Live disclosure tracker · updated continuously

Technology & Software Data Breaches

SaaS platforms, cloud providers, developer tooling, and app-layer infrastructure are concentrated attack surfaces. One tech vendor breach can expose thousands of downstream customers. Below is every tech-sector breach LeakTrace has indexed.

98B+
Records Exposed
1095
Incidents
94+
Countries
+104%
Breach Velocity YoY
Browse by sector
All breaches Healthcare Finance Government Technology Retail Education Legal
Browse by year
2024 2025 2026

Technology & Software Data Breaches (1095 indexed)

high · tech · Mar 25, 2026

Langflow Langflow

Langflow Code Injection Vulnerability — Langflow contains a code injection vulnerability that could allow building public flows without requiring authentication.

View incident → Original disclosure Indexed 2 weeks, 3 days ago
high · tech · Mar 20, 2026

Apple Multiple Products

Apple Multiple Products Improper Locking Vulnerability — Apple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS contain an improper locking vulnerability that could allow a malicious application to cause unexpected change

View incident → Original disclosure Indexed 3 weeks, 1 day ago
high · tech · Mar 20, 2026

Apple Multiple Products

Apple Multiple Products Classic Buffer Overflow Vulnerability — Apple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS contain a classic buffer overflow vulnerability which could allow a malicious application to cause une

View incident → Original disclosure Indexed 3 weeks, 1 day ago
high · tech · Mar 20, 2026

Apple Multiple Products

Apple Multiple Products Buffer Overflow Vulnerability — Apple Safari, iOS, watchOS, visionOS, iPadOS, macOS, and tvOS contain a buffer overflow vulnerability that could allow the processing of maliciously crafted web con

View incident → Original disclosure Indexed 3 weeks, 1 day ago
high · tech · Mar 20, 2026

Laravel Livewire

Laravel Livewire Code Injection Vulnerability — Laravel Livewire contain a code injection vulnerability that could allow unauthenticated attackers to achieve remote command execution in specific scenarios.

View incident → Original disclosure Indexed 3 weeks, 1 day ago
high · tech · Mar 18, 2026

Microsoft SharePoint

Microsoft SharePoint Deserialization of Untrusted Data Vulnerability — Microsoft SharePoint contains a deserialization of untrusted data vulnerability that allows an unauthorized attacker to execute code over a network.

View incident → Original disclosure Indexed 3 weeks, 3 days ago
high · tech · Mar 13, 2026

Google Chromium V8

Google Chromium V8 Improper Restriction of Operations Within the Bounds of a Memory Buffer Vulnerability — Google Chromium V8 contains an improper restriction of operations within the bounds of a memory buffer vulnerabil

View incident → Original disclosure Indexed 4 weeks, 1 day ago
high · tech · Mar 13, 2026

Google Skia

Google Skia Out-of-Bounds Write Vulnerability — Google Skia contains an out-of-bounds write vulnerability that could allow a remote attacker to perform out of bounds memory access via a crafted HTML page. This vulnerabil

View incident → Original disclosure Indexed 4 weeks, 1 day ago
high · tech · Mar 11, 2026

n8n n8n

n8n Improper Control of Dynamically-Managed Code Resources Vulnerability — n8n contains an improper control of dynamically managed code resources vulnerability in its workflow expression evaluation system that allows for