22 datasets found
  1. All-time biggest online data breaches 2025

    • statista.com
    Updated May 26, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). All-time biggest online data breaches 2025 [Dataset]. https://www.statista.com/statistics/290525/cyber-crime-biggest-online-data-breaches-worldwide/
    Explore at:
    Dataset updated
    May 26, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    Jan 2025
    Area covered
    Worldwide
    Description

    The largest reported data leakage as of January 2025 was the Cam4 data breach in March 2020, which exposed more than 10 billion data records. The second-largest data breach in history so far, the Yahoo data breach, occurred in 2013. The company initially reported about one billion exposed data records, but after an investigation, the company updated the number, revealing that three billion accounts were affected. The National Public Data Breach was announced in August 2024. The incident became public when personally identifiable information of individuals became available for sale on the dark web. Overall, the security professionals estimate the leakage of nearly three billion personal records. The next significant data leakage was the March 2018 security breach of India's national ID database, Aadhaar, with over 1.1 billion records exposed. This included biometric information such as identification numbers and fingerprint scans, which could be used to open bank accounts and receive financial aid, among other government services.

    Cybercrime - the dark side of digitalization As the world continues its journey into the digital age, corporations and governments across the globe have been increasing their reliance on technology to collect, analyze and store personal data. This, in turn, has led to a rise in the number of cyber crimes, ranging from minor breaches to global-scale attacks impacting billions of users – such as in the case of Yahoo. Within the U.S. alone, 1802 cases of data compromise were reported in 2022. This was a marked increase from the 447 cases reported a decade prior. The high price of data protection As of 2022, the average cost of a single data breach across all industries worldwide stood at around 4.35 million U.S. dollars. This was found to be most costly in the healthcare sector, with each leak reported to have cost the affected party a hefty 10.1 million U.S. dollars. The financial segment followed closely behind. Here, each breach resulted in a loss of approximately 6 million U.S. dollars - 1.5 million more than the global average.

  2. U.S. adults attitude towards companies with data breach experience 2024, by...

    • statista.com
    Updated Mar 11, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Ani Petrosyan (2025). U.S. adults attitude towards companies with data breach experience 2024, by age [Dataset]. https://www.statista.com/topics/1731/smb-and-cyber-crime/
    Explore at:
    Dataset updated
    Mar 11, 2025
    Dataset provided by
    Statistahttp://statista.com/
    Authors
    Ani Petrosyan
    Area covered
    United States
    Description

    As of May 2024, approximately 63 percent of respondents in the United States aged 18 to 24 reported having no interest in dealing with companies that have experienced data breaches, while only eight percent of the same age group said they were very likely to do so. Additionally, around 76 percent of individuals aged 45 to 54 stated they would not trust a company that had experienced a data leak.

  3. Biggest data breaches in the U.S. 2025, by impact

    • statista.com
    Updated Jul 7, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Biggest data breaches in the U.S. 2025, by impact [Dataset]. https://www.statista.com/statistics/1448545/us-biggest-data-breaches/
    Explore at:
    Dataset updated
    Jul 7, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    Jun 2025
    Area covered
    United States
    Description

    As of June 2025, the most significant data breach incident in the United States was the Yahoo data breach that dates back to 2013-2016. Impacting over three billion online users, this incident still remains one of the most significant data breaches worldwide. The second-biggest case was the January 2021 data breach at Microsoft, involving about 30 thousand companies in the United States and around 60 thousand companies around the world.

  4. U.S. adults attitude towards companies with data breach 2024

    • statista.com
    Updated Jul 16, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Ani Petrosyan (2025). U.S. adults attitude towards companies with data breach 2024 [Dataset]. https://www.statista.com/topics/2588/us-internet-users-and-cybercrime/
    Explore at:
    Dataset updated
    Jul 16, 2025
    Dataset provided by
    Statistahttp://statista.com/
    Authors
    Ani Petrosyan
    Area covered
    United States
    Description

    As of May 2024, over half of adults in the United States reported having no interest in dealing with companies that have experienced data breaches in the past. In contrast, only nine percent of adult users in the U.S. said they are very likely to trust a company that has had a data leak.

