Security Intelligence

Security Intelligence

Known Data Breaches

Hundreds of confirmed breaches. Billions of compromised accounts. Browse the full directory to see how widespread the threat really is, and why proactive
security matters.

Why Browse the Data Breach Directory?

Data breaches are not isolated incidents — they are cumulative. A single person’s credentials can appear in dozens of separate breaches over the years, each one adding more personal details to an attacker’s profile. This directory lets you explore the full scope of confirmed breaches: which companies were hit, how many accounts were exposed, and what types of data were compromised, from email addresses and passwords to financial records and government IDs.

Browsing the catalog puts the scale of the problem into perspective and helps you make informed decisions about which services you trust with your data. If a company you use appears here, that is a direct signal to change your credentials, review your account activity, and consider whether that service deserves continued access to your personal information.

Latest Breach

ZenBusiness

zenbusiness.com

Breach date: Mar 26, 2026 5,118,184 accounts affected
In March 2026, the hacker and extortion group "ShinyHunters" claimed to have obtained a substantial corpus of data from ZenBusiness, a business formation and compliance platform. The group claimed the data had been exfiltrated from platforms including Snowflake, Mixpanel and Salesforce, and threatened to publish it if a ransom was not paid. The following month, after claiming payment had not been made, ShinyHunters publicly released the data. The collection amounted to many terabytes across thousands of files that appeared to originate from multiple systems and business functions, including leads, support records and other CRM-related data. The data contained approximately 5M unique email addresses, often accompanied by name and phone number depending on the source file.
Email addresses Names Phone numbers
980 Known Breaches
17.6B Compromised Accounts
160 Data Types Exposed
Showing 1–24 of 980 breaches
zenbusiness.com
Mar 26, 2026 5,118,184 accounts
In March 2026, the hacker and extortion group "ShinyHunters" claimed to have obtained a substantial corpus of data from ZenBusiness, a business formation and compliance platform. The group claimed the data had been exfiltrated from platforms including Snowflake, Mixpanel and Salesforce, and threatened to publish it if a ransom was not paid. The following month, after claiming payment had not been made, ShinyHunters publicly released the data. The collection amounted to many terabytes across thousands of files that appeared to originate from multiple systems and business functions, including leads, support records and other CRM-related data. The data contained approximately 5M unique email addresses, often accompanied by name and phone number depending on the source file.
Email addresses Names Phone numbers
aman.com
Apr 19, 2026 215,563 accounts
In April 2026, the ultra-luxury hotel brand Aman was named by ShinyHunters as the target of a "pay or leak" extortion campaign, with the data allegedly obtained from their Salesforce CRM. The data was subsequently leaked publicly and contained over 200k unique email addresses. Whilst not present on all records, the data also included genders, physical addresses, phone numbers, nationalities, dates of birth, spouse names and VIP status codes.
Dates of birth Email addresses Genders Language preferences Names Nationalities Phone numbers Physical addresses Spouses names VIP statuses
pitneybowes.com
Apr 19, 2026 8,243,989 accounts
In April 2026, the hacking collective ShinyHunters claimed to have obtained data from Pitney Bowes as part of a broader extortion campaign that also named several other organisations. After negotiations allegedly failed, the group publicly released the data which included 8.2M unique email addresses, along with names, phone numbers and physical addresses. A subset of the data also included Pitney Bowes employee records with job titles.
Email addresses Job titles Names Phone numbers Physical addresses
adt.com
Apr 19, 2026 5,488,888 accounts
In April 2026, home security firm ADT confirmed a data breach by ShinyHunters, which listed the company on its website as part of a "pay or leak" extortion attempt. The breach impacted 5.5M unique email addresses along with names, phone numbers and physical addresses. ADT also advised that "in a small percentage of cases, dates of birth and the last four digits of Social Security numbers or Tax IDs were included" and that it had contacted all affected people.
Dates of birth Email addresses Names Partial government issued IDs Phone numbers Physical addresses
udemy.com
Apr 23, 2026 1,401,259 accounts
