100+ datasets found
  1. Number of data compromises and impacted individuals in U.S. 2005-2024

    • statista.com
    Updated Jul 14, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Number of data compromises and impacted individuals in U.S. 2005-2024 [Dataset]. https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/
    Explore at:
    Dataset updated
    Jul 14, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    United States
    Description

    In 2024, the number of data compromises in the United States stood at 3,158 cases. Meanwhile, over 1.35 billion individuals were affected in the same year by data compromises, including data breaches, leakage, and exposure. While these are three different events, they have one thing in common. As a result of all three incidents, the sensitive data is accessed by an unauthorized threat actor. Industries most vulnerable to data breaches Some industry sectors usually see more significant cases of private data violations than others. This is determined by the type and volume of the personal information organizations of these sectors store. In 2024 the financial services, healthcare, and professional services were the three industry sectors that recorded most data breaches. Overall, the number of healthcare data breaches in some industry sectors in the United States has gradually increased within the past few years. However, some sectors saw decrease. Largest data exposures worldwide In 2020, an adult streaming website, CAM4, experienced a leakage of nearly 11 billion records. This, by far, is the most extensive reported data leakage. This case, though, is unique because cyber security researchers found the vulnerability before the cyber criminals. The second-largest data breach is the Yahoo data breach, dating back to 2013. The company first reported about one billion exposed records, then later, in 2017, came up with an updated number of leaked records, which was three billion. In March 2018, the third biggest data breach happened, involving India’s national identification database Aadhaar. As a result of this incident, over 1.1 billion records were exposed.

  2. U.S. health data breaches caused by hacking 2014 - H1 2024

    • statista.com
    Updated Jun 23, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). U.S. health data breaches caused by hacking 2014 - H1 2024 [Dataset]. https://www.statista.com/statistics/972228/health-data-breaches-caused-by-hacking-us/
    Explore at:
    Dataset updated
    Jun 23, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    United States
    Description

    In the first half of 2024, the share of health-related U.S. data breaches caused by hacking was ** percent, which marked a *** percent increase from 2023, reaching its highest rate since 2014.

  3. S

    Hacking Statistics By Cost, Email, Social Media Hacking and Key Hacking...

    • sci-tech-today.com
    Updated Jun 24, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Sci-Tech Today (2025). Hacking Statistics By Cost, Email, Social Media Hacking and Key Hacking Prevention [Dataset]. https://www.sci-tech-today.com/stats/hacking-statistics/
    Explore at:
    Dataset updated
    Jun 24, 2025
    Dataset authored and provided by
    Sci-Tech Today
    License

    https://www.sci-tech-today.com/privacy-policyhttps://www.sci-tech-today.com/privacy-policy

    Time period covered
    2022 - 2032
    Area covered
    Global
    Description

    Introduction

    Hacking Statistics: In 2024, cybercrime continues to be a growing concern globally, with hacking as one of the most prevalent forms of cyber threats. Hackers have become increasingly sophisticated, targeting both individuals and organisations. The rise in digital activities has led to an increase in hacking incidents, affecting individuals, businesses, and governments worldwide.

    Recent statistics reveal that hacking is responsible for a significant percentage of data breaches, which cause billions of dollars in damages. Understanding the latest hacking trends is crucial for implementing effective security measures to safeguard personal and organisational data.

  4. Global cyber incidents 2024, by type

    • statista.com
    Updated May 30, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Global cyber incidents 2024, by type [Dataset]. https://www.statista.com/statistics/1483769/global-cyber-incidents-by-type/
    Explore at:
    Dataset updated
    May 30, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    Oct 2023 - Sep 2024
    Area covered
    Worldwide
    Description

    As of September 2024, almost 30 percent of cyber incidents detected in the past 12 months were hacking incidents. A further 28.7 percent were incidents of misuse, and 15.2 percent of detections revealed malware attacks.

  5. s

    Data Breach Statistics

    • searchlogistics.com
    Updated Apr 1, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2025). Data Breach Statistics [Dataset]. https://www.searchlogistics.com/learn/statistics/cybersecurity-statistics/
    Explore at:
    Dataset updated
    Apr 1, 2025
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    The average cyber attack takes 280 days to identify and contain and it costs an average of about $3.86 million to deal with properly.

