{"id":28248,"date":"2019-08-05T14:42:20","date_gmt":"2019-08-05T14:42:20","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/30364\/Equifax-And-Beyond-A-List-Of-Major-Breaches.html"},"modified":"2019-08-05T14:42:20","modified_gmt":"2019-08-05T14:42:20","slug":"equifax-and-beyond-a-list-of-major-breaches","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/equifax-and-beyond-a-list-of-major-breaches\/","title":{"rendered":"Equifax And Beyond: A List Of Major Breaches"},"content":{"rendered":"<p><span class=\"imageContainer\"><span><img decoding=\"async\" src=\"https:\/\/cnet3.cbsistatic.com\/img\/lFve3SDlSsElqOg80tB0YGa5BtQ=\/2019\/08\/02\/87b94bc0-5b07-4ee1-be7a-df243395b0ad\/gettyimages-1158660560.jpg\" class alt=\"Capital One\"><\/span><\/span><\/p>\n<p><span class=\"caption\">Capital One is the latest to suffer a massive data breach at the hands of hackers.&nbsp;<\/span><\/p>\n<p><span class=\"credit\">Johannes Eisele\/AFP\/Getty Images<\/span><\/p>\n<p class=\"speakableTextP1\">Data breaches are scary. Scariest of all is that they can come at any time, to any of the financial institutions you trust. Hackers take advantage of loopholes in institutions&#8217; servers and security protections to steal your most personal and sensitive information &#8212; credit and debit card numbers, Social Security data, your birth date and maybe even where you live.<\/p>\n<p class=\"speakableTextP2\">While you can&#8217;t foresee an attack, you can certainly <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/how-to-protect-yourself-in-a-data-breach-if-your-bank-gets-hacked\/\">take steps to protect yourself<\/a><\/span> from further harm by <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/scammers-want-to-steal-your-id-with-fake-equifax-settlement-sites-dont-let-them\/\">avoiding fraudulent scams<\/a><\/span> and being vigilant about <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/5-best-ways-to-make-sure-your-credit-data-hasnt-been-breached\/\">monitoring your credit and credit card charges<\/a><\/span>.<\/p>\n<p>Here are some, not all, of the biggest ones the US has experienced in recent history:<\/p>\n<h2>Capital One&nbsp;<\/h2>\n<p><span class=\"imageContainer\"><span><img decoding=\"async\" src=\"https:\/\/www.cnet.com\/how-to\/equifax-and-beyond-every-major-security-breach-and-data-hack-so-far\/\" class=\"lazy\" alt=\"Capital One Financial's offices in San Francisco\" data-original=\"https:\/\/cnet3.cbsistatic.com\/img\/-AogPWR2gnZ85dEQtIiMWEv0yWM=\/2019\/07\/30\/41bc11f5-1def-411a-bfcf-a5014eb80fc2\/20190325-capitalone-bank-san-francisco-001.jpg\"><\/span><noscript><\/p>\n<p><span><img decoding=\"async\" src=\"https:\/\/cnet3.cbsistatic.com\/img\/-AogPWR2gnZ85dEQtIiMWEv0yWM=\/2019\/07\/30\/41bc11f5-1def-411a-bfcf-a5014eb80fc2\/20190325-capitalone-bank-san-francisco-001.jpg\" class alt=\"Capital One Financial's offices in San Francisco\"><\/span><\/p>\n<p><\/noscript><\/span><\/p>\n<p><span class=\"caption\">Capital One Financial&#8217;s offices in San Francisco.<\/span><\/p>\n<p><span class=\"credit\">Stephen Shankland\/CNET<\/span><\/p>\n<p><strong>When:<\/strong> July 30, 2019<\/p>\n<p><strong>Number of people affected:<\/strong> 100 million people<\/p>\n<p><strong>What happened:&nbsp;<\/strong>Financial corporation <a href=\"https:\/\/www.cnet.com\/news\/capital-one-data-breach-involves-100-million-credit-card-applications\/\">Capital One suffered a data breach<\/a> that impacted 100 million credit card applications, 140,000 Social Security numbers and 80,000 bank account numbers. If you applied for a card in the US between 2005 and 2019, you&#8217;re likely part of the breach, according to the bank.