifies the import of compromised victim authentication data into a web browser session. We measure the prices on Genesis Market and how compromised device prices are determined. We crawled the website between April 2019 and May 2022, collecting the web pages offering the resources for sale. The dataset contains 0.5 million victim files, with a dataset size of 3.5 GB.

    3. AccountAccessSet
    The Database marketplace operates inside the anonymous Tor network. Vendors offer their goods for sale, and customers can purchase them with Bitcoins. The marketplace sells online accounts, such as PayPal and Spotify, as well as private datasets, such as driver's licence photographs and tax forms. We then collect data from Database Market, where vendors sell online credentials, and investigate similarly. To build our dataset, we crawled the website between November 2021 and June 2022, collecting the web pages offering the credentials for sale. The dataset contains 33,896 victim files, with a dataset size of 400 MB.

    Credits Authors

    • Billy Bob Brumley (Tampere University, Tampere, Finland)
    • Juha Nurmi (Tampere University, Tampere, Finland)
    • Mikko Niemelä (Cyber Intelligence House, Singapore)

    Funding

    This project has received funding from the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme under project numbers 804476 (SCARE) and 952622 (SPIRS).

    Alternative links to download: AccountAccessSet, MalwareInfectionSet, and VictimAccessSet.

  8. i

    After Hack Security Checklist PrestaShop

    • ieee-dataport.org
    Updated Sep 1, 2021
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Naman Rastogi (2021). After Hack Security Checklist PrestaShop [Dataset]. https://ieee-dataport.org/documents/after-hack-security-checklist-prestashop
    Explore at:
    Dataset updated
    Sep 1, 2021
    Authors
    Naman Rastogi
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    66% of Prestashop websites are at high risk from cyber criminals.Common Hacks in Prestashop

  9. s

    hacking-resources-guide-2025.vercel.app Web security report

    • sechttp.com
    html
    Updated Jul 9, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    sechttp (2025). hacking-resources-guide-2025.vercel.app Web security report [Dataset]. https://sechttp.com/scan/hacking-resources-guide-2025.vercel.app
    Explore at:
    htmlAvailable download formats
    Dataset updated
    Jul 9, 2025
    Dataset authored and provided by
    sechttp
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    In-depth penetration of hacking-resources-guide-2025.vercel.app's comprehensive security detection topics, revealing vulnerabilities, threats and defenses, including penetration testing and ASN analysis

  10. P

    PEN Testing Industry Report

    • marketreportanalytics.com
    doc, pdf, ppt
    Updated Apr 26, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Market Report Analytics (2025). PEN Testing Industry Report [Dataset]. https://www.marketreportanalytics.com/reports/pen-testing-industry-91239
    Explore at:
    doc, ppt, pdfAvailable download formats
    Dataset updated
    Apr 26, 2025
    Dataset authored and provided by
    Market Report Analytics
    License

    https://www.marketreportanalytics.com/privacy-policyhttps://www.marketreportanalytics.com/privacy-policy

    Time period covered
    2025 - 2033
    Area covered
    Global
    Variables measured
    Market Size
    Description