  5. Number of data compromises and impacted individuals in U.S. 2005-2024

    • statista.com
    Updated Mar 11, 2017
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Ani Petrosyan (2017). Number of data compromises and impacted individuals in U.S. 2005-2024 [Dataset]. https://www.statista.com/study/41510/us-government-and-cyber-crime/
    Explore at:
    Dataset updated
    Mar 11, 2017
    Dataset provided by
    Statistahttp://statista.com/
    Authors
    Ani Petrosyan
    Area covered
    United States
    Description

    In 2024, the number of data compromises in the United States stood at 3,158 cases. Meanwhile, over 1.35 billion individuals were affected in the same year by data compromises, including data breaches, leakage, and exposure. While these are three different events, they have one thing in common. As a result of all three incidents, the sensitive data is accessed by an unauthorized threat actor. Industries most vulnerable to data breaches Some industry sectors usually see more significant cases of private data violations than others. This is determined by the type and volume of the personal information organizations of these sectors store. In 2024 the financial services, healthcare, and professional services were the three industry sectors that recorded most data breaches. Overall, the number of healthcare data breaches in some industry sectors in the United States has gradually increased within the past few years. However, some sectors saw decrease. Largest data exposures worldwide In 2020, an adult streaming website, CAM4, experienced a leakage of nearly 11 billion records. This, by far, is the most extensive reported data leakage. This case, though, is unique because cyber security researchers found the vulnerability before the cyber criminals. The second-largest data breach is the Yahoo data breach, dating back to 2013. The company first reported about one billion exposed records, then later, in 2017, came up with an updated number of leaked records, which was three billion. In March 2018, the third biggest data breach happened, involving India’s national identification database Aadhaar. As a result of this incident, over 1.1 billion records were exposed.

  6. c

    Using Decision Trees to Detect and Isolate Leaks in the J-2X

    • s.cnmilf.com
    • catalog.data.gov
    • +1more
    Updated Aug 30, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Dashlink (2025). Using Decision Trees to Detect and Isolate Leaks in the J-2X [Dataset]. https://s.cnmilf.com/user74170196/https/catalog.data.gov/dataset/using-decision-trees-to-detect-and-isolate-leaks-in-the-j-2x
    Explore at:
    Dataset updated
    Aug 30, 2025
    Dataset provided by
    Dashlink
    Description

    Full title: Using Decision Trees to Detect and Isolate Simulated Leaks in the J-2X Rocket Engine Mark Schwabacher, NASA Ames Research Center Robert Aguilar, Pratt & Whitney Rocketdyne Fernando Figueroa, NASA Stennis Space Center Abstract The goal of this work was to use data-driven methods to automatically detect and isolate faults in the J-2X rocket engine. It was decided to use decision trees, since they tend to be easier to interpret than other data-driven methods. The decision tree algorithm automatically “learns” a decision tree by performing a search through the space of possible decision trees to find one that fits the training data. The particular decision tree algorithm used is known as C4.5. Simulated J-2X data from a high-fidelity simulator developed at Pratt & Whitney Rocketdyne and known as the Detailed Real-Time Model (DRTM) was used to “train” and test the decision tree. Fifty-six DRTM simulations were performed for this purpose, with different leak sizes, different leak locations, and different times of leak onset. To make the simulations as realistic as possible, they included simulated sensor noise, and included a gradual degradation in both fuel and oxidizer turbine efficiency. A decision tree was trained using 11 of these simulations, and tested using the remaining 45 simulations. In the training phase, the C4.5 algorithm was provided with labeled examples of data from nominal operation and data including leaks in each leak _location. From the data, it “learned” a decision tree that can classify unseen data as having no leak or having a leak in one of the five leak locations. In the test phase, the decision tree produced very low false alarm rates and low missed detection rates on the unseen data. It had very good fault isolation rates for three of the five simulated leak locations, but it tended to confuse the remaining two locations, perhaps because a large leak at one of these two locations can look very similar to a small leak at the other _location. Introduction The J-2X rocket engine will be tested on Test Stand A-1 at NASA Stennis Space Center (SSC) in Mississippi. A team including people from SSC, NASA Ames Research Center (ARC), and Pratt & Whitney Rocketdyne (PWR) is developing a prototype end-to-end integrated systems health management (ISHM) system that will be used to monitor the test stand and the engine while the engine is on the test stand[1]. The prototype will use several different methods for detecting and diagnosing faults in the test stand and the engine, including rule-based, model-based, and data-driven approaches. SSC is currently using the G2 tool http://www.gensym.com to develop rule-based and model-based fault detection and diagnosis capabilities for the A-1 test stand. This paper describes preliminary results in applying the data-driven approach to detecting and diagnosing faults in the J-2X engine. The conventional approach to detecting and diagnosing faults in complex engineered systems such as rocket engines and test stands is to use large numbers of human experts. Test controllers watch the data in near-real time during each engine test. Engineers study the data after each test. These experts are aided by limit checks that signal when a particular variable goes outside of a predetermined range. The conventional approach is very labor intensive. Also, humans may not be able to recognize faults that involve the relationships among large numbers of variables. Further, some potential faults could happen too quickly for humans to detect them and react before they become catastrophic. Automated fault detection and diagnosis is therefore needed. One approach to automation is to encode human knowledge into rules or models. Another approach is use data-driven methods to automatically learn models from historical data or simulated data. Our prototype will combine the data-driven approach with the model-based and rule-based appro

