{"version":"https://jsonfeed.org/version/1","title":"The Breach Report","home_page_url":"https://breachreports.org","description":"The Breach Report","author":{"name":"The Breach Report"},"items":[{"id":"the-stage-before-the-surge","html_content":"<img src=\"https://img1.wsimg.com/isteam/ip/4577a10d-fe91-44cc-a0a0-ac1e3add219a/The%20Stage%20Before%20the%20Surge.png\"/><p>A Staging Window Before a Surge of Attacks</p>","url":"https://breachreports.org/the-breach-report/f/the-stage-before-the-surge","title":"The Stage Before the Surge","date_modified":"2026-04-03T18:00:00Z"},{"id":"turning-the-tap","html_content":"<img src=\"https://img1.wsimg.com/isteam/ip/4577a10d-fe91-44cc-a0a0-ac1e3add219a/Turning%20the%20tap.png\"/><p>Published: March 17, 2026</p>","url":"https://breachreports.org/the-breach-report/f/turning-the-tap","title":"Turning the Tap","date_modified":"2026-03-27T18:00:00Z"},{"id":"critical-isn%E2%80%99t-critical-anymore-the-rise-of-%E2%80%9Cmax-severity%E2%80%9D","html_content":"<img src=\"https://img1.wsimg.com/isteam/ip/4577a10d-fe91-44cc-a0a0-ac1e3add219a/New%20Maximum%20Severity.png\"/><p>BreachReports.org Weekly | Special Analysis</p>","url":"https://breachreports.org/the-breach-report/f/critical-isn%E2%80%99t-critical-anymore-the-rise-of-%E2%80%9Cmax-severity%E2%80%9D","title":"Critical Isn’t Critical Anymore: The Rise of “Max Severity”","date_modified":"2026-03-20T18:00:00Z"},{"id":"cyber-warfare-reaches-us-hospitals","html_content":"<img src=\"https://img1.wsimg.com/isteam/ip/4577a10d-fe91-44cc-a0a0-ac1e3add219a/Stryker%20Breach%20Reports%20Cover%20image.png\"/><p>Stryker Attack Disrupts Medical Infrastructure - Secondary Attacks Possible</p>","url":"https://breachreports.org/the-breach-report/f/cyber-warfare-reaches-us-hospitals","title":"Cyber Warfare Reaches U.S. Hospitals","date_modified":"2026-03-13T18:00:00Z"},{"id":"top-cybersecurity-trends-2026","html_content":"<img src=\"https://img1.wsimg.com/isteam/ip/4577a10d-fe91-44cc-a0a0-ac1e3add219a/FBI%20Wiretap%20Breach%2003052026.png\"/><p>Published Date: March 6, 2026</p>","url":"https://breachreports.org/the-breach-report/f/top-cybersecurity-trends-2026","title":"Listening Posts Compromised: FBI Surveillance Systems Breached","date_modified":"2026-03-06T17:13:39Z"},{"id":"the-winter-of-shinyhunters-explained","html_content":"<img src=\"https://img1.wsimg.com/isteam/ip/4577a10d-fe91-44cc-a0a0-ac1e3add219a/SineyHunters.png\"/><p>Friday March 6, 2026</p>","url":"https://breachreports.org/the-breach-report/f/the-winter-of-shinyhunters-explained","title":"The Winter of ShinyHunters Explained","date_modified":"2026-03-06T17:12:19Z"},{"id":"%E2%80%9Cconduent-breach-expands-25-million-impacted-and-counting%E2%80%9D","html_content":"<img src=\"https://img1.wsimg.com/isteam/ip/4577a10d-fe91-44cc-a0a0-ac1e3add219a/Conduant%20Breach.png\"/><p>Friday February 27, 2026</p>","url":"https://breachreports.org/the-breach-report/f/%E2%80%9Cconduent-breach-expands-25-million-impacted-and-counting%E2%80%9D","title":"Conduent Breach Expands: 25+ Million Impacted and