    The penetration testing (PEN testing) market is experiencing robust growth, driven by the escalating frequency and sophistication of cyberattacks targeting businesses across diverse sectors. The market, valued at $4.25 billion in 2025, is projected to expand at a Compound Annual Growth Rate (CAGR) of 24.59% from 2025 to 2033. This significant growth is fueled by increasing regulatory compliance mandates (like GDPR and CCPA), rising adoption of cloud computing (increasing attack surface), and the growing awareness of potential financial and reputational damage from data breaches. The demand for PEN testing services is particularly high in sectors like government and defense, BFSI (Banking, Financial Services, and Insurance), and IT and telecom, where sensitive data and critical infrastructure necessitate robust security measures. Different types of penetration testing, including network, web application, mobile application, social engineering, and wireless network testing, cater to diverse organizational needs, further fueling market segmentation. The market's growth is also influenced by the increasing adoption of cloud-based penetration testing solutions offering scalability and cost-effectiveness. The competitive landscape is characterized by a mix of established players and emerging companies offering a wide range of penetration testing services and tools. Companies like Synopsys, Acunetix, Checkmarx, IBM, and Rapid7 are key players, leveraging their expertise and established market presence. However, the market also shows room for smaller, specialized firms focusing on niche areas like social engineering or specific industry verticals. While factors like high initial investment costs and the need for skilled professionals could act as restraints, the overall market trajectory remains positive, driven by continuous technological advancements in cyber threats and corresponding demand for proactive security measures. Future growth will likely be driven by the expansion of IoT devices and the increased adoption of AI and machine learning in security solutions. Recent developments include: February 2024 - BreachLock, a global leader in Penetration Testing as a Service (PTaaS), has announced a significant expansion of its cybersecurity product portfolio, introducing AI-powered and automated solutions for Attack Surface Management, PTaaS, Automated Pentesting, and Red Teaming as a Service. This expansion aims to provide enterprises with a comprehensive view of their full attack surface, offering evidence-based context and a standardized framework to measure security posture progress, potentially revolutionizing the penetration testing market by combining human expertise with AI-driven technology for greater accuracy, speed, and scalability., November 2023 - FireCompass, a SaaS startup specializing in Continuous Penetration Testing and Red Teaming, has launched its Generative-AI powered Agent AI for Ethical Hacking & Autonomous Penetration Testing, which autonomously executes the entire penetration testing workflow and dramatically increases testing coverage. This innovation addresses the growing cybersecurity challenges and skills shortage in the industry, potentially revolutionizing the penetration testing market by offering 10 to 100 times more frequency and cost efficiency compared to traditional models, while enhancing the productivity of human pen-testers., October 2023 - Tesserent, an Australian cybersecurity company, is set to acquire Beyond Binary, a Brisbane-based attack simulation provider founded by former Rapid7 talent OJ Reeves, for USD 7 million. This acquisition strengthens Tesserent's position in the penetration testing market, as Beyond Binary offers services including penetration testing, red team engagements, and adversary and attack simulation, highlighting the growing importance and demand for these cybersecurity services in the industry.. Key drivers for this market are: Rising Cybersecurity Risks Across Sectors, Rising Demand for Security Assessments; Government Regulations Driving Compliance Needs. Potential restraints include: Rising Cybersecurity Risks Across Sectors, Rising Demand for Security Assessments; Government Regulations Driving Compliance Needs. Notable trends are: Growing Requirement of Penetration Testing among Government and Defense.

  11. g

    IMOS - National Mooring Network - New South Wales (NSW) Port Hacking 125m...

    • gimi9.com
    Updated Jul 2, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2025). IMOS - National Mooring Network - New South Wales (NSW) Port Hacking 125m Water Sampling Site | gimi9.com [Dataset]. https://gimi9.com/dataset/au_imos-national-mooring-network-new-south-wales-nsw-port-hacking-125m-water-sampling-site
    Explore at:
    Dataset updated
    Jul 2, 2025
    Area covered
    Port Hacking, New South Wales
    Description

    The NSW Port Hacking 125m water sampling site (IMOS site code: PH125) is one of four water sampling sites at Port Hacking. The site is at Latitude:-34.148, Longitude:151.256. One of the IMOS National Reference Stations (NRS) is located in Port Hacking (PH100) and water sampling is conducted each month as part of the NRS regime. To supplement the NRS water sampling in New South Wales, identical water sampling is conducted at three other sites in Port Hacking. The full list of water sampling sites in Port Hacking is: PH025 PH050 PH100 PH125

  12. t

    Darknet Market Price Index 2018 (UK Data)

    • top10vpn.com
    Updated Feb 28, 2018
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Top10VPN (2018). Darknet Market Price Index 2018 (UK Data) [Dataset]. https://www.top10vpn.com/research/dark-web-prices/2018/
    Explore at:
    Dataset updated
    Feb 28, 2018
    Dataset authored and provided by
    Top10VPN
    Time period covered
    2018
    Area covered
    GB
    Description

    Average prices in 2018 for UK stolen ID, personal data and hacked accounts for sale on darknet markets. It’s ordered by type of credential, in descending order by average sale value.