  7. Average cost per data breach in the United States 2006-2024

    • statista.com
    Updated Jun 23, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Average cost per data breach in the United States 2006-2024 [Dataset]. https://www.statista.com/statistics/273575/us-average-cost-incurred-by-a-data-breach/
    Explore at:
    Dataset updated
    Jun 23, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    United States
    Description

    As of 2024, the average cost of a data breach in the United States amounted to **** million U.S. dollars, down from **** million U.S. dollars in the previous year. The global average cost per data breach was **** million U.S. dollars in 2024. Cost of a data breach in different countries worldwide Data breaches impose a big threat for organizations globally. The monetary damage caused by data breaches has increased in many markets in the past decade. In 2023, Canada followed the U.S. by data breach costs, with an average of **** million U.S. dollars. Since 2019, the average monetary damage caused by loss of sensitive information in Canada has increased notably. In the United Kingdom, the average cost of a data breach in 2024 amounted to around **** million U.S. dollars, while in Germany it stood at **** million U.S. dollars. The cost of data breach by industry and segment Data breach costs vary depending on the industry and segment. For the fourth consecutive year, the global healthcare sector registered the highest costs of data breach, which in 2024 amounted to about **** million U.S. dollars. Financial institutions ranked second, with an average cost of *** million U.S. dollars for a data breach. Detection and escalation was the costliest segment in data breaches worldwide, with **** U.S. dollars on average. The cost for lost business ranked second, while response following a breach came across as the third-costliest segment.

  8. c

    Global Cloud Security Market Report 2025 Edition, Market Size, Share, CAGR,...

    • cognitivemarketresearch.com
    pdf,excel,csv,ppt
    Updated May 18, 2024
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Cognitive Market Research (2024). Global Cloud Security Market Report 2025 Edition, Market Size, Share, CAGR, Forecast, Revenue [Dataset]. https://www.cognitivemarketresearch.com/cloud-security-market-report
    Explore at:
    pdf,excel,csv,pptAvailable download formats
    Dataset updated
    May 18, 2024
    Dataset authored and provided by
    Cognitive Market Research
    License

    https://www.cognitivemarketresearch.com/privacy-policyhttps://www.cognitivemarketresearch.com/privacy-policy

    Time period covered
    2021 - 2033
    Area covered
    Global
    Description

    Market Summary of Cloud Security Market:

    • The Global Cloud Security market size in 2023 was XX Million. The Cloud Security Industry's compound annual growth rate (CAGR) was XX% from 2024 to 2031. • The market for cloud security is growing because of the emergence of DevSecOps and Data breaches. • The adoption of these solutions by businesses, particularly small and medium-sized businesses, has been greatly hampered by their high cost. • The AI and data analytics capabilities of the cloud are being heavily utilized by telcos. Operating in extremely dynamic and complicated IT environments with a multitude of software, networks, and devices is what has contributed to the expansion of the IT & telecom market. • North America is expected to have the largest market share in the cloud security market

    Market Dynamics of Cloud Security Market:

    Key drivers of Cloud Security Market

    Data breaches and cyberattacks are driving the cloud security market's rapid growth.
    

