2026 Data Breaches: Cybersecurity Incidents Explained

Beth Osborne
Blog
February 3, 2026
2026 Data Breaches: Cybersecurity Incidents Explained

Data breaches are part of the modern digital world. Why they happen varies, but there’s almost always a negative consequence for companies and their customers. Each month, we’ll reveal the latest 2026 data breaches, along with the scope and key lessons for security professionals to consider to prevent or limit exposure should one occur.

Data Breaches from January 2026

We’re kicking off 2026 data breaches with a review of January. The incidents in January cover multiple industries. What’s unique about this batch is that there was data exposure of both consumers and corporations. Explore the cases in January and the key insights into preventing these in your organization.

Illinois and Minnesota Department of Human Services

Both Illinois and Minnesota experienced a system failure that exposed the personal data of nearly one million people. In the Illinois incident, sensitive information was on display publicly and was visible for four years. 

The Minnesota breach was the result of excessive internal access, leading to improper disclosure.  

  • Scale of breach: Around one million individuals 
  • Data exposed: Names, addresses, case numbers, case status, and referral information (Illinois); names, addresses, email addresses, dates of birth, phone numbers, Medicaid ID, the first four digits of Social Security numbers, and other protected information (Minnesota). 
  • Breach cause: In Illinois, an error caused patient data to be publicly viewable. In Minnesota, the culprit was unauthorized access to data that was outside the scope of their work assignments.  
  • Data breach notifications: 

Key Lessons  

It's imperative for every organization to have complete visibility of where sensitive data resides. Automated discovery ensures the consistent application of protection. For four years, the data of Illinois residents was available online. Having an always-up-to-date inventory of this data can prevent such misconfigurations. 

Identity access control (IAC) plays a key role in thwarting unauthorized access, but relying on it as the last line of defense has shortcomings. Managing specific access can be cumbersome, but some platforms can streamline this. Also, protecting data through encryption, masking, or redaction means that exfiltrated data is mostly useless. 

Ledger and Global-e

Ledger, a crypto wallet platform, confirmed a customer data breach related to its e-commerce payment partner, Global-e. While there were no crypto assets stolen, hackers later used this information in phishing campaigns.  

  • Scale of breach: Unknown 
  • Data exposed: Name, addresses, email addresses, phone numbers, and order details. 
  • Breach cause: The company identified unusual activity in its cloud systems and moved to secure it. They did not disclose the root cause.  

Key Lessons  

Companies should adopt persistent encryption and protection across all environments. With such a proactive strategy in place, organizations can protect across the enterprise. When security is data-centric, it reduces the effect of breaches.

Cloud-Sharing Sites  

The threat actor Zestix has been selling corporate data stolen from multiple companies. They are acting as an initial access broker (IAB) on the dark web. The hack occurred due to stolen credentials. ShareFile, Nextcloud, and OwnCloud were all victims of the attack. There were impact organizations across many sectors, including aviation, defense, healthcare, utilities, mass transit, telecom, legal, real estate, and government. 

  • Scale of breach: Unknown 
  • Data exposed: Highly sensitive corporate data, including health records and government contracts. 
  • Breach cause: Stolen credentials and lack of multi-factor authentication 

Key Lessons 

Cloud exposure has been a risk component for many years. Unfortunately, there are systemic issues regarding the use of best practices. MFA has become mandatory in many regulations. Will this alone be enough to reduce unauthorized access? No, but enterprise-wide data encryption, redaction, and masking limit the fallout of such an attack. 

On January 24, Nike launched an investigation into a possible cyber attack. This action came after WorldLeaks claimed it had stolen and posted 1.4 terabytes of internal company data.  

  • Scale of breach: 1.4 terabytes of company data 
  • Date exposed: Product development intellectual property and supply chain logistics 
  • Breach cause: Not defined, but threat intelligence firms have suggested a connection to supply chain infrastructure. 
  • Breach report: The National CIO Review provided an extensive review of the attack and leak. 

Lessons Learned 

This data breach involves corporate data versus customer data. Investigators did not find personal identifiers. However, the leak of IP and other trade secrets could have been of value to competitors.  