&nbsp;<\/p>\n<p>Capital One said that no credit card account numbers or log-in credentials were exposed. The breach still affected names, addresses, ZIP codes, phone numbers, email addresses and birth dates. The FBI arrested Paige A. Thompson, a tech worker who goes by &#8220;erratic&#8221;. Thompson was charged with computer fraud and abuse for the hack.&nbsp;<\/p>\n<p>Capital One has been reaching out to impacted customers, but in the meantime, <a href=\"https:\/\/www.cnet.com\/how-to\/capital-one-data-breach-find-out-if-you-were-hacked-and-what-you-can-do\/\">you can take steps to monitor your accounts for fraud<\/a>.&nbsp;<\/p>\n<h2>Equifax<\/h2>\n<p><span class=\"imageContainer\"><span><img decoding=\"async\" src=\"https:\/\/www.cnet.com\/how-to\/equifax-and-beyond-every-major-security-breach-and-data-hack-so-far\/\" class=\"lazy\" alt=\"Equifax\" data-original=\"https:\/\/cnet3.cbsistatic.com\/img\/jnS0w9J7HU6znGEhQy7Cmt5HL_0=\/2019\/08\/02\/123979df-6596-4039-b87e-6a9a971480fb\/gettyimages-1147880673.jpg\"><\/span><noscript><\/p>\n<p><span><img decoding=\"async\" src=\"https:\/\/cnet3.cbsistatic.com\/img\/jnS0w9J7HU6znGEhQy7Cmt5HL_0=\/2019\/08\/02\/123979df-6596-4039-b87e-6a9a971480fb\/gettyimages-1147880673.jpg\" class alt=\"Equifax\"><\/span><\/p>\n<p><\/noscript><\/span><\/p>\n<p><span class=\"caption\">You can still check to see if you were affected by this hack.<\/span><\/p>\n<p><span class=\"credit\">SOPA Images\/Getty Images<\/span><\/p>\n<p><strong>When:<\/strong> Approximately mid-May 2017<\/p>\n<p><strong>Number of people affected:<\/strong> About 143 million people<\/p>\n<p><strong>What happened:&nbsp;<\/strong>Hackers stole customer names, Social Security numbers, birthdates and addresses in a <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/your-guide-to-surviving-equifax-data-breach\/\">hack that stretched for three months<\/a><\/span>. In addition, hackers nabbed 209,000 credit card numbers and 182,000 documents containing personal information. It&#8217;s unclear what the hackers did with the data during that time. The company estimates that <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/equifax-data-leak-hits-nearly-half-of-the-us-population\/\">half of the US population<\/a><\/span> was affected, but didn&#8217;t include international victims. It was the biggest known leak of 2017.&nbsp;<\/p>\n<p><span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/equifax-settlement-discover-if-youre-eligible-file-a-claim-see-what-youll-get\/\">You can still check to see if you were affected<\/a><\/span>, worthwhile since <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/equifax-breach-how-to-claim-up-to-125-in-ftc-settlement\/\">you might get reimbursed for it<\/a><\/span>. The credit reporting company agreed to pay between <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/equifax-to-pay-at-least-575m-as-part-of-ftc-settlement\/\">$575 million and up to $700 million<\/a><\/span> on July 22 as part of a <span class=\"link\" section=\"shortcodeLink\"><a href=\"https:\/\/www.cnet.com\/news\/equifax-breach-how-to-claim-up-to-125-in-ftc-settlement\/\">settlement with the Federal Trade Commission<\/a><\/span>. &nbsp;<\/p>\n<h2>Marriott&nbsp;<\/h2>\n<p><span class=\"imageContainer\"><span><img decoding=\"async\" src=\"https:\/\/www.cnet.com\/how-to\/equifax-and-beyond-every-major-security-breach-and-data-hack-so-far\/\" class=\"lazy\" alt=\"Marriott\" data-original=\"https:\/\/cnet2.cbsistatic.com\/img\/LnGJ2BZCOXEdsbPORJWT2P5gf_E=\/2019\/08\/02\/3ac21dd9-169a-4415-aa23-6eb433b7c1fa\/gettyimages-971892150.jpg\"><\/span><noscript><\/p>\n<p><span><img decoding=\"async\" src=\"https:\/\/cnet2.cbsistatic.com\/img\/LnGJ2BZCOXEdsbPORJWT2P5gf_E=\/2019\/08\/02\/3ac21dd9-169a-4415-aa23-6eb433b7c1fa\/gettyimages-971892150.jpg\" class alt=\"Marriott\"><\/span><\/p>\n<p><\/noscript><\/span><\/p>\n<p><span class=\"caption\">The Starwood Hotels group, bought by Marriott in 2014, was hit by a hacking campaign.