  6. E

    Small Business Cyber Attack Statistics And Facts (2025)

    • electroiq.com
    Updated Jul 10, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Electro IQ (2025). Small Business Cyber Attack Statistics And Facts (2025) [Dataset]. https://electroiq.com/stats/small-business-cyber-attack-statistics/
    Explore at:
    Dataset updated
    Jul 10, 2025
    Dataset authored and provided by
    Electro IQ
    License

    https://electroiq.com/privacy-policyhttps://electroiq.com/privacy-policy

    Time period covered
    2022 - 2032
    Area covered
    Global
    Description

    Introduction

    Small Business Cyber Attack Statistics: Cyber threats remain a significant security concern for small businesses in 2024. They make good targets for cybercriminals because they have limited resources and, many times, inadequate security measures of their own. The knowledge of the current cyber threats is printed on the mind of any small business owner so that a strategy can be fabricated to protect against them.

    This article will present the statistics and trends of small business cyberattacks.

  7. S

    Chinese Cyber Attack Statistics By Industry, Market Share and Facts (2025)

    • sci-tech-today.com
    Updated May 16, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Sci-Tech Today (2025). Chinese Cyber Attack Statistics By Industry, Market Share and Facts (2025) [Dataset]. https://www.sci-tech-today.com/stats/chinese-cyber-attack-statistics-updated/
    Explore at:
    Dataset updated
    May 16, 2025
    Dataset authored and provided by
    Sci-Tech Today
    License

    https://www.sci-tech-today.com/privacy-policyhttps://www.sci-tech-today.com/privacy-policy

    Time period covered
    2022 - 2032
    Area covered
    China, Global
    Description

    Introduction

    Chinese Cyber Attack Statistics: Chinese cyber attacks have become a major global issue over the last 20 years. These attacks target governments, businesses, and important industries around the world. Many of these attacks are supported by the state, and their main goals are spying, stealing intellectual property, and gaining advantages in areas like technology, defence, and telecommunications.

    In 2024, the global digital world will continue to face threats from cyberattacks linked to China. Because of this, governments and organisations need to strengthen their cybersecurity measures to protect their assets and data from these harmful activities.

  8. d

    Data from: Health IT, hacking, and cybersecurity: national trends in data...

    • search.dataone.org
    • data.niaid.nih.gov
    • +2more
    Updated Apr 6, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Jay G. Ronquillo; J. Erik Winterholler; Kamil Cwikla; Raphael Szymanski; Christopher Levy (2025). Health IT, hacking, and cybersecurity: national trends in data breaches of protected health information [Dataset]. http://doi.org/10.5061/dryad.24275c6
    Explore at:
    Dataset updated
    Apr 6, 2025
    Dataset provided by
    Dryad Digital Repository
    Authors
    Jay G. Ronquillo; J. Erik Winterholler; Kamil Cwikla; Raphael Szymanski; Christopher Levy
    Time period covered
    May 25, 2019
    Description

    Objective: The rapid adoption of health information technology (IT) coupled with growing reports of ransomware, and hacking has made cybersecurity a priority in health care. This study leverages federal data in order to better understand current cybersecurity threats in the context of health IT.

    Materials and Methods: Retrospective observational study of all available reported data breaches in the United States from 2013 to 2017, downloaded from a publicly available federal regulatory database.

    Results: There were 1512 data breaches affecting 154 415 257 patient records from a heterogeneous distribution of covered entities (P < .001). There were 128 electronic medical record-related breaches of 4 867 920 patient records, while 363 hacking incidents affected 130 702 378 records.

    Discussion and Conclusion: Despite making up less than 25% of all breaches, hacking was responsible for nearly 85% of all affected patient records. As medicine becomes increasingly interconnected and ...

  9. Global number of breached user accounts Q1 2020-Q3 2024

    • statista.com
    • ai-chatbox.pro
    Updated Jun 23, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Global number of breached user accounts Q1 2020-Q3 2024 [Dataset]. https://www.statista.com/statistics/1307426/number-of-data-breaches-worldwide/
    Explore at:
    Dataset updated
    Jun 23, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    Worldwide
    Description

    During the third quarter of 2024, data breaches exposed more than *** million records worldwide. Since the first quarter of 2020, the highest number of data records were exposed in the first quarter of ***, more than *** million data sets. Data breaches remain among the biggest concerns of company leaders worldwide. The most common causes of sensitive information loss were operating system vulnerabilities on endpoint devices. Which industries see the most data breaches? Meanwhile, certain conditions make some industry sectors more prone to data breaches than others. According to the latest observations, the public administration experienced the highest number of data breaches between 2021 and 2022. The industry saw *** reported data breach incidents with confirmed data loss. The second were financial institutions, with *** data breach cases, followed by healthcare providers. Data breach cost Data breach incidents have various consequences, the most common impact being financial losses and business disruptions. As of 2023, the average data breach cost across businesses worldwide was **** million U.S. dollars. Meanwhile, a leaked data record cost about *** U.S. dollars. The United States saw the highest average breach cost globally, at **** million U.S. dollars.