Organizations should enforce security controls and cybersecurity best practices with supply chain vendors. Additionally, security embedded into data follows it wherever it goes. 

Crunchbase 

Crunchbase confirmed a data breach in January after a hack. ShinyHunters, a cybercrime group, claimed responsibility. The company revealed there was file exfiltration but said there were no operational disruptions. The incident is still under investigation, and they have yet to send any notifications to customers.  

  • Scale of breach: Two million records 
  • Data exposed: PII and corporate data (e.g., contracts and internal documents) 
  • Breach cause: Social engineering campaign using voice phishing techniques 
  • Breach report: SecurityWeek was the first to report the story and received confirmation from Crunchbase. 

Lessons Learned 

Social engineering, especially deepfakes, is much more sophisticated than ever before. They are emerging as a key way for hackers to compromise credentials. While you can't eliminate all breach risk, you can take proactive steps to minimize the impact. Examples include: 

  • Using encryption mechanisms that stay with data 
  • Applying data discovery and classification solutions to build an inventory of sensitive information 

Match Group

The family of Match dating apps finishes out the list of the major 2026 data breaches in January. ShinyHunters was also the cyber criminal in this case. The group claimed they have millions of documents, while Match called it a "security incident" that is still under investigation.  

  • Scale of breach: 10 million records 
  • Data exposed: User and corporate data 
  • Breach cause: According to ShinyHunters dark web leak site, it cited AppsFlyer as the entry point. AppsFlyer is a marketing analytics company for apps.  
  • Breach report: The Register published a review of the breach and exposures.  

Lessons Learned 

It appears this is another third-party system failure. Data sharing for analytics is essential to any business but carries risk. Secure data exchange, internally or externally, with modern encryption allows for access while safeguarding data.  

See How Smart Data Security Reduces Breach Impact

Discover how much time, cost, and risk you can save with intelligent data discovery and posture management. Our interactive Data Breach Calculator helps you quantify the business impact—from reduced compliance overhead to minimized data exposure.

ROI Calculator
Share on social media
2026 Data Breaches: Cybersecurity Incidents Explained

Data breaches are part of the modern digital world. Why they happen varies, but there’s almost always a negative consequence for companies and their customers. Each month, we’ll reveal the latest 2026 data breaches, along with the scope and key lessons for security professionals to consider to prevent or limit exposure should one occur.

Data Breaches from January 2026

We’re kicking off 2026 data breaches with a review of January. The incidents in January cover multiple industries. What’s unique about this batch is that there was data exposure of both consumers and corporations. Explore the cases in January and the key insights into preventing these in your organization.

Illinois and Minnesota Department of Human Services

Both Illinois and Minnesota experienced a system failure that exposed the personal data of nearly one million people. In the Illinois incident, sensitive information was on display publicly and was visible for four years. 

The Minnesota breach was the result of excessive internal access, leading to improper disclosure.  

  • Scale of breach: Around one million individuals 
  • Data exposed: Names, addresses, case numbers, case status, and referral information (Illinois); names, addresses, email addresses, dates of birth, phone numbers, Medicaid ID, the first four digits of Social Security numbers, and other protected information (Minnesota). 
  • Breach cause: In Illinois, an error caused patient data to be publicly viewable. In Minnesota, the culprit was unauthorized access to data that was outside the scope of their work assignments.  
  • Data breach notifications: 

Key Lessons  

It's imperative for every organization to have complete visibility of where sensitive data resides. Automated discovery ensures the consistent application of protection. For four years, the data of Illinois residents was available online. Having an always-up-to-date inventory of this data can prevent such misconfigurations. 

Identity access control (IAC) plays a key role in thwarting unauthorized access, but relying on it as the last line of defense has shortcomings. Managing specific access can be cumbersome, but some platforms can streamline this. Also, protecting data through encryption, masking, or redaction means that exfiltrated data is mostly useless. 

Ledger and Global-e

Ledger, a crypto wallet platform, confirmed a customer data breach related to its e-commerce payment partner, Global-e. While there were no crypto assets stolen, hackers later used this information in phishing campaigns.  

