the breach report
March 2026 Recap - The Breach Report
🔓 Unlocked - Edition #31 - Tuesday, March 31st 2026
Detailed analysis of major data breaches and security incidents. Coverage of root cause, attacker techniques, affected systems and data, regulatory and legal fallout, and the controls IT and security leaders should review based on each incident's lessons.
the breach report
🔓 Unlocked - Edition #31 - Tuesday, March 31st 2026
the breach report
Hello and welcome back to The Breach Report! February 2026 was a month of high-stakes pressure, defined by a "double-down" strategy from threat actors. While global ransomware volumes showed a slight stabilization, the impact per attack skyrocketed. Attackers pivoted from simple data theft to "operational extortion"
the breach report
Hello and welcome back to The Breach Report! January 2026 kicked off the new year with a relentless surge in activity, proving that there is no "post-holiday lull" in the current threat landscape. Organizations worldwide faced an average of 2,090 cyberattacks per week, a 17% increase over
the breach report
Hello and welcome back to The Breach Report! December 2025 closed the year with a stark reminder: cyber risk is now systemic, relentless, and indiscriminate. While the holiday season usually brings a slowdown in business, threat actors leveraged the "seasonal shift" to exploit skeletal staffing and holiday-themed social
the breach report
Hello and welcome back to The Breach Report! November 2025 was a month of relentless pressure, marked by a critical shift in how threats materialize. While the world watched a temporary U.S. government shutdown freeze federal breach reporting, the private sector and global entities faced a sophisticated "identity-first&
the breach report
Hello and welcome back to The Breach Report! October kept the pressure on. From airlines to delivery platforms, universities to retail chains — attackers again homed in on weak vendor links, credential misuse, and third-party system exposure. The recurring themes? Social-engineered vendor access, SaaS/data-platform misuse, and unsecured backend systems. Follow
the breach report
Hello and welcome back to The Breach Report! September delivered another round of high-stakes breaches — targeting fintech, auto, SaaS platforms, and even the airline industry — with attackers yet again capitalizing on weak vendor systems, token misuse, and third-party dependencies. The recurring themes? Supply-chain compromise, OAuth/token misuse, and vendor ecosystem
the breach report
Hello and welcome back to The Breach Report! August didn’t slow down. From credit bureaus to healthcare giants, universities, governments, and even credit unions — attackers zeroed in on blind spots across finance, healthcare, SaaS platforms, and critical infrastructure. The recurring themes? Third-party weaknesses, SaaS supply-chain attacks, and zero-day exploits.
the breach report
Hello and welcome back to The Breach Report! July brought a wave of big breaches hitting insurers, airlines, courts, luxury brands, and even a dating app - most traced back to familiar weak spots like vendor lapses, unpatched zero-days, and outdated systems. The takeaway? If you don’t know where
the breach report
Hello and welcome back to The Breach Report! June 2025 delivered a fresh wave of high-impact cyberattacks that crippled hospitals, universities, food supply chains, and even national banking systems. The incidents this month highlight the growing convergence of hacktivism, ransomware, and insider-fueled breaches -and the continued need for zero-trust, employee
the breach report
Welcome to The Breach Report, your monthly digest of critical cybersecurity events and insights. May brought a wave of high-profile cyber incidents across the globe, impacting retail giants, healthcare providers, financial institutions, and telecoms. These events continue to highlight the importance of proactive security measures, vendor oversight, and incident readiness.