&nbsp;<\/span><\/p>\n<p><span class=\"credit\">Roberto Machado Noa\/Getty Images<\/span><\/p>\n<p><strong>When:<\/strong> 2014-2018<\/p>\n<p><strong>Number of people affected:<\/strong> 383 million<\/p>\n<p><strong>What happened:&nbsp;<\/strong>Malware infected the security systems of Starwood Hotels &#8212; which includes Sheraton, W Hotels, Westin, Le Meridien, Four Points by Sheraton, Aloft and St. Regis &#8212; in 2014, and the Marriott hotel group then acquired Starwood in 2016. In November 2018, Marriott discovered and revealed a <a href=\"https:\/\/www.cnet.com\/news\/marriott-data-breach-impacts-500-million-starwood-hotel-guests\/\">four-year hacking campaign that attacked Starwood&#8217;s reservation database<\/a>. Lawmakers demanded data privacy and security protections going forward.<\/p>\n<p>The 500 million guests originally thought to impacted was <a href=\"https:\/\/www.cnet.com\/news\/marriott-says-hackers-stole-more-than-5-million-passport-numbers\/\">lowered to 383 million<\/a> this past January. In addition to <a href=\"https:\/\/www.cnet.com\/news\/marriott-says-hackers-stole-more-than-5-million-passport-numbers\/\">names, addresses, phone numbers, credit card information and email addresses<\/a>, hackers also swiped millions of unencrypted <a href=\"https:\/\/www.cnet.com\/news\/marriott-breach-what-to-do-when-hackers-steal-your-passport-number\/\">passport numbers<\/a>.&nbsp;<\/p>\n<h2>Facebook<\/h2>\n<p><span class=\"imageContainer\"><span><img decoding=\"async\" src=\"https:\/\/www.cnet.com\/how-to\/equifax-and-beyond-every-major-security-breach-and-data-hack-so-far\/\" class=\"lazy\" alt=\"facebook-logo-1\" data-original=\"https:\/\/cnet4.cbsistatic.com\/img\/tz7X-aG9GQzoEB2U8HWGr_xdo-A=\/2019\/07\/25\/3b90add6-b5a5-4fb5-ab78-d462c14d6d9d\/facebook-logo-1.jpg\"><\/span><noscript><\/p>\n<p><span><img decoding=\"async\" src=\"https:\/\/cnet4.cbsistatic.com\/img\/tz7X-aG9GQzoEB2U8HWGr_xdo-A=\/2019\/07\/25\/3b90add6-b5a5-4fb5-ab78-d462c14d6d9d\/facebook-logo-1.jpg\" class alt=\"facebook-logo-1\"><\/span><\/p>\n<p><\/noscript><\/span><\/p>\n<p><span class=\"caption\">Facebook was the victim of one of the most infamous hacks ever.<\/span><\/p>\n<p><span class=\"credit\">Angela Lang\/CNET<\/span><\/p>\n<p><strong>When:<\/strong> 2016-2018<\/p>\n<p><strong>Number of people affected:<\/strong> 87 million<\/p>\n<p><strong>What happened:&nbsp;<\/strong>Facebook&#8217;s <a href=\"https:\/\/www.cnet.com\/tags\/cambridge-analytica\/\" data-annotation=\"true\" data-component=\"linkTracker\" data-link-tracker-options=\"{&quot;action&quot;:&quot;inline-annotation|Cambridge Analytica|CNET_TAG|221&quot;}\">Cambridge Analytica<\/a> scandal isn&#8217;t the most recent or the biggest, but it&#8217;s arguably the most infamous. In a nutshell, the popular social media site was <a href=\"https:\/\/www.cnet.com\/news\/facebook-cambridge-analytica-data-mining-and-trump-what-you-need-to-know\/\">tricked by researchers who gained access to Facebook user data<\/a>. The researchers then misused the data for political ads during the 2016 US presidential election.&nbsp;<\/p>\n<p>The number of people whose data was compromised quickly rose to <a href=\"https:\/\/www.cnet.com\/news\/facebook-says-cambridge-analytica-had-data-on-87m-people\/\">87 million by last April<\/a>.