<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0">
  <channel xmlns:atom="http://www.w3.org/2005/Atom">
    <title>Have I Been Pwned latest breaches</title>
    <link>https://haveibeenpwned.com/</link>
    <description>The latest publicly leaked data breaches to hit Have I Been Pwned</description>
    <atom:link href="https://haveibeenpwned.com/feed/breaches/" rel="self" type="application/rss+xml" />
    <item>
      <guid isPermaLink="false">Vimeo</guid>
      <link>https://haveibeenpwned.com/Breach/Vimeo</link>
      <title>Vimeo - 119,167 breached accounts</title>
      <description>In April 2026, the ShinyHunters extortion group &lt;a href="https://www.bleepingcomputer.com/news/security/video-service-vimeo-confirms-anodot-breach-exposed-user-data/" target="_blank" rel="noopener"&gt;listed Vimeo on their extortion portal as part of their "pay or leak" campaign&lt;/a&gt;. They subsequently published hundreds of gigabytes of data, predominantly consisting of video titles, technical data and metadata. The data also included 119k unique email addresses, sometimes accompanied by names. &lt;a href="https://vimeo.com/blog/post/anodot-third-party-security-incident" target="_blank" rel="noopener"&gt;Vimeo attributed the exposure&lt;/a&gt; to a breach of Anodot, a third-party analytics vendor, and advised the incident &lt;em&gt;does not&lt;/em&gt; include "Vimeo video content, valid user login credentials, or payment card information".</description>
      <pubDate>Tue, 05 May 2026 02:08:50 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">RebornGaming</guid>
      <link>https://haveibeenpwned.com/Breach/RebornGaming</link>
      <title>Reborn Gaming - 126 breached accounts</title>
      <description>In April 2026, the gaming community &lt;a href="https://reborngaming.net/threads/6120/" target="_blank" rel="noopener"&gt;Reborn Gaming suffered a data breach due to a vulnerability in cPanel and WebHost Manager (WHM)&lt;/a&gt;. The breach exposed 126 unique email addresses along with IP addresses and Steam IDs. Reborn Gaming self-submitted the data to Have I Been Pwned.</description>
      <pubDate>Mon, 04 May 2026 03:43:06 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">MarcusMillichap</guid>
      <link>https://haveibeenpwned.com/Breach/MarcusMillichap</link>
      <title>Marcus &amp; Millichap - 1,837,078 breached accounts</title>
      <description>In April 2026, the commercial real estate brokerage firm &lt;a href="https://www.scworld.com/brief/multiple-other-companies-purportedly-breached-by-shinyhunters-over-9m-record-leak-warned" target="_blank" rel="noopener"&gt;Marcus &amp; Millichap was named as one of multiple alleged victims of the ShinyHunters hacking and extortion group&lt;/a&gt;. Data alleged to have been obtained from the company was subsequently released publicly and included 1.8M unique email addresses, along with names, phone numbers and employment-related information including employer, job title and physical company address. In &lt;a href="https://www.marcusmillichap.com/news-events/press/2026/04/marcus-millichap-releases-information-regarding-cybersecurity-incident" target="_blank" rel="noopener"&gt;their disclosure notice&lt;/a&gt;, Marcus &amp; Millichap advised that data which may have been accessed appeared limited to "company forms, templates, marketing materials, and general contact information".</description>
      <pubDate>Sun, 03 May 2026 22:53:12 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">ZenBusiness</guid>
      <link>https://haveibeenpwned.com/Breach/ZenBusiness</link>
      <title>ZenBusiness - 5,118,184 breached accounts</title>
      <description>In March 2026, &lt;a href="https://cybernews.com/security/zenbusiness-shinyhunters-data-breach-mark-cuban/" target="_blank" rel="noopener"&gt;the hacker and extortion group "ShinyHunters" claimed to have obtained a substantial corpus of data from ZenBusiness&lt;/a&gt;, a business formation and compliance platform. The group claimed the data had been exfiltrated from platforms including Snowflake, Mixpanel and Salesforce, and threatened to publish it if a ransom was not paid. The following month, after claiming payment had not been made, ShinyHunters publicly released the data. The collection amounted to many terabytes across thousands of files that appeared to originate from multiple systems and business functions, including leads, support records and other CRM-related data. The data contained approximately 5M unique email addresses, often accompanied by name and phone number depending on the source file.</description>
