The Most Recent Data Breaches in 2026

Data Breaches - February 2026

blog-post

Aircraft Systems

Data Breach Report Victim aircraftsystems.aero Threat Actor ANUBIS Date Discovered Feb 06, 2026 Description Aircraft …

blog-post

Conpet

Data Breach Report Victim conpet.ro Threat Actor Qilin Date Discovered Feb 06, 2026 Description Conpet S.A. is an …

blog-post

Esposito Brothers

Data Breach Report Victim espositobros.com Threat Actor DragonForce Date Discovered Feb 06, 2026 Description Esposito …

blog-post

Exco

Data Breach Report Victim exco.fr Threat Actor Sinobi Date Discovered Feb 06, 2026 Description Exco is an accounting …

blog-post

Farsound Aviation

Data Breach Report Victim farsoundaviation.com Threat Actor Akira Date Discovered Feb 06, 2026 Description Farsound …

blog-post

Fenco Labs

Data Breach Report Victim fencolabs.com Threat Actor Akira Date Discovered Feb 06, 2026 Description Fenco Labs is a …

blog-post

Heavy Motions

Data Breach Report Victim heavymotions.com Threat Actor DragonForce Date Discovered Feb 06, 2026 Description Heavy …

blog-post

Hochschule Worms

Data Breach Report Victim hs-worms.de Threat Actor Qilin Date Discovered Feb 06, 2026 Description Hochschule Worms is a …

blog-post

Info Montréal

Data Breach Report Victim infomontreal.ca Threat Actor Sinobi Date Discovered Feb 06, 2026 Description Info Montréal is …

blog-post

La Fábrica

Data Breach Report Victim lafabrica.com.ar Threat Actor Qilin Date Discovered Feb 06, 2026 Description La Fábrica is a …

blog-post

Lumio Dental

Data Breach Report Victim lumiodental.com Threat Actor Nitrogen Date Discovered Feb 06, 2026 Description Lumio Dental …

Are Your Credentials Already Exposed?

Your organization or its vendors may have been compromised. Scan your domain to find out.

Check Your Exposure Book a Demo

Our data breach tracker shows the most recent ransomware attacks. We index data directly from threat actor leak sites and track various ransomware threat actors and where they’re leaking the stolen data.

This gives security teams early access to breach data. If your company gets hit, or your vendor leaks your data in their breach, you can respond before attackers exploit it.

Want to monitor your company for data breaches? See our data breach monitoring platform or check your dark web exposure now.

How Often Do Data Breaches Happen?

Data breaches happen every day. Here are the numbers:

  • Over 4,100 publicly disclosed data breaches happened last year alone. That’s roughly 11 breaches per day, and that’s only publicly disclosed breaches.
  • Nearly 109 million accounts were breached in just the 3rd quarter of last year.
  • It takes companies an average of 241 days to identify and contain a breach.
  • 60% of breaches involve a human element like phishing or stolen credentials (Verizon 2025 DBIR).
  • On average, a data breach costs companies $4.44 million (IBM’s 2025 Cost of Data Breach Report).

How to Search for Data Leaks

Data leaks surface across multiple sources. Knowing where to search helps you find exposed credentials before attackers exploit them.

For security teams: Data leak monitoring continuously searches for your domains across dark web marketplaces and breach forums. Get alerts when employee credentials or company data surfaces.

For penetration testers: Our API integrates full credential details directly into your testing workflow. For a quick check, the dark web scan shows an overview of the credentials we’ve indexed for any domain.

What sources matter most for data leak search:

  • Third-party breaches - When vendors get breached, your data may be exposed. Search for your domains in breach compilations.
  • Infostealer logs - Malware harvests credentials directly from browsers. These logs appear on infostealer channels within hours of infection.
  • Ransomware leak sites - The breach tracker above shows companies hit by ransomware. Search for your vendors here.
  • Dark web marketplaces - Stolen credentials are bought and sold on darknet markets. Continuous monitoring catches your data when it’s listed for sale.

Frequently Asked Questions

The most recent data breaches are tracked on this page and updated daily as ransomware gangs post new victims to their leak sites. Our tracker pulls directly from threat actor websites to show which companies were breached within the last 24 hours. Check the list above for today’s latest breaches.

This page shows companies breached by ransomware gangs and is updated daily. Recent victims include organizations hit by ransomware threat actors like LockBit, ALPHV, and Cl0p. Each entry shows when the breach was posted and where the stolen data is located.

Yes. You can check your dark web exposure to see if your email or credentials were leaked. For companies, our data breach monitoring platform provides real-time alerts when your organization appears on ransomware leak sites or when employee data surfaces on the dark web.

Yes, you should act quickly. Change your password immediately on the affected account and any other accounts where you used the same password. Leaked credentials are used for account takeover attacks and credential stuffing. If you’re a security team, monitor for compromised credentials to reset passwords before attackers exploit them.

Approximately 11 data breaches are publicly disclosed every day based on the 4,100+ breaches reported last year. However, many breaches go unreported for months. Our tracker shows ransomware victims as soon as threat actors post them to leak sites, often significantly before official company disclosures.

We index data directly from ransomware gang leak sites and threat actor channels. This lets us track breaches as soon as criminals post victim companies, often weeks before official disclosures. Our platform monitors multiple threat actor websites 24/7 for new breach announcements.

You can search for data leaks using our dark web scan tool. Enter your email or domain to check if credentials appeared in breaches or infostealer logs. For continuous monitoring, data leak monitoring alerts you when new leaks surface.

Yes. Security teams can search for leaked company data across dark web marketplaces and breach forums. Infostealer channels too. Our data breach monitoring platform indexes credentials and sensitive data as soon as it appears on criminal sites.

You can search across third-party breaches and infostealer logs. Ransomware leak sites and dark web marketplaces too. Our platform indexes data from infostealer channels where malware harvests credentials, plus darknet markets where stolen data is sold.