<\/p>\n<p>The data firm was also linked to then-presidential candidate Donald Trump. Trump&#8217;s campaign hired Cambridge Analytica <a href=\"https:\/\/www.wired.com\/story\/what-did-cambridge-analytica-really-do-for-trumps-campaign\/\" target=\"_blank\" data-component=\"externalLink\" rel=\"noopener noreferrer\">to run data operations<\/a> during the 2016 election. Steve Bannon, who would become Trump&#8217;s chief strategist, <a href=\"https:\/\/www.politico.com\/story\/2017\/04\/bannon-resign-mercer-trump-236939\" target=\"_blank\" data-component=\"externalLink\" rel=\"noopener noreferrer\">was also reportedly vice president of Cambridge Analytica&#8217;s board<\/a>. The company helped the campaign identify voters to target with ads, and gave advice on how best to <a href=\"https:\/\/www.techrepublic.com\/article\/cambridge-analytica-the-future-of-political-data-is-in-the-enterprise\/\" target=\"_blank\" data-component=\"externalLink\" rel=\"noopener noreferrer\">focus its approach<\/a>, such as where to make campaign stops. It also helped with strategic communication, like what to say in speeches.<\/p>\n<h2>Anthem<\/h2>\n<p><span class=\"imageContainer\"><span><img decoding=\"async\" src=\"https:\/\/www.cnet.com\/how-to\/equifax-and-beyond-every-major-security-breach-and-data-hack-so-far\/\" class=\"lazy\" alt=\"Anthem Health Insurance\" data-original=\"https:\/\/cnet2.cbsistatic.com\/img\/9AUVhUF632mlVocDdMboOtTRGiY=\/2019\/08\/02\/78ef2398-8046-45c5-9915-6e630b33c453\/gettyimages-462788356.jpg\"><\/span><noscript><\/p>\n<p><span><img decoding=\"async\" src=\"https:\/\/cnet2.cbsistatic.com\/img\/9AUVhUF632mlVocDdMboOtTRGiY=\/2019\/08\/02\/78ef2398-8046-45c5-9915-6e630b33c453\/gettyimages-462788356.jpg\" class alt=\"Anthem Health Insurance\"><\/span><\/p>\n<p><\/noscript><\/span><\/p>\n<p><span class=\"caption\">Anthem had to pay $115 million to settle a data breach class-action lawsuit.&nbsp;<\/span><\/p>\n<p><span class=\"credit\">Aaron P. Bernstein\/Getty Images<\/span><\/p>\n<p><strong>When:<\/strong> 2015<\/p>\n<p><strong>Number of people affected:<\/strong> 80 million<\/p>\n<p><strong>What happened:&nbsp;<\/strong>The <a href=\"https:\/\/www.cnet.com\/news\/hack-of-health-insurer-anthem-may-have-exposed-data-of-millions\/\">hackers that infiltrated Anthem Insurance<\/a> swiped the names, dates of birth, member ID, Social Security numbers, addresses and more of almost 80 million current (at the time) and former employees. Shortly after the hack was revealed, the attorney general accused Anthem of <a href=\"https:\/\/www.cnet.com\/news\/anthem-accused-of-failure-to-inform-customers-affected-by-hack\/\">failing to communicate the gravity of the situation<\/a> to customers. In June 2017, Anthem agreed to <a href=\"https:\/\/www.cnet.com\/news\/anthem-would-pay-record-115m-to-settle-data-breach-suit\/\">pay $115 million to settle the data breach class-action lawsuit<\/a> from the 2015 hack. &nbsp;<\/p>\n<h2>Yahoo<strong>&nbsp;<br \/><\/strong><\/h2>\n<p><span class=\"imageContainer\"><span><img decoding=\"async\" src=\"https:\/\/www.cnet.com\/how-to\/equifax-and-beyond-every-major-security-breach-and-data-hack-so-far\/\" class=\"lazy\" alt=\"Yahoo getty\" data-original=\"https:\/\/cnet3.cbsistatic.com\/img\/Cn2Oc3V0uv7VcwwG31k_wG_5_6Y=\/2019\/08\/02\/0e192ebf-cecd-4d89-875b-c4e38bb28860\/gettyimages-1158922727.jpg\"><\/span><noscript><\/p>\n<p><span><img decoding=\"async\" src=\"https:\/\/cnet3.cbsistatic.com\/img\/Cn2Oc3V0uv7VcwwG31k_wG_5_6Y=\/2019\/08\/02\/0e192ebf-cecd-4d89-875b-c4e38bb28860\/gettyimages-1158922727.jpg\" class alt=\"Yahoo getty\"><\/span><\/p>\n<p><\/noscript><\/span><\/p>\n<p><span class=\"caption\">Yahoo was hit in 2013.