  10. D

    Ethical Hacking Tool Market Report | Global Forecast From 2025 To 2033

    • dataintelo.com
    csv, pdf, pptx
    Updated Jan 7, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Dataintelo (2025). Ethical Hacking Tool Market Report | Global Forecast From 2025 To 2033 [Dataset]. https://dataintelo.com/report/ethical-hacking-tool-market
    Explore at:
    csv, pdf, pptxAvailable download formats
    Dataset updated
    Jan 7, 2025
    Dataset authored and provided by
    Dataintelo
    License

    https://dataintelo.com/privacy-and-policyhttps://dataintelo.com/privacy-and-policy

    Time period covered
    2024 - 2032
    Area covered
    Global
    Description

    Ethical Hacking Tool Market Outlook



    The global market size for Ethical Hacking Tools was valued at USD 1.2 billion in 2023 and is projected to reach USD 3.8 billion by 2032, growing at a compound annual growth rate (CAGR) of 13.5% during the forecast period. The growth of this market is driven by the increasing frequency of cyber-attacks, the rising importance of data security, and the growing adoption of advanced technologies across various sectors.



    One of the primary growth factors for the Ethical Hacking Tool market is the escalating incidence of cyber threats and data breaches across the globe. Organizations are becoming increasingly aware of the need for robust security measures to protect sensitive information and critical infrastructure. Ethical hacking tools play a pivotal role in identifying vulnerabilities and enhancing the overall security posture, thus witnessing substantial demand from various industry verticals. The surge in remote work and the proliferation of IoT devices have further accentuated the need for advanced security solutions, contributing to the market's expansion.



    Another significant growth driver is the stringent regulatory landscape and compliance requirements. Governments and regulatory bodies worldwide are imposing rigorous data protection laws and security standards, compelling organizations to adopt ethical hacking tools to ensure compliance. For instance, regulations such as the General Data Protection Regulation (GDPR) in Europe and the California Consumer Privacy Act (CCPA) in the United States mandate stringent data security measures. This regulatory pressure is prompting enterprises to invest in ethical hacking solutions to avoid hefty fines and reputational damage.



    The growing awareness and education about cybersecurity threats among enterprises and individuals are also fueling market growth. As cybersecurity becomes a board-level concern, businesses are increasingly investing in ethical hacking tools to perform proactive security assessments. Additionally, the rise of cybersecurity training programs and certifications is creating a skilled workforce capable of effectively utilizing these tools, thereby driving their adoption. The expanding cybersecurity ecosystem, comprising start-ups and established players, is fostering innovation and the development of advanced ethical hacking solutions.



    Intranet Security Vulnerability Scanning Tools are becoming increasingly vital as organizations strive to protect their internal networks from potential threats. These tools are specifically designed to identify and assess vulnerabilities within an organization's intranet, ensuring that any weaknesses are addressed before they can be exploited by malicious actors. With the rise of remote work and the increasing reliance on internal networks for critical operations, the demand for robust intranet security solutions is on the rise. These tools not only help in safeguarding sensitive data but also play a crucial role in maintaining the integrity and reliability of internal communication systems. As organizations continue to expand their digital infrastructure, the importance of intranet security vulnerability scanning tools cannot be overstated.



    Regionally, North America holds a dominant position in the Ethical Hacking Tool market, driven by the high adoption of cybersecurity solutions and the presence of major market players. The Asia Pacific region is expected to witness significant growth during the forecast period, attributed to the rapid digital transformation, increasing cyber threats, and growing investments in cybersecurity infrastructure. Europe also represents a substantial market share due to stringent data protection regulations and the proactive stance of organizations toward cybersecurity.



