2026 Data Breaches: Cybersecurity Incidents Explained

Beth Osborne
Blog
February 9, 2026
2026 Data Breaches: Cybersecurity Incidents Explained

Data breaches are part of the modern digital world. Why they happen varies, but there’s almost always a negative consequence for companies and their customers. Each month, we’ll reveal the latest 2026 data breaches, along with the scope and key lessons for security professionals to consider to prevent or limit exposure should one occur.

Data Breaches from January 2026

We’re kicking off 2026 data breaches with a review of January. The incidents in January cover multiple industries. What’s unique about this batch is that there was exposure of both consumer and corporate data. Explore the cases in January and the key insights into preventing these in your organization.

Illinois and Minnesota Department of Human Services

Both Illinois and Minnesota experienced a system failure that exposed the personal data of nearly one million people. In the Illinois incident, sensitive information was on display publicly and was visible for four years. 

The Minnesota breach was the result of excessive internal access, leading to improper disclosure.  

  • Scale of breach: Around one million individuals 
  • Data exposed: Names, addresses, case numbers, case status, and referral information (Illinois); names, addresses, email addresses, dates of birth, phone numbers, Medicaid ID, the first four digits of Social Security numbers, and other protected information (Minnesota). 
  • Breach cause: In Illinois, an error caused patient data to be publicly viewable. In Minnesota, the culprit was unauthorized access to data that was outside the scope of employee work assignments. 
  • Data breach notifications: 

Key Lessons  

It's imperative for every organization to have complete visibility of where sensitive data resides. Automated discovery provides this visibility enterprise-wide and centralized, policy-based protection ensures consistent security of data. For four years, the data of Illinois residents was available online. Having an always-up-to-date inventory with data-centric protection can prevent such exposure.

Identity access control (IAC) plays a key role in thwarting unauthorized access, but relying on it as the last line of defense has shortcomings. IAC doesn't truly protect your critical data and sensitive data can be exposed if data moves or credentials are compromised. Protecting data through encryption, masking, or redaction secures data at rest and in motion and ensures that exfiltrated data is useless to bad actors.

Ledger and Global-e

Ledger, a crypto wallet platform, confirmed a customer data breach related to its e-commerce payment partner, Global-e. While there were no crypto assets stolen, hackers later used this information in phishing campaigns.  

  • Scale of breach: Unknown 
  • Data exposed: Name, addresses, email addresses, phone numbers, and order details. 
  • Breach cause: The company identified unusual activity in its cloud systems and moved to secure it. They did not disclose the root cause.  

Key Lessons  

Companies should adopt persistent encryption and protection across all environments. With such a proactive strategy in place, organizations can protect across the enterprise. When security is data-centric, it reduces the effect of breaches.

Cloud-Sharing Sites  

Data-Centric Security to Eliminate Exposure The threat actor Zestix has been selling corporate data stolen from multiple companies. They are acting as an initial access broker (IAB) on the dark web. The hack occurred due to stolen credentials. ShareFile, Nextcloud, and OwnCloud were all victims of the attack. There were impacted organizations across many sectors, including aviation, defense, healthcare, utilities, mass transit, telecom, legal, real estate, and government. 

  • Scale of breach: Unknown 
  • Data exposed: Highly sensitive corporate data, including health records and government contracts. 
  • Breach cause: Stolen credentials and lack of multi-factor authentication 

Key Lessons 

Cloud exposure has been a risk component for many years. MFA has become mandatory in many regulations. Will this alone be enough to reduce unauthorized access? No, but enterprise-wide data encryption, redaction, and masking limit the fallout of such an attack. 

Nike

On January 24, Nike launched an investigation into a possible cyber attack. This action came after WorldLeaks claimed it had stolen and posted 1.4 terabytes of internal company data.  

  • Scale of breach: 1.4 terabytes of company data 
  • Date exposed: Product development intellectual property and supply chain logistics 
  • Breach cause: Not defined, but threat intelligence firms have suggested a connection to supply chain infrastructure. 
  • Breach report: The National CIO Review provided an extensive review of the attack and leak. 