      <pubDate>Sat, 02 May 2026 05:53:38 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">Aman</guid>
      <link>https://haveibeenpwned.com/Breach/Aman</link>
      <title>Aman - 215,563 breached accounts</title>
      <description>In April 2026, the ultra-luxury hotel brand &lt;a href="https://www.scworld.com/brief/multiple-other-companies-purportedly-breached-by-shinyhunters-over-9m-record-leak-warned" target="_blank" rel="noopener"&gt;Aman was named by ShinyHunters as the target of a "pay or leak" extortion campaign&lt;/a&gt;, with the data allegedly obtained from their Salesforce CRM. The data was subsequently leaked publicly and contained over 200k unique email addresses. Whilst not present on all records, the data also included genders, physical addresses, phone numbers, nationalities, dates of birth, spouse names and VIP status codes.</description>
      <pubDate>Fri, 01 May 2026 03:34:30 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">PitneyBowes</guid>
      <link>https://haveibeenpwned.com/Breach/PitneyBowes</link>
      <title>Pitney Bowes - 8,243,989 breached accounts</title>
      <description>In April 2026, the hacking collective &lt;a href="https://breachnews.com/breaches/shinyhunters-lists-new-victims-including-zara-7-eleven-and-pitney-bowes-in-alleged-data-release/" target="_blank" rel="noopener"&gt;ShinyHunters claimed to have obtained data from Pitney Bowes&lt;/a&gt; as part of a broader extortion campaign that also named several other organisations. After negotiations allegedly failed, the group publicly released the data which included 8.2M unique email addresses, along with names, phone numbers and physical addresses. A subset of the data also included Pitney Bowes employee records with job titles.</description>
      <pubDate>Mon, 27 Apr 2026 22:52:07 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">ADT</guid>
      <link>https://haveibeenpwned.com/Breach/ADT</link>
      <title>ADT - 5,488,888 breached accounts</title>
      <description>In April 2026, home security firm &lt;a href="https://www.bleepingcomputer.com/news/security/adt-confirms-data-breach-after-shinyhunters-leak-threat/" target="_blank" rel="noopener"&gt;ADT confirmed a data breach by ShinyHunters&lt;/a&gt;, which listed the company on its website as part of a "pay or leak" extortion attempt. The breach impacted 5.5M unique email addresses along with names, phone numbers and physical addresses. ADT also advised that "in a small percentage of cases, dates of birth and the last four digits of Social Security numbers or Tax IDs were included" and that it had contacted all affected people.</description>
      <pubDate>Mon, 27 Apr 2026 07:36:42 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">Udemy</guid>
      <link>https://haveibeenpwned.com/Breach/Udemy</link>
      <title>Udemy - 1,401,259 breached accounts</title>
      <description>In April 2026, online training company &lt;a href="https://cybernews.com/security/shinyhunters-claim-udemy-data-theft/" target="_blank" rel="noopener"&gt;Udemy was the victim of a “pay or leak” extortion attempt&lt;/a&gt; perpetrated by the ShinyHunters group. The data was subsequently leaked publicly and contained 1.4M unique email addresses belonging to customers and instructors. The data also included names, physical addresses, phone numbers, employer information and instructor payout methods including PayPal, cheque and bank transfer.</description>
      <pubDate>Sun, 26 Apr 2026 23:01:50 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">Carnival</guid>
      <link>https://haveibeenpwned.com/Breach/Carnival</link>
      <title>Carnival - 7,531,359 breached accounts</title>
      <description>In April 2026, the notorious hacking collective &lt;a href="https://cyberinsider.com/carnival-corporation-probes-data-breach-after-claims-of-8-7m-records-theft/" target="_blank" rel="noopener"&gt;ShinyHunters claimed they had obtained a substantial volume of data belonging to the Carnival cruise operator&lt;/a&gt; and attempted to extort the organisation to prevent the data from being leaked. The following week, the group published the data publicly, which contained 8.7M records with 7.5M unique email addresses. The data contained fields indicating it related to the Mariner Society loyalty program run by Holland America, a cruise line brand under Carnival, and included names, dates of birth, genders and data relating to status within the loyalty program. Carnival acknowledged a phishing incident involving a single user account and advised they were working to better understand the scope of the unauthorised activity.</description>
