27 datasets found
  1. Deep web employee data leaks of selected e-commerce platforms 2024

    • statista.com
    Updated Jul 11, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Deep web employee data leaks of selected e-commerce platforms 2024 [Dataset]. https://www.statista.com/statistics/1350068/e-commerce-websites-deep-web-employee-credential-leaks/
    Explore at:
    Dataset updated
    Jul 11, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    May 15, 2024
    Area covered
    Worldwide
    Description

    Company information such as employee credentials is one of the most common assets online vendors trade illegally on the darknet. According to the source, Zalando.com has suffered thousands of data leakage incidents on the deep web in the 12 months leading up to ********, in which more than ***** employee credentials were compromised. Amazon registered a relatively low number of deep web data leaks, with roughly *** in the last 12 months.

  2. Number of data compromises and impacted individuals in U.S. 2005-2024

    • statista.com
    Updated Jul 14, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Number of data compromises and impacted individuals in U.S. 2005-2024 [Dataset]. https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/
    Explore at:
    Dataset updated
    Jul 14, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    United States
    Description

    In 2024, the number of data compromises in the United States stood at 3,158 cases. Meanwhile, over 1.35 billion individuals were affected in the same year by data compromises, including data breaches, leakage, and exposure. While these are three different events, they have one thing in common. As a result of all three incidents, the sensitive data is accessed by an unauthorized threat actor. Industries most vulnerable to data breaches Some industry sectors usually see more significant cases of private data violations than others. This is determined by the type and volume of the personal information organizations of these sectors store. In 2024 the financial services, healthcare, and professional services were the three industry sectors that recorded most data breaches. Overall, the number of healthcare data breaches in some industry sectors in the United States has gradually increased within the past few years. However, some sectors saw decrease. Largest data exposures worldwide In 2020, an adult streaming website, CAM4, experienced a leakage of nearly 11 billion records. This, by far, is the most extensive reported data leakage. This case, though, is unique because cyber security researchers found the vulnerability before the cyber criminals. The second-largest data breach is the Yahoo data breach, dating back to 2013. The company first reported about one billion exposed records, then later, in 2017, came up with an updated number of leaked records, which was three billion. In March 2018, the third biggest data breach happened, involving India’s national identification database Aadhaar. As a result of this incident, over 1.1 billion records were exposed.

  3. i

    Data from: Rockyou

    • ieee-dataport.org
    Updated Apr 27, 2021
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Zeeshan Shaikh (2021). Rockyou [Dataset]. https://ieee-dataport.org/documents/rockyou
    Explore at:
    Dataset updated
    Apr 27, 2021
    Authors
    Zeeshan Shaikh
    License

    Attribution 4.0 (CC BY 4.0)https://creativecommons.org/licenses/by/4.0/
    License information was derived automatically

    Description

    Passwords that were leaked or stolen from sites. The Rockyou Dataset is about 14 million passwords.

  4. Global number of ransomware leak site victims Q1 2021- Q3 2024

    • statista.com
    Updated Jan 13, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Global number of ransomware leak site victims Q1 2021- Q3 2024 [Dataset]. https://www.statista.com/statistics/1459910/global-number-of-ransomware-leak-site-victims/
    Explore at:
    Dataset updated
    Jan 13, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    Worldwide
    Description

    As of the third quarter of 2024, the number of victims of ransomware leak sites worldwide increased by over two percent from the previous quarter, reaching a total of 1,275 victims. Ransomware attacks exploit vulnerabilities in computer systems to encrypt sensitive data, often demanding payment for its release.

  5. O

    Texas Commission on Environmental Quality - Leaking Petroleum Storage Tank...

    • data.texas.gov
    • texastier2.net
    • +3more
    application/rdfxml +5
    Updated Sep 18, 2025
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Office of Waste (2025). Texas Commission on Environmental Quality - Leaking Petroleum Storage Tank (LPST) Sites [Dataset]. https://data.texas.gov/w/hedz-nn4q/7v57-4sdh?cur=4gMcg_l7izD&from=heedGlq5U7j
    Explore at:
    json, application/rdfxml, csv, tsv, application/rssxml, xmlAvailable download formats
    Dataset updated
    Sep 18, 2025
    Dataset authored and provided by
    Office of Waste
    Description

    List of Leaking Petroleum Storage Tank sites in Texas with associated PST Registration ID number(s), location information, the date each site was reported to the TCEQ, and the closure date (if closed).