    Type Analysis



    The Ethical Hacking Tool market can be segmented by type into Network Security Tools, Web Application Security Tools, Wireless Security Tools, Database Security Tools, Cloud Security Tools, and Others. Network Security Tools are crucial for protecting data integrity and preventing unauthorized access to the network. These tools include firewalls, intrusion detection systems (IDS), and intrusion prevention systems (IPS). As organizations increasingly rely on complex network infrastructures, the demand for robust network security tools is on the rise. This segment is expected to maintain a significant market share, driven by the growing need to secure network environmen

  11. s

    Cybersecurity Statistics & COVID-19

    • searchlogistics.com
    Updated Apr 1, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2025). Cybersecurity Statistics & COVID-19 [Dataset]. https://www.searchlogistics.com/learn/statistics/cybersecurity-statistics/
    Explore at:
    Dataset updated
    Apr 1, 2025
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Did the COVID-19 pandemic really affect cybersecurity? Short answer – Yes. Cybercrime is up 600% due to COVID-19.

  12. Cybersecurity Attack Dataset

    • kaggle.com
    Updated Jul 23, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Tannu Barot (2025). Cybersecurity Attack Dataset [Dataset]. https://www.kaggle.com/datasets/tannubarot/cybersecurity-attack-and-defence-dataset
    Explore at:
    CroissantCroissant is a format for machine-learning datasets. Learn more about this at mlcommons.org/croissant.
    Dataset updated
    Jul 23, 2025
    Dataset provided by
    Kagglehttp://kaggle.com/
    Authors
    Tannu Barot
    License

    MIT Licensehttps://opensource.org/licenses/MIT
    License information was derived automatically

    Description

    Overview This dataset is a comprehensive, easy-to-understand collection of cybersecurity incidents, threats, and vulnerabilities, designed to help both beginners and experts explore the world of digital security. It covers a wide range of modern cybersecurity challenges, from everyday web attacks to cutting-edge threats in artificial intelligence (AI), satellites, and quantum computing. Whether you're a student, a security professional, a researcher, or just curious about cybersecurity, this dataset offers a clear and structured way to learn about how cyber attacks happen, what they target, and how to defend against them.

    With 14134 entries and 15 columns, this dataset provides detailed insights into 26 distinct cybersecurity domains, making it a valuable tool for understanding the evolving landscape of digital threats. It’s perfect for anyone looking to study cyber risks, develop strategies to protect systems, or build tools to detect and prevent attacks.

    What’s in the Dataset? The dataset is organized into 16 columns that describe each cybersecurity incident or research scenario in detail:

    ID: A unique number for each entry (e.g., 1, 2, 3). Title: A short, descriptive name of the attack or scenario (e.g., "Authentication Bypass via SQL Injection"). Category: The main cybersecurity area, like Mobile Security, Satellite Security, or AI Exploits. Attack Type: The specific kind of attack, such as SQL Injection, Cross-Site Scripting (XSS), or GPS Spoofing. Scenario Description: A plain-language explanation of how the attack works or what the scenario involves. Tools Used: Software or tools used to carry out or test the attack (e.g., Burp Suite, SQLMap, GNURadio). Attack Steps: A step-by-step breakdown of how the attack is performed, written clearly for all audiences. Target Type: The system or technology attacked, like web apps, satellites, or login forms. Vulnerability: The weakness that makes the attack possible (e.g., unfiltered user input or weak encryption). MITRE Technique: A code from the MITRE ATT&CK framework, linking the attack to a standard classification (e.g., T1190 for exploiting public-facing apps). Impact: What could happen if the attack succeeds, like data theft, system takeover, or financial loss. Detection Method: Ways to spot the attack, such as checking logs or monitoring unusual activity. Solution: Practical steps to prevent or fix the issue, like using secure coding or stronger encryption. Tags: Keywords to help search and categorize entries (e.g., SQLi, WebSecurity, SatelliteSpoofing). Source: Where the information comes from, like OWASP, MITRE ATT&CK, or Space-ISAC.

    Cybersecurity Domains Covered The dataset organizes cybersecurity into 26 key areas:

    AI / ML Security

    AI Agents & LLM Exploits

    AI Data Leakage & Privacy Risks

    Automotive / Cyber-Physical Systems

    Blockchain / Web3 Security

    Blue Team (Defense & SOC)

    Browser Security

    Cloud Security

    DevSecOps & CI/CD Security

    Email & Messaging Protocol Exploits

    Forensics & Incident Response

    Insider Threats

    IoT / Embedded Devices

    Mobile Security

    Network Security

    Operating System Exploits

    Physical / Hardware Attacks

    Quantum Cryptography & Post-Quantum Threats

    Red Team Operations

    Satellite & Space Infrastructure Security

    SCADA / ICS (Industrial Systems)