    Due to digitalization and technological advancements, the use of the Internet is increasing in all sectors. As the use of the Internet increases, the chances of cyber-attacks increase. There is a large scale of cyberattacks that is causing the loss of private, business, and governmental data all around the world when individuals utilize the Internet to conduct focused, politically driven attacks against cloud IT infrastructure. A cyberattack that targets off-site service platforms that use their cloud architecture to provide computing, storage, or hosting services might be categorized as a cloud cyberattack. This can involve assaults on service platforms that make use of SaaS(software as a service), IaaS (infrastructure as a service), and PaaS (platform as a service) service delivery paradigms. For Example, In March 2020, a cloud cyber assault targeted the adult live-streaming website CAM4, exposing 10.8 billion confidential entries totaling 7 TB of data. Location information, email addresses, IP addresses, payment logs, usernames, and more were all included in the compromised database. (Source:https://cisomag.com/adult-website-data-leak/) The growing number of organizational data breaches and leaks is driving the cloud security market. Data in the cloud is more vulnerable to hackers than data on corporate computers. For Instance, Microsoft revealed in 2020, that in December 2019 breach in one of their cloud databases exposed 250 million entries, including IP addresses, email addresses, and support case information. The computer giant claims that a poorly designed network server that was storing the important data was the root cause of this data breach. Despite not being the largest, the high-profile target made it one of the most startling clouds cyberattacks. (Source:https://www.forbes.com/sites/daveywinder/2020/01/22/microsoft-security-shocker-as-250-million-customer-records-exposed-online/?sh=693f59f04d1b)Thus, The cloud service model enhances the dangers and security challenges associated with cloud computing systems by exposing information and offering customers a variety of services. Data loss in cloud computing is a basic security issue. Hackers from both inside and external staff may gain unauthorized or purposeful access to the data. Such setups can be targets for external hackers who utilize hacking tactics like eavesdropping and hijacking to get access to databases. Additionally, malicious programs like Trojan horses which are a kind of malicious software that infiltrates a computer under the guise of an authentic application, and viruses are added to cloud services. Therefore, to put in place a system with stronger security features, it is vital to detect potential cloud risks and protect against such breaches with good cloud security.

    The market for cloud security is growing because of the emergence of DevSecOps.
    

    As more businesses shift their apps and IT infrastructure to the cloud, cloud security is becoming more and more crucial. DevSecOps which is development, security, and operation automation is becoming popular among many enterprises as a means of guaranteeing the best possible cloud security. DevSecOps automation incorporates security into every phase of the development lifecycle, from code generation to deployment and maintenance. DevSecOps helps many...

  9. Paradise-Panama-Papers

    • kaggle.com
    Updated Nov 21, 2017
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Zeeshan-ul-hassan Usmani (2017). Paradise-Panama-Papers [Dataset]. http://doi.org/10.34740/kaggle/dsv/7596
    Explore at:
    CroissantCroissant is a format for machine-learning datasets. Learn more about this at mlcommons.org/croissant.
    Dataset updated
    Nov 21, 2017
    Dataset provided by
    Kagglehttp://kaggle.com/
    Authors
    Zeeshan-ul-hassan Usmani
    License

    Attribution-ShareAlike 3.0 (CC BY-SA 3.0)https://creativecommons.org/licenses/by-sa/3.0/
    License information was derived automatically

    Description

    Context

    The Paradise Papers is a cache of some 13GB of data that contains 13.4 million confidential records of offshore investment by 120,000 people and companies in 19 tax jurisdictions (Tax Heavens - an awesome video to understand this); that was published by the International Consortium of Investigative Journalists (ICIJ) on November 5, 2017. Here is a brief video about the leak. The people include Queen Elizabeth II, the President of Columbia (Juan Manuel Santos), Former Prime Minister of Pakistan (Shaukat Aziz), U.S Secretary of Commerce (Wilbur Ross) and many more. According to an estimate by the Boston Consulting Group, the amount of money involved is around $10 trillion. The leak contains many famous companies, including Facebook, Apple, Uber, Nike, Walmart, Allianz, Siemens, McDonald’s and Yahoo.

    It also contains a lot of U. S President Donald Trump allies including Rax Tillerson, Wilbur Ross, Koch Brothers, Paul Singer, Sheldon Adelson, Stephen Schwarzman, Thomas Barrack and Steve Wynn etc. The complete list of Politicians involve is avaiable here.

    The Panama Papers in the cache of 38GB of data from the national corporate registry of Bahamas. It contains world’s top politicians and influential persons as head and director of offshore companies registered in Bahamas.

    Offshore Leaks details 13,000 offshore accounts in a report.

    I am calling all data scientists to help me stop the corruption and reveal the patterns and linkages invisible for the untrained eye.

    Content

    The data is the effort of more than 100 journalists from 60+ countries

    The original data is available under creative common license and can be downloaded from this link.

    I will keep updating the datasets with more leaks and data as it’s available

    Acknowledgements

    International Consortium of Investigative Journalists (ICIJ)

    Paradise Papers Update

    Paradise Papers data has been uploaded as released by ICIJ on Nov 21, 2017. You can find Paradise Papers zip file and six extracted files in CSV format, all starting with a prefix of Paradise. Happy Coding!