  6. Worldwide number of ransomware leak sites Q1 2021- Q4 2023

    • statista.com
    Updated Jan 6, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Worldwide number of ransomware leak sites Q1 2021- Q4 2023 [Dataset]. https://www.statista.com/statistics/1459943/global-number-of-ransomware-leak-sites/
    Explore at:
    Dataset updated
    Jan 6, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Area covered
    Worldwide
    Description

    As of the fourth quarter of 2023, the number of ransomware leak sites worldwide increased by 29.4 percent from the first quarter of 2021, reaching a total of 47 sites. In the examined period, the number of victims of ransomware leak sites reached a total of total of 1,185 victims.

  7. c

    Global Cloud Security Market Report 2025 Edition, Market Size, Share, CAGR,...

    • cognitivemarketresearch.com
    pdf,excel,csv,ppt
    Updated May 18, 2024
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Cognitive Market Research (2024). Global Cloud Security Market Report 2025 Edition, Market Size, Share, CAGR, Forecast, Revenue [Dataset]. https://www.cognitivemarketresearch.com/cloud-security-market-report
    Explore at:
    pdf,excel,csv,pptAvailable download formats
    Dataset updated
    May 18, 2024
    Dataset authored and provided by
    Cognitive Market Research
    License

    https://www.cognitivemarketresearch.com/privacy-policyhttps://www.cognitivemarketresearch.com/privacy-policy

    Time period covered
    2021 - 2033
    Area covered
    Global
    Description

    Market Summary of Cloud Security Market:

    • The Global Cloud Security market size in 2023 was XX Million. The Cloud Security Industry's compound annual growth rate (CAGR) will be XX% from 2024 to 2031. • The market for cloud security is growing because of the emergence of DevSecOps and Data breaches. • The adoption of these solutions by businesses, particularly small and medium-sized businesses, has been greatly hampered by their high cost. • The AI and data analytics capabilities of the cloud are being heavily utilized by telcos. Operating in extremely dynamic and complicated IT environments with a multitude of software, networks, and devices is what has contributed to the expansion of the IT & telecom market. • North America is expected to have the largest market share in the cloud security market

    Market Dynamics of Cloud Security Market:

    Key drivers of Cloud Security Market

    Data breaches and cyberattacks are driving the cloud security market's rapid growth.
    

    Due to digitalization and technological advancements, the use of the Internet is increasing in all sectors. As the use of the Internet increases, the chances of cyber-attacks increase. There is a large scale of cyberattacks that is causing the loss of private, business, and governmental data all around the world when individuals utilize the Internet to conduct focused, politically driven attacks against cloud IT infrastructure. A cyberattack that targets off-site service platforms that use their cloud architecture to provide computing, storage, or hosting services might be categorized as a cloud cyberattack. This can involve assaults on service platforms that make use of SaaS(software as a service), IaaS (infrastructure as a service), and PaaS (platform as a service) service delivery paradigms. For Example, In March 2020, a cloud cyber assault targeted the adult live-streaming website CAM4, exposing 10.8 billion confidential entries totaling 7 TB of data. Location information, email addresses, IP addresses, payment logs, usernames, and more were all included in the compromised database. (Source:https://cisomag.com/adult-website-data-leak/) The growing number of organizational data breaches and leaks is driving the cloud security market. Data in the cloud is more vulnerable to hackers than data on corporate computers. For Instance, Microsoft revealed in 2020, that in December 2019 breach in one of their cloud databases exposed 250 million entries, including IP addresses, email addresses, and support case information. The computer giant claims that a poorly designed network server that was storing the important data was the root cause of this data breach. Despite not being the largest, the high-profile target made it one of the most startling clouds cyberattacks. (Source:https://www.forbes.com/sites/daveywinder/2020/01/22/microsoft-security-shocker-as-250-million-customer-records-exposed-online/?sh=693f59f04d1b)Thus, The cloud service model enhances the dangers and security challenges associated with cloud computing systems by exposing information and offering customers a variety of services. Data loss in cloud computing is a basic security issue. Hackers from both inside and external staff may gain unauthorized or purposeful access to the data. Such setups can be targets for external hackers who utilize hacking tactics like eavesdropping and hijacking to get access to databases. Additionally, malicious programs like Trojan horses which are a kind of malicious software that infiltrates a computer under the guise of an authentic application, and viruses are added to cloud services. Therefore, to put in place a system with stronger security features, it is vital to detect potential cloud risks and protect against such breaches with good cloud security.

