Data breaches and cyber attacks Archive

Research methodology

We identified incidents from a range of publicly available sources (listed here), including reports to regulators, news reports, security researchers’ feeds, and press releases by breached organizations. We only recorded incidents where we have a reasonable degree of confidence that …