Live disclosure tracker · updated continuously

Technology & Software Data Breaches

SaaS platforms, cloud providers, developer tooling, and app-layer infrastructure are concentrated attack surfaces. One tech vendor breach can expose thousands of downstream customers. Below is every tech-sector breach LeakTrace has indexed.

98B+
Records Exposed
1095
Incidents
94+
Countries
+104%
Breach Velocity YoY
Browse by sector
All breaches Healthcare Finance Government Technology Retail Education Legal
Browse by year
2024 2025 2026

Technology & Software Data Breaches (1095 indexed)

high · tech · Mar 9, 2026

SolarWinds Web Help Desk

SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability — SolarWinds Web Help Desk contain a deserialization of untrusted data vulnerability in AjaxProxy that could allow an attacker to run commands on t

high · tech · Mar 9, 2026

Ivanti Endpoint Manager (EPM)

Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability — Ivanti Endpoint Manager (EPM) contains an authentication bypass using an alternate path or channel vulnerability that could allow a remote unauthenticat

high · tech · Mar 9, 2026

Omnissa Workspace One UEM

Omnissa Workspace ONE Server-Side Request Forgery — Omnissa Workspace One UEM formerly known as VMware Workspace One UEM contains a server-side request forgery (SSRF) vulnerability that could allow a malicious actor with

high · tech · Mar 5, 2026

Rockwell Multiple Products

Rockwell Multiple Products Insufficient Protected Credentials Vulnerability — Multiple Rockwell products contain an insufficient protected credentials vulnerability. Studio 5000 Logix Designer software may allow a key to

high · tech · Mar 5, 2026

Hikvision Multiple Products

Hikvision Multiple Products Improper Authentication Vulnerability — Multiple Hikvision products contain an improper authentication vulnerability that could allow a malicious user to escalate privileges on the system and

high · tech · Mar 5, 2026

Apple Multiple Products

Apple Multiple products Use-After-Free Vulnerability — Apple macOS, iOS, iPadOS, and Safari 16.6 contain a use-after-free vulnerability due to the processing of maliciously crafted web content that may lead to memory cor

high · tech · Mar 5, 2026

Apple iOS and iPadOS

Apple iOS and iPadOS Use-After-Free Vulnerability — Apple iOS and iPadOS contain a use-after-free vulnerability. An app may be able to execute arbitrary code with kernel privileges.

high · tech · Mar 5, 2026

Apple Multiple Products

Apple Multiple Products Integer Overflow or Wraparound Vulnerability — Apple tvOS, macOS, Safari, iPadOS and watchOS contain an integer overflow or wraparound vulnerability due to the processing of maliciously crafted we

high · tech · Mar 3, 2026

Broadcom VMware Aria Operations

Broadcom VMware Aria Operations Command Injection Vulnerability — Broadcom VMware Aria Operations formerly known as vRealize Operations (vROps) contains a command injection vulnerability that allows an unauthenticated at

View incident → Original disclosure Indexed 1 month, 1 week ago
medium · tech · Mar 2, 2026

Lovora

495,556 records exposed — Display names, Email addresses, Profile photos

View incident → Indexed 1 month, 1 week ago