    The market for cloud security is growing because of the emergence of DevSecOps.
    

    As more businesses shift their apps and IT infrastructure to the cloud, cloud security is becoming more and more crucial. DevSecOps which is development, security, and operation automation is becoming popular among many enterprises as a means of guaranteeing the best possible cloud security. DevSecOps automation incorporates security into every phase of the development lifecycle, from code generation to deployment and maintenance. DevSecOps helps ...

  8. d

    Underground Storage Tanks/Leaking Underground Storage Tanks Database System

    • datasets.ai
    • s.cnmilf.com
    • +3more
    Updated Aug 9, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    State of Iowa (2024). Underground Storage Tanks/Leaking Underground Storage Tanks Database System [Dataset]. https://datasets.ai/datasets/underground-storage-tanks-leaking-underground-storage-tanks-database-system
    Explore at:
    Dataset updated
    Aug 9, 2024
    Dataset authored and provided by
    State of Iowa
    Description

    Tracks underground storage tanks (UST) site location, site owners, tanks, Risk-Based Corrective Action (RBCA), site classification and remediation; and the current status of UST & Leaking UST sites.

  9. d

    Leaking Underground Storage Tanks

    • datasets.ai
    • res1catalogd-o-tdatad-o-tgov.vcapture.xyz
    • +4more
    Updated Sep 8, 2024
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    State of Iowa (2024). Leaking Underground Storage Tanks [Dataset]. https://datasets.ai/datasets/leaking-underground-storage-tanks
    Explore at:
    Dataset updated
    Sep 8, 2024
    Dataset authored and provided by
    State of Iowa
    Description

    Leaking Underground Storage Tank (LUST) sites where petroleum contamination has been found. There may be more than one LUST site per UST site.

  10. Leaking Petroleum Storage Tank Sites

    • catalog.newmexicowaterdata.org
    • data-nmenv.opendata.arcgis.com
    csv, html, zip
    Updated Jul 22, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    New Mexico Environment Department (2024). Leaking Petroleum Storage Tank Sites [Dataset]. https://catalog.newmexicowaterdata.org/dataset/leaking-petroleum-storage-tank-sites
    Explore at:
    html, zip, csvAvailable download formats
    Dataset updated
    Jul 22, 2024
    Dataset provided by
    New Mexico Environment Departmenthttp://www.env.nm.gov/
    Description

    A current status of NFA means "no further action" and that it is cleaned up as much as the law requires.

  11. w

    leaking.site - Historical whois Lookup

    • whoisdatacenter.com
    csv
    Updated Jul 14, 2024
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    AllHeart Web Inc (2024). leaking.site - Historical whois Lookup [Dataset]. https://whoisdatacenter.com/domain/leaking.site/
    Explore at:
    csvAvailable download formats
    Dataset updated
    Jul 14, 2024
    Dataset authored and provided by
    AllHeart Web Inc
    License

    https://whoisdatacenter.com/terms-of-use/https://whoisdatacenter.com/terms-of-use/

    Time period covered
    Mar 15, 1985 - Sep 17, 2025
    Description

    Explore the historical Whois records related to leaking.site (Domain). Get insights into ownership history and changes over time.

  12. w

    water-leak-tape.site - Historical whois Lookup

    • whoisdatacenter.com
    csv
    Updated Jul 21, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    AllHeart Web Inc (2023). water-leak-tape.site - Historical whois Lookup [Dataset]. https://whoisdatacenter.com/domain/water-leak-tape.site/
    Explore at:
    csvAvailable download formats
    Dataset updated
    Jul 21, 2023
    Dataset authored and provided by
    AllHeart Web Inc
    License

    https://whoisdatacenter.com/terms-of-use/https://whoisdatacenter.com/terms-of-use/

    Time period covered
    Mar 15, 1985 - Sep 18, 2025
    Description

    Explore the historical Whois records related to water-leak-tape.site (Domain). Get insights into ownership history and changes over time.