    Supply Chain Attacks

    Virtualization & Container Security

    Web Application Security

    Wireless Attacks

    Zero-Day Research / Fuzzing

    Why Is This Dataset Important? Cybersecurity is more critical than ever as our world relies on technology for everything from banking to space exploration. This dataset is a one-stop resource to understand:

    What threats exist: From simple web attacks to complex satellite hacks. How attacks work: Clear explanations of how hackers exploit weaknesses. How to stay safe: Practical solutions to prevent or stop attacks. Future risks: Insight into emerging threats like AI manipulation or quantum attacks. It’s a bridge between technical details and real-world applications, making cybersecurity accessible to everyone.

    Potential Uses This dataset can be used in many ways, whether you’re a beginner or an expert:

    Learning and Education: Students can explore how cyber attacks work and how to defend against them. Threat Intelligence: Security teams can identify common attack patterns and prepare better defenses. Security Planning: Businesses and governments can use it to prioritize protection for critical systems like satellites or cloud infrastructure. Machine Learning: Data scientists can train models to detect threats or predict vulnerabilities. Incident Response Training: Practice responding to cyber incidents, from web hacks to satellite tampering.

    Ethical Considerations Purpose: The dataset is for educational and research purposes only, to help improve cybersecurity knowledge and de...

  13. m

    Data from: Cyber Attack Evaluation Dataset for Deep Packet Inspection and...

    • data.mendeley.com
    Updated Oct 18, 2022
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Shishir Kumar Shandilya (2022). Cyber Attack Evaluation Dataset for Deep Packet Inspection and Analysis [Dataset]. http://doi.org/10.17632/3szjvt3w78.1
    Explore at:
    Dataset updated
    Oct 18, 2022
    Authors
    Shishir Kumar Shandilya
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    To determine the effectiveness of any defense mechanism, there is a need for comprehensive real-time network data that solely references various attack scenarios based on older software versions or unprotected ports, and so on. This presented dataset has entire network data at the time of several cyber attacks to enable experimentation on challenges based on implementing defense mechanisms on a larger scale. For collecting the data, we captured the network traffic of configured virtual machines using Wireshark and tcpdump. To analyze the impact of several cyber attack scenarios, this dataset presents a set of ten computers connected to Router1 on VLAN1 in a Docker Bridge network, that try and exploit each other. It includes browsing the web and downloading foreign packages including malicious ones. Also, services like FTP and SSH were exploited using several attack mechanisms. The presented dataset shows the importance of updating and patching systems to protect themselves to a greater extent, by following attack tactics on older versions of packages as compared to the newer and updated ones. This dataset also includes an Apache Server hosted on the different subset on VLAN2 which is connected to the VLAN1 to demonstrate isolation and cross-VLAN communication. The services on this web server were also exploited by the previously stated ten computers. The attack types include: Distributed Denial of Service, SQL Injection, Account Takeover, Service Exploitation (SSH, FTP), DNS and ARP Spoofing, Scanning and Firewall Searching and Indexing (using Nmap), Hammering the services to brute-force passwords and usernames, Malware attack, Spoofing and Man-in-the-Middle Attack. The attack scenarios also show various scanning mechanisms and the impact of Insider Threats on the entire network.

  14. Share of cyberattacks in global industries worldwide 2024

    • statista.com
    Updated May 26, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Share of cyberattacks in global industries worldwide 2024 [Dataset]. https://www.statista.com/statistics/1315805/cyber-attacks-top-industries-worldwide/
    Explore at:
    Dataset updated
    May 26, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    2024
    Area covered
    Worldwide
    Description

    In 2024, manufacturing saw the highest share of cyberattacks among the leading industries worldwide. During the examined year, manufacturing companies encountered more than a quarter of the total cyberattacks. Organizations in the finance and insurance followed, with around 23 percent. Professional, business, and consumer services ranked third, with 18 percent of reported cyberattacks. Manufacturing industry and cyberattacks The industry of manufacturing has been in the center of cyberattacks in a long time. The share of cyberattacks targeting organizations in this sector in 2018 was at 10 percent, while in 2024, it amounted to 26 percent. The situation is even more compliacted when we look at the cyber vulnerabilities found in this sector. In 2024, critical vulnerabilities in manufacturing companies lasted 205 days on average. IT perspective and prevention With recent technology developments, cybersecurity is crucial to an organization’s success. Realizing this, companies have been gradually increasing cybersecurity investments. Thus, in 2024, the cybersecurity budget worldwide was forecast to increase to nearly 283 billion U.S. dollars. Roughly nine in ten board directors of companies worldwide in professional services and media and entertainment industries say they expect an increase in the cybersecurity budget.