    Inspiration

    Some ideas worth exploring:

    1. How many companies and individuals are there in all of the leaks data

    2. How many countries involved

    3. Total money involved

    4. What is the biggest best tax heaven

    5. Can we compare the corruption with human development index and make an argument that would correlate corruption with bad conditions in that country

    6. Who are the biggest cheaters and where they live

    7. What role Fortune 500 companies play in this game

    I need your help to make this world corruption free in the age of NLP and Big Data

  10. Data points leaked in France 2004-2024 YTD, by type

    • statista.com
    Updated Jan 10, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Ani Petrosyan (2024). Data points leaked in France 2004-2024 YTD, by type [Dataset]. https://www.statista.com/topics/6569/online-piracy-and-fraud-france/
    Explore at:
    Dataset updated
    Jan 10, 2024
    Dataset provided by
    Statistahttp://statista.com/
    Authors
    Ani Petrosyan
    Area covered
    France
    Description

    Between 2004 and 2024, internet users in France have seen many significant data breaches. In these incidents, log-in credentials were the most frequently leaked type of data, with overall 478 million passwords being leaked in this period. Username ranked second, while country name followed.

  11. Global average cost per breached data record 2014-2024

    • statista.com
    Updated Jun 23, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Global average cost per breached data record 2014-2024 [Dataset]. https://www.statista.com/statistics/799396/worldwide-cost-effects-data-record-breaches/
    Explore at:
    Dataset updated
    Jun 23, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    Worldwide
    Description

    As of 2024, the average cost per stolen record in data breaches worldwide amounted to *** U.S. dollars, up from *** dollars in the previous year. The average cost of a data breach worldwide was **** million U.S. dollars.

  12. r

    Data from: Pilot design of an efficient, leak-proof and economical flush...

    • resodate.org
    • scielo.figshare.com
    Updated Jan 1, 2021
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Jaime Joaquim Silva Pereira Cabral; Sérgio Ribeiro de Aguiar; Manoel Alves Oliveira; Suzana Maria Gico Lima Montenegro (2021). Pilot design of an efficient, leak-proof and economical flush system [Dataset]. http://doi.org/10.6084/M9.FIGSHARE.14283660
    Explore at:
    Dataset updated
    Jan 1, 2021
    Dataset provided by
    SciELO journals
    Authors
    Jaime Joaquim Silva Pereira Cabral; Sérgio Ribeiro de Aguiar; Manoel Alves Oliveira; Suzana Maria Gico Lima Montenegro
    Description

    ABSTRACT In the last decades, water consumption per capita has been reduced. Nevertheless, several countries look for additional reduction in water consumption through better process of equipment functions. This paper describes a new design for an economical flush system in which there is neither flapper nor gasket that could leak. Prototypes with new design have been made and tested; after a 12 months’ test with one of them, by a family of 4 people, the project had good performance, with reduction in water consumption. This new design does not use gasket, works with two boxes (internal box and external box), presents good drag ability and demonstrates good water efficiency both for 3 L and 6 L flushes.

  13. Global Security Appliance Market 2016-2020

    • technavio.com
    pdf
    Updated Apr 7, 2016
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Technavio (2016). Global Security Appliance Market 2016-2020 [Dataset]. https://www.technavio.com/report/global-it-security-security-appliance-market
    Explore at:
    pdfAvailable download formats
    Dataset updated
    Apr 7, 2016
    Dataset provided by
    TechNavio
    Authors
    Technavio
    License

    https://www.technavio.com/content/privacy-noticehttps://www.technavio.com/content/privacy-notice

    Description

    Snapshot img { margin: 10px !important; } Outlook of the security appliance market

    Technavio’s market research analyst predicts the global security appliance market to grow impressively at a CAGR of more than 11% during the forecast period. The increasing domestic and international security threats is a primary driver of the growth of the security appliance market size. Since 2010, there’s been a significant rise in criminal activities and data theft worldwide. The loss of data from organizations can be detrimental as they contain confidential information. Therefore, surveillance devices are used to track the individuals involved in such criminal activities. This market is expected to witness an augmented adoption of monitoring and surveillance devices to prevent the unauthorized access to information and property,

    Technavio anticipates the increasing adoption of IP-based video surveillance solutions to aid market growth in the coming years. IP surveillance systems include video recorders, cameras, and storage devices. Moreover, private and public financial institutions have started using HD cameras, as they have high-quality imaging and provide up to 180 days’ worth of video storage. With various institutions adopting IP cameras for surveillance, this market’s growth has a positive outlook until the end of 2020.