  • Scale of breach: Unknown 
  • Data exposed: Name, addresses, email addresses, phone numbers, and order details. 
  • Breach cause: The company identified unusual activity in its cloud systems and moved to secure it. They did not disclose the root cause.  

Key Lessons  

Companies should adopt persistent encryption and protection across all environments. With such a proactive strategy in place, organizations can protect across the enterprise. When security is data-centric, it reduces the effect of breaches.

Cloud-Sharing Sites  

The threat actor Zestix has been selling corporate data stolen from multiple companies. They are acting as an initial access broker (IAB) on the dark web. The hack occurred due to stolen credentials. ShareFile, Nextcloud, and OwnCloud were all victims of the attack. There were impact organizations across many sectors, including aviation, defense, healthcare, utilities, mass transit, telecom, legal, real estate, and government. 

  • Scale of breach: Unknown 
  • Data exposed: Highly sensitive corporate data, including health records and government contracts. 
  • Breach cause: Stolen credentials and lack of multi-factor authentication 

Key Lessons 

Cloud exposure has been a risk component for many years. Unfortunately, there are systemic issues regarding the use of best practices. MFA has become mandatory in many regulations. Will this alone be enough to reduce unauthorized access? No, but enterprise-wide data encryption, redaction, and masking limit the fallout of such an attack. 

On January 24, Nike launched an investigation into a possible cyber attack. This action came after WorldLeaks claimed it had stolen and posted 1.4 terabytes of internal company data.  

  • Scale of breach: 1.4 terabytes of company data 
  • Date exposed: Product development intellectual property and supply chain logistics 
  • Breach cause: Not defined, but threat intelligence firms have suggested a connection to supply chain infrastructure. 
  • Breach report: The National CIO Review provided an extensive review of the attack and leak. 

Lessons Learned 

This data breach involves corporate data versus customer data. Investigators did not find personal identifiers. However, the leak of IP and other trade secrets could have been of value to competitors.  

Organizations should enforce security controls and cybersecurity best practices with supply chain vendors. Additionally, security embedded into data follows it wherever it goes. 

Crunchbase 

Crunchbase confirmed a data breach in January after a hack. ShinyHunters, a cybercrime group, claimed responsibility. The company revealed there was file exfiltration but said there were no operational disruptions. The incident is still under investigation, and they have yet to send any notifications to customers.  

  • Scale of breach: Two million records 
  • Data exposed: PII and corporate data (e.g., contracts and internal documents) 
  • Breach cause: Social engineering campaign using voice phishing techniques 
  • Breach report: SecurityWeek was the first to report the story and received confirmation from Crunchbase. 

Lessons Learned 

Social engineering, especially deepfakes, is much more sophisticated than ever before. They are emerging as a key way for hackers to compromise credentials. While you can't eliminate all breach risk, you can take proactive steps to minimize the impact. Examples include: 

  • Using encryption mechanisms that stay with data 
  • Applying data discovery and classification solutions to build an inventory of sensitive information 

Match Group

The family of Match dating apps finishes out the list of the major 2026 data breaches in January. ShinyHunters was also the cyber criminal in this case. The group claimed they have millions of documents, while Match called it a "security incident" that is still under investigation.  

  • Scale of breach: 10 million records 
  • Data exposed: User and corporate data 
  • Breach cause: According to ShinyHunters dark web leak site, it cited AppsFlyer as the entry point. AppsFlyer is a marketing analytics company for apps.  
  • Breach report: The Register published a review of the breach and exposures.  

Lessons Learned 

It appears this is another third-party system failure. Data sharing for analytics is essential to any business but carries risk. Secure data exchange, internally or externally, with modern encryption allows for access while safeguarding data.  

See How Smart Data Security Reduces Breach Impact

Discover how much time, cost, and risk you can save with intelligent data discovery and posture management. Our interactive Data Breach Calculator helps you quantify the business impact—from reduced compliance overhead to minimized data exposure.

ROI Calculator
Share on social media