  15. i

    Grant Giving Statistics for Hacking the Workforce

    • instrumentl.com
    Updated Dec 22, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2024). Grant Giving Statistics for Hacking the Workforce [Dataset]. https://www.instrumentl.com/990-report/hacking-the-workforce
    Explore at:
    Dataset updated
    Dec 22, 2024
    Description

    Financial overview and grant giving statistics of Hacking the Workforce

  16. d

    Cyber Crimes from NCRB - Master Data: Year-, State-and City-wise Type of...

    • dataful.in
    Updated Aug 1, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Dataful (Factly) (2025). Cyber Crimes from NCRB - Master Data: Year-, State-and City-wise Type of Cyber Crimes committed in Violation of IT Act [Dataset]. https://dataful.in/datasets/19642
    Explore at:
    csv, application/x-parquet, xlsxAvailable download formats
    Dataset updated
    Aug 1, 2025
    Dataset authored and provided by
    Dataful (Factly)
    License

    https://dataful.in/terms-and-conditionshttps://dataful.in/terms-and-conditions

    Area covered
    States and Cities of India
    Variables measured
    Cyber Crimes under IT Act
    Description

    The dataset contains year-, state- and city-wise historically compiled data on the number of cyber crimes committed in violation of Information Technology Act (IT Act) in Indian cities with over one million population. The different types of cyber crimes covered in the dataset include Tampering Computer Source documents, Cyber Terrorism, Publication or transmission of obscene or sexually explicit act in electronic form, Interception or Monitoring or decryption of Information, Unauthorized access or attempt to access to protected computer system, Abetment to Commit Offences, Publication or Transmission of Obscene or Sexually Explicit Act, etc. in Electronic Form, Breach of Confidentiality or Privacy and Disclosure of Information in Breach of Lawful Contract , Hacking, Obscene Publication or Transmission in Electronic Form, Failure in Obtaining Licence or Digital Signature by misrepresentation or suppression of fact, Publishing false digital Signature Certificate, Fraud Digital Signature, Breach of confidentiality or privacy, other computer related offences such as Ransomware, Offences other than Ransomware, Dishonestly receiving stolen computer resource or communication device, Identity Theft, Cheating by personation by using computer resource, Violation of Privacy, Failure Of compliance or orders of certifying Authority, To assist to decoy or the information in interception by Government Agency, Hacking crimes such as Loss or damage to computer resource or utility, Publication or transmission of Obscene or Sexually Explicit Act in Electronic Form involving Children and Adults, etc.

  17. i

    Grant Giving Statistics for Hacking Medicine Institute

    • instrumentl.com
    Updated Mar 14, 2022
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2022). Grant Giving Statistics for Hacking Medicine Institute [Dataset]. https://www.instrumentl.com/990-report/hacking-medicine-institute-inc
    Explore at:
    Dataset updated
    Mar 14, 2022
    Variables measured
    Total Assets, Total Giving
    Description

    Financial overview and grant giving statistics of Hacking Medicine Institute

  18. c

    Global Cloud Security Market Report 2025 Edition, Market Size, Share, CAGR,...

    • cognitivemarketresearch.com
    pdf,excel,csv,ppt
    Updated May 18, 2024
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Cognitive Market Research (2024). Global Cloud Security Market Report 2025 Edition, Market Size, Share, CAGR, Forecast, Revenue [Dataset]. https://www.cognitivemarketresearch.com/cloud-security-market-report
    Explore at:
    pdf,excel,csv,pptAvailable download formats
    Dataset updated
    May 18, 2024
    Dataset authored and provided by
    Cognitive Market Research
    License

    https://www.cognitivemarketresearch.com/privacy-policyhttps://www.cognitivemarketresearch.com/privacy-policy

    Time period covered
    2021 - 2033
    Area covered
    Global
    Description

    Market Summary of Cloud Security Market:

    • The Global Cloud Security market size in 2023 was XX Million. The Cloud Security Industry's compound annual growth rate (CAGR) will be XX% from 2024 to 2031. • The market for cloud security is growing because of the emergence of DevSecOps and Data breaches. • The adoption of these solutions by businesses, particularly small and medium-sized businesses, has been greatly hampered by their high cost. • The AI and data analytics capabilities of the cloud are being heavily utilized by telcos. Operating in extremely dynamic and complicated IT environments with a multitude of software, networks, and devices is what has contributed to the expansion of the IT & telecom market. • North America is expected to have the largest market share in the cloud security market

    Market Dynamics of Cloud Security Market:

    Key drivers of Cloud Security Market

    Data breaches and cyberattacks are driving the cloud security market's rapid growth.
    