  13. Steps to take in case of data leakage from the website in Poland 2022

    • statista.com
    Updated Jul 11, 2025
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Statista (2025). Steps to take in case of data leakage from the website in Poland 2022 [Dataset]. https://www.statista.com/statistics/1266430/poland-online-data-leakage-activities/
    Explore at:
    Dataset updated
    Jul 11, 2025
    Dataset authored and provided by
    Statistahttp://statista.com/
    Time period covered
    Mar 2022
    Area covered
    Poland
    Description

    In 2022, nearly ** percent of Poles stated a person should change the password of a leaked website. Meanwhile, ** percent of Poles indicated that it should be reported to the police.

  14. UST Cleanup Fund Potential Sites

    • gis.data.ca.gov
    • arc-gis-hub-home-arcgishub.hub.arcgis.com
    • +2more
    Updated Apr 24, 2023
    + more versions
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    California Water Boards (2023). UST Cleanup Fund Potential Sites [Dataset]. https://gis.data.ca.gov/maps/261ed794afce4f70b5c587e3ac2c94c5
    Explore at:
    Dataset updated
    Apr 24, 2023
    Dataset provided by
    California State Water Resources Control Board
    Authors
    California Water Boards
    Area covered
    Description

    Below is an explanation of the data along with some features that are available on this map (description is also provided in the "Getting Started" widget of the application).A variety of different colored circles appear throughout the map. They represent sites that are associated with the following programs:1) Department of Toxic Substances Control (DTSC) sites:a) Historical Inactive - Identifies sites from an older database that are non-active sites where, through a Preliminary Endangerment Assessment (PEA) or other evaluation, DTSC has determined that a removal or remedial action or further extensive investigation is required.b) School Cleanup - Identifies proposed and existing school sites that are being evaluated by DTSC for possible hazardous materials contamination. School sites are further defined as “Cleanup”, where remedial actions are or have occurred.c) School Evaluation - Identifies proposed and existing school sites that are being evaluated by DTSC for possible hazardous materials contamination. School sites are further defined as “Evaluation”, where further investigation is needed.d) Corrective Action - Investigation or cleanup activities at Resource Conservation and Recovery Act (RCRA) or state-only hazardous waste facilities (that were required to obtain a permit or have received a hazardous waste facility permit from DTSC or U.S. EPA).e) State Response - Identifies confirmed release sites where DTSC is involved in remediation, either in a lead or oversight capacity. These confirmed release sites are generally high-priority and high potential risk.f) Evaluation - Identifies suspected, but unconfirmed, contaminated sites that need or have gone through a limited investigation and assessment process.g) Tiered Permit - A corrective action cleanup project on a hazardous waste facility that either was eligible to treat or permitted to treat waste under the Tiered Permitting system.2) State Water Board or DTSC sites:a) Leaking Underground Storage Tank (LUST) Cleanup - Includes all Underground Storage Tank (UST) sites that have had an unauthorized release (i.e. leak or spill) of a hazardous substance, usually fuel hydrocarbons, and are being (or have been) cleaned up. These sites are regulated under the State Water Board's UST Cleanup Program and/or similar programs conducted by each of the nine Regional Water Boards or Local Oversight Programs.b) Cleanup Program - Includes all "non-federally owned" sites that are regulated under the State Water Board's Site Cleanup Program and/or similar programs conducted by each of the nine Regional Water Boards. Cleanup Program Sites are also commonly referred to as "Site Cleanup Program sites".c) Voluntary Cleanup - Identifies sites with either confirmed or unconfirmed releases, and the project proponents have requested that the State Water Board or DTSC oversee evaluation, investigation, and/or cleanup activities and have agreed to provide coverage for the lead agency’s costs.3) Othera) Permitted Tanks - The "Permitted Tanks" data set includes Facilities that are associated with permitted underground storage tanks from the California Environmental Reporting System (CERS) database. The CERS data consists of current and recently closed permitted underground storage tank (UST) facilities information provided to CERS by Certified Unified Program Agencies (CUPAs).*Note: Underground Storage Tank Cleanup and Cleanup Program project records are pulled from the State Water Board's GeoTracker database. The Permitted Tanks information was obtained from California EPA’s California Environmental Reporting System (CERS) database. All other project records were obtained from DTSC's EnviroStor database. Program descriptions come from DTSC’s EnviroStor Glossary of Terms and the State Water Board’s GeoTracker Site/Facility Type Definitions. The information associated with these records was last updated in the application on 4/24/2023.