<\/span><\/p>\n<p><span class=\"credit\">SOPA Images\/Getty Images<\/span><\/p>\n<p><strong>When:<\/strong> 2013- 2014<\/p>\n<p><strong>Number of people affected:<\/strong> 3 billion<\/p>\n<p><strong>What happened:&nbsp;<\/strong>Yahoo users were urged to change their passwords after hackers stole personal information associated with about half a billion email accounts. At the time, the numbers made it the biggest data breach in history. Initially, the casualties were reported at 500 million, still making <a href=\"https:\/\/www.cnet.com\/news\/yahoo-500-million-accounts-hacked-data-breach\/\">the hack the biggest in history<\/a>. Yahoo slowly <a href=\"https:\/\/www.cnet.com\/news\/yahoo-hack-1-billion-users-affected-2013-record\/\">raised the number<\/a> but reported in 2017 that none of its <a href=\"https:\/\/www.cnet.com\/news\/yahoo-announces-all-3-billion-accounts-hit-in-2013-breach\/\">3 billion accounts<\/a> had gone unscathed in the original breach. That&#8217;s 3 billion names, email addresses, telephone numbers, dates of birth, encrypted passwords and unencrypted security questions.&nbsp;<\/p>\n<p>The culprit? A <a href=\"https:\/\/www.cnet.com\/news\/russia-linked-hacker-gets-5-years-for-yahoo-security-breach\/\">23-year-old Russian hacker-for-hire named Karim Baratov<\/a>. Baratov was sentenced to five years in prison, paid the victims restitution and $2.25 million in fines. Yahoo didn&#8217;t go without punishment either. <a href=\"https:\/\/www.cnet.com\/news\/yahoo-must-pay-50m-in-damages-for-security-breach\/\">The company had to pay $50 million in damages<\/a> and provide credit monitoring for at least two years for about 200 million people who&#8217;d been hacked.<\/p>\n<div class=\"shortcode video v2\" data-video-playlist=\"[{&quot;id&quot;:&quot;f9b4e2b8-c64c-480f-afae-f0370f6a1db3&quot;,&quot;title&quot;:&quot;Capital One data breach: Here\\u0027s what to do&quot;,&quot;description&quot;:&quot;These tips will help protect you from the most recent bank hack.&quot;,&quot;slug&quot;:&quot;capital-one-data-breach-heres-what-to-do&quot;,&quot;chapters&quot;:{&quot;data&quot;:[],&quot;paging&quot;:{&quot;total&quot;:0,&quot;limit&quot;:15,&quot;offset&quot;:0}},&quot;datePublished&quot;:&quot;2019-08-02 20:25:40&quot;,&quot;duration&quot;:103,&quot;mpxRefId&quot;:&quot;jEZqEN57RlwnGCx0CFwniwYUEQtWgPdP&quot;,&quot;ratingVChip&quot;:&quot;TV-14&quot;,&quot;primaryTopic&quot;:{&quot;id&quot;:&quot;1c1fbb47-c387-11e2-8208-0291187b029a&quot;},&quot;author&quot;:{&quot;id&quot;:&quot;4fe6b73f-4208-46eb-bf9d-7bbac51263ce&quot;,&quot;firstName&quot;:&quot;Clifford&quot;,&quot;lastName&quot;:&quot;Colby&quot;},&quot;primaryCollection&quot;:{&quot;id&quot;:&quot;043b8a15-f01d-441a-8401-7db7466c3747&quot;,&quot;title&quot;:&quot;How To Video&quot;},&quot;image&quot;:{&quot;path&quot;:&quot;https:\\\/\\\/cnet3.cbsistatic.com\\\/img\\\/_vxZ3mfJNFcuOyJTgcLM0E_Mmu4=\\\/1280x720\\\/2019\\\/08\\\/02\\\/1c9e29a7-ee2a-4115-910c-cb6aa225a387\\\/capital-one-image.jpg&quot;},&quot;thumbnail&quot;:&quot;https:\\\/\\\/cnet2.cbsistatic.com\\\/img\\\/zG5AEVQZFa_mGVFtGJ-DmOJfrDs=\\\/194x109\\\/2019\\\/08\\\/02\\\/1c9e29a7-ee2a-4115-910c-cb6aa225a387\\\/capital-one-image.jpg&quot;,&quot;closedCaptionPath&quot;:&quot;\\\/videos\\\/captions\\\/webvtt\\\/capital-one-data-breach-heres-what-to-do.vtt&quot;,&quot;urlPath&quot;:&quot;\\\/videos\\\/capital-one-data-breach-heres-what-to-do\\\/&quot;,&quot;isVertical&quot;:false,&quot;m3u8&quot;:&quot;https:\\\/\\\/cnetvideo.cbsistatic.com\\\/vr\\\/2019\\\/08\\\/02\\\/1580650563528\\\/75264_hls\\\/master.m3u8&quot;,&quot;mp4&quot;:&quot;https:\\\/\\\/cnetmedia-a.akamaihd.net\\\/21923\\\/2019\\\/08\\\/02\\\/1580650563528\\\/HT_Capital_One_75263_740.mp4&quot;,&quot;index&quot;:0}]\" readability=\"6\">\n<div