Aura Identity Protection
900K customer marketing contacts with names and email addresses exposed
2026 continues the year-over-year growth trend in confirmed disclosures. The list below updates as new breaches are reported by Verizon DBIR partners and major security news outlets.
900K customer marketing contacts with names and email addresses exposed
2.7M individuals' PII including health plan and FSA information
1.2M bank account records compromised in national registry breach
339,778 records exposed — Email addresses, Passwords, Usernames
15K+ employees/customers data including SSNs, driver's licenses
3.4M patient health records including SSNs, insurance data, medical information exposed
User account metadata, contact details from January breach
F5 BIG-IP Stack-Based Buffer Overflow Vulnerability — F5 BIG-IP APM contains a stack-based buffer overflow vulnerability that could allow a threat actor to achieve remote code execution.
284K victims' sensitive mental health information accessed
3.4M patient health records including SSNs, medical data, insurance info
Customer metadata and business information accessed
Restaurant POS system breach, customer emails exposed
750K Canadian investors' SINs and financial information
170GB client agreements, employee data from US site
676.8M US citizens' personal records including SSNs, names, addresses, birth dates
284,525 patient records with clinical information
192K+ student records with SSNs, birth dates, driver licenses
967K user accounts with names, birth dates, addresses, phone numbers
3.7M chat logs and 1.4M audio files exposed containing PII from AI chatbot
128,683 records exposed — Display names, Email addresses, IP addresses, Passwords and 1 more
292,993 records exposed — Email addresses, Names, Passwords
Aquasecurity Trivy Embedded Malicious Code Vulnerability — Aquasecurity Trivy contains an embedded malicious code vulnerability that could allow an attacker to gain access to everything in the CI/CD environment, includin
Langflow Code Injection Vulnerability — Langflow contains a code injection vulnerability that could allow building public flows without requiring authentication.
Defense program documents and 180K employee records exposed via subcontractor email compromise