  15. KDHE Regulated Storage Tanks - Leaking Underground (LUST)

    • hub.kansasgis.org
    Updated May 20, 2022
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    KDHE Public ArcGIS (2022). KDHE Regulated Storage Tanks - Leaking Underground (LUST) [Dataset]. https://hub.kansasgis.org/items/7233d9be32064d269eb064e379c9ba07
    Explore at:
    Dataset updated
    May 20, 2022
    Dataset provided by
    Kansas Department of Health and Environmenthttp://www.kdheks.gov/
    Authors
    KDHE Public ArcGIS
    Area covered
    Description

    The data is updated nightly using ArcGIS scripting. Scripting will not update the ArcGIS Online "item updated" date, which only reflects the last time the ArcGIS Online item page was last updated. A typical leaking underground storage tank (LUST) scenario involves the release of a fuel product from an underground storage tank (UST) that can contaminate surrounding soil, groundwater, or surface waters, or affect indoor air spaces. Early detection of an UST release is important, as is determining the source of the release, the type of fuel released, the occurrence of imminently threatened receptors, and the appropriate initial response. The primary objective of the initial response is to determine the nature and extent of a release as soon as possible.PROHIBITED USES: KSA 45-230 prohibits the use of names and addresses contained in public records for certain commercial purposes. By submitting this request, you are signing the following written certification that you will not use the information in the records for any purpose prohibited by law.

    DATA LIMITATIONS:

    This data set is not designed for use as a regulatory tool in permitting or citing decisions; it may be used as a reference source. Carefully consider the provisional or incomplete nature of these data before using them for decisions that concern personal safety or involves substantial monetary consequences.

    This dataset contains one facility point per LUST data record. The points will be stacked if multiple LUST occurred at the same facility.

    A new facility point is added when a new facility is added to the origination database.

    Data is replicated on a nightly basis for public consumption. KDHE is not responsible for database integrity following download.

    The facility point is not the exact location of the tank, but a general representative somewhere in the property of the Storage Tank Facility.

    KDHE makes no assurances of the accuracy or validity of information presented in the Spatial Data. KDHE Tanks have been located using a variety of locational methods. More recent points are geocoded and validated with accuracy of 3-10 meters. Many inactive/old facilities only had a Legal description to calculate point placement on a map, with an accuracy of 250 – 2000 meters.For users who wish to interact with the data in a finished product, KDHE recommends using our Kansas Environmental Interest Finder . More information about KDHE can be found on the Kansas Department of Health and Environment website .More information about KDHE Storage Tanks can be found on the Kansas Department of Health and Environment website Storage Tanks Division .ATTRIBUTES description: Start Date/End Date: The LUST is considered finished when the remediation has occurred and the environment is back to pre-contamination state. A new LUST will be recorded if the Tank Leaks again. Approved TRUST: Flag Yes if approved for EPA TRUST: In 1986, Congress created the Leaking Underground Storage Tank (LUST) Trust Fund to address petroleum releases from federally regulated underground storage tanks (USTs) by amending Subtitle I of the Solid Waste Disposal Act. In 2005, the Energy Policy Act expanded eligible uses of the Trust Fund to include certain leak prevention activities.

  16. d

    Replication Data and Code for \"Incentives and Information in Methane Leak...

    • search.dataone.org
    • dataverse.harvard.edu
    Updated Sep 24, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Lewis, Eric (2024). Replication Data and Code for \"Incentives and Information in Methane Leak Detection and Repair\" [Dataset]. http://doi.org/10.7910/DVN/BAVBGX
    Explore at:
    Dataset updated
    Sep 24, 2024
    Dataset provided by
    Harvard Dataverse
    Authors
    Lewis, Eric
    Description

    Replication Data and Code for "Incentives and Information in Methane Leak Detection and Repair" Abstract: Capturing leaked methane can be a win for both firms and the environment. However, leakage volume uncertainty can be a barrier inhibiting leak repair. We study an experiment at oil and gas production sites which randomized whether site operators were informed of methane leakage volumes. At sites with high baseline leakage, we estimate a negative but imprecise effect of information on endline emissions. But at sites with zero measured leakage, giving firms information about methane leakage increased emissions at endline. Our results suggest that giving firms news of low leakage disincentivizes maintenance effort, thereby increasing the likelihood of future leaks. Package includes data from Wang et al. (2024) RCT as well as IEA data on estimated methane emissions and methane abatement costs. Package also includes code for replication.