      <pubDate>Fri, 24 Apr 2026 01:58:19 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">Amtrak</guid>
      <link>https://haveibeenpwned.com/Breach/Amtrak</link>
      <title>Amtrak - 2,147,679 breached accounts</title>
      <description>In April 2026, the hacking group &lt;a href="https://cybernews.com/security/hackers-threaten-amtrak-data-leak/" target="_blank" rel="noopener"&gt;ShinyHunters claimed they had breached Amtrak&lt;/a&gt;. The group typically compromises organisations' Salesforce instances before demanding a ransom and later, if not paid, dumping the data publicly. They subsequently published the alleged data which contained over 2M unique email addresses along with names, physical addresses and customer support records.</description>
      <pubDate>Fri, 17 Apr 2026 04:54:48 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">McGrawHill</guid>
      <link>https://haveibeenpwned.com/Breach/McGrawHill</link>
      <title>McGraw Hill - 13,500,136 breached accounts</title>
      <description>In April 2026, education company &lt;a href="https://www.bleepingcomputer.com/news/security/mcgraw-hill-confirms-data-breach-following-extortion-threat/" target="_blank" rel="noopener"&gt;McGraw Hill confirmed a data breach following an extortion attempt&lt;/a&gt;. Attributed to a Salesforce misconfiguration, the company stated the incident exposed "a limited set of data from a webpage hosted by Salesforce on its platform". More than 100GB of data was later publicly distributed, containing 13.5M unique email addresses across multiple files, with additional fields such as name, physical address and phone number appearing inconsistently across some records.</description>
      <pubDate>Thu, 16 Apr 2026 01:31:14 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">Hallmark</guid>
      <link>https://haveibeenpwned.com/Breach/Hallmark</link>
      <title>Hallmark - 1,736,520 breached accounts</title>
      <description>In March 2026, &lt;a href="https://cybernews.com/security/hallmark-data-breach-shinyhunters/" target="_blank" rel="noopener"&gt;Hallmark suffered an alleged breach and subsequent extortion&lt;/a&gt; after attackers gained access to data stored within Salesforce. The data was later published after the extortion deadline passed, exposing 1.7M unique email addresses across both Hallmark and the Hallmark+ streaming service, along with names, phone numbers, physical addresses and support tickets.</description>
      <pubDate>Sun, 12 Apr 2026 02:01:11 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">MyLovelyAI</guid>
      <link>https://haveibeenpwned.com/Breach/MyLovelyAI</link>
      <title>My Lovely AI - 106,271 breached accounts</title>
      <description>In April 2026, the NSFW AI girlfriend platform &lt;a href="https://dailydarkweb.net/mylovely-ai-data-breach-exposes-private-content-of-over-106000-users/" target="_blank" rel="noopener"&gt;My Lovely AI suffered a data breach that exposed over 100k users&lt;/a&gt;. The data included user-created prompts and links to the resulting AI-generated images, along with a small number of Discord and X usernames.</description>
      <pubDate>Wed, 08 Apr 2026 03:40:14 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">Crunchyroll</guid>
      <link>https://haveibeenpwned.com/Breach/Crunchyroll</link>
      <title>Crunchyroll - 1,195,684 breached accounts</title>
      <description>In March 2026, the anime streaming service &lt;a href="https://www.bleepingcomputer.com/news/security/crunchyroll-probes-breach-after-hacker-claims-to-steal-68m-users-data/" target="_blank" rel="noopener"&gt;Crunchyroll suffered a data breach alleged to have impacted 6.8M users&lt;/a&gt;. The exposed data is reported to have originated from the company's Zendesk support system where "name, login name, email address, IP address, general geographic location and the contents of the support tickets" were exposed. &lt;a href="https://x.com/IntCyberDigest/status/2040197865369125022" target="_blank" rel="noopener"&gt;A subset of 1.2M email addresses from an alleged 2M record dataset being sold was later provided to HIBP.&lt;/a&gt;</description>
      <pubDate>Sat, 04 Apr 2026 04:47:29 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">SongTrivia2</guid>