    Segmentation by end-users and analysis of the security appliance market

    SMEs
    Government organizations
    Large enterprises
    

    The large enterprises segment accounted for more than 43% of the market share during 2015 and is expected to retain its market leadership until the end of 2020. An important factor contributing to the growth of this market segment is the rising concern for physical and network security in organizations around the world. Technological advancements and recent changes in corporate culture have led to employees using their devices such as iPhones, Android phones, and tablets for professional work. This has raised the need to secure corporate data and valuable business information from getting leaked and misused. Moreover, the increasing use of mobile banking among end-users has also increased the need for network security appliances. Additionally, the rising number of criminal activities in organizations will lead to an augmented demand for physical security devices in the forecast period.

    Geographical segmentation and analysis of the security appliance market

    Americas
    APAC
    EMEA
    

    During 2015, the Americas dominated the market, accounting for more than 42% of the market share. As the dependency on the Internet and wireless technologies is very high in this region, the governments of countries like Brazil, Peru, Chile, and Columbia are making substantial investments on network security appliances to prevent data theft in organizations. Moreover, with the adoption of BYOD (bring your device) policy in organizations, the need for network security appliances has increased. The US is the largest market in North America, but many organizations in South America are also adopting physical security appliances. Such developments will drive the market in this region during the forecast period.

    Competitive landscape and key vendors

    The global security appliance market is highly fragmented owing to the presence of many multinational and regional vendors. Security appliance companies often acquire small vendors to increase their product portfolio and increase their market presence. The competition in the market will increase due to solution extensions, technological innovations, and mergers and acquisitions.

    The key vendors in the security appliance market are -

    Bosch Security Solutions
    Honeywell Security
    Tyco
    Check Point Software Technologies
    Fortinet
    Jupiter Networks
    

    Other prominent vendors in the security appliance market include ALL-TAG, Arecont Vision, Assa Abloy, Avigilon, Axis Communications, Check Point Software Technologies, Checkpoint Systems, Future Fibre Technology, Genetec, Gunnebo, H3C Technologies, Hewlett-Packard Enterprise, Hikvision Digital, Kaba Holding, Ketec, Magal Security Systems, March Networks, MOBOTIX, NAPCO Security Systems, Nedap, Panasonic, Qognify, Safran, Samsung Techwin, Siemens, Skybox Security, Sophos, and videoNEX.

    Key questions answered in the report include

    What will the security appliance market size and the growth rate be in 2020?
    What are the key factors driving the global security appliance market?
    What are the key market trends impacting the growth of the security appliance market?
    What are the challenges to the security appliance market growth?
    Who are the key vendors in this market space?
    What are the market opportunities and threats faced by the vendors in the global security appliance market?
    What are the trending factors influencing the security appliance market shares of the Americas, APAC, and EMEA?
    What are the key outcomes of the five forces analysis of the security appliance market?
    

    Technavio

  14. Number of accounts affected in data breaches Thailand Q2 2022-Q3 2024

    • statista.com
    Updated Aug 8, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Number of accounts affected in data breaches Thailand Q2 2022-Q3 2024 [Dataset]. https://www.statista.com/statistics/1404553/thailand-number-of-account-breaches-exposed/
    Explore at:
    Dataset updated
    Aug 8, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    Thailand
    Description

    Between the second quarter of 2022 and the third quarter of 2024, the number of records exposed to account breaches in Thailand fluctuated significantly. Over ******* datasets were reported as having been leaked in the third quarter of 2024, compared to around ******* during the same quarter of the previous year.

  15. R

    Watermeter Dataset

    • universe.roboflow.com
    zip
    Updated Dec 10, 2022
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    watermeter (2022). Watermeter Dataset [Dataset]. https://universe.roboflow.com/watermeter/watermeter-el8x3/dataset/1
    Explore at:
    zipAvailable download formats
    Dataset updated
    Dec 10, 2022
    Dataset authored and provided by
    watermeter
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Variables measured
    Watermeter Recognition Bounding Boxes
    Description

    Here are a few use cases for this project:

    1. Home Utility Management: The model could be used in domestic applications by homeowners or renters to track their water usage without physically checking the meter. With a simple photo, the model can identify the metrics which can then be aligned with consumption habits and conservation goals.

    2. Automated Billing Services: Water supply companies could use this model to read water meters remotely, automating the process of monthly water usage data capture for billing purposes. A device could capture an image of the meter and share results directly to the billing system.