  17. Regulated Storage Tanks - Leaking Underground (LUST)

    • hub.kansasgis.org
    Updated May 20, 2022
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    KDHE Public ArcGIS (2022). Regulated Storage Tanks - Leaking Underground (LUST) [Dataset]. https://hub.kansasgis.org/maps/kdhe::regulated-storage-tanks-leaking-underground-lust
    Explore at:
    Dataset updated
    May 20, 2022
    Dataset provided by
    Kansas Department of Health and Environmenthttp://www.kdheks.gov/
    Authors
    KDHE Public ArcGIS
    Area covered
    Description

    A typical leaking underground storage tank (LUST) scenario involves the release of a fuel product from an underground storage tank (UST) that can contaminate surrounding soil, groundwater, or surface waters, or affect indoor air spaces. Early detection of an UST release is important, as is determining the source of the release, the type of fuel released, the occurrence of imminently threatened receptors, and the appropriate initial response. The primary objective of the initial response is to determine the nature and extent of a release as soon as possible.PROHIBITED USES: KSA 45-230 prohibits the use of names and addresses contained in public records for certain commercial purposes. By submitting this request, you are signing the following written certification that you will not use the information in the records for any purpose prohibited by law.

    DATA LIMITATIONS:

    This data set is not designed for use as a regulatory tool in permitting or citing decisions; it may be used as a reference source. Carefully consider the provisional or incomplete nature of these data before using them for decisions that concern personal safety or involves substantial monetary consequences.

    This dataset contains one facility point per LUST data record. The points will be stacked if multiple LUST occurred at the same facility.

    A new facility point is added when a new facility is added to the origination database.

    Data is replicated on a nightly basis for public consumption. KDHE is not responsible for database integrity following download.

    The facility point is not the exact location of the tank, but a general representative somewhere in the property of the Storage Tank Facility.

    KDHE makes no assurances of the accuracy or validity of information presented in the Spatial Data. KDHE Tanks have been located using a variety of locational methods. More recent points are geocoded and validated with accuracy of 3-10 meters. Many inactive/old facilities only had a Legal description to calculate point placement on a map, with an accuracy of 250 – 2000 meters.For users who wish to interact with the data in a finished product, KDHE recommends using our Kansas Environmental Interest Finder . More information about KDHE can be found on the Kansas Department of Health and Environment website .More information about KDHE Storage Tanks can be found on the Kansas Department of Health and Environment website Storage Tanks Division .ATTRIBUTES description: Start Date/End Date: The LUST is considered finished when the remediation has occurred and the environment is back to pre-contamination state. A new LUST will be recorded if the Tank Leaks again. Approved TRUST: Flag Yes if approved for EPA TRUST: In 1986, Congress created the Leaking Underground Storage Tank (LUST) Trust Fund to address petroleum releases from federally regulated underground storage tanks (USTs) by amending Subtitle I of the Solid Waste Disposal Act. In 2005, the Energy Policy Act expanded eligible uses of the Trust Fund to include certain leak prevention activities.

  18. D

    Engine Stop Leak Market Report | Global Forecast From 2025 To 2033

    • dataintelo.com
    csv, pdf, pptx
    Updated Sep 23, 2024
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Dataintelo (2024). Engine Stop Leak Market Report | Global Forecast From 2025 To 2033 [Dataset]. https://dataintelo.com/report/global-engine-stop-leak-market
    Explore at:
    csv, pptx, pdfAvailable download formats
    Dataset updated
    Sep 23, 2024
    Dataset authored and provided by
    Dataintelo
    License

    https://dataintelo.com/privacy-and-policyhttps://dataintelo.com/privacy-and-policy

    Time period covered
    2024 - 2032
    Area covered
    Global
    Description

    Engine Stop Leak Market Outlook



    The global engine stop leak market size is anticipated to grow from USD 1.5 billion in 2023 to USD 2.3 billion by 2032, at a compound annual growth rate (CAGR) of 4.9%. This growth is primarily driven by the increasing number of aging vehicles on the road, which has boosted the demand for engine stop leak products to prolong engine life and improve performance. The rise in automotive production, coupled with advancements in stop leak technology, further propels market growth.



    One of the significant growth factors in the engine stop leak market is the increasing age of the global vehicle fleet. As cars and trucks age, their engines are more likely to develop leaks due to wear and tear. This creates a substantial market for stop leak products, which can serve as a cost-effective solution for extending the lifespan of an engine. Furthermore, many vehicle owners are becoming more conscious of maintenance costs, opting for stop leak products as a preventative measure to avoid more expensive repairs.



