The Most Recent Data Breaches in 2026

Data Breaches - March 2026

blog-post

Abutriek Service

Data Breach Report Victim abutriek.be Threat Actor Qilin Date Discovered Mar 06, 2026 Description Abutriek Service is …

blog-post

Ambicare Health

Data Breach Report Victim ambicare.com Threat Actor BlackShrantac Date Discovered Mar 06, 2026 Description Ambicare …

blog-post

Applied Products

Data Breach Report Victim appliedproducts.com Threat Actor Akira Date Discovered Mar 06, 2026 Description Applied …

blog-post

Atlas Insurance

Data Breach Report Victim atlas-insurances.com Threat Actor Handala Date Discovered Mar 06, 2026 Description Atlas …

blog-post

CD Oracle Clinic

Data Breach Report Victim cdoracleclinic.com Threat Actor Qilin Date Discovered Mar 06, 2026 Description CD Oracle …

blog-post

CTI Coordinators

Data Breach Report Victim cticoordinators.com Threat Actor PEAR Date Discovered Mar 06, 2026 Description CTI …

blog-post

Design Source

Data Breach Report Victim designsourcect.com Threat Actor Akira Date Discovered Mar 06, 2026 Description Design Source …

blog-post

Donjon Singapore

Data Breach Report Victim donjon.com.sg Threat Actor Akira Date Discovered Mar 06, 2026 Description Donjon Singapore is …

blog-post

ELC Security

Data Breach Report Victim elcsecurity.com Threat Actor Qilin Date Discovered Mar 06, 2026 Description ELC Security is a …

blog-post

F-One

Data Breach Report Victim f-one.co.jp Threat Actor BlackShrantac Date Discovered Mar 06, 2026 Description F-One Co., …

blog-post

Flooring Installation Systems

Data Breach Report Victim flooringinstallationsystems.com Threat Actor BlackShrantac Date Discovered Mar 06, 2026 …

Are Your Credentials Already Exposed?

Your organization or its vendors may have been compromised. Scan your domain to find out.

Check Your Exposure Book a Demo

Our data breach tracker shows the most recent ransomware attacks. We index data directly from threat actor leak sites and track various ransomware threat actors and where they’re leaking the stolen data.

This gives security teams early access to breach data. See how the Breachsense tracker works for details on what we index and how we verify it. For monthly trends and analysis, check our ransomware reports. If your company gets hit, or your vendor leaks your data in their breach, you can respond before attackers exploit it.

Want to monitor your company for data breaches? See our data breach monitoring platform or check your dark web exposure now.

How Often Do Data Breaches Happen?

Data breaches happen every day. Here are the numbers:

  • Over 4,100 publicly disclosed data breaches happened last year alone. That’s roughly 11 breaches per day, and that’s only publicly disclosed breaches.
  • Nearly 109 million accounts were breached in just the 3rd quarter of last year.
  • It takes companies an average of 241 days to identify and contain a breach.
  • 60% of breaches involve a human element like phishing or stolen credentials (Verizon 2025 DBIR).
  • On average, a data breach costs companies $4.44 million (IBM’s 2025 Cost of Data Breach Report).

How to Search for Data Leaks

Data leaks surface across multiple sources. Knowing where to search helps you find exposed credentials before attackers exploit them.

For security teams: Data leak monitoring continuously searches for your domains across dark web marketplaces and breach forums. Get alerts when employee credentials or company data surfaces.

For penetration testers: Our API integrates full credential details directly into your testing workflow. For a quick check, the dark web scan shows an overview of the credentials we’ve indexed for any domain.

What sources matter most for data leak search:

  • Third-party breaches - When vendors get breached, your data may be exposed. Search for your domains in breach compilations.
  • Infostealer logs - Malware harvests credentials directly from browsers. These logs appear on infostealer channels within hours of infection.
  • Ransomware leak sites - The breach tracker above shows companies hit by ransomware. Search for your vendors here.
  • Dark web marketplaces - Stolen credentials are bought and sold on darknet markets. Continuous monitoring catches your data when it’s listed for sale.

Frequently Asked Questions

The most recent data breaches are tracked on this page and updated daily as ransomware gangs post new victims to their leak sites. Our tracker pulls directly from threat actor websites to show which companies were breached within the last 24 hours. Check the list above for today’s latest breaches.

This page shows companies breached by ransomware gangs and is updated daily. Recent victims include organizations hit by ransomware threat actors like LockBit, ALPHV, and Cl0p. Each entry shows when the breach was posted and where the stolen data is located.

Yes. You can check your dark web exposure to see if your email or credentials were leaked. For companies, our data breach monitoring platform provides real-time alerts when your organization appears on ransomware leak sites or when employee data surfaces on the dark web.

Yes, you should act quickly. Change your password immediately on the affected account and any other accounts where you used the same password. Leaked credentials are used for account takeover attacks and credential stuffing. If you’re a security team, monitor for compromised credentials to reset passwords before attackers exploit them.

Approximately 11 data breaches are publicly disclosed every day based on the 4,100+ breaches reported last year. However, many breaches go unreported for months. Our tracker shows ransomware victims as soon as threat actors post them to leak sites, often significantly before official company disclosures.

We index data directly from ransomware gang leak sites and threat actor channels. This lets us track breaches as soon as criminals post victim companies, often weeks before official disclosures. Our platform monitors multiple threat actor websites 24/7 for new breach announcements.

You can search for data leaks using our dark web scan tool. Enter your email or domain to check if credentials appeared in breaches or infostealer logs. For continuous monitoring, data leak monitoring alerts you when new leaks surface.

Yes. Security teams can search for leaked company data across dark web marketplaces and breach forums. Infostealer channels too. Our data breach monitoring platform indexes credentials and sensitive data as soon as it appears on criminal sites.

You can search across third-party breaches and infostealer logs. Ransomware leak sites and dark web marketplaces too. Our platform indexes data from infostealer channels where malware harvests credentials, plus darknet markets where stolen data is sold.