    3. Municipal Water Supply Monitoring: Regulatory bodies could deploy this model within smart cities or towns to constantly monitor water consumption. Alarms could be set up to identify any sudden increases in water use that might suggest leaks or water waste.

    4. Research Studies: It could be used for research purposes to study and analyze water consumption patterns across different regions or demographic groups. The data collected can be used for designing or adjusting water policies.

    5. Leak Detection and Maintenance: Companies or individuals can deploy this model to track sudden variances in water usage which might hint at leaks or malfunctions in the water system. On finding any discrepancies, a maintenance check can be scheduled promptly.

  16. f

    Primary data.

    • plos.figshare.com
    xlsx
    Updated Nov 13, 2024
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Honggang Shi; Kahaer Tuerxun; Aizizaimu Yusupu; Zainuer Yusupu; Qilin Xu; Yibin Jia; Musitaba Maimaitireyimu; Tuerhongaji Maimaitiaili; Muzaipaer Muhetajiang; Jiaxin Lin; Chengmin Ma; Xiaofeng Li; Yuanquan Wu; Yonghui Su (2024). Primary data. [Dataset]. http://doi.org/10.1371/journal.pntd.0012620.s001
    Explore at:
    xlsxAvailable download formats
    Dataset updated
    Nov 13, 2024
    Dataset provided by
    PLOS Neglected Tropical Diseases
    Authors
    Honggang Shi; Kahaer Tuerxun; Aizizaimu Yusupu; Zainuer Yusupu; Qilin Xu; Yibin Jia; Musitaba Maimaitireyimu; Tuerhongaji Maimaitiaili; Muzaipaer Muhetajiang; Jiaxin Lin; Chengmin Ma; Xiaofeng Li; Yuanquan Wu; Yonghui Su
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    BackgroundSurgical intervention is a crucial treatment for hepatic cystic echinococcosis. However, the choice between radical and conservative surgery remains controversial. This study aimed to compare the perioperative outcomes and hospitalization costs between radical and conservative surgery for hepatic cystic echinococcosis.MethodA retrospective cohort study was conducted on patients undergoing surgical treatment at the First People’s Hospital of Kashi Prefecture from July 1, 2012, to October 1, 2023. Propensity score-matching analysis was utilized to mitigate patient selection bias between the two surgical groups.ResultOf the 434 patients included, 324 underwent conservative surgery and 110 underwent radical surgery. After propensity score-matching, 182 conservative surgery and 102 radical surgery patients were compared. Radical surgery patients experienced longer operative time, higher intraoperative blood loss, increased blood transfusion, and higher costs compared to conservative surgery patients. However, no differences were observed in short-term outcomes, including overall morbidity, death, bile leak, effusion, pulmonary infection, incision infection, intestinal obstruction, ICU stay, abdominal drainage time, and postoperative hospital stays.ConclusionThis study suggests that radical surgery is associated with greater surgical complexity and higher hospitalization costs, while it doesn’t offer a significant short-term advantage. Conservative surgery may be a viable option in resource-limited settings or for patients unsuitable for complex procedures. Further research with long-term follow-up is needed to determine the optimal approach.

  17. Largest data breaches in France 2024

    • statista.com
    Updated Jan 10, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Ani Petrosyan (2024). Largest data breaches in France 2024 [Dataset]. https://www.statista.com/topics/6569/online-piracy-and-fraud-france/
    Explore at:
    Dataset updated
    Jan 10, 2024
    Dataset provided by
    Statistahttp://statista.com/
    Authors
    Ani Petrosyan
    Area covered
    France
    Description

    Between May 2018 and September 2024, France saw eight incidents of significant data breaches. The first recorded case was the May 2018 data breach at Apollo.io. The marketing company based in San Francisco lost approximately 10.93 million data records from French users. The latest reported data breach incident occurred at the France-based security company Thales. As a result of this incident, 9.5 GB of archive files were leaked.

  18. U.S. financial cybercrime or fraud victims 2023, by age

    • statista.com
    Updated Apr 16, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Ani Petrosyan (2024). U.S. financial cybercrime or fraud victims 2023, by age [Dataset]. https://www.statista.com/topics/9918/cyber-crime-and-the-financial-industry-in-the-united-states/
    Explore at:
    Dataset updated
    Apr 16, 2024
    Dataset provided by
    Statistahttp://statista.com/
    Authors
    Ani Petrosyan
    Area covered
    United States
    Description

    A September 2023 survey of American adults found that three in 10 respondents had experienced financial fraud or cybercrime. Individuals between 35 and 54 years were more often targeted by financial cybercrime, with 36 percent stating so. Among the younger generation, individuals between 18 and 34 years, this share was lower, 22 percent.