Key Lessons

This data breach involves corporate data versus customer data. Investigators did not find personal identifiers. However, the leak of IP and other trade secrets could have been of value to competitors.  

Organizations should enforce security controls and cybersecurity best practices with supply chain vendors. Additionally, security embedded into data follows it wherever it goes. 

Crunchbase 

Crunchbase confirmed a data breach in January after a hack. ShinyHunters, a cybercrime group, claimed responsibility. The company revealed there was file exfiltration but said there were no operational disruptions. The incident is still under investigation, and they have yet to send any notifications to customers.  

  • Scale of breach: Two million records 
  • Data exposed: PII and corporate data (e.g., contracts and internal documents) 
  • Breach cause: Social engineering campaign using voice phishing techniques 
  • Breach report: SecurityWeek was the first to report the story and received confirmation from Crunchbase. 

Key Lessons

Social engineering, especially deepfakes, is much more sophisticated than ever before. They are emerging as a key way for hackers to compromise credentials. While you can't eliminate all breach risk, you can take proactive steps to minimize the impact. Examples include: 

  • Using encryption mechanisms that stay with data 
  • Applying data discovery and classification solutions to build an inventory of sensitive information 

Match Group

Prevent Exposure Before it HappensThe family of Match dating apps finishes out the list of the major 2026 data breaches in January. ShinyHunters was also the cyber criminal in this case. The group claimed they have millions of documents, while Match called it a "security incident" that is still under investigation.  

  • Scale of breach: 10 million records 
  • Data exposed: User and corporate data 
  • Breach cause: According to ShinyHunters dark web leak site, it cited AppsFlyer as the entry point. AppsFlyer is a marketing analytics company for apps.  
  • Breach report: The Register published a review of the breach and exposures.  

Key Lessons

It appears this is another third-party system failure. Data sharing for analytics is essential to any business but carries risk. Secure data exchange, internally or externally, with modern encryption allows for access while safeguarding data.  

See How Smart Data Security Reduces Breach Impact

Discover how much time, cost, and risk you can save with intelligent data discovery and posture management. Our interactive Data Breach Calculator helps you quantify the business impact—from reduced compliance overhead to minimized data exposure.

ROI Calculator
Share on social media
2026 Data Breaches: Cybersecurity Incidents Explained

Data breaches are part of the modern digital world. Why they happen varies, but there’s almost always a negative consequence for companies and their customers. Each month, we’ll reveal the latest 2026 data breaches, along with the scope and key lessons for security professionals to consider to prevent or limit exposure should one occur.

Data Breaches from January 2026

We’re kicking off 2026 data breaches with a review of January. The incidents in January cover multiple industries. What’s unique about this batch is that there was exposure of both consumer and corporate data. Explore the cases in January and the key insights into preventing these in your organization.

Illinois and Minnesota Department of Human Services

Both Illinois and Minnesota experienced a system failure that exposed the personal data of nearly one million people. In the Illinois incident, sensitive information was on display publicly and was visible for four years. 

The Minnesota breach was the result of excessive internal access, leading to improper disclosure.  

  • Scale of breach: Around one million individuals 
  • Data exposed: Names, addresses, case numbers, case status, and referral information (Illinois); names, addresses, email addresses, dates of birth, phone numbers, Medicaid ID, the first four digits of Social Security numbers, and other protected information (Minnesota). 
  • Breach cause: In Illinois, an error caused patient data to be publicly viewable. In Minnesota, the culprit was unauthorized access to data that was outside the scope of employee work assignments. 
  • Data breach notifications: 

Key Lessons  

It's imperative for every organization to have complete visibility of where sensitive data resides. Automated discovery provides this visibility enterprise-wide and centralized, policy-based protection ensures consistent security of data. For four years, the data of Illinois residents was available online. Having an always-up-to-date inventory with data-centric protection can prevent such exposure.

Identity access control (IAC) plays a key role in thwarting unauthorized access, but relying on it as the last line of defense has shortcomings. IAC doesn't truly protect your critical data and sensitive data can be exposed if data moves or credentials are compromised. Protecting data through encryption, masking, or redaction secures data at rest and in motion and ensures that exfiltrated data is useless to bad actors.