class=\"embeddedVideoContainer\" tabindex=\"0\" aria-label=\"Play video Capital One data breach: Here's what to do\" data-load-video=\"0\" data-video-id=\"f9b4e2b8-c64c-480f-afae-f0370f6a1db3\" readability=\"7\">\n<div class=\"videoContainer\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cnet2.cbsistatic.com\/img\/xkM-RMp96gcZNJef5f-d372Xd0A=\/196x110\/2019\/08\/02\/1c9e29a7-ee2a-4115-910c-cb6aa225a387\/capital-one-image.jpg\" class=\"photo\" alt height=\"110\" width=\"196\"><\/div>\n<p><span class=\"bold\"><span class=\"nowPlaying\">Now playing:<\/span> <span class=\"watchThis\">Watch this:<\/span><\/span> Capital One data breach: Here&#8217;s what to do<\/p>\n<p><span class=\"duration\">1:43<\/span><\/p>\n<\/div>\n<\/div>\n<footer class=\"row\"> <\/footer>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/30364\/Equifax-And-Beyond-A-List-Of-Major-Breaches.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":28249,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[7231],"class_list":["post-28248","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackerprivacycybercrimedata-lossfraudidentity-theft"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Equifax And Beyond: A List Of Major Breaches 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/equifax-and-beyond-a-list-of-major-breaches\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Equifax And Beyond: A List Of Major Breaches 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/equifax-and-beyond-a-list-of-major-breaches\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-05T14:42:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/equifax-and-beyond-a-list-of-major-breaches.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"5633\" \/>\n\t<meta property=\"og:image:height\" content=\"3653\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/equifax-and-beyond-a-list-of-major-breaches\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/equifax-and-beyond-a-list-of-major-breaches\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Equifax And Beyond: A List Of Major Breaches\",\"datePublished\":\"2019-08-05T14:42:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/equifax-and-beyond-a-list-of-major-breaches\\\/\"},\"wordCount\":1015,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/equifax-and-beyond-a-list-of-major-breaches\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/equifax-and-beyond-a-list-of-major-breaches.jpg\",\"keywords\":[\"headline,hacker,privacy,cybercrime,data loss,fraud,identity theft\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/equifax-and-beyond-a-list-of-major-breaches\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/equifax-and-beyond-a-list-of-major-breaches\\\/\",\"name\":\"Equifax And Beyond: A List Of Major Breaches 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/equifax-and-beyond-a-list-of-major-breaches\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/equifax-and-beyond-a-list-of-major-breaches\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/equifax-and-beyond-a-list-of-major-breaches.jpg\",\"datePublished\":\"2019-08-05T14:42:20+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/equifax-and-beyond-a-list-of-major-breaches\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/equifax-and-beyond-a-list-of-major-breaches\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/equifax-and-beyond-a-list-of-major-breaches\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/equifax-and-beyond-a-list-of-major-breaches.