    Environmental regulations are another critical driver of market growth. As governments worldwide implement stricter emissions standards, the automotive industry is under pressure to reduce environmental impact. Engine stop leak products can play a role in this by maintaining engine efficiency, reducing emissions, and preventing fluid leaks that could contaminate the environment. Manufacturers are increasingly focusing on developing eco-friendly formulas to meet these regulatory requirements, which in turn is driving innovation and market expansion.



    The rise of e-commerce and the proliferation of automotive aftermarket websites have also contributed to the market’s growth. Consumers now have easier access to a wide variety of engine stop leak products, enabling them to compare prices, read reviews, and make informed purchasing decisions. This increased accessibility has led to higher product adoption rates, particularly among do-it-yourself (DIY) enthusiasts and smaller automotive repair shops. The convenience and availability of these products online have broadened the market reach, further fueling growth.



    Regionally, North America remains a dominant market due to its large vehicle fleet and high disposable income levels, allowing consumers to invest in vehicle maintenance products. Europe also shows significant potential, driven by its stringent environmental regulations and a strong culture of vehicle maintenance. Meanwhile, the Asia Pacific region is emerging as a lucrative market, with rapidly increasing vehicle production and ownership rates, especially in countries like China and India. These regional dynamics are poised to shape the future trajectory of the engine stop leak market.



    Product Type Analysis



    The engine stop leak market can be segmented by product type into liquid additives and powder additives. Liquid additives are the most commonly used products in this category. They are formulated to be added directly to the engine oil, where they work by softening and expanding the seals and gaskets, effectively stopping leaks. The ease of application and widespread availability make liquid additives a popular choice among both consumers and automotive service professionals. Advances in chemical formulations have improved the efficacy of liquid additives, further enhancing their appeal.



    On the other hand, powder additives, though less prevalent, offer specific advantages that appeal to a niche segment of the market. These products generally work by forming a coating inside the engine that seals the leaks. They are often touted for their long-lasting effects and ability to handle more severe leaks. Some consumers prefer powder additives due to their reputed durability, despite requiring more complicated application processes. The ongoing development in powder additive technology is expected to broaden their usage, although liquid additives will likely continue to dominate the market.



    The choice between liquid and powder additives often boils down to the specific needs of the vehicle and the preferences of the user. For example, newer vehicles or those with minor leaks might benefit more from liquid additives, which are simpler to use and less likely to cause any complications. In contrast, older vehicles with more severe issues might require the enhanced sealing capabilities of powder additives. This segmentation allows manufacturers to cater to a broad range of customer requirements, ensuring comprehensive market coverage.



    Additionally, the market for

  19. Autonomous, Cryogenic Leak Detector for Improving Launch Site Operations,...

    • data.nasa.gov
    application/rdfxml +5
    Updated Jun 26, 2018
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    (2018). Autonomous, Cryogenic Leak Detector for Improving Launch Site Operations, Phase II [Dataset]. https://data.nasa.gov/dataset/Autonomous-Cryogenic-Leak-Detector-for-Improving-L/uech-niaf
    Explore at:
    application/rssxml, application/rdfxml, tsv, csv, xml, jsonAvailable download formats
    Dataset updated
    Jun 26, 2018
    License

    U.S. Government Workshttps://www.usa.gov/government-works
    License information was derived automatically

    Description

    Spaceports, spacecrafts for planetary missions, future projects on the moon and mars -- they all need to monitor mission critical propellants. This project established the feasibility of a tapered optical fiber-based sensor (TOFS) that can be fitted into narrow orifices of plumbing junctions to detect the leakage of cryogenic fluids such as hydrogen. Complete reversibility and response/recovery time of less than 30 seconds for the hydrogen sensor were demonstrated in Phase I. Scanning electron microscope (SEM) images confirmed that the sensor suffered no degradation upon soaking in liquid nitrogen (LN2, 77 K). Tests with LH2 will be conducted in Phase II. The underlying sensor technology will support NASA goal of reducing vehicle and payload cost, and increase safety of operations by measuring hydrogen in real-time and in situ. A prototype device will be engineered, field-tested and delivered to NASA in Phase II establishing technical maturity approaching TRL 6. InnoSense LLC has received a strong endorsement letter from a major Aerospace company in support of the project. InnoSense LLC has also received Phase III follow-on funding commitment totaling $500,000 from commercialization partners. An engineering team having 80 person-years of cumulative experience in developing commercially viable products has been assembled for this project.