    Due to digitalization and technological advancements, the use of the Internet is increasing in all sectors. As the use of the Internet increases, the chances of cyber-attacks increase. There is a large scale of cyberattacks that is causing the loss of private, business, and governmental data all around the world when individuals utilize the Internet to conduct focused, politically driven attacks against cloud IT infrastructure. A cyberattack that targets off-site service platforms that use their cloud architecture to provide computing, storage, or hosting services might be categorized as a cloud cyberattack. This can involve assaults on service platforms that make use of SaaS(software as a service), IaaS (infrastructure as a service), and PaaS (platform as a service) service delivery paradigms. For Example, In March 2020, a cloud cyber assault targeted the adult live-streaming website CAM4, exposing 10.8 billion confidential entries totaling 7 TB of data. Location information, email addresses, IP addresses, payment logs, usernames, and more were all included in the compromised database. (Source:https://cisomag.com/adult-website-data-leak/) The growing number of organizational data breaches and leaks is driving the cloud security market. Data in the cloud is more vulnerable to hackers than data on corporate computers. For Instance, Microsoft revealed in 2020, that in December 2019 breach in one of their cloud databases exposed 250 million entries, including IP addresses, email addresses, and support case information. The computer giant claims that a poorly designed network server that was storing the important data was the root cause of this data breach. Despite not being the largest, the high-profile target made it one of the most startling clouds cyberattacks. (Source:https://www.forbes.com/sites/daveywinder/2020/01/22/microsoft-security-shocker-as-250-million-customer-records-exposed-online/?sh=693f59f04d1b)Thus, The cloud service model enhances the dangers and security challenges associated with cloud computing systems by exposing information and offering customers a variety of services. Data loss in cloud computing is a basic security issue. Hackers from both inside and external staff may gain unauthorized or purposeful access to the data. Such setups can be targets for external hackers who utilize hacking tactics like eavesdropping and hijacking to get access to databases. Additionally, malicious programs like Trojan horses which are a kind of malicious software that infiltrates a computer under the guise of an authentic application, and viruses are added to cloud services. Therefore, to put in place a system with stronger security features, it is vital to detect potential cloud risks and protect against such breaches with good cloud security.

    The market for cloud security is growing because of the emergence of DevSecOps.
    

    As more businesses shift their apps and IT infrastructure to the cloud, cloud security is becoming more and more crucial. DevSecOps which is development, security, and operation automation is becoming popular among many enterprises as a means of guaranteeing the best possible cloud security. DevSecOps automation incorporates security into every phase of the development lifecycle, from code generation to deployment and maintenance. DevSecOps helps ...

  19. s

    What’s The Cost Of A Data Breach?

    • searchlogistics.com
    Updated Apr 1, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2025). What’s The Cost Of A Data Breach? [Dataset]. https://www.searchlogistics.com/learn/statistics/cybersecurity-statistics/
    Explore at:
    Dataset updated
    Apr 1, 2025
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Data breaches cost companies and businesses a lot of money. The average cost of a data breach is $3.86 million.

  20. Data from: Malware Finances and Operations: a Data-Driven Study of the Value...

    • zenodo.org
    • data.niaid.nih.gov
    zip
    Updated Jun 20, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Juha Nurmi; Juha Nurmi; Mikko Niemelä; Mikko Niemelä; Billy Brumley; Billy Brumley (2023). Malware Finances and Operations: a Data-Driven Study of the Value Chain for Infections and Compromised Access [Dataset]. http://doi.org/10.5281/zenodo.8047205
    Explore at:
    zipAvailable download formats
    Dataset updated
    Jun 20, 2023
    Dataset provided by
    Zenodohttp://zenodo.org/
    Authors
    Juha Nurmi; Juha Nurmi; Mikko Niemelä; Mikko Niemelä; Billy Brumley; Billy Brumley
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Description

    The datasets demonstrate the malware economy and the value chain published in our paper, Malware Finances and Operations: a Data-Driven Study of the Value Chain for Infections and Compromised Access, at the 12th International Workshop on Cyber Crime (IWCC 2023), part of the ARES Conference, published by the International Conference Proceedings Series of the ACM ICPS.