  13. Gamers who would use websites with previous security breaches Singapore 2019...

    • statista.com
    Updated Jul 9, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Gamers who would use websites with previous security breaches Singapore 2019 [Dataset]. https://www.statista.com/statistics/1031458/singapore-gamers-who-would-use-websites-with-previous-security-breaches/
    Explore at:
    Dataset updated
    Jul 9, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    Jan 25, 2019 - Feb 14, 2019
    Area covered
    Singapore
    Description

    According to a survey among gamers conducted in Singapore in 2019, around ** percent of respondents stated that they would not play online games or make purchases from a gaming website that had previously experienced a security breach or been hacked. Gamers were highly concerned with online security, with a global average of almost ** percent of gamers surveyed saying they would not use a breached website anymore.

  14. g

    IMOS - National Mooring Network - New South Wales (NSW) Port Hacking 50m...

    • gimi9.com
    Updated Jul 2, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2025). IMOS - National Mooring Network - New South Wales (NSW) Port Hacking 50m Water Sampling Site | gimi9.com [Dataset]. https://gimi9.com/dataset/au_imos-national-mooring-network-new-south-wales-nsw-port-hacking-50m-water-sampling-site
    Explore at:
    Dataset updated
    Jul 2, 2025
    Area covered
    Port Hacking, New South Wales
    Description

    The NSW Port Hacking 50m water sampling site (IMOS site code: PH050) is one of four water sampling sites at Port Hacking. The site is at Latitude:-34.089, Longitude:151.189. One of the IMOS National Reference Stations (NRS) is located in Port Hacking (PH100) and water sampling is conducted each month as part of the NRS regime. To supplement the NRS water sampling in New South Wales, identical water sampling is conducted at three other sites in Port Hacking. The full list of water sampling sites in Port Hacking is: PH025 PH050 PH100 PH125

  15. hacked-me.com - Historical whois Lookup

    • whoisdatacenter.com
    csv
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    AllHeart Web Inc, hacked-me.com - Historical whois Lookup [Dataset]. https://whoisdatacenter.com/domain/hacked-me.com/
    Explore at:
    csvAvailable download formats
    Dataset provided by
    AllHeart Web
    Authors
    AllHeart Web Inc
    License

    https://whoisdatacenter.com/terms-of-use/https://whoisdatacenter.com/terms-of-use/

    Time period covered
    Mar 15, 1985 - Jul 12, 2025
    Description

    Explore the historical Whois records related to hacked-me.com (Domain). Get insights into ownership history and changes over time.

  16. hacked.domains - Historical whois Lookup

    • whoisdatacenter.com
    csv
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    AllHeart Web Inc, hacked.domains - Historical whois Lookup [Dataset]. https://whoisdatacenter.com/domain/hacked.domains/
    Explore at:
    csvAvailable download formats
    Dataset provided by
    AllHeart Web
    Authors
    AllHeart Web Inc
    License

    https://whoisdatacenter.com/terms-of-use/https://whoisdatacenter.com/terms-of-use/

    Time period covered
    Mar 15, 1985 - Jul 12, 2025
    Description

    Explore the historical Whois records related to hacked.domains (Domain). Get insights into ownership history and changes over time.

  17. t

    Darknet Market Price Index 2020 (Lockdown-affected Brands)

    • top10vpn.com
    Updated Aug 4, 2020
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Top10VPN (2020). Darknet Market Price Index 2020 (Lockdown-affected Brands) [Dataset]. https://www.top10vpn.com/research/dark-web-prices/2020/
    Explore at:
    Dataset updated
    Aug 4, 2020
    Dataset authored and provided by
    Top10VPN
    Time period covered
    2020
    Description

    Average prices in 2020 for hacked log-ins for online accounts for sale on darknet markets. The dataset is focused on online accounts for brands most affected by lockdowns and social distancing. It’s ordered by type of credential, in descending order by average sale value.