In April 2026, online training company Udemy was the victim of a “pay or leak” extortion attempt perpetrated by the ShinyHunters group. The data was subsequently leaked publicly and contained 1.4M unique email addresses belonging to customers and instructors. The data also included names, physical addresses, phone numbers, employer information and instructor payout methods including PayPal, cheque and bank transfer.
Email addresses Employers Job titles Names Payment methods Phone numbers Physical addresses
carnivalcorp.com
Apr 17, 2026 7,531,359 accounts
In April 2026, the notorious hacking collective ShinyHunters claimed they had obtained a substantial volume of data belonging to the Carnival cruise operator and attempted to extort the organisation to prevent the data from being leaked. The following week, the group published the data publicly, which contained 8.7M records with 7.5M unique email addresses. The data contained fields indicating it related to the Mariner Society loyalty program run by Holland America, a cruise line brand under Carnival, and included names, dates of birth, genders and data relating to status within the loyalty program. Carnival acknowledged a phishing incident involving a single user account and advised they were working to better understand the scope of the unauthorised activity.
Dates of birth Email addresses Genders Geographic locations Loyalty program details Names Salutations
amtrak.com
Apr 2, 2026 2,147,679 accounts
In April 2026, the hacking group ShinyHunters claimed they had breached Amtrak. The group typically compromises organisations' Salesforce instances before demanding a ransom and later, if not paid, dumping the data publicly. They subsequently published the alleged data which contained over 2M unique email addresses along with names, physical addresses and customer support records.
Email addresses Names Physical addresses Support tickets
mheducation.com
Apr 9, 2026 13,500,136 accounts
In April 2026, education company McGraw Hill confirmed a data breach following an extortion attempt. Attributed to a Salesforce misconfiguration, the company stated the incident exposed "a limited set of data from a webpage hosted by Salesforce on its platform". More than 100GB of data was later publicly distributed, containing 13.5M unique email addresses across multiple files, with additional fields such as name, physical address and phone number appearing inconsistently across some records.
Email addresses Names Phone numbers Physical addresses
hallmark.com
Mar 30, 2026 1,736,520 accounts
In March 2026, Hallmark suffered an alleged breach and subsequent extortion after attackers gained access to data stored within Salesforce. The data was later published after the extortion deadline passed, exposing 1.7M unique email addresses across both Hallmark and the Hallmark+ streaming service, along with names, phone numbers, physical addresses and support tickets.
Email addresses Names Phone numbers Physical addresses Support tickets
mylovely.ai
Apr 6, 2026 106,271 accounts
In April 2026, the NSFW AI girlfriend platform My Lovely AI suffered a data breach that exposed over 100k users. The data included user-created prompts and links to the resulting AI-generated images, along with a small number of Discord and X usernames.
Email addresses Social media profiles
crunchyroll.com
Mar 11, 2026 1,195,684 accounts
In March 2026, the anime streaming service Crunchyroll suffered a data breach alleged to have impacted 6.8M users. The exposed data is reported to have originated from the company's Zendesk support system where "name, login name, email address, IP address, general geographic location and the contents of the support tickets" were exposed. A subset of 1.2M email addresses from an alleged 2M record dataset being sold was later provided to HIBP.
Email addresses
songtrivia2.io
Apr 1, 2026 291,739 accounts
In April 2026, the music trivia platform SongTrivia2 suffered a data breach that was subsequently published to a public hacking forum. The data contained a total of 291k unique email addresses sourced from either Google OAuth logins or accounts created on the site, the latter also containing bcrypt password hashes. The data also included names, usernames and avatars.
Auth tokens Avatars Email addresses Names Passwords Usernames
success.com
Mar 3, 2026 253,510 accounts
In March 2026, the personal development and achievement media brand SUCCESS suffered a data breach. The incident exposed 250k unique email addresses along with names, IP addresses, phone numbers and, for a limited number of staff members, bcrypt password hashes. The data also included orders containing physical addresses and the payment method used. In SUCCESS' disclosure notice, they advised their system had also been abused to send offensive newsletters with quotes falsely attributed to contributors.
Device information Email addresses IP addresses Names Passwords Phone numbers Physical addresses Purchases
cuties.ai