    Using the well-documented scripts, it is straightforward to reproduce our findings. It takes an estimated 1 hour of human time and 3 hours of computing time to duplicate our key findings from MalwareInfectionSet; around one hour with VictimAccessSet; and minutes to replicate the price calculations using AccountAccessSet. See the included README.md files and Python scripts.

    We choose to represent each victim by a single JavaScript Object Notation (JSON) data file. Data sources provide sets of victim JSON data files from which we've extracted the essential information and omitted Personally Identifiable Information (PII). We collected, curated, and modelled three datasets, which we publish under the Creative Commons Attribution 4.0 International License.

    1. MalwareInfectionSet
    We discover (and, to the best of our knowledge, document scientifically for the first time) that malware networks appear to dump their data collections online. We collected these infostealer malware logs available for free. We utilise 245 malware log dumps from 2019 and 2020 originating from 14 malware networks. The dataset contains 1.8 million victim files, with a dataset size of 15 GB.

    2. VictimAccessSet
    We demonstrate how Infostealer malware networks sell access to infected victims. Genesis Market focuses on user-friendliness and continuous supply of compromised data. Marketplace listings include everything necessary to gain access to the victim's online accounts, including passwords and usernames, but also detailed collection of information which provides a clone of the victim's browser session. Indeed, Genesis Market simplifies the import of compromised victim authentication data into a web browser session. We measure the prices on Genesis Market and how compromised device prices are determined. We crawled the website between April 2019 and May 2022, collecting the web pages offering the resources for sale. The dataset contains 0.5 million victim files, with a dataset size of 3.5 GB.

    3. AccountAccessSet
    The Database marketplace operates inside the anonymous Tor network. Vendors offer their goods for sale, and customers can purchase them with Bitcoins. The marketplace sells online accounts, such as PayPal and Spotify, as well as private datasets, such as driver's licence photographs and tax forms. We then collect data from Database Market, where vendors sell online credentials, and investigate similarly. To build our dataset, we crawled the website between November 2021 and June 2022, collecting the web pages offering the credentials for sale. The dataset contains 33,896 victim files, with a dataset size of 400 MB.

    Credits Authors

    • Billy Bob Brumley (Tampere University, Tampere, Finland)
    • Juha Nurmi (Tampere University, Tampere, Finland)
    • Mikko Niemelä (Cyber Intelligence House, Singapore)

    Funding

    This project has received funding from the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme under project numbers 804476 (SCARE) and 952622 (SPIRS).

    Alternative links to download: AccountAccessSet, MalwareInfectionSet, and VictimAccessSet.

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
Statista (2025). Number of data compromises and impacted individuals in U.S. 2005-2024 [Dataset]. https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/
Organization logo

Number of data compromises and impacted individuals in U.S. 2005-2024

Explore at:
163 scholarly articles cite this dataset (View in Google Scholar)
Dataset updated
Jul 14, 2025
Dataset authored and provided by
Statistahttp://statista.com/
Area covered
United States
Description

In 2024, the number of data compromises in the United States stood at 3,158 cases. Meanwhile, over 1.35 billion individuals were affected in the same year by data compromises, including data breaches, leakage, and exposure. While these are three different events, they have one thing in common. As a result of all three incidents, the sensitive data is accessed by an unauthorized threat actor. Industries most vulnerable to data breaches Some industry sectors usually see more significant cases of private data violations than others. This is determined by the type and volume of the personal information organizations of these sectors store. In 2024 the financial services, healthcare, and professional services were the three industry sectors that recorded most data breaches. Overall, the number of healthcare data breaches in some industry sectors in the United States has gradually increased within the past few years. However, some sectors saw decrease. Largest data exposures worldwide In 2020, an adult streaming website, CAM4, experienced a leakage of nearly 11 billion records. This, by far, is the most extensive reported data leakage. This case, though, is unique because cyber security researchers found the vulnerability before the cyber criminals. The second-largest data breach is the Yahoo data breach, dating back to 2013. The company first reported about one billion exposed records, then later, in 2017, came up with an updated number of leaked records, which was three billion. In March 2018, the third biggest data breach happened, involving India’s national identification database Aadhaar. As a result of this incident, over 1.1 billion records were exposed.

Search
Clear search
Close search
Google apps
Main menu