  18. stop-hacking.org - Historical whois Lookup

    • whoisdatacenter.com
    csv
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    AllHeart Web Inc, stop-hacking.org - Historical whois Lookup [Dataset]. https://whoisdatacenter.com/domain/stop-hacking.org/
    Explore at:
    csvAvailable download formats
    Dataset provided by
    AllHeart Web
    Authors
    AllHeart Web Inc
    License

    https://whoisdatacenter.com/terms-of-use/https://whoisdatacenter.com/terms-of-use/

    Time period covered
    Mar 15, 1985 - Jul 13, 2025
    Description

    Explore the historical Whois records related to stop-hacking.org (Domain). Get insights into ownership history and changes over time.

  19. m

    IMOS - ANMN National Reference Station (NRS) Port Hacking station

    • demo.dev.magda.io
    html
    Updated Sep 8, 2023
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    CSIRO Oceans & Atmosphere - Hobart (2023). IMOS - ANMN National Reference Station (NRS) Port Hacking station [Dataset]. https://demo.dev.magda.io/dataset/ds-dga-41a2019a-1ea2-46bc-9bf8-315e2bff3509
    Explore at:
    htmlAvailable download formats
    Dataset updated
    Sep 8, 2023
    Dataset provided by
    CSIRO Oceans & Atmosphere - Hobart
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Area covered
    Port Hacking
    Description

    The NRS Port Hacking Referece Station (IMOS site code: NRSPHB) is one of a series of national reference stations designed to monitor particular oceanographic phenomena in Australian coastal ocean …Show full descriptionThe NRS Port Hacking Referece Station (IMOS site code: NRSPHB) is one of a series of national reference stations designed to monitor particular oceanographic phenomena in Australian coastal ocean waters. It is located at -34.116S, 151.219E. Biogeochemical sampling is being performed at the mooring site as part of the National Reference Station water sampling program. Sampling commenced in February 2009 and is conducted monthly. Related sensor data are obtained at the Port Hacking 100m Mooring (PH100, part of the ANMN-NSW sub-facility), approximately 800 metres away.

  20. Dark web market price for stolen credentials 2019

    • statista.com
    Updated Aug 25, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2023). Dark web market price for stolen credentials 2019 [Dataset]. https://www.statista.com/statistics/1007470/stolen-credentials-dark-web-market-price/
    Explore at:
    Dataset updated
    Aug 25, 2023
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    Feb 2019
    Area covered
    Worldwide
    Description

    This statistic presents the average price of stolen credentials on dark web marketplaces as of February 2019. The average price of an Amazon account login was 30.36 U.S. dollars. Stolen bank details were worth 259.56 U.S. dollars.

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
Statista (2025). Number of data compromises and impacted individuals in U.S. 2005-2024 [Dataset]. https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/
Organization logo

Number of data compromises and impacted individuals in U.S. 2005-2024

Explore at:
169 scholarly articles cite this dataset (View in Google Scholar)
Dataset updated
May 23, 2025
Dataset authored and provided by
Statistahttp://statista.com/
Area covered
United States
Description

In 2024, the number of data compromises in the United States stood at 3,158 cases. Meanwhile, over 1.35 billion individuals were affected in the same year by data compromises, including data breaches, leakage, and exposure. While these are three different events, they have one thing in common. As a result of all three incidents, the sensitive data is accessed by an unauthorized threat actor. Industries most vulnerable to data breaches Some industry sectors usually see more significant cases of private data violations than others. This is determined by the type and volume of the personal information organizations of these sectors store. In 2024 the financial services, healthcare, and professional services were the three industry sectors that recorded most data breaches. Overall, the number of healthcare data breaches in some industry sectors in the United States has gradually increased within the past few years. However, some sectors saw decrease. Largest data exposures worldwide In 2020, an adult streaming website, CAM4, experienced a leakage of nearly 11 billion records. This, by far, is the most extensive reported data leakage. This case, though, is unique because cyber security researchers found the vulnerability before the cyber criminals. The second-largest data breach is the Yahoo data breach, dating back to 2013. The company first reported about one billion exposed records, then later, in 2017, came up with an updated number of leaked records, which was three billion. In March 2018, the third biggest data breach happened, involving India’s national identification database Aadhaar. As a result of this incident, over 1.1 billion records were exposed.

Search
Clear search
Close search
Google apps
Main menu