Counting","date_modified":"2026-02-27T18:00:00Z"},{"id":"emerging-trends-in-cybersecurity-for-2026","html_content":"<img src=\"https://img1.wsimg.com/isteam/ip/4577a10d-fe91-44cc-a0a0-ac1e3add219a/Wynn%20Breach.png\"/><p>Publication Date: Friday, February 27, 2026</p>","url":"https://breachreports.org/the-breach-report/f/emerging-trends-in-cybersecurity-for-2026","title":"Glitch in the Odds: Wynn Resorts ShinyHunters Breach","date_modified":"2026-02-27T18:00:00Z"},{"id":"telecom-giant-odido-62-million-customers-hit-in-dutch-breach","html_content":"<img src=\"https://img1.wsimg.com/isteam/ip/4577a10d-fe91-44cc-a0a0-ac1e3add219a/Odido%20Breach.png\"/><p>Friday February 20, 2026</p>","url":"https://breachreports.org/the-breach-report/f/telecom-giant-odido-62-million-customers-hit-in-dutch-breach","title":"Telecom Giant Odido: 6.2 Million Customers Hit in Dutch Breach","date_modified":"2026-02-20T18:00:00Z"},{"id":"%E2%80%9Cnearly-a-million-exposed-the-figure-technology-solutions-breach","html_content":"<img src=\"https://img1.wsimg.com/isteam/ip/4577a10d-fe91-44cc-a0a0-ac1e3add219a/Figure%20Breach.png\"/><p>Publication Date: Friday, February 13, 2026</p>","url":"https://breachreports.org/the-breach-report/f/%E2%80%9Cnearly-a-million-exposed-the-figure-technology-solutions-breach","title":"Nearly a Million Exposed: The Figure Technology Solutions Breach","date_modified":"2026-02-13T18:00:00Z"},{"id":"healthcare-held-hostage-change-healthcare-fallout-expands-again","html_content":"<img src=\"https://img1.wsimg.com/isteam/ip/4577a10d-fe91-44cc-a0a0-ac1e3add219a/Change%20Healthcare%20Breach.png\"/><p>Friday, February 6, 2026</p>","url":"https://breachreports.org/the-breach-report/f/healthcare-held-hostage-change-healthcare-fallout-expands-again","title":"Healthcare Held Hostage: Change Healthcare Fallout Expands Again","date_modified":"2026-02-06T18:00:00Z"},{"id":"insights-on-emerging-cyber-threats","html_content":"<img src=\"https://img1.wsimg.com/isteam/ip/4577a10d-fe91-44cc-a0a0-ac1e3add219a/Panera%20Breach.png\"/><p>Friday January 30, 2026</p>","url":"https://breachreports.org/the-breach-report/f/insights-on-emerging-cyber-threats","title":"The Bread That Crumbled: Panera Bread’s ShinyHunters Leak","date_modified":"2026-01-30T18:00:00Z"},{"id":"crunchbase-targets-compromised-2m-business-records-dumped","html_content":"<img src=\"https://img1.wsimg.com/isteam/ip/4577a10d-fe91-44cc-a0a0-ac1e3add219a/Crunchbase%20Breach.png\"/><p>Friday January 23, 2026</p>","url":"https://breachreports.org/the-breach-report/f/crunchbase-targets-compromised-2m-business-records-dumped","title":"Crunchbase Targets Compromised: 2M+ Business Records Dumped","date_modified":"2026-01-23T18:00:00Z"},{"id":"ice-border-patrol-insider-leak-government-pii-exposed","html_content":"<img src=\"https://img1.wsimg.com/isteam/ip/4577a10d-fe91-44cc-a0a0-ac1e3add219a/ICE%20Breach.png\"/><p>Friday January 16, 2026</p>","url":"https://breachreports.org/the-breach-report/f/ice-border-patrol-insider-leak-government-pii-exposed","title":"ICE & Border Patrol Insider Leak: Government PII Exposed","date_modified":"2026-01-16T18:00:00Z"}]}