Overview.
As more organizations face crippling security incidents, compromised data is accelerating. Breach statistics illustrate that adversaries are highly motivated by financial gain, prized targets include personal information, and despite significant advances in cyber technology, many organisations remain inadequately prepared.
- Data breaches continue to accelerate.
- Financially motivated attackers target high-value personal data.
- Organizations remain underprepared despite improved security technologies.
- Data shows rising breach volume, evolving attack vectors and growing industry-specific impacts.
- Trends reinforce the need for stronger budgets, modernized defences and mature incident-response capabilities.
Top 8 Data Breach Trends: Breach Types, Industry Exposure, Risks & Defence Alignment
- The global average cost of a data breach is approximately US $4.44 million.
- In the United States the average breach cost has reached US $10.22 million, making it the highest-cost region.
- Attack vectors: In the 2025 Verizon Data Breach Investigations Report, the largest dataset yet, exploited vulnerabilities and credential use are prominent initial access methods.
- Breaches involving multiple environments (on-premises + cloud) averaged about US $5.05 million and represented among the most costly.
- Customer personally identifiable information (PII) remains the most frequently compromised data type, reported in approximately 53 % of breaches.
- AI and “shadow AI” present emerging risks: about 16 % of breaches involve attacker use of AI, and ~20 % involve ungoverned (“shadow”) AI inside organizations.
- Dwell time (time attackers remain undetected) for many organizations sits around 241 days on average.
- Third-party involvement is rising: about 30 % of breaches now involve vendor or supplier relationships.
Average Data Breach Cost.
Global & National Cost Benchmarks
- Global breach cost: US $4.44M.
- U.S. remains highest at US $10.22M.
- Canada averages CA $6.98M per breach.
Industry-Specific Impact
- Healthcare is highest-cost at US $7.42M.
- Hybrid/multi-environment breaches average US $5.05M
- Shadow AI exposure adds US $670K in cost.
Cost Drivers & Key Influencing Factors
- Strong security AI/automation saves US $1.9M and cuts lifecycle by ≈80 days.
- Average detection-to-containment time: 241 days.
Regional Observations
- The U.S. remains the clear cost outlier.
- Europe, Asia-Pacific and Latin America face rising pressure from regulation, compliance demands and complex incident response.
Cyberattack Causes, Sources, & Lifecycle.
Cause & Source Insights
- 4,800 websites/month are compromised with formjacking.
- 34% of breaches involve internal actors.
- 71% of breaches are financially motivated.
- 24% of malware incidents involve ransomware.
- 95% of breached records** come from government, retail, and technology.
- 36% of external actors** are linked to organized crime.
Response & Lifecycle Metrics
- Breach identification averages 287 days.
- Containment takes 80–90 days.
- Healthcare and financial services see the longest lifecycles at 329 and 233 days.
- Malicious attacks last an average of 315 days.
- 48% of malicious email attachments use Microsoft Office formats.
- Top attack groups target about 55 organizations on average.
Industry News.