  20. a

    2021-2022 Price Service Center Leaking Underground Storage Tank Site Annual...

    • egsd-compliance-unit-project-site-cotgis.hub.arcgis.com
    • cotgis.hub.arcgis.com
    Updated Sep 20, 2023
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    City of Tucson (2023). 2021-2022 Price Service Center Leaking Underground Storage Tank Site Annual Periodic Site Status Report [Dataset]. https://egsd-compliance-unit-project-site-cotgis.hub.arcgis.com/items/00bb6cf32e604cbfb968537b1b0818f6
    Explore at:
    Dataset updated
    Sep 20, 2023
    Dataset authored and provided by
    City of Tucson
    Area covered
    Description

    This is an Annual Periodic Site Status Report (PSSR) that includes four quarterly groundwater monitoring/sampling events, two in-situ chemical oxidation (ISCO) injection events, and one confirmation soil borings and soil sampling event.bThe Thomas O. Price Service Center (TOPSC) is located at 4004 South Park Avenue, Tucson, Arizona, near the southwest corner of Park Avenue and Ajo Way. TOPSC formerly contained 23 underground storage tanks (USTs) and associated fuel dispensing equipment/piping that were the sources of multiple petroleum releases. In June 1989, diesel fuel was observed seeping from concrete joints at the north end of the dispenser islands, and evidence of petroleum releases were reported to ADEQ on June 14, 1989. All USTs were taken out of service by November 1992. Since the initial discovery, the site has been investigated and remediated under ADEQ’s LUST program. TOPSC appeared to be the source of Liquid-Phase Hydrocarbon (LPH) and dissolved petroleum hydrocarbons in the shallow groundwater zone that extended northeasterly from TOPSC to COT Fire Station #10 (TFS-10), located north of Ajo Way. However, LPH discovered in monitor well WR-220A exhibited characteristics that were inconsistent with TOPSC fuel, and it was determined by COT and ADEQ not to be associated with the TOPSC LUST site (Accutest, 2013). Monitor and remediation wells at the site are either screened across the shallow or deep-zone perched aquifers. The shallow zone was defined in the original Corrective Action Plan (CAP), 1994 as the uppermost groundwater unit beneath the Site with a depth-to-water of approximately 90 to 115 feet below ground surface (ft bgs). The deep zone was defined in the CAP as the second groundwater-bearing zone encountered beneath the Site with a depth-to-water of approximately 114 to 145 ft bgs. The deep-zone perched aquifer appears to be isolated from the underlying regional aquifer by 40 to 50 feet. Site remedial goals have been the removal of LPH from groundwater associated with the shallow perched aquifer and removal of residual hydrocarbons from the vadose zone. The LPH plume was previously located east of the TFS-10 property. Based on the latest collected data, LPH may have been eliminated through implementation of the 2021 and/or 2022 ISCO injection events; however, additional monitoring is needed for long-term verification. Past remedial activities included direct LPH recovery by hand bailing, pumping, and air sparging with soil vapor extraction (AS/SVE). Skimmer pumps were phased out and replaced with AS/SVE technology; no skimmer pumps remained by June 2013. Figure 2 depicts locations of TOPSC, TFS-10, and the location of monitor and recovery wells in and around the Site.

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
Statista (2025). Deep web employee data leaks of selected e-commerce platforms 2024 [Dataset]. https://www.statista.com/statistics/1350068/e-commerce-websites-deep-web-employee-credential-leaks/
Organization logo

Deep web employee data leaks of selected e-commerce platforms 2024

Explore at:
Dataset updated
Jul 11, 2025
Dataset authored and provided by
Statistahttp://statista.com/
Time period covered
May 15, 2024
Area covered
Worldwide
Description

Company information such as employee credentials is one of the most common assets online vendors trade illegally on the darknet. According to the source, Zalando.com has suffered thousands of data leakage incidents on the deep web in the 12 months leading up to ********, in which more than ***** employee credentials were compromised. Amazon registered a relatively low number of deep web data leaks, with roughly *** in the last 12 months.

Search
Clear search
Close search
Google apps
Main menu