Ledger and Global-e

Ledger, a crypto wallet platform, confirmed a customer data breach related to its e-commerce payment partner, Global-e. While there were no crypto assets stolen, hackers later used this information in phishing campaigns.  

  • Scale of breach: Unknown 
  • Data exposed: Name, addresses, email addresses, phone numbers, and order details. 
  • Breach cause: The company identified unusual activity in its cloud systems and moved to secure it. They did not disclose the root cause.  

Key Lessons  

Companies should adopt persistent encryption and protection across all environments. With such a proactive strategy in place, organizations can protect across the enterprise. When security is data-centric, it reduces the effect of breaches.

Cloud-Sharing Sites  

Data-Centric Security to Eliminate Exposure The threat actor Zestix has been selling corporate data stolen from multiple companies. They are acting as an initial access broker (IAB) on the dark web. The hack occurred due to stolen credentials. ShareFile, Nextcloud, and OwnCloud were all victims of the attack. There were impacted organizations across many sectors, including aviation, defense, healthcare, utilities, mass transit, telecom, legal, real estate, and government. 

  • Scale of breach: Unknown 
  • Data exposed: Highly sensitive corporate data, including health records and government contracts. 
  • Breach cause: Stolen credentials and lack of multi-factor authentication 

Key Lessons 

Cloud exposure has been a risk component for many years. MFA has become mandatory in many regulations. Will this alone be enough to reduce unauthorized access? No, but enterprise-wide data encryption, redaction, and masking limit the fallout of such an attack. 

Nike

On January 24, Nike launched an investigation into a possible cyber attack. This action came after WorldLeaks claimed it had stolen and posted 1.4 terabytes of internal company data.  

  • Scale of breach: 1.4 terabytes of company data 
  • Date exposed: Product development intellectual property and supply chain logistics 
  • Breach cause: Not defined, but threat intelligence firms have suggested a connection to supply chain infrastructure. 
  • Breach report: The National CIO Review provided an extensive review of the attack and leak. 

Key Lessons

This data breach involves corporate data versus customer data. Investigators did not find personal identifiers. However, the leak of IP and other trade secrets could have been of value to competitors.  

Organizations should enforce security controls and cybersecurity best practices with supply chain vendors. Additionally, security embedded into data follows it wherever it goes. 

Crunchbase 

Crunchbase confirmed a data breach in January after a hack. ShinyHunters, a cybercrime group, claimed responsibility. The company revealed there was file exfiltration but said there were no operational disruptions. The incident is still under investigation, and they have yet to send any notifications to customers.  

  • Scale of breach: Two million records 
  • Data exposed: PII and corporate data (e.g., contracts and internal documents) 
  • Breach cause: Social engineering campaign using voice phishing techniques 
  • Breach report: SecurityWeek was the first to report the story and received confirmation from Crunchbase. 

Key Lessons

Social engineering, especially deepfakes, is much more sophisticated than ever before. They are emerging as a key way for hackers to compromise credentials. While you can't eliminate all breach risk, you can take proactive steps to minimize the impact. Examples include: 

  • Using encryption mechanisms that stay with data 
  • Applying data discovery and classification solutions to build an inventory of sensitive information 

Match Group

Prevent Exposure Before it HappensThe family of Match dating apps finishes out the list of the major 2026 data breaches in January. ShinyHunters was also the cyber criminal in this case. The group claimed they have millions of documents, while Match called it a "security incident" that is still under investigation.  

  • Scale of breach: 10 million records 
  • Data exposed: User and corporate data 
  • Breach cause: According to ShinyHunters dark web leak site, it cited AppsFlyer as the entry point. AppsFlyer is a marketing analytics company for apps.  
  • Breach report: The Register published a review of the breach and exposures.  

Key Lessons

It appears this is another third-party system failure. Data sharing for analytics is essential to any business but carries risk. Secure data exchange, internally or externally, with modern encryption allows for access while safeguarding data.  

See How Smart Data Security Reduces Breach Impact

Discover how much time, cost, and risk you can save with intelligent data discovery and posture management. Our interactive Data Breach Calculator helps you quantify the business impact—from reduced compliance overhead to minimized data exposure.

ROI Calculator
Share on social media