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/08\\\/equifax-and-beyond-a-list-of-major-breaches.jpg\",\"width\":5633,\"height\":3653},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/equifax-and-beyond-a-list-of-major-breaches\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,privacy,cybercrime,data loss,fraud,identity theft\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerprivacycybercrimedata-lossfraudidentity-theft\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Equifax And Beyond: A List Of Major Breaches\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Equifax And Beyond: A List Of Major Breaches 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/equifax-and-beyond-a-list-of-major-breaches\/","og_locale":"en_US","og_type":"article","og_title":"Equifax And Beyond: A List Of Major Breaches 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/equifax-and-beyond-a-list-of-major-breaches\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-08-05T14:42:20+00:00","og_image":[{"width":5633,"height":3653,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/equifax-and-beyond-a-list-of-major-breaches.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/equifax-and-beyond-a-list-of-major-breaches\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/equifax-and-beyond-a-list-of-major-breaches\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Equifax And Beyond: A List Of Major Breaches","datePublished":"2019-08-05T14:42:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/equifax-and-beyond-a-list-of-major-breaches\/"},"wordCount":1015,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/equifax-and-beyond-a-list-of-major-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/equifax-and-beyond-a-list-of-major-breaches.jpg","keywords":["headline,hacker,privacy,cybercrime,data loss,fraud,identity theft"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/equifax-and-beyond-a-list-of-major-breaches\/","url":"https:\/\/www.threatshub.org\/blog\/equifax-and-beyond-a-list-of-major-breaches\/","name":"Equifax And Beyond: A List Of Major Breaches 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/equifax-and-beyond-a-list-of-major-breaches\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/equifax-and-beyond-a-list-of-major-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/equifax-and-beyond-a-list-of-major-breaches.jpg","datePublished":"2019-08-05T14:42:20+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/equifax-and-beyond-a-list-of-major-breaches\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/equifax-and-beyond-a-list-of-major-breaches\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/equifax-and-beyond-a-list-of-major-breaches\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/equifax-and-beyond-a-list-of-major-breaches.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/08\/equifax-and-beyond-a-list-of-major-breaches.jpg","width":5633,"height":3653},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/equifax-and-beyond-a-list-of-major-breaches\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,privacy,cybercrime,data loss,fraud,identity theft","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerprivacycybercrimedata-lossfraudidentity-theft\/"},{"@type":"ListItem","position":3,"name":"Equifax And Beyond: A List Of Major Breaches"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28248","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=28248"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/28248\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/28249"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=28248"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=28248"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=28248"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}