Data Breaches

Articles, news, and research on data breaches and how to prevent them.

Data Breaches

Data Breaches
Third-Party Risk Management
Cybersecurity

Spotify Resets User Passwords to Protect Against Third Party Data Breaches

The LinkedIn data breach compromised hundreds of thousands of passwords, leaving accounts wide open across numerous sites. Spotify took action.
Read more
Third-Party Risk Management
Data Breaches

9 Ways to Prevent Third-Party Data Breaches in 2025

This is a complete guide to preventing third-party data breaches. Learn about how organizations like yours are keeping themselves and their customers safe.
Read more
Data Breaches
Cybersecurity

116 Must-Know Data Breach Statistics for 2025

116 data breach statistics that cover risk, cost, prevention, industry trends, and more. Assess and analyze these stats and learn to prevent data breaches.
Read more
Data Breaches

The 83 Biggest Data Breaches of All Time [Updated 2025]

Our updated list for 2025 ranks the 83 biggest data breaches of all time, ranked by impact. Learn from their mistakes to avoid costly damages.
Read more
Data Breaches

Data Leaks and the Deep Web: Swimming in the Deep End

The deep web makes up 95-99% of the entire internet. The dark web makes up less than 1%. UpGuard explores how deep web assets can lead to data exposure.
Read more
Cybersecurity
Attack Surface Management
Third-Party Risk Management
Data Breaches

What is Data Security?

Data security is the process of protecting sensitive data from unauthorized access and corruption throughout its lifecycle.
Read more
Attack Surface Management
Data Breaches
Cybersecurity

How to Fix The Top 10 Critical CVEs That Can Lead To A Data Breaches

Learn more about how to fix these top 10 CVEs that commonly lead to data breaches.
Read more
Cybersecurity
Data Breaches

What is a Data Breach?

A data breach is the intentional or unintentional release of secure or private/confidential information to an untrusted environment.
Read more
Cybersecurity
Data Breaches

What are Indicators of Compromise (IOCs)?

Indicators of compromise (IOCs) are pieces of forensic data, such as system log entries, system files or network traffic that identify malicious activity.
Read more
Compliance and Regulations
Cybersecurity
Data Breaches

What is Sensitive Data?

Sensitive data is information that must be protected against unauthorized access.
Read more
Third-Party Risk Management
Data Breaches
Cybersecurity

The Amex Partner Data Breach and Downstream Liability

Learn more about the recent American Express data breach notification and what it means for cardholders worldwide.
Read more
Cybersecurity
Attack Surface Management
Data Breaches

What is an Incident Response Plan?

An incident response plan is a set of written instructions that outline your organization's response to data breaches, data leaks, and cyber attacks.
Read more
Attack Surface Management
Cybersecurity
Data Breaches

Don’t Use Production Data In Your Test Environment: The Impact Of Leaked Test Credentials

Read about why your third-party vendors and test environments should not contain production data, and how to protect your customers by taking a few steps.
Read more
Attack Surface Management
Cybersecurity
Data Breaches

Check your Amazon S3 permissions or Someone Else will.

Companies regularly host sensitive data on Amazon's S3. Sometimes they forget to close it off to the internet. Here's a guide to make sure you don't.
Read more
Cybersecurity
Data Breaches

What is Data Loss Prevention (DLP)?

This is a complete overview of data loss prevention (DLP). Learn about DLP best practices in this in-depth post.
Read more
Deliver icon

Sign up for our newsletter

UpGuard's monthly newsletter cuts through the noise and brings you what matters most: our breaking research, in-depth analysis of emerging threats, and actionable strategic insights.
Free instant security score

How secure is your organization?

Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
  • Check icon
    Instant insights you can act on immediately
  • Check icon
    Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
Website Security scan resultsWebsite Security scan rating