Live disclosure tracker · updated continuously

Technology & Software Data Breaches

SaaS platforms, cloud providers, developer tooling, and app-layer infrastructure are concentrated attack surfaces. One tech vendor breach can expose thousands of downstream customers. Below is every tech-sector breach LeakTrace has indexed.

98B+
Records Exposed
1144
Incidents
94+
Countries
+104%
Breach Velocity YoY
Browse by sector
All breaches Healthcare Finance Government Technology Retail Education Legal
Browse by year
2024 2025 2026

Technology & Software Data Breaches (1144 indexed)

medium · tech · Apr 30, 2026

SAP npm package attack highlights

A supply chain attack on SAP-related npm packages has put fresh scrutiny on the developer tools and build workflows that enterprises rely on to produce software. The campaign, referred to as “mini Shai-Hulud,” affecte

View incident → Original disclosure Indexed 2 days, 3 hours ago
high · tech · Apr 28, 2026

ConnectWise ScreenConnect

ConnectWise ScreenConnect Path Traversal Vulnerability — ConnectWise ScreenConnect contains a path traversal vulnerability which could allow an attacker to execute remote code or directly impact confidential data and cri

View incident → Original disclosure Indexed 4 days, 3 hours ago
high · tech · Apr 28, 2026

Microsoft Windows

Microsoft Windows Protection Mechanism Failure Vulnerability — Microsoft Windows Shell contains a protection mechanism failure vulnerability that allows an unauthorized attacker to perform spoofing over a network.

View incident → Original disclosure Indexed 4 days, 3 hours ago
high · tech · Apr 24, 2026

Samsung MagicINFO 9 Server

Samsung MagicINFO 9 Server Path Traversal Vulnerability — Samsung MagicINFO 9 Server contains a path traversal vulnerability that could allow an attacker to write arbitrary files as system authority.

View incident → Original disclosure Indexed 1 week, 1 day ago
high · tech · Apr 24, 2026

SimpleHelp SimpleHelp

SimpleHelp Missing Authorization Vulnerability — SimpleHelp contains a missing authorization vulnerability that could allow low-privileged technicians to create API keys with excessive permissions. These API keys can be

View incident → Original disclosure Indexed 1 week, 1 day ago
high · tech · Apr 24, 2026

D-Link DIR-823X

D-Link DIR-823X Command Injection Vulnerability — D-Link DIR-823X contains a command injection vulnerability that allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to

View incident → Original disclosure Indexed 1 week, 1 day ago
high · tech · Apr 24, 2026

SimpleHelp SimpleHelp

SimpleHelp Path Traversal Vulnerability — SimpleHelp contains a path traversal vulnerability that allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file (i.e. zip slip).

View incident → Original disclosure Indexed 1 week, 1 day ago
high · tech · Apr 23, 2026

Marimo Marimo

Marimo Remote Code Execution Vulnerability — Marimo contains an pre-authorization remote code execution vulnerability, allowing an unauthenticated attacked to shell access and execute arbitrary system commands.

View incident → Original disclosure Indexed 1 week, 2 days ago
critical · tech · Apr 23, 2026

RAMP Uncovered

Pierluigi Paganini reports: A leaked database from RAMP gives us a rare look behind the curtain. It shows how cybercrime works when it becomes structured, commercial, and repeatable. Instead of random hackers acting alon

View incident → Original disclosure Indexed 1 week, 2 days ago
high · tech · Apr 22, 2026

Microsoft Defender

Microsoft Defender Insufficient Granularity of Access Control Vulnerability — Microsoft Defender contains an insufficient granularity of access control vulnerability that could allow an authorized attacker to escalate pr

View incident → Original disclosure Indexed 1 week, 3 days ago
medium · tech · Apr 22, 2026

BlueLeaks 2.0

Overview and Background This is the first of what will likely be several updates to this site’s exclusive reporting on the “BlueLeaks 2.0” incident that exposed anonymous and sensitive tips by and about

View incident → Original disclosure Indexed 1 week, 3 days ago
high · tech · Apr 20, 2026

Cisco Catalyst SD-WAN Manager

Cisco Catalyst SD-WAN Manager Exposure of Sensitive Information to an Unauthorized Actor Vulnerability — Cisco Catalyst SD-WAN Manager contains an exposure of sensitive information to an unauthorized actor vulnerability

View incident → Original disclosure Indexed 1 week, 5 days ago