Mar 20, 2025 144,250 accounts
In March 2026, the NSFW AI companion platform Cuties AI suffered a data breach that was subsequently published to a public hacking forum. The incident exposed 144k unique email addresses along with display names, avatars, prompts and descriptions used to generate AI adult images, as well as URLs to the generated content. The data also included the account that created the content and a stated "preference" of either female or trans.
Avatars Display names Email addresses
breachforums.bf
Mar 25, 2026 339,778 accounts
In March 2026, a breach of one of the many iterations of the BreachForums hacking forum known as "Version 5" was publicly disclosed. The incident exposed 340k unique email addresses along with usernames and argon2 password hashes.
Email addresses Passwords Usernames
scufgaming.com
Jun 4, 2015 128,683 accounts
In June 2015, custom gaming controller maker Scuf Gaming suffered a data breach. The incident exposed 129k unique email addresses along with usernames, display names, IP addresses and password hashes.
Display names Email addresses IP addresses Passwords Usernames
soundradix.com
Mar 24, 2026 292,993 accounts
In March 2026, the audio production tools company Sound Radix disclosed a data breach that they subsequently self-submitted to HIBP. The incident impacted 293k unique email addresses and names. Sound Radix advised that it is possible that additional data including hashed passwords may have been exposed, and that no financial or credit card information was impacted.
Email addresses Names Passwords
rsboards.com
Dec 25, 2011 222,762 accounts
In around 2011, the now defunct RuneScape Boards forum (also known as RSBoards) suffered a data breach that was later redistributed as part of a larger corpus of data. The vBulletin-based service exposed 223k unique email addresses along with usernames, IP addresses and salted MD5 password hashes.
Email addresses IP addresses Passwords Usernames
aura.com
Mar 5, 2026 903,080 accounts
In March 2026, the online safety service Aura disclosed a data breach that exposed 900k unique email addresses. The data was primarily associated with a marketing tool from a previously acquired company, with fewer than 20k active Aura customers affected. Exposed data included names, phone numbers, physical and IP addresses, and customer service notes. Aura advised that no Social Security numbers, passwords or financial information were compromised.
Customer service comments Email addresses IP addresses Names Phone numbers Physical addresses
divineskins.gg
Mar 12, 2026 105,814 accounts
In March 2026, the League of Legends custom skins service Divine Skins suffered a data breach. The incident was disclosed via the service's Discord server, where Divine Skins stated that an unauthorised third party accessed part of its systems, deleted all skins from the database and exposed email addresses and usernames. The data also contained a history of purchases made by users.
Email addresses Purchases Usernames
baydoner.com
Mar 7, 2026 1,266,822 accounts
In March 2026, the Turkish restaurant chain Baydöner suffered a data breach which was subsequently published to a public hacking forum. The incident exposed over 1.2M unique email addresses along with names, phone numbers, cities of residence and plaintext passwords. A small number of records also included Turkish national ID number and date of birth. In their disclosure notice, Baydöner stated that payment and financial data was not affected.
Dates of birth Email addresses Genders Geographic locations Government issued IDs Names Passwords Phone numbers Purchases
provecho.bio
Jan 29, 2026 712,904 accounts
In early 2026, data purportedly sourced from the recipe and meal planning service Provecho was alleged to have been obtained in a breach. The exposed data included 713k unique email address along with username and the creator account holders followed. Provecho has been notified and is aware of the claims surrounding the incident.
Email addresses Usernames
Feb 24, 2026 495,556 accounts
In February 2026, the couples and relationship app Lovora allegedly suffered a data breach that exposed 496k unique email addresses. The data also included users’ display names and profile photos, along with other personal information collected through use of the app. The app’s maker, Plantake, did not respond to multiple attempts to contact them about the incident.
Display names Email addresses Profile photos
quitbro.app
Feb 16, 2026 22,874 accounts
In February 2026, the porn addiction app Quitbro allegedly suffered a data breach that exposed 23k unique email addresses. The data also included users’ years of birth, responses to questions within the app and their last recorded relapse time. The app’s maker, Plantake, did not respond to multiple attempts to contact them about the incident.
Email addresses Partial dates of birth Usernames