Research shows Aussie Baby Boomers have better password habits than Gen X and Millennials, but a 'wait-and-see' approach to security breaches ... The recent decision by the Global Coalition on Telecoms (GCOT) to publish security and resilience principles for 6G marks a significant shift in ... Other people listed include Ali Larijani, the country's national security ... Experts warn of 'data breach' scams · Your Money 58 minutes ago. Video ... Data breach shadows: Discussions highlighted ongoing repercussions from a November incident exposing data of over 33 million customers, prompting ... Time is running out for thousands of U.S. citizens who could be eligible for compensation following one of the most significant security breaches ... ... data, prompting an ongoing investigation and remediation efforts. This incident highlights growing operational and reputational risks for TELUS as ... OpenAI has confirmed a security breach at a third-party analytics vendor, exposing some API users' personal information such as email addresses, names ... ... data analytics firm continues its multi-year recovery from the 2017 data breach that exposed personal information on 147 million consumers. With a ... All information in this summary is directly sourced from UpGuard (https://www.upguard.com/news/loblaw-companies-limited-data-breach-2026-03-12), ... Veeam has released critical security patches addressing seven severe vulnerabilities in its flagship Veeam Backup & Replication platform. The crew also looks into a DOGE data breach, the growing battle between ... DOGE employee stole Social Security data and put it on a thumb drive, report ... ... Settlement in 23andMe data breach class-action proposed at about $4.49M ... Running AWS security audits without a dedicated security team typically means choosing between enterprise platforms with per-check billing and generic ... Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. ... data breach' scams · Jones Act: Could it lower gas prices? Father arrested, teenage son injured in Midwest City … Health care in rural areas ... Officials warn that strikes landing close to the facility, which houses highly dangerous terrorist inmates, could compromise prison security and ... Security leaders working in environments where AI testing coverage is limited report 70% higher annual remediation costs compared with organizations ... The Arab Republic of Egypt has called for urgent Arab action to secure the assets of regional states by developing a new security vision that ... (NEXSTAR) – Cyber experts are warning that the message no one wants to receive – “Your data has been breached” – could actually be the first phase ... How to verify a breach alert without clicking on the message. While scammers try to capitalize on highly-publicized data breaches, some warnings are ...
China's National Computer Network Emergency Response Technical Team (CNCERT) has issued a warning about the security stemming from the use of OpenClaw (formerly Clawdbot and Moltbot), an open-source […] Cybersecurity researchers have flagged a new iteration of the GlassWorm campaign that they say represents a "significant escalation" in how it propagates through the Open VSX registry.
"Instead of […] A suspected China-based cyber espionage operation has targeted Southeast Asian military organizations as part of a state-sponsored campaign that dates back to at least 2020.
Palo Alto Networks Unit […] Meta has announced plans to discontinue support for end-to-end encryption (E2EE) for chats on Instagram after May 8, 2026.
"If you have chats that are impacted by this change, you will see […] INTERPOL on Friday announced the takedown of 45,000 malicious IP addresses and servers used in connection with phishing, malware, and ransomware campaigns, as part of the agency's ongoing efforts to […] Microsoft has disclosed details of a credential theft campaign that employs fake virtual private network (VPN) clients distributed through search engine optimization (SEO) poisoning techniques.
"The […] Disclaimer: This report has been prepared by the Threat Research Center to enhance cybersecurity awareness and support the strengthening of defense capabilities. It is based on independent research […] Google on Thursday released security updates for its Chrome web browser to address two high-severity vulnerabilities that it said have been exploited in the wild.
The list of vulnerabilities is as […] Cybersecurity researchers have disclosed multiple security vulnerabilities within the Linux kernel's AppArmor module that could be exploited by unprivileged users to circumvent kernel protections, […] A court-authorized international law enforcement operation has dismantled a criminal proxy service named SocksEscort that enslaved thousands of residential routers worldwide into a botnet for […] Veeam has released security updates to address multiple critical vulnerabilities in its Backup & Replication software that, if successfully exploited, could result in remote code execution.
The […] Cybersecurity researchers have disclosed details of a new banking malware targeting Brazilian users that's written in Rust, marking a significant departure from other known Delphi-based malware […] Cybersecurity researchers have disclosed details of a suspected artificial intelligence (AI)-generated malware codenamed Slopoly put to use by a financially motivated threat actor named Hive0163. […] Phishing has quietly turned into one of the hardest enterprise threats to expose early. Instead of crude lures and obvious payloads, modern campaigns rely on trusted infrastructure, […] Another Thursday, another pile of weird security stuff that somehow happened in just seven days. Some of it is clever. Some of it is lazy. A few bits fall into that uncomfortable category of […] The most dangerous phishing campaigns aren’t just designed to fool employees. Many are designed to exhaust the analysts investigating them. When a phishing investigation takes 12 hours instead of […] Apple on Wednesday backported fixes for a security flaw in iOS, iPadOS, and macOS Sonoma to older versions after it was found to be used as part of the Coruna exploit kit.