      <link>https://haveibeenpwned.com/Breach/SongTrivia2</link>
      <title>SongTrivia2 - 291,739 breached accounts</title>
      <description>In April 2026, the music trivia platform &lt;a href="https://x.com/DarkWebInformer/status/2039804363225391147" target="_blank" rel="noopener"&gt;SongTrivia2 suffered a data breach that was subsequently published to a public hacking forum&lt;/a&gt;. The data contained a total of 291k unique email addresses sourced from either Google OAuth logins or accounts created on the site, the latter also containing bcrypt password hashes. The data also included names, usernames and avatars.</description>
      <pubDate>Sat, 04 Apr 2026 01:59:01 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">SUCCESS</guid>
      <link>https://haveibeenpwned.com/Breach/SUCCESS</link>
      <title>SUCCESS - 253,510 breached accounts</title>
      <description>In March 2026, the personal development and achievement media brand &lt;a href="https://x.com/DarkWebInformer/status/2039094399594897818" target="_blank" rel="noopener"&gt;SUCCESS suffered a data breach&lt;/a&gt;. The incident exposed 250k unique email addresses along with names, IP addresses, phone numbers and, for a limited number of staff members, bcrypt password hashes. The data also included orders containing physical addresses and the payment method used. In &lt;a href="https://www.success.com/inside-success/security-update" target="_blank" rel="noopener"&gt;SUCCESS' disclosure notice&lt;/a&gt;, they advised their system had also been abused to send offensive newsletters with quotes falsely attributed to contributors.</description>
      <pubDate>Wed, 01 Apr 2026 06:51:14 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">CutiesAI</guid>
      <link>https://haveibeenpwned.com/Breach/CutiesAI</link>
      <title>Cuties AI - 144,250 breached accounts</title>
      <description>In March 2026, the NSFW AI companion platform &lt;a href="https://x.com/DarkWebInformer/status/2036476854958178811" target="_blank" rel="noopener"&gt;Cuties AI suffered a data breach that was subsequently published to a public hacking forum&lt;/a&gt;. The incident exposed 144k unique email addresses along with display names, avatars, prompts and descriptions used to generate AI adult images, as well as URLs to the generated content. The data also included the account that created the content and a stated "preference" of either female or trans.</description>
      <pubDate>Tue, 31 Mar 2026 06:52:52 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">BreachForumsV5</guid>
      <link>https://haveibeenpwned.com/Breach/BreachForumsV5</link>
      <title>BreachForums Version 5 - 339,778 breached accounts</title>
      <description>In March 2026, &lt;a href="https://x.com/DarkWebInformer/status/2037305685965148419" target="_blank" rel="noopener"&gt;a breach of one of the many iterations of the BreachForums hacking forum known as "Version 5" was publicly disclosed&lt;/a&gt;. The incident exposed 340k unique email addresses along with usernames and argon2 password hashes.</description>
      <pubDate>Fri, 27 Mar 2026 02:19:23 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">ScufGaming</guid>
      <link>https://haveibeenpwned.com/Breach/ScufGaming</link>
      <title>Scuf Gaming - 128,683 breached accounts</title>
      <description>In June 2015, custom gaming controller maker &lt;a href="https://www.malwarebytes.com/blog/news/2015/06/up-down-left-right-hack" target="_blank" rel="noopener"&gt;Scuf Gaming suffered a data breach&lt;/a&gt;. The incident exposed 129k unique email addresses along with usernames, display names, IP addresses and password hashes.</description>
      <pubDate>Thu, 26 Mar 2026 05:31:26 Z</pubDate>
    </item>
    <item>
      <guid isPermaLink="false">SoundRadix</guid>
      <link>https://haveibeenpwned.com/Breach/SoundRadix</link>
      <title>Sound Radix - 292,993 breached accounts</title>
      <description>In March 2026, the audio production tools company &lt;a href="https://support.soundradix.com/support/solutions/articles/5000900043" target="_blank" rel="noopener"&gt;Sound Radix disclosed a data breach that they subsequently self-submitted to HIBP&lt;/a&gt;. The incident impacted 293k unique email addresses and names. Sound Radix advised that it is possible that additional data including hashed passwords may have been exposed, and that no financial or credit card information was impacted.</description>
      <pubDate>Thu, 26 Mar 2026 00:06:29 Z</pubDate>
    </item>
  </channel>
</rss>