  19. Biggest risks to businesses worldwide 2018-2025

    • statista.com
    Updated Jun 20, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Biggest risks to businesses worldwide 2018-2025 [Dataset]. https://www.statista.com/statistics/422171/leading-business-risks-globally/
    Explore at:
    Dataset updated
    Jun 20, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    Worldwide
    Description

    Cyber incidents were the leading risk to businesses globally for 2025, according to a survey carried out among risk management experts in late 2024. These cyber incidents refer to things such as cyber crime, IT failure or outages, data breaches, and fines and penalties. The global cyber insurance market is forecast to grow consistently in coming years. What is cyber crime? Cyber crime refers to any criminal activities carried out through the use of a computer, a digital network, or the internet. As of January 2024, the biggest reported data leak to occur in the past few years was the 2020 hack of the online platform Cam4, which affected more than ** billion user accounts. In 2020, the Global Cybersecurity Index (GCI) ranked the United States as the country with the highest commitment to cyber security. Cyber attacks in the U.S. Instances of cyber crime has been on the rise in recent years, with the annual number of data breaches in the U.S. reaching a total of over ***** in 2023. At the same time, about *** million individuals were seemingly affected by record exposure. In 2023, the most common type of cyber attack experienced by U.S.-based companies was network intrusion. Network intrusion refers to unauthorized access to a corporate network.

  20. Italy number of data sets affected in data breaches Q1 2020-Q2 2024

    • statista.com
    Updated May 28, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Ani Petrosyan (2024). Italy number of data sets affected in data breaches Q1 2020-Q2 2024 [Dataset]. https://www.statista.com/topics/12334/cybercrime-and-users-in-italy/
    Explore at:
    Dataset updated
    May 28, 2024
    Dataset provided by
    Statistahttp://statista.com/
    Authors
    Ani Petrosyan
    Area covered
    Italy
    Description

    Between the first quarter of 2020 and the first second quarter of 2024, the number of records exposed in data breaches in Italy experienced a significant decrease. In the most recent measured period, approximately one million records were reported as leaked, down from around 10.2 million data sets affected in the first quarter of 2021.

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
Statista (2025). All-time biggest online data breaches 2025 [Dataset]. https://www.statista.com/statistics/290525/cyber-crime-biggest-online-data-breaches-worldwide/
Organization logo

All-time biggest online data breaches 2025

Explore at:
34 scholarly articles cite this dataset (View in Google Scholar)
Dataset updated
May 26, 2025
Dataset authored and provided by
Statistahttp://statista.com/
Time period covered
Jan 2025
Area covered
Worldwide
Description

The largest reported data leakage as of January 2025 was the Cam4 data breach in March 2020, which exposed more than 10 billion data records. The second-largest data breach in history so far, the Yahoo data breach, occurred in 2013. The company initially reported about one billion exposed data records, but after an investigation, the company updated the number, revealing that three billion accounts were affected. The National Public Data Breach was announced in August 2024. The incident became public when personally identifiable information of individuals became available for sale on the dark web. Overall, the security professionals estimate the leakage of nearly three billion personal records. The next significant data leakage was the March 2018 security breach of India's national ID database, Aadhaar, with over 1.1 billion records exposed. This included biometric information such as identification numbers and fingerprint scans, which could be used to open bank accounts and receive financial aid, among other government services.

Cybercrime - the dark side of digitalization As the world continues its journey into the digital age, corporations and governments across the globe have been increasing their reliance on technology to collect, analyze and store personal data. This, in turn, has led to a rise in the number of cyber crimes, ranging from minor breaches to global-scale attacks impacting billions of users – such as in the case of Yahoo. Within the U.S. alone, 1802 cases of data compromise were reported in 2022. This was a marked increase from the 447 cases reported a decade prior. The high price of data protection As of 2022, the average cost of a single data breach across all industries worldwide stood at around 4.35 million U.S. dollars. This was found to be most costly in the healthcare sector, with each leak reported to have cost the affected party a hefty 10.1 million U.S. dollars. The financial segment followed closely behind. Here, each breach resulted in a loss of approximately 6 million U.S. dollars - 1.5 million more than the global average.

Search
Clear search
Close search
Google apps
Main menu