The vulnerability, tracked […] Cybersecurity researchers have discovered half-a-dozen new Android malware families that come with capabilities to steal data from compromised devices and conduct financial fraud.
The Android malware […] The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added a critical security flaw impacting n8n to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of […] Agentic web browsers that leverage artificial intelligence (AI) capabilities to autonomously execute actions across multiple websites on behalf of a user could be trained and tricked into falling […] Cybersecurity researchers have disclosed details of two now-patched security flaws in the n8n workflow automation platform, including two critical bugs that could result in arbitrary command […] Meta on Wednesday said it disabled over 150,000 accounts associated with scam centers in Southeast Asia as part of a coordinated effort in partnership with authorities from Thailand, the U.S., the […] SAP has released security updates to address two critical security flaws that could be exploited to achieve arbitrary code execution on affected systems.
The vulnerabilities in question listed below […] “You knew, and you could have acted. Why didn’t you?”
This is the question you do not want to be asked. And increasingly, it’s the question leaders are forced to answer after an incident. […] Microsoft on Tuesday released patches for a set of 84 new security vulnerabilities affecting various software components, including two that have been listed as publicly known.
Of these, eight are […] A threat actor known as UNC6426 leveraged keys stolen following the supply chain compromise of the nx npm package last year to completely breach a victim's cloud environment within a span of 72 […] Cybersecurity researchers have discovered five malicious Rust crates that masquerade as time-related utilities to transmit .env file data to the threat actors.
The Rust packages, published to […] Artificial Intelligence (AI) is no longer just a tool we talk to; it is a tool that does things for us. These are called AI Agents. They can send emails, move data, and even manage software on their […] Cybersecurity researchers are calling attention to a new campaign where threat actors are abusing FortiGate Next-Generation Firewall (NGFW) appliances as entry points to breach victim networks.
The […] Cybersecurity researchers have discovered a new malware called KadNap that's primarily targeting Asus routers to enlist them into a botnet for proxying malicious traffic.
The malware, first detected […]
The excitement around Cisco's latest SD-WAN bugs has inspired some light fraud, misunderstandings, and overlooked risks. Threat actors target nonprofits due to security gaps and highly coveted information, but a lack of sufficient data makes it difficult to grasp the entire picture. Sightline Security's founder and advisory board discuss how cybersecurity poses significant problems for nonprofits and suggest ways the industry can help. Sophisticated phishing attacks are bypassing on-device protections with troubling frequency, making it more critical than ever for users to protect themselves from potential threats, new research […] Forget stolen credentials and misconfigurations; AI means vulnerability exploits that beat patching cycles are the top cause of compromises in the cloud. The latest banking Trojan campaign to hit Brazil combines classic malware with a real-time human operator, waiting for the perfect moment to strike. Organizations have to prepare to ensure they have cryptography in place in the post-quantum world. Iranian APTs have long pretended to be cybercriminal groups. Now they're working with actual cybercriminal groups. Rescinded sanctions and reactivated contracts have created confusion about the Trump administration's spyware policy and where it draws the line. StrongDM, which injects ephemeral, real-time credentials into developer workflows, will enable Delinea to offer privilege access management across cloud, SaaS, Kubernetes, and database environments. The Iranian cyberattack on Stryker is the kind of stress test that business continuity and disaster recovery programs often do not plan for. In this edition of "Reporters' Notebook," we discuss cyberattackers targeting the Milan-Cortina Winter Games, adding them to a long list of global sporting events in the crosshairs. Though the attack […] The real frontline of American cybersecurity is a bidding war on eBay for 30-year-old industrial controllers. Government agencies, emergency clinics, and others in Australia, New Zealand, and Tonga have had serious run-ins with the prolific ransomware outfit. Attackers operated an active C2 implant for up to a week and compromised AppSec vendor Xygeni's xygeni/xygeni-action in that time. Two attacks on Qatari entities signal a shift in focus for China-backed actors and demonstrate how quickly they can pivot in response to geopolitical events. Data centers — used by both governments and militaries for operations — are now fair game, not just for cyberattacks, but for kinetic attacks as well. For a change, there's little in this month's Patch Tuesday that should cause panic, according to security experts. Some customers have mishandled guest user configurations otherwise intended to allow third-party access to important — and sensitive — client data. After several years of using simple implants, the Russia-affiliated actor is back with two new sophisticated malware tools. A campaign by Russian-speaking cyberattackers hijacks workflows to deliver security-busting malware, allowing attackers to steal data without detection. In a seven-page strategy document, the Trump administration signaled a shift to preemption and deterrence to handling cyber threats. A fresh cyberattack campaign blends malvertising with a ClickFix-style technique that highlights risky behavior with AI coding assistants and command-line interfaces. With the rapid innovations in AI, we are entering an exciting era of automated risk remediation. Learn about security team readiness to leverage agentic AI for threat and exposure management. An undefined Chinese-speaking actor wields a combo of custom malware, open source tools, and LOTL binaries against Windows and Linux, likely for spying. Cylake's platform will analyze security data locally and identify potential attacks for organizations concerned about data sovereignty. DPRK worker scams are old hat, but they're still working, thanks to AI tools that help with everything from face swapping to daily emails. The European Union is taking new precautions as climate change and cybersecurity threats rise across the automotive industry. Iran has been hacking IP cameras to plan missile strikes against its enemies, and mounting other attacks on physical assets, showing how cyber and kinetic warfare are fast becoming one and the same. Using Anthropic's Claude, OpenAI's ChatGPT, and a detailed playbook prompt, a handful of cyberattackers reportedly gained access to government agencies and its citizens' data. Pakistan's APT36 threat group has begun using vibe-coding to churn out mediocre malware, but at a scale that could overwhelm defenses. The phishing-as-a-service platform was popular among cyber threat actors because of its ability to bypass multifactor authentication defenses. Edge bugs are so fetch, and Cisco just patched 50 new ones, including some heavy hitters with 10 out of 10 scores on the CVSS scale. Fig Security's platform traces security data flows end-to-end across SIEMs, pipelines, and response systems to alert teams before infrastructure changes break critical defenses. Organizations can borrow secure-by-design processes to manage non-technical challenges like governance or the inevitable human error. Much of Central and South America struggles with cybersecurity maturity, and hackers are taking advantage. Exploitation of the command injection flaw in VMware Aria Operations could grant an attacker broad acess to victims' cloud environments. Events and concepts from the Stranger Things television series illustrate how enterprises can defend their networks and stay "right side up." Dark Reading Confidential Episode 15: Interpol relied on Will Thomas and team to help break up a sprawling cybercrime ring, leading to the arrest of 574 suspects, the recovery of more than $3 […] The emerging actor, part of the APT41 nexus, gains initial access via phishing, and uses legitimate network services to obscure cyber espionage activities. India-nexus cyber threat actors are growing more active and sophisticated, using custom tools coded in Rust and cloud-based command and control. Like many other features and systems in modern cars, tire pressure sensors leak sensitive data that can be abused by threat actors. The exploitation activity against CVE-2026-21385, a high-severity memory corruption flaw, could be tied to commercial spyware or nation-state threat groups. Lessons from history highlight why AI-enabled browsers require controlled enablement. Workloads keep getting more complicated and organizations are struggling to keep up. So what's the play? Iran and its supporters have taken to cyberspace to retaliate for US-Israeli military action, with an aim to cause economic and physical disruption. The now-patched flaw is the latest in a growing string of security issues associated with the viral AI tool, which has seen rapid adoption among developers. Speed and security are historically clashing priorities, but with AI and automation, it's increasingly important that application developers and security teams get on the same page. The global law enforcement crackdown, which began in January 2025, also identified nearly 180 members of the notorious cybercriminal collective. Forward Edge-AI's new Isidore Quantum is a compact, low-power hardware device designed to defend sensitive